Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-counterfeiting encryption verification method and system for electric power data

A technology of power data and verification method, which is applied in the direction of digital transmission system, transmission system, digital data protection, etc., and can solve problems such as malicious operation of power commands

Pending Publication Date: 2021-07-06
NARI TECH CO LTD +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a power data anti-forgery encryption verification method and system, which solves the problem that malicious nodes use leaked private keys to perform malicious operations on power commands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeiting encryption verification method and system for electric power data
  • Anti-counterfeiting encryption verification method and system for electric power data
  • Anti-counterfeiting encryption verification method and system for electric power data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0051] Such as figure 1 As shown, a power data anti-forgery encryption verification method includes a method on the sending node side and a method on the receiving node side, specifically as follows:

[0052] The method on the sending node side includes the following steps:

[0053] 11) Use the random number generation algorithm to generate the random number Nonce on the blockchain system application platform, and use the receiving node public key P(B) key Encrypt the random number Nonce to obtain the ciphertext Nonce'.

[0054] 12) Combining the random number Nonce with an instruction (specifically a scheduling instruction), and using a one-way encryption algorithm to encrypt the combination...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electric power data anti-counterfeiting encryption verification method and system, and the method achieves the interaction verification of an instruction through the asymmetric encryption of a block chain technology, the introduction of a random number, and a data confirmation and return mechanism, avoids the malicious operation of the electric power instruction by the malicious node by using the leaked private key under the condition that the private key of the instruction sending node is leaked and is not informed, guarantees the safe interaction of an electric power system on the Internet, and improves the safe operation performance of a power grid.

Description

technical field [0001] The invention relates to a power data anti-forgery encryption verification method and system, belonging to the field of electric power regulation and transaction business data anti-forgery. Background technique [0002] As the speed and requirements of the country's promotion of power market reform continue to increase, the participants in the power market continue to expand, and the participants in the source, network, load and storage will also participate in the power market, receive power regulation instructions, and carry out power stability and balance on the user side. In order to ensure the safety of the source-grid-load-storage entities connected to the Internet participating in power regulation and transactions, realizing mutual trust and anti-forgery of power data through blockchain technology is one of the important technical directions to promote the source-grid load-storage to participate in the power demand side response. 1. At present, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L9/08G06F21/64
CPCH04L9/3239H04L9/0869H04L63/0442G06F21/64H04L9/50Y04S40/20
Inventor 吉斌昌力丁恰曹荣章朱丽叶朱敏健
Owner NARI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products