Power grid data auditing method and device, power grid system and storage medium

A data auditing and power grid technology, applied in the field of data resource security management, can solve the problems of not being able to obtain data or use services normally, hinder legitimate users, and low security, so as to achieve privacy and auditability, and realize reliable transmission , Guarantee the effect of data security and credible verification

Pending Publication Date: 2022-03-25
GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the face of today's ever-changing network technology, the traditional secure transmission protocol can no longer achieve the original goal, especially the continuous development of various intelligent industrial control systems, which put forward higher requirements for security in all aspects
That is to say, the traditional secure transmission protocol can no longer provide secure and reliable communication for the rapidly developing power grid system, especially the smart grid system. When the relevant personnel inside and outside the power grid interact, attackers often achieve unauthorized access to the power grid system. Illegal access to sensitive data or services of the power grid, or through certain means, hindering legitimate users so that they cannot normally obtain data or use services
[0003] However, in the current grid data transmission process, there is a problem of low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power grid data auditing method and device, power grid system and storage medium
  • Power grid data auditing method and device, power grid system and storage medium
  • Power grid data auditing method and device, power grid system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to facilitate the understanding of the present application, the present application will be described more fully below with reference to the relevant drawings. Embodiments of the application are given in the drawings. However, the present application can be embodied in many different forms and is not limited to the embodiments described herein. On the contrary, the purpose of providing these embodiments is to make the disclosure of this application more thorough and comprehensive.

[0050] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the application are only for the purpose of describing specific embodiments, and are not intended to limit the application.

[0051] It can be understood that the terms "first", "second", etc. used in this application may be used t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a power grid data auditing method and device, a power grid system and a storage medium. The method comprises the steps of receiving an auditing request and a smart contract sent by a user terminal; sending the auditing request to the target user through the server, so that the target user feeds back the first ciphertext; the first ciphertext is obtained by encrypting power grid data by the target user based on an elliptic curve encryption model and a public key of the user terminal; receiving a zero-knowledge proof sent by the user terminal; the zero knowledge proof is obtained by processing the public key, the private key of the user terminal, the first ciphertext and the second ciphertext by adopting a proof generation model under the condition that the user terminal obtains the second ciphertext and the first ciphertext from the block chain node; the second ciphertext is obtained by encrypting the power grid data by the user terminal based on an elliptic curve encryption model and a public key; and verifying the validity of the zero-knowledge proof based on the smart contract, and outputting a verification result for judging whether the power grid data is tampered or not. According to the invention, the data transmission security of the power grid system can be improved.

Description

technical field [0001] The present application relates to the technical field of data resource security management, in particular to a power grid data audit method, device, power grid system and storage medium. Background technique [0002] In the communication technology, the secure transmission protocol is a regular protocol, which can realize the information transfer between two or more nodes in the communication system through the physical channel. This protocol defines the rules of data transmission, the strategy of synchronous communication, and possible error recovery methods. The main goal is to provide secure and reliable communication in channels that cannot guarantee security. Various sub-protocols achieve the goals of user node authentication, data confidentiality and integrity, thus ensuring the realization of node security communication. In the face of today's ever-changing network technology, the traditional secure transmission protocol can no longer achieve ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/60
CPCG06F21/64G06F21/602
Inventor 刘育权莫文雄王莉黄滔高强
Owner GUANGZHOU POWER SUPPLY BUREAU GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products