Distributed power transaction credible identity management method and system, and computer equipment

A distributed power and identity management technology, applied in the field of information security, can solve problems such as low security, difficulty, interconnection and interoperability, and achieve the effect of protecting identity privacy, strengthening broad applicability, and simplifying the application process

Pending Publication Date: 2021-12-07
INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER +2
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The traditional centralized identity authentication method cannot be applied to the interconnection between cross-domain and heterogeneous entities; secondly, distributed energy transactions blur the boundary between power transmission and distribution, highlighting the complexity and ease of power systems. Due to the changing nature, the roles of buyers and sellers are changing dynamically, and the traditional centralized identity management and fixed systems of buyers and sellers are no longer applicable; in addition, the privacy protection challenges of the power grid are extremely prominent. How to protect the privacy of personal information of buyers and sellers and transaction The privacy and traceability of information is an urgent problem to be solved
[0004] Through the above analysis, the problems and defects of the existing technology are: the traditional identity authentication management method cannot be applied to the interconnection and intercommunication between cross-domain and heterogeneous entities, cannot be applied to distributed networks, and the security is not high
[0005] The difficulty of solving the above problems and defects is: In a distributed blockchain network, to realize identity authentication and management, it is necessary to solve challenges such as consensus consistency, Byzantine faults, unreliable networks, and difficulties in member coordination.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed power transaction credible identity management method and system, and computer equipment
  • Distributed power transaction credible identity management method and system, and computer equipment
  • Distributed power transaction credible identity management method and system, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0112] Aiming at the decentralization and ubiquitous interconnection requirements of the smart grid and the energy Internet, the present invention realizes the realization of entities (human, machine, etc.) , Thing) identity autonomous control, realize identity security authentication, authorization and data exchange under the state of privacy protection, and provide a new, safe and efficient distributed authentication system. At the same time, the system provides capabilities such as autonomous identity management, agile access, and privacy authentication of distributed heterogeneous entities, and the authentication method is convenient and the authentication cost is low.

[0113] The present invention provides a blockchain-based trusted authentication system for distributed power transactions. The ecological roles of the system include an identity issuer, an identity user, and an identity verifier.

[0114] Among them, the identity issuer refers to those entities that are we...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses a distributed power transaction credible identity management method and system, and computer equipment. The distributed power transaction credible identity management system comprises an identity registration module, a system role registration module, a voucher issuing module, a storage certificate creation module, a storage certificate verification module, a role updating module and a voucher updating module. Based on the blockchain, distributed identity identification, verifiable declaration, zero-knowledge proof and other technologies, autonomous control of entity (human, machine and object) identities in a distributed scene is achieved, identity security authentication, authorization and data exchange in a privacy protection state are achieved, and a brand-new, safe and efficient distributed authentication system is provided. Meanwhile, the system provides the capabilities of autonomous identity management, agile access, privacy authentication and the like of the distributed heterogeneous entity, the authentication mode is convenient, and the authentication cost is low.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a distributed power transaction trusted identity management method, system and computer equipment. Background technique [0002] At present: In the central identity management system of traditional power grids and energy Internet, user identity information leakage, embezzlement, and abuse occur frequently, which has a very large impact on users and society. At the same time, with the rapid development of smart grid, energy Internet of Things, edge computing and other technologies, the power grid and energy Internet are filled with a large number of distributed deployment of machines and equipment, and the traditional power grid and energy field urgently need to face transformation. However, traditional energy is mostly produced independently by companies, which can easily form data islands and lack the necessary distributed collaborative sharing mechanism...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/62G06F21/64G06F16/27G06Q40/04G06Q50/06
CPCG06F21/33G06F21/64G06F21/6245G06F16/27G06Q40/04G06Q50/06G06F2221/2141
Inventor 杨冠群郑海杰王聪邢宏伟张建辉李恩堂薛念明徐崇豪张华栋田诚信徐康
Owner INFORMATION COMM COMPANY STATE GRID SHANDONG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products