학술논문

Research on Omni-Channel Access Technology Based on Energy Internet Marketing Service System
Document Type
Conference
Source
2023 International Conference on Applied Physics and Computing (ICAPC) ICAPC Applied Physics and Computing (ICAPC), 2023 International Conference on. :55-59 Dec, 2023
Subject
Computing and Processing
Systematics
Power supplies
Shape
Scalability
Energy Internet
Production
Security
energy internet marketing service system
electric power marketing
channel access
Language
Abstract
With the deepening of power system reform and the implementation of the dual-carbon strategy, the construction of new electric power system has accelerated and the market shape and energy ecology have undergone profound changes. The channel business has many channel types, business needs, access methods and cannot get through to each other, among other problems. The power marketing business has gradually changed from a single power supply service to a comprehensive energy service such as distributed power supply, energy efficiency services, multi-energy supply, customer-side energy storage and carbon trading. And power customers are accelerating their transformation from a single electricity consumer to a multiple complex that encompasses production, consumption, trading and energy conservation. And the transaction relationship has gradually changed from the form of unidirectional static to multi-directional dynamic. We need to overcome the management needs and existing problems after multi-channel access. It is necessary to build a fully functional energy Internet marketing service system that achieves unified management of third-party channel access, unified service authorization and unified service operation monitoring. Based on multi-table integrated pre-system, provincial direct collection platform and government service platform, we studied the design ideas and construction content of omnichannel service agency, operation, architecture, and management functions, and designed network boundary protection, data transmission, and storage technologies. Finally, we implemented system security protection and analyzed the case.