An authentication method for terminal trusted access in smart grid

A technology of smart grid and authentication method, applied in the field of security authentication, can solve the problems of slow process, collapse of authentication system, easy information theft, etc., to achieve the effect of improving life cycle and energy control, ensuring context privacy, simple and easy to implement

Inactive Publication Date: 2017-06-13
STATE GRID CHONGQING ELECTRIC POWER
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the trusted access of smart grid terminals cannot be realized, it will affect the effective development of the smart grid, and may even lead to the termination of the development of the smart grid.
Since the traditional trusted access authentication method is only aimed at small and simple network systems, direct application to the smart grid may cause the following problems: (1) The open nature of the wireless channel makes the smart grid easy to be monitored, resulting in network During the data transmission process, the information is easy to be stolen. Malicious attackers can use the stolen information to counterfeit the access terminal to access the power grid
(2) As the number of users increases, adopting the traditional authentication method may lead to the collapse of the authentication system, and may also slow down the user authentication process, resulting in an excessive accumulation of users in the system and making it impossible for users to pass the authentication normally. into the smart grid
(3) Traditional authentication methods may directly use terminal information to verify user legitimacy, which may lead to tampering before the information is transmitted to the authentication server, resulting in leakage of user information, thereby affecting the credibility, reliability, and security of the entire system
[0005] At present, there is a trusted access technology that can realize trusted authentication of smart grid terminal access, but due to too many system components, complex system layers, and lack of reliable scalability, the entire access authentication process becomes Complicated and slow, it cannot meet the requirements of fast authentication and access for a large number of smart grid users. At the same time, the huge system structure of the trusted access technology makes the deployment of the system unable to achieve the requirements of intelligent and precise, thus making the smart grid The development is hindered, so it is necessary to propose a small, reliable and safe new authentication access system to meet the needs of the future development of the smart grid, and at the same time improve the convenience and security of smart grid users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method for terminal trusted access in smart grid
  • An authentication method for terminal trusted access in smart grid
  • An authentication method for terminal trusted access in smart grid

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Embodiments of the present invention are described in detail below, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals represent the same or similar processes or have the same or similar methods throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0046] In the description of the present invention, unless otherwise specified and limited, it should be noted that the terms "installation", "connection" and "connection" should be understood in a broad sense, for example, the connection between system levels can also be two The connection within the hierarchy may be directly connected or indirectly connected through an intermediary. Those skilled in the art can understand the specific meanings of the above terms according to specific situations.

[0047] The invention provides an auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes an authentication method for trusted access of terminals in smart grids, which includes the following steps: deploying a terminal authentication system in smart grids according to the hierarchical structure, the uppermost layer is the information collection layer; the second is the information processing layer; the last is information authentication layer; the information collection layer collects the terminal information to be accessed, and sends the information to the information processing layer. After the processing layer, the information is comprehensively processed, and finally sent to the information authentication layer, where the information will be completely authenticated. The present invention adopts structural layering, improves the simplicity and scalability of system deployment, and realizes the flexible communication mechanism and interaction mechanism of loosely coupled characteristics between systems. In addition to ensuring the security of terminal information, the present invention can also ensure that the terminal Information context privacy prevents information from being cracked during communication. In addition, the present invention has no special requirements for end users.

Description

technical field [0001] The invention belongs to the technical field of safety authentication, relates to the safety authentication of trusted access of terminals in smart grids, and in particular relates to an authentication method of trusted access of terminals in smart grids. Background technique [0002] As a branch of the Internet of Things, smart grid is an important public application network. In recent years, energy shortage, environmental pressure and large-scale grid-connection of intermittent renewable energy have made the existing grid operation security and power system operation mode face severe challenges. As a result, smart grids have emerged as the times require. The smart grid is based on the physical grid of various power generation equipment, power transmission and distribution network, power consumption equipment and energy storage equipment, combined with modern advanced sensor measurement technology, network technology, communication technology, computi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 杨云吕跃春白云庆聂静吴斌常涛
Owner STATE GRID CHONGQING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products