Unlock instant, AI-driven research and patent intelligence for your innovation.

Power system equipment interaction method based on trusted computing and block chain

A power system and trusted computing technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of vulnerability to attacks and low security of power system equipment, and achieve the effect of reducing risks

Pending Publication Date: 2022-06-28
STATE GRID LIAONING ELECTRIC POWER CO LTD SHENYANG POWER +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide a power system device interaction method based on trusted computing and blockchain, to solve the problem of low security and vulnerability to attacks of power system devices during interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power system equipment interaction method based on trusted computing and block chain
  • Power system equipment interaction method based on trusted computing and block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further explained below with reference to specific embodiments, but the present invention is not limited.

[0037] like figure 1 As shown, the present invention provides a power system device interaction method based on trusted computing and blockchain, including the following steps:

[0038] S1: Perform self-safety authentication on the power system equipment, check whether the power system equipment is credible, and if so, execute S2;

[0039] In S1, self-security authentication is performed on the power system equipment, and the method for detecting whether the power system equipment is credible is as follows: install a TCM trusted cryptographic module on the power system equipment, and use the TCM trusted cryptographic module to measure the integrity of the power system equipment , if the measurement is successful, the device is trusted.

[0040] Among them, the trusted boot mainly includes two parts, the first part is the trusted boo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an electric power system equipment interaction method based on trusted computing and a block chain, and the method comprises the following steps: S1, carrying out the self-security authentication of electric power system equipment, detecting whether the electric power system equipment is trusted, and if yes, executing S2; s2, carrying out security authentication on the power system equipment by utilizing a Byzantine algorithm, judging whether the authentication is successful or not, and if the authentication is successful, executing S3; and S3, realizing secure interaction among the electric power system equipment by utilizing ternary three-layer trusted network connection. The power system equipment interaction method based on trusted computing and the block chain is high in security, and risks such as attack and information leakage during power system equipment interaction are avoided.

Description

technical field [0001] The invention relates to the field of power system equipment security protection, and particularly provides a power system equipment interaction method based on trusted computing and block chain. Background technique [0002] The development of the network promotes the overall development of the power system equipment, but for the power equipment, the development of the network makes it more intelligent, but also faces more dangers, such as malicious attacks, spam, computer viruses, etc. When the system equipment interacts, it will also face the risk of being attacked, information leakage, etc. [0003] Therefore, it is an urgent problem to propose a safe interaction method of power system equipment. SUMMARY OF THE INVENTION [0004] In view of this, the purpose of the present invention is to provide a power system device interaction method based on trusted computing and blockchain, so as to solve the problems of low security and vulnerability of po...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/104
CPCH04L63/08H04L63/123H04L63/0823H04L67/104
Inventor 杨沈卢毅高明双王策王俊楠郭云峰
Owner STATE GRID LIAONING ELECTRIC POWER CO LTD SHENYANG POWER