Power distribution terminal authentication method, system and device, computer equipment and storage medium

A power distribution terminal and authentication method technology, which is applied in the field of power grids, can solve the problems of invalid authentication system, long time consumption, and low efficiency of power distribution terminal identity authentication, so as to improve the efficiency of identity authentication, increase the speed of authentication, and prevent authentication systems. The effect of aging

Pending Publication Date: 2021-12-31
GUANGZHOU KETENG INFORMATION TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the above method, only one central trusted device authenticates the power distribution terminal, and when there are many power distribution terminals that need to be authenticated, the authentication process will take a long time, which cannot meet the real-time requirements of the power distribution automation system. security requirements, and once a single central trusted device fails, it will easily lead to the failure of the entire authentication system
Therefore, the related technology has the problem of low efficiency of power distribution terminal identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power distribution terminal authentication method, system and device, computer equipment and storage medium
  • Power distribution terminal authentication method, system and device, computer equipment and storage medium
  • Power distribution terminal authentication method, system and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0046] With the development of power grid technology and the continuous advancement of distribution automation construction, the number of power distribution terminals put into operation has exploded, and the covered area has expanded rapidly. brought hidden dangers.

[0047]Specifically, power distribution terminals can be connected to the master station of power distribution automation through optical fiber or wireless networks. Due to the wide distribution characteristics, attackers can maliciously destroy and attack the main station of distribution automation through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power distribution terminal authentication method, system and device, computer equipment and a storage medium. The method comprises the following steps: acquiring main node information sent by a to-be-authenticated node corresponding to the to-be-authenticated power distribution terminal; determining a main node corresponding to the main node information, and receiving a storage position sent by the main node; obtaining first terminal attribute information in the storage position, and obtaining second terminal attribute information sent by the to-be-authenticated node; and comparing the first terminal attribute information with the second terminal attribute information, and determining whether the identity authentication of the to-be-authenticated node is passed or not according to a comparison result. In the embodiment of the invention, any authenticated node in the private chain network can perform identity authentication on the node to be authenticated, so that identity authentication on a large number of power distribution terminals by depending on limited central trusted equipment can be avoided, the authentication speed is improved, and meanwhile, the timeliness of an authentication system caused by failure of single central trusted equipment can be prevented, therefore, the identity authentication efficiency of the power distribution terminal is effectively improved.

Description

technical field [0001] The present application relates to the technical field of power grids, in particular to a power distribution terminal authentication method, system, device, computer equipment and storage medium. Background technique [0002] With the development of power grid technology and the continuous advancement of distribution automation construction, the number of power distribution terminals put into operation has exploded, and the covered area has expanded rapidly. brought hidden dangers. In order to ensure the safe operation of the distribution automation system, the distribution terminals connected to the distribution automation system can be authenticated. [0003] In related technologies, the authentication function corresponding to the power distribution terminal certificate authority can be centrally deployed on a central trusted device, and the central trusted device performs identity authentication on the connected power distribution terminal. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/08
Inventor 张伟谢虎谢型浪徐长飞杨占杰何超林
Owner GUANGZHOU KETENG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products