Power system equipment interaction method based on trusted computing and block chain
A power system and trusted computing technology, applied in transmission systems, digital transmission systems, electrical components, etc., can solve the problems of vulnerability to attacks and low security of power system equipment, and achieve the effect of reducing risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] The present invention will be further explained below with reference to specific embodiments, but the present invention is not limited.
[0037] like figure 1 As shown, the present invention provides a power system device interaction method based on trusted computing and blockchain, including the following steps:
[0038] S1: Perform self-safety authentication on the power system equipment, check whether the power system equipment is credible, and if so, execute S2;
[0039] In S1, self-security authentication is performed on the power system equipment, and the method for detecting whether the power system equipment is credible is as follows: install a TCM trusted cryptographic module on the power system equipment, and use the TCM trusted cryptographic module to measure the integrity of the power system equipment , if the measurement is successful, the device is trusted.
[0040] Among them, the trusted boot mainly includes two parts, the first part is the trusted boo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

