Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain-based v2g transaction privacy protection method, device and system

A blockchain and block technology, applied in the field of blockchain and privacy protection, can solve problems such as energy waste, achieve the effect of protecting privacy, preventing dishonesty, and saving transaction costs

Active Publication Date: 2022-08-02
SHANDONG UNIV
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And when grid demand is low, electricity usage is lower than the output of baseload power plants, so that unused energy is wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain-based v2g transaction privacy protection method, device and system
  • Blockchain-based v2g transaction privacy protection method, device and system
  • Blockchain-based v2g transaction privacy protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Embodiment 1, this embodiment provides a blockchain-based V2G transaction privacy protection method;

[0044] Blockchain-based V2G transaction privacy protection methods, including:

[0045] The blockchain node receives the transaction parameters anonymously sent by the buyer's client, and records the transaction parameters and the first zero-knowledge proof generated by the buyer's client on the blockchain; the blockchain node verifies the correctness of the first zero-knowledge proof , and record the verified transaction parameters on the blockchain;

[0046] The blockchain node receives the guarantee fee anonymously sent by the buyer's client, and records the guarantee fee and the second zero-knowledge proof generated by the buyer's client on the blockchain in the form of a smart contract; the blockchain node verifies the second zero-knowledge proof. The correctness of the knowledge proof, and the guarantee fee for the verification is recorded on the blockchain;

...

Embodiment 11

[0134] Consider the specific actions of the seller in the transaction. User A is an electric vehicle user, and the zero-knowledge balance in his account is cmt A =SHA256(v A ,sn A ,r A ), he wants to sell the electricity in the electric car to user B, including the following steps:

[0135] 1.1.1 User A and User B negotiate the transaction parameters cmt offline c , N, pk A , pk B , and then wait for User B to deploy the smart contract in the blockchain;

[0136] 1.1.2 After the smart contract is deployed on the blockchain, user A checks whether the transaction parameters in the contract are the same as the parameters negotiated by the two parties before, and checks whether there is the correct amount of guarantee fee in the contract.

[0137] If the parameters are the same and the number of guarantee fees is correct, proceed to the next step of the transaction;

[0138] If the parameters are different or the number of guarantee fees is incorrect, it is considered that...

Embodiment 12

[0144] Consider the specific actions of the buyer in the transaction. User B is an EV user, and the zero-knowledge balance in his account is cmt B =SHA256(v B ,sn B ,r B ), he wants to purchase user A's electricity, including the following steps:

[0145] 1.2.1 User B generates guarantee fee certificate cmt c =SHA256(amt,r c ), negotiate the transaction parameters cmt with user A offline c , N, pk A , pk B , then user B generates a hash chain of length N, the hash root is h 0 .

[0146] 1.2.2 User B generates parameters and constructs a zero-knowledge amount cmt v =SHA256(amt,sn v ,r v ), and construct a zero-knowledge balance cmt after use B ’=SHA256(v B ’, sn B ',r B ’). User B generates a zero-knowledge proof π based on these parameters convert , and set the sn B , cmt B , cmt v , cmt B ’ and pi convert , sent to the blockchain, after waiting for miners to verify, cmt v Be a valid zero-knowledge amount.

[0147] 1.2.3 User B deploys a smart contract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain-based V2G transaction privacy protection method, device and system. The blockchain node receives transaction parameters anonymously sent by the buyer's client, and the transaction parameters and the first zero-knowledge proof generated by the buyer's client are intelligently The form of the contract is recorded on the blockchain; the blockchain node verifies the correctness of the first zero-knowledge proof, and records the verified transaction parameters on the blockchain; the blockchain node receives anonymously sent by the buyer client Guarantee fee, and record the verified guarantee fee on the blockchain; the blockchain node receives the payment voucher for settlement sent anonymously by the seller’s client, and records the verified payment voucher on the blockchain; based on The smart contract of the blockchain converts the payment certificate into the corresponding amount of funds; sends the corresponding amount of funds to the seller's client; sends the guarantee fee to the buyer's client.

Description

technical field [0001] The present disclosure relates to the technical field of blockchain and privacy protection, and in particular, to a blockchain-based V2G transaction privacy protection method, a blockchain-based V2G transaction privacy protection system, electronic equipment and storage media. Background technique [0002] The statements in this section merely mention background related to the present disclosure and do not necessarily constitute prior art. [0003] As one of the important components of the smart grid, V2G technology has developed rapidly and has gradually become a hot topic in related industries. V2G technology, or Vehicle-to-Grid, is a technical solution that uses a large number of electric vehicles as the energy reserve of the grid to provide a buffer for the grid and other renewable energy sources. When grid demand exceeds the capacity of baseload power plants, peaking power plants are put into operation because the grid itself does not have suffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/64G06Q40/04
CPCG06F21/6254G06F21/64G06Q40/04
Inventor 万志国张桐刘卫壮
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products