Open Access

Table 2

Performance of the Energy Internet access control

Experimental content Method of the experiment Results
Verification of equipment attributes and integrity information The system will verify the attributes and integrity of the collected devices when they are accessed again There were no exception, runtime between 2.24-4.31 s with an average runtime of 3.58 s
Collection of device properties and integrity information Terminal attributes and integrity information are collected during user login verification There were no exception, runtime between 4.98-7.09 s with an average runtime of 6.64 s
External security equipment access verification The external security device is the USB key. User inserts USB Key device to verify PIN code (ignore user input time) There were no exception, response time between 0.09-0.18 s and the average response time was 0.14 s
Verify user personal identity security First, the user enters the user name and password, and then the security authentication center completes the Energy Internet identity authentication (the user input time is not calculated) There were no exception, with a response time between 0.17-0.32 s, and the average response time was 0.22 s
Energy Internet resource access request The user refreshes the resource request list for a trusted server response There were no exception, response time between 0.44-0.70 s and the average response time was 0.55 s
Energy and Internet resource operation Test users use the terminal for Energy Internet data upload and download function There is no exception

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.