Electric Power ›› 2017, Vol. 50 ›› Issue (11): 72-77.DOI: 10.11930/j.issn.1004-9649.201701034

• Innovation & Practice of Technical Standards • Previous Articles     Next Articles

Interpretation and Application for DL/T 1527—2016 Technology Specification of Electric Power Utilization Information Security Protection

ZHAO Bing1, FENG Zhancheng1, CEN Wei1, LIANG Xiaobing1, LI Haibo2   

  1. 1. China Electric Power Research Institute, Beijing 100192, China;
    2. State Grid Eastern Inner Mongolia Wenniute Banner Power Supply Company, Chifeng 024000, China
  • Received:2017-01-20 Online:2017-11-25 Published:2017-11-29
  • Supported by:
    This work is supported by Science and Technology Innovation Fund Project of China Electric Power Research Institute (No. JL83-17-003).

Abstract: In order to enhance power information system security and to ensure information system data and network safety, the China Electric Power Research Institute organized formulation of DL/T 1527-2016 technology specification of electric power utilization information security protection. The specification provides security protection technology and management requirements for electricity information system and related components. The logical structure of electricity information system is analyzed first. Detailed interpretation on some key issues in the specification is performed. Based on standard interpretation,security encryption devices including cipher machine, security encryption module and special encryption isolation gateway are also developed. Finally, a double-deck security communication protocol is designed to guarantee safety and reliability of electricity information system.

Key words: power information system, DL/T 1527-2016, security protection strategy, security encryption devices, security interaction protocol

CLC Number: