Patent classifications
Y04S40/20
AUTONOMOUS TOPOLOGY VALIDATION FOR ELECTRICAL SUPPLY NETWORK
A system for autonomously validating the topology information of an electrical power distribution system is provided. For example, the system includes a group of meters previously determined to be connected to the same transformer of an electrical power distribution system. The group of meters is configured to perform family check periodically or upon request and to identify orphan meters in the group. The identified orphan meter can contact a community device communicatively connected to meters in more than one group to request a community check. The community device performs the community check by contacting meters in other groups of meters and obtain their family signature data. The community device further determines whether the orphan meter belongs to a new family based on the voltage data of the orphan meter and the family signature data of other groups. The orphan meter can report the community check results to a headend system.
Systems and Methods for Malicious Attack Detection in Phasor Measurement Unit Data
A method for determining whether a power system is encountering a malicious attack is provided. The method comprises: receiving a plurality of first phasor measurement unit (PMU) measurements from a plurality of PMUs of the power system; determining a plurality of expected PMU measurements associated with a future time period based on an optimization algorithm that uses differences between a plurality of consecutive predictive entries and the plurality of first PMU measurements; receiving, from the plurality of PMUs, a plurality of second PMU measurements associated with the future time period; determining whether the power system is encountering the malicious attack based on comparing the plurality of expected PMU measurements with the plurality of second PMU measurements; and executing an action based on whether the power system is encountering the malicious attack.
SYSTEMS AND METHODS FOR ESTABLISHING A SECURE COMMUNICATION LINK IN AN ELECTRIC POWER DELIVERY SYSTEM
A non-transitory computer readable medium includes instructions that, when executed by processing circuitry, are configured to cause the processing circuitry to operate in a recovery mode after initiating a startup operation, transmit a data frame to a device of an electric power delivery system during the recovery mode, the data frame indicating a request for a security association key (SAK), receive the SAK from the device in response to transmitting the data frame, and use the SAK to communicate data via a media access control security (MACsec) communication link.
Computational framework for modeling of physical process
Techniques, systems, and devices are described for providing a computational frame for estimating high-dimensional stochastic behaviors. In one exemplary aspect, a method for performing numerical estimation includes receiving a set of measurements of a stochastic behavior. The set of correlated measurements follows a non-standard probability distribution and is non-linearly correlated. Also, a non-linear relationship exists between a set of system variables that describes the stochastic behavior and a corresponding set of measurements. The method includes determining, based on the set of measurements, a numerical model of the stochastic behavior. The numerical model comprises a feature space comprising non-correlated features corresponding to the stochastic behavior. The non-correlated features have a dimensionality of M and the set of measurements has a dimensionality of N, M being smaller than N. The method includes generating a set of approximated system variables corresponding to the set of measurements based on the numerical model.
Authentication apparatus, system and methods using unclonable identifiers
An integrated circuit having Radio Frequency Identification components and circuitry used for authentication is discussed. The RFID components and circuitry include two or more coils and corresponding electrical circuits that are tuned to use two or more different resonant frequencies including: a first resonant RF used for power generation and a second resonant RF used for data communication. The integrated circuit contains a unique signature that is used for the authentication with two or more aspects including i) a first aspect that is a programmed password in a memory embedded on the integrated circuit, and ii) a second aspect that is a unique, randomly generated code based upon a physical characteristic of the integrated circuit.
Systems and methods for control system security
A component security device may be disposed at an interface between a component and a cyber-physical system. The disclosed component security device may be physically and/or electrically coupled between the component and infrastructure of the cyber-physical system, such as a backplane, bus, and/or the like. The component security device may be configured to monitor the component, and selectively isolate the component from the cyber-physical system. Since the component security device is interposed at the interface of the component, the component security device may be capable of isolating the component regardless of whether the component has been compromised (e.g., regardless of whether the component is capable of complying with system commands).
Test and control apparatus, system and method for wind farm
A test and control apparatus, system and method for a wind farm, are provided. The test and control apparatus includes a first communication interface, a second communication interface, and a processor card. The processor card receives, via the first communication interface, a frequency regulation instruction issued by the grid scheduling server, receives operation information of the wind power generation unit via the second communication interface, and calculates, based on the operation information of the wind power generation unit, a first frequency regulation capability of the wind power generation unit performing a frequency regulation without using the first energy storage battery. The processor card sends the frequency regulation instruction to the wind power generation unit without using the first energy storage battery, in a case that the first frequency regulation capability of the wind power generation unit satisfies a requirement of the frequency regulation instruction.
Industrial data verification using secure, distributed ledger
A verification platform may include a data connection to receive a stream of industrial asset data, including a subset of the industrial asset data, from industrial asset sensors. The verification platform may store the subset of industrial asset data into a data store, the subset of industrial asset data being marked as invalid, and record a hash value associated with a compressed representation of the subset of industrial asset data combined with metadata in a secure, distributed ledger (e.g., associated with blockchain technology). The verification platform may then receive a transaction identifier from the secure, distributed ledger and mark the subset of industrial asset data in the data store as being valid after using the transaction identifier to verify that the recorded hash value matches a hash value of an independently created version of the compressed representation of the subset of industrial asset data combined with metadata.
Method of generating a secret key for data communication and key generator thereof
A method for generating a secret key at a first node for data communication between the first node and a second node. A channel estimate of a communication channel between the first and second nodes is obtained. A time-frequency matrix associated with the communication channel is then obtained based on the time-frequency transformation of the channel estimate. The secret key is then produced based on the time-frequency matrix. Furthermore, a corresponding key generator may be provided for generating a secret key.
Method, system and storage medium for load dispatch optimization for residential microgrid
The present invention provides a method, system and storage medium for load dispatch optimization for residential microgrid. The method includes collecting environmental data and time data of residential microgrid in preset future time period; obtaining power load data of residential microgrid in future time period by inputting environmental data and time data into pre-trained load forecasting model; obtaining photovoltaic output power data of residential microgrid in future time period by inputting environmental data and time data into pre-trained photovoltaic output power forecasting model; determining objective function and corresponding constraint condition of residential microgrid in future time period, where optimization objective of objective function is to minimize total cost of residential microgrid; obtaining load dispatch scheme of residential microgrid in future time period by solving objective function with particle swarm algorithm. The invention can provide load dispatch scheme suitable for current microgrid and reduce operating cost of residential microgrid.