Chrome Extension
WeChat Mini Program
Use on ChatGLM

Design And Implementation Of Integrated Service Penetration Technology Cross Security Region

2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2)(2018)

Cited 1|Views3
No score
Abstract
In the power dispatching automation system, production control security region and management information security region adopt forward and backward isolation devices for physical isolation, with the enhancement of the functional relevance between the security regions and the expansion of the system functions, one-way synchronization of production control security region to management information security region has been unable to meet the requirements of application expansion of supervisory control. In accordance with the principles of safety protection standards, it is urgent to establish a data transmission mechanism that can cross the forward and backward isolation, realize service penetration cross the security region. In this paper, a scheme of integrated service invocation across the security region is proposed, which can be invoked by the service bus that can be transparent and unaware service bus, encapsulate cross domain service protocol, establish virtual access, and complete service invocation. Through the signature verification technology, the service message is tampered in the communication, the communication security of the service invocation is guaranteed, the rights of the service are obtained through the authorization and the security of the service invocation cross the security region. The integrated service invocation technology cross the security region has been applied in Jiangsu Province, Beijing and Hangzhou. It provides a safe and stable support for the construction of the grand operation system, and provides a powerful guarantee for the efficient operation of the power grid.
More
Translated text
Key words
isolation device, cross security region, services integration, service invocation, authority authentication
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined