Unlock instant, AI-driven research and patent intelligence for your innovation.

Security authentication method for power distribution Internet of Things based on blockchain

A security authentication, blockchain technology

Active Publication Date: 2022-03-11
山东华科信息技术有限公司 +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing design often encounters the huge amount of computing required for the central server to reply to the identity authentication application or data transmission brought by a large number of power terminal equipment. Such problems usually cause the power distribution terminal to apply for identity authentication. Identity authentication is often not completed efficiently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for power distribution Internet of Things based on blockchain
  • Security authentication method for power distribution Internet of Things based on blockchain
  • Security authentication method for power distribution Internet of Things based on blockchain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Hereinafter, preferred embodiments of the present disclosure will be described in detail with reference to the drawings. In the following description, the same reference numerals are given to the same components, and repeated descriptions are omitted. In addition, the drawings are only schematic diagrams, and the ratio of dimensions between components, the shape of components, and the like may be different from the actual ones.

[0025] It should be noted that the terms "comprising" and "having" and any variations thereof in the present disclosure, such as a process, method, system, product or device that includes or has a series of steps or units, are not necessarily limited to the clearly listed instead, may include or have other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

[0026] The present disclosure provides a security authentication method (sometimes referred to as a security authentication method for short)...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This disclosure describes a blockchain-based security authentication method for power distribution Internet of Things, which includes: using each edge gateway as a blockchain node to build a blockchain, and each power terminal device sends its corresponding The device information and preset password are processed by the edge gateway to complete the registration. The edge gateway generates the first encrypted ciphertext and the second encrypted ciphertext. The edge gateway generates the target based on the first encrypted ciphertext and the second encrypted ciphertext. The ciphertext is combined, and then the target ciphertext is combined on the block chain. The power terminal device sends the authentication information to the edge gateway, and the edge gateway obtains the authentication data from it. The chain extracts the second digital abstract, and the edge gateway realizes the security authentication of the electric terminal equipment by the edge gateway based on the first authentication data abstract and the second digital abstract. Thus, the identity authentication of the electric power terminal equipment can be completed more efficiently.

Description

technical field [0001] The present disclosure specifically relates to a security authentication method for a blockchain-based power distribution Internet of Things. Background technique [0002] With the effective integration of the new generation of information technology such as the Internet of Things and the Internet and the smart grid, the traditional power grid is gradually transformed into a smart grid, and the large-scale and high-efficiency allocation of energy resources can be achieved through the construction of a smart grid. [0003] The traditional power distribution Internet of Things is based on the existing Internet environment. It is to uniformly authenticate the identity of the power terminal equipment through the central server to ensure the effective operation of the power distribution system. [0004] However, the existing design often encounters the huge amount of computing required for the central server to reply to the identity authentication applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/14H04L67/12H04L67/10
CPCH04L63/08H04L63/0428H04L63/06H04L9/14H04L67/12H04L67/10Y04S40/20
Inventor 杨会轩张瑞照朱曰超
Owner 山东华科信息技术有限公司