Power data distributed security protection tool based on block chain

A technology for power data and security protection, applied in data exchange networks, electrical components, digital transmission systems, etc., can solve problems such as weak security awareness, imperfect security management system, insufficient technical guidelines and management systems, and achieve guarantee Safe, effective, and impact-reducing effects

Inactive Publication Date: 2018-11-20
WENZHOU TUSHENG SCI & TECH +1
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the continuous expansion of power system data business needs, there are more and more researches on the security of power data networks. The security of the structure and functions of the network itself has received extensive and in-depth attention. The information security strategy based on the business side, such as intrusion detection, virus protection, vulnerability scanning, multi-level protection, etc., and the security management system of the network itself is not perfect, and the security awareness of the network level is not strong, which also leads to corresponding technical guidance. Insufficient principles and management systems, for this reason, we propose a blockchain-based power data distributed security protection tool

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power data distributed security protection tool based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] see figure 1 , a blockchain-based distributed security protection tool for power data, the protection method includes the following steps:

[0024] A. Use go language and geth and mist tools to complete the network security test and block deployment of power data;

[0025] B. Carry out information collection, information transmission, information identification and information classification for electric power data;

[0026] C. The device with the bui...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a power data distributed security protection tool based on a block chain. A protection method comprises the following step of A, finishing network security test and block deployment of power data through utilization of a go language and geth and mint tools. According to the power data distributed security protection tool, through adoption of a decentralization characteristic, a central node (a sever, a database and so on) is cancelled in a traditional model, so an attacker cannot find an attack object, and an network attack is out of the question; a distributed block chain structure and randomly selected nodes carry out power data validation and it is ensured that the attacker cannot attack a network in a mode of breaking through and controlling nodes, so influenceof security performance of a terminal on whole network security protection capability is greatly reduced; and moreover, power data maintenance at each time requires validation of 51% of random nodes,a validation process needs to be carried out for three times, and the nodes at each time are different, so power data is prevented from being tampered, and the power data is guaranteed to be secure and valid.

Description

technical field [0001] The invention relates to the technical field of electric power security protection, in particular to a blockchain-based distributed security protection tool for electric power data. Background technique [0002] Electricity is an energy powered by electric energy. It was invented in the 1870s. The invention and application of electric power set off the second industrialization climax and became one of the three scientific and technological revolutions in the world since the eighteenth century in human history. It has changed people's lives. The large-scale power system that appeared in the 20th century is one of the most important achievements in the history of human engineering science. It is a power production and consumption system composed of power generation, power transmission, power transformation, power distribution and power consumption. , it converts the primary energy of nature into electricity through mechanical energy devices, and then sup...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/08H04L63/14H04L63/1441
Inventor 陈梦娴蔡怡挺朱犇郑立王佑戴文博
Owner WENZHOU TUSHENG SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products