Electric power Internet of Things cross-domain authentication method based on cross-chain technology

A technology of electric power Internet of things and authentication method, which is applied in the field of cross-domain authentication of electric power Internet of things based on cross-chain technology, which can solve problems such as system security crisis and inability to meet trust needs

Active Publication Date: 2020-12-01
NANJING INST OF TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]In the traditional power Internet of Things system, the credibility guarantee of the access terminal mainly depends on the centralized key management. Once there is a loophole in the key system, it will cause the entire system to security crisis
With the continuous development of distributed power sources, controllable loads, incremental distribution networks, and material services, the data transmission distance and data volume of IoT terminals are increasing rapidly, and comprehensive services that require cross-domain data sharing are emerging. The access authentication method can no longer meet the trust requirements of cross-domain business systems involving multiple parties such as the interaction of source, network, load and storage in the power Internet of Things, and accurate supply of materials.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electric power Internet of Things cross-domain authentication method based on cross-chain technology
  • Electric power Internet of Things cross-domain authentication method based on cross-chain technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] Such as figure 1 As shown, each power IoT terminal belongs to its own certification domain, and each certification domain maintains an authentication blockchain, and the power IoT system deployed in the edge IoT proxy server maintains a public certification blockchain. The three processes of registration, cross-domain authentication and cross-domain access between the authentication domain and the public authentication blockchain realize the cross-domain authentication of the power Internet of Things.

[0035] The registration process consists of the following steps:

[0036] Step 1, the e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electric power Internet of Things cross-domain authentication method based on a cross-chain technology. Each power Internet of Things terminal belongs to an authentication domain where the power Internet of Things terminal is located. Each authentication domain maintains an authentication block chain; an electric power Internet of Things system deployed in an edge Internet of Things proxy server maintains a public authentication block chain. Cross-domain authentication between the authentication domain and the public authentication block chain comprises three processes of registration, cross-domain authentication and cross-domain access. According to the method, the characteristic that the block chain cannot be tampered is utilized, so that safe and credible cross-domain transmission of the authentication data is guaranteed, the authentication server is deployed on the edge side, cross-chain transaction is performed through the edge Internet of Things agent,and the system operation efficiency and safety are guaranteed.

Description

technical field [0001] The invention relates to the security field of the electric power Internet of Things, in particular to a cross-domain authentication method for the electric power Internet of Things based on cross-chain technology. Background technique [0002] The power Internet of Things is an information system that fully applies modern information and communication technology to realize the interconnection of terminals and main stations in each link of the power system and human-computer interaction. It has the characteristics of comprehensive state perception, efficient information processing, convenient and flexible application, etc. It plays an important role in application scenarios such as electricity sales service, distributed power generation, new energy grid connection, and smart charging piles. [0003] With the development of information and communication technologies such as 5G, the power Internet of Things has developed rapidly in terms of terminal func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08G16Y40/50G16Y10/75G16Y10/35
CPCH04L9/3263H04L9/3247H04L9/3236H04L63/0884H04L63/0823H04L67/12G16Y10/35G16Y10/75G16Y40/50H04L9/3297H04L2209/463H04L63/0442H04L9/50
Inventor 李大伟
Owner NANJING INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products