Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power system security and stability control terminal identity authentication method based on block chain

A security and stability control and terminal identity technology, applied in the field of smart grid information security, can solve problems such as heavy burdens on research and certification centers, inability to match the characteristics of power security and stability control systems, etc.

Active Publication Date: 2019-10-11
NARI TECH CO LTD +3
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) Existing terminal identity authentication methods require a centralized management center to maintain the characteristic data of all terminals. When a large number of terminals participate in authentication and the authentication granularity is refined, the burden on the authentication center is heavy, and the demand for computing resources is increasing. Many, the terminal computing power is insufficient, and the frequency of single point failure is high. With the access of more and more distributed power plants, the demand for computing resources is increasing
[0008] (2) Most of the existing block chain-based identity authentication methods are improved digital certificate identity authentication mechanisms, which only replace traditional CAs with block chains in the original scheme, and still have certificate management, key management, and public key distribution. Problems such as delay, signature and signature verification delay cannot be solved, and cannot fully match the characteristics of the power security and stability control system
[0009] (3) The blockchain technology is still in the early stages of development. Most of the existing blockchain applications in the power system are only for power transactions and energy. There is no research on customized blockchain technology for stability control terminals, especially Combining specific applications can better solve the confidentiality, security, performance and other issues in terminal communication, meet the rapid development needs of the communication network of the safe and stable control system, and ensure the safe and stable operation of the power grid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system security and stability control terminal identity authentication method based on block chain
  • Power system security and stability control terminal identity authentication method based on block chain
  • Power system security and stability control terminal identity authentication method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] Existing terminal identity authentication methods all require a centralized management center to maintain the feature data of all terminals. When a large number of terminals participate in authentication and the authentication granularity is refined, the authentication center has a heavy burden and the demand for computing resources is increasing. Insufficient computing power. Most of the existing blockchain-based identity authentication methods are improved digital certificate authentication mechanisms, which only replace the traditional CA with blockchain in the original scheme, and there are still certificate mana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of intelligent power grid information security, and discloses a power system security and stability control terminal identity authentication method based on a block chain, and the method comprises the steps: voting new equipment A applying for network access by a node on the chain of an authentication block chain based on user identity information; enabling the new equipment A to send a communication authentication request to equipment B according to the identity of the equipment B, and send the last item of the own authentication key sequence to the equipment B at the same time; and after the authentication is passed, enabling the equipment B to send an authentication passing confirmation message to the new equipment A to allow continuous communication. Identity authentication between the safety and stability control terminals in the power system is achieved, the inherent distributed characteristics of the safety and stability control system are met, and the problem that an authentication center is fragile due to centralized management is avoided; time consumption and computing power requirements are reduced, and the operation characteristics of the safe and stable control terminal are better met. According to the invention, man-in-the-middle attacks can be defended, and the safe and stable control terminal is prevented from being illegally accessed.

Description

technical field [0001] The invention belongs to the technical field of smart grid information security, and in particular relates to a block chain-based identity authentication method for a security and stability control terminal of a power system. Background technique [0002] Currently, the closest prior art: [0003] As the second line of defense of the power system, the power grid security and stability control system undertakes the important responsibility of ensuring the safe and reliable operation of the power grid. The traditional vertical tree topology security and stability control system architecture is based on single-point to multi-point centralized control, and there is a lack of a complete identity authentication mechanism between security and stability control terminals. In scenarios such as extensive interconnection of terminals and distributed access to new energy sources, attackers can use attack devices or zombie hosts connected to the intranet to intera...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32G06Q50/06
CPCH04L63/08H04L67/10H04L67/12H04L9/3236H04L9/3239G06Q50/06H04L9/50
Inventor 陈汹朱钰宋长坡于同伟朱开阳刘爱民李籽良徐海波钱海曲晓蕾许士光唐冠军封科黄玲王旺
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products