Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method of power distribution Internet of Things based on block chain

A security authentication and blockchain technology, which is applied in the security authentication field of the power distribution Internet of Things based on blockchain, can solve the problems of the central server's large amount of computation and the inability to efficiently complete identity authentication.

Active Publication Date: 2021-09-07
山东华科信息技术有限公司 +2
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing design often encounters the huge amount of computing required for the central server to reply to the identity authentication application or data transmission brought by a large number of power terminal equipment. Such problems usually cause the power distribution terminal to apply for identity authentication. Identity authentication is often not completed efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method of power distribution Internet of Things based on block chain
  • Security authentication method of power distribution Internet of Things based on block chain
  • Security authentication method of power distribution Internet of Things based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0025] It should be noted that the terms "comprising" and "having" and any variations thereof in the present disclosure, such as a process, method, system, product or device that includes or has a series of steps or units, are not necessarily limited to the clearly listed instead, may include or have other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

[0026] The present disclosure provides a security authentication method (sometimes referred to as a security authentication method for short)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method for a power distribution Internet of Things based on blockchain, and the method comprises the steps: respectively taking each edge gateway as a block chain node to construct a blockchain, respectively sending corresponding equipment information and a preset password to the edge gateway by each power terminal equipment, and carrying out the processing of the equipment information and the preset password through the edge gateway to complete the registration; enabling the edge gateway to generate a first encrypted ciphertext and a second encrypted ciphertext, enabling the edge gateway to generate a target ciphertext combination based on the first encrypted ciphertext and the second encrypted ciphertext, and then linking the target ciphertext combination on the blockchain, enabling the power terminal equipment to send authentication information to the edge gateway, enabling the edge gateway to obtain authentication data from the authentication information, enabling the edge gateway to obtain a first authentication data abstract based on the authentication data, extracting a second digital abstract from the block chain, and enabling the edge gateway to realize security authentication of the edge gateway on the power terminal equipment based on the first authentication data abstract and the second digital abstract. Therefore, identity authentication of the power terminal equipment can be completed more efficiently.

Description

technical field [0001] The present disclosure specifically relates to a security authentication method for a blockchain-based power distribution Internet of Things. Background technique [0002] With the effective integration of the new generation of information technology such as the Internet of Things and the Internet and the smart grid, the traditional power grid is gradually transformed into a smart grid, and the large-scale and high-efficiency allocation of energy resources can be achieved through the construction of a smart grid. [0003] The traditional power distribution Internet of Things is based on the existing Internet environment. It is to uniformly authenticate the identity of the power terminal equipment through the central server to ensure the effective operation of the power distribution system. [0004] However, the existing design often encounters the huge amount of computing required for the central server to reply to the identity authentication applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14H04L29/08
CPCH04L63/08H04L63/0428H04L63/06H04L9/14H04L67/12H04L67/10Y04S40/20
Inventor 杨会轩张瑞照朱曰超
Owner 山东华科信息技术有限公司