+

CN109495516A - Electric power internet-of-things terminal cut-in method based on block chain - Google Patents

Electric power internet-of-things terminal cut-in method based on block chain Download PDF

Info

Publication number
CN109495516A
CN109495516A CN201910011681.4A CN201910011681A CN109495516A CN 109495516 A CN109495516 A CN 109495516A CN 201910011681 A CN201910011681 A CN 201910011681A CN 109495516 A CN109495516 A CN 109495516A
Authority
CN
China
Prior art keywords
authentication
terminal
power internet
things
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910011681.4A
Other languages
Chinese (zh)
Inventor
陈孝莲
徐晓海
梅沁
沈超
李达
过烽
虎啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Original Assignee
Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd filed Critical Wuxi Power Supply Branch Jiangsu Electric Power Co Ltd
Priority to CN201910011681.4A priority Critical patent/CN109495516A/en
Publication of CN109495516A publication Critical patent/CN109495516A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of electric power internet-of-things terminal cut-in method based on block chain, comprising: electric power internet-of-things terminal to be accessed contacts host node, initiates certification request;Host node responds certification request, chooses the node composition certification group for meeting number of thresholds condition from block chain at random;The public key G and identity ID of electric power internet-of-things terminal to be accessed obtain digital signature ciphertext X, identity ID, terminal public value R and digital signature ciphertext X are sent to host node by private key encryption;Host node is packaged certification request information and is sent to certification group membership's node;Certification group runs PBFT common recognition algorithm, by the way that exchange authentication information, progress distributed authentication obtain authentication result, new block generated in block chain two-by-two between certification group node, returns to confirmation message to electric power internet-of-things terminal to be accessed;Electric power internet-of-things terminal returns to encrypted confirmation message to access gateway.Authentication security can be improved in the present invention, improves authentication efficiency.

Description

Electric power internet-of-things terminal cut-in method based on block chain
Technical field
The present invention relates to Internet of things node access authentication field, especially a kind of electric power internet-of-things terminal based on block chain Cut-in method.
Background technique
Traditional terminal access authentication system is the management framework of centralization, and the certification request of great amount of terminals will lead to center Internet resources and the computing resource consumption of node are excessive, meet the requirement of the following Internet of Things real-time, flexibility, therefore compel to be essential Study a kind of safe and efficient distributed authentication method of flexibility and reliability and strategy.Block chain is substantially a decentralization Distributed account book database has the characteristics that reciprocity main body, open and clear, secure communication, is difficult to tamper with and knows together in many ways, in gold Melt, the fields such as logistics, the energy have been more and more widely used.Verifying, storage, maintenance and the transmission of data in block chain network Etc. processes be all based on distributed system architecture realization, using mathematical method rather than central authority establishes the letter between node Appoint, therefore block chain technology has preferable optimization function for the centralized architecture of Internet of Things.Utilize block chain decentralization Feature can improve the standing state of data storage center, internet of things structure centralization, reduce Internet of Things to division center It relies on, prevents the paralysis of the whole system as caused by the damage of division center.
Summary of the invention
It is an object of the present invention to overcome the shortcomings of the prior art and provide a kind of electric power Internet of Things based on block chain Network termination cut-in method is a kind of inexpensive, efficient electric power internet-of-things terminal cut-in method.The technical side that the present invention uses Case is:
A kind of electric power internet-of-things terminal cut-in method based on block chain, comprising:
Step S1, electric power internet-of-things terminal to be accessed contact host node, initiate certification request;
Step S2, host node respond certification request, and the node composition that selection meets number of thresholds condition from block chain at random is recognized Card group;
Step S3, the public key G and identity ID of electric power internet-of-things terminal to be accessed obtain digital signature ciphertext by private key encryption Identity ID, terminal public value R and digital signature ciphertext X are sent to host node by X;Host node seals certification request information It fills and is sent to certification group membership's node;
Step S4, certification group runs PBFT and knows together algorithm, by exchange authentication information two-by-two between certification group node, in conjunction with waiting The digital certificate information for entering electric power internet-of-things terminal carries out distributed authentication, obtains authentication result, generates and corresponds in block chain The new block of electric power internet-of-things terminal to be accessed returns to confirmation message to electric power internet-of-things terminal to be accessed;
Step S5, electric power internet-of-things terminal return to encrypted confirmation message to access gateway, and certification terminates.
Specifically, in step S4, certification group runs PBFT common recognition algorithm and includes request, pre-preparation, preparation, submits four ranks Section;
Request stage;
Host node receives entity authentication request to be accessed, carries out preliminary identification to certification request;Preliminary identification will certification after passing through Solicited message is packaged;
The pre-preparation stage;
Certification request information after encapsulation is sent in certification group respectively by multicast mode from node by host node;Host node operation Key in privacy sharing algorithm generates and distribution algorithms, generates certification shadow key, is sent to each node in certification group, wherein Host node also saves a shadow key share;
Preparation stage;
After all nodes of certification group receive certification request and shadow key share, the recovery algorithms in privacy sharing algorithm are run, Information is exchanged two-by-two, calculates authentication result;
Presentation stage;
All nodes of certification group submit authentication result and feed back to ingress waiting;Corresponding ingress waiting is formed in block chain New block, the mode of new block general ledger in a distributed manner has recorded the access situation of new node.
Further, preliminary identification content includes request format, historical requests record, type of service.
Further, in step S3, terminal public value R is that one of electric power internet-of-things terminal generation to be accessed is random Number.
The present invention has the advantages that
1. applying block chain technology in Trust transitivity, distributed computing and the characteristic that can not be distorted, suitable electric power object is devised The access authentication algorithm of networked terminals.
2. this method is authenticated by multiple legitimate nodes instead of centralization authentication center CA, traditional collection can be significantly reduced The communication of Chinese style authentication center and calculate pressure, be particularly suitable for the situation that a large amount of internet-of-things terminals concurrently access, reduce certification at This, improves authentication security, improves authentication efficiency.
3. algorithm structure is succinct, versatile, the electric power internet of things service of compatible current mainstream, realize it is transparent, intelligent, Efficiently, it reliably accesses.
4. can flexibly realize the business function such as access control, charging, integral excitation by disposing intelligent contract on block chain Energy.
Detailed description of the invention
Fig. 1 is block design structural schematic diagram of the invention.
Fig. 2 is the network architecture schematic diagram of access authentication system of the invention.
Fig. 3 is cut-in method flow diagram of the invention.
Fig. 4 is certification group PBFT common recognition algorithm schematic diagram of the invention.
Specific embodiment
Below with reference to specific drawings and examples, the invention will be further described.
The present invention proposes a kind of electric power internet-of-things terminal cut-in method based on block chain, all legal electric power Internet of Things In the block chain distribution account book that the access procedure of terminal node, which is stored in, can facilitate inquiry, can not distort;
1) block design is as shown in Figure 1.Block saves the turn-on time of node access service system, type of service, Permission Levels And running state information;Block include block head and block body two parts, wherein block head include previous block hash value, when Between the Composition of contents such as stamp, random number, target block hash value and Merkle root, formed by the hash value of front and back block traceable Chain structure;Block body stores information required for access authentication, including internet-of-things terminal node ID, public key and certificate, fortune Row state, turn-on time, type of service and Permission Levels;
2) network architecture of access authentication system is as shown in Fig. 2, the electric power internet-of-things terminal of legal access is different according to its configuration It is divided into host node and from two class of node, safeguards an access authentication block chain jointly.Wherein, electric power internet of things service system is every Secondary legal access forms a new block, and when new Internet of things node application is added, host node randomly chooses symbol from block chain The legal access node for closing number of thresholds forms certification group, and certification group carries out distributed authentication by common recognition algorithm;It is successfully accessed Internet of things node business function is realized by the intelligent contract disposed on chain;
3) the specific access authentication procedure of electric power internet-of-things terminal is as shown in Figure 3, comprising the following steps:
Step S1, electric power internet-of-things terminal to be accessed contact host node, initiate certification request;
Step S2, host node respond certification request, and the node composition that selection meets number of thresholds condition from block chain at random is recognized Card group;
Step S3, the public key G and identity ID of electric power internet-of-things terminal to be accessed obtain digital signature ciphertext by private key encryption Identity ID, terminal public value R and digital signature ciphertext X are sent to host node by X;Host node seals certification request information It fills and is sent to certification group membership's node;
Terminal public value R is the random number that electric power internet-of-things terminal to be accessed generates;
Step S4, certification group runs PBFT and knows together algorithm, by exchange authentication information two-by-two between certification group node, in conjunction with waiting The digital certificate information for entering electric power internet-of-things terminal carries out distributed authentication, obtains authentication result, generates and corresponds in block chain The new block of electric power internet-of-things terminal to be accessed returns to confirmation message to electric power internet-of-things terminal to be accessed;
In this step, the digital certificate information on electric power internet-of-things terminal to be accessed can be sent to certification group, to authenticate a group knot It closes the digital certificate information and carries out distributed authentication;
After the certification of this step passes through, electric power internet-of-things terminal to be accessed just has access to electric power Internet of Things;
Step S5, electric power internet-of-things terminal return to encrypted confirmation message to access gateway, and certification terminates;
Electric power internet-of-things terminal is successfully accessed electric power Internet of Things;
4) certification group operation PBFT common recognition algorithm includes request, pre-preparation, preparation, submits four-stage;
4-1) request stage;
Host node receives entity authentication request to be accessed, carries out preliminary identification to certification request, preliminary identification content includes request Format, historical requests record, type of service etc. prevent malicious node frequent requests from accessing;Preliminary identification asks certification after passing through Information is asked to be packaged;
4-2) the pre-preparation stage;
Host node by the certification request information after encapsulation by multicast mode be sent in certification group respectively from node 1,2 ... n; Host node runs key generation and distribution algorithms in privacy sharing algorithm, generates certification shadow key, is sent in certification group Each node, wherein host node also saves a shadow key share;
4-3) the preparation stage;
After all nodes of certification group receive certification request and shadow key share, the recovery algorithms in privacy sharing algorithm are run, Information is exchanged two-by-two, calculates authentication result;
4-4) presentation stage;
All nodes of certification group submit authentication result and feed back to ingress waiting;Corresponding ingress waiting is formed in block chain New block, the mode of new block general ledger in a distributed manner has recorded the access situation of new node;
After electric power Internet of things system forms new block by common recognition algorithm, new electric power internet-of-things terminal node is just provided with legal connect Entering the voucher of system, the electric power internet-of-things terminal node of legal access carries out power network business access according to contract intelligent on chain, Realize the functions such as service access, expense calculate and permission controls.
It should be noted last that the above specific embodiment is only used to illustrate the technical scheme of the present invention and not to limit it, Although being described the invention in detail referring to example, those skilled in the art should understand that, it can be to the present invention Technical solution be modified or replaced equivalently, without departing from the spirit and scope of the technical solution of the present invention, should all cover In the scope of the claims of the present invention.

Claims (4)

1.一种基于区块链的电力物联网终端接入方法,其特征在于,包括:1. A method for accessing a power Internet of Things terminal based on a blockchain, comprising: 步骤S1,待接入的电力物联网终端联系主节点,发起认证请求;Step S1, the terminal to be connected to the power Internet of Things contacts the master node, and initiates an authentication request; 步骤S2,主节点响应认证请求,随机从区块链上选取满足阈值数量条件的节点组成认证组;Step S2, the master node responds to the authentication request, and randomly selects nodes that meet the threshold number condition from the blockchain to form an authentication group; 步骤S3,待接入的电力物联网终端的公钥G和身份ID通过私钥加密,得到数字签名密文X,把身份ID、终端公开值R和数字签名密文X发送给主节点;主节点对认证请求信息进行封装并发送给认证组成员节点;In step S3, the public key G and the identity ID of the power Internet of Things terminal to be accessed are encrypted with the private key to obtain a digital signature ciphertext X, and the identity ID, the terminal public value R and the digital signature ciphertext X are sent to the master node; The node encapsulates the authentication request information and sends it to the authentication group member nodes; 步骤S4,认证组运行PBFT共识算法,通过认证组节点之间两两交换认证信息,结合待接入电力物联网终端的数字证书信息进行分布式认证,得到认证结果,在区块链中生成对应待接入电力物联网终端的新的区块,返回确认信息给待接入电力物联网终端;In step S4, the authentication group runs the PBFT consensus algorithm, exchanges authentication information between the authentication group nodes, and performs distributed authentication in combination with the digital certificate information of the terminal to be connected to the power Internet of Things to obtain the authentication result, and generate a corresponding authentication result in the blockchain. For the new block to be connected to the power Internet of Things terminal, return confirmation information to the to-be-connected power Internet of Things terminal; 步骤S5,电力物联网终端返回加密后的确认信息给接入网关,认证结束。Step S5, the power Internet of Things terminal returns the encrypted confirmation information to the access gateway, and the authentication ends. 2.如权利要求1所述的基于区块链的电力物联网终端接入方法,其特征在于,2. The method for accessing a terminal of the Internet of Things in electric power based on blockchain according to claim 1, characterized in that, 步骤S4中,认证组运行PBFT共识算法包括请求、预准备、准备、提交四个阶段;In step S4, the authentication group running the PBFT consensus algorithm includes four stages: request, pre-preparation, preparation, and submission; 请求阶段;request phase; 主节点收到待接入节点认证请求,对认证请求进行初步验证;初步验证通过后将认证请求信息进行封装;The master node receives the authentication request of the node to be accessed, and performs preliminary verification on the authentication request; after the preliminary verification is passed, the authentication request information is encapsulated; 预准备阶段;pre-preparation stage; 主节点将封装后的认证请求信息通过组播方式发送给认证组中各从节点;主节点运行秘密共享算法中的密钥生成和分发算法,生成认证影子密钥,发送给认证组中各节点,其中主节点也保存一个影子密钥份额;The master node sends the encapsulated authentication request information to each slave node in the authentication group through multicast; the master node runs the key generation and distribution algorithm in the secret sharing algorithm to generate an authentication shadow key and send it to each node in the authentication group , where the master node also holds a shadow key share; 准备阶段;preparation stage; 认证组所有节点收到认证请求和影子密钥份额后,运行秘密共享算法中的恢复算法,两两交换信息,计算认证结果;After receiving the authentication request and the shadow key share, all nodes in the authentication group run the recovery algorithm in the secret sharing algorithm, exchange information in pairs, and calculate the authentication result; 提交阶段;submission stage; 认证组所有节点提交认证结果并反馈给待接入节点;在区块链中形成对应待接入节点的新的区块,新区块以分布式总账的方式记录了新节点的接入情况。All nodes in the authentication group submit the authentication results and feed them back to the nodes to be accessed; a new block corresponding to the nodes to be accessed is formed in the blockchain, and the new block records the access status of the new nodes in the form of a distributed ledger. 3.如权利要求2所述的基于区块链的电力物联网终端接入方法,其特征在于,3. The method for accessing a terminal of the Internet of Things based on blockchain according to claim 2, characterized in that, 初步验证内容包括请求格式、历史请求记录、业务类型。The preliminary verification content includes the request format, historical request record, and business type. 4.如权利要求1所述的基于区块链的电力物联网终端接入方法,其特征在于,4. The method for accessing a terminal of the Internet of Things in electric power based on blockchain according to claim 1, characterized in that, 步骤S3中,终端公开值R是待接入的电力物联网终端生成的一个随机数。In step S3, the terminal public value R is a random number generated by the terminal of the power Internet of Things to be connected.
CN201910011681.4A 2019-01-07 2019-01-07 Electric power internet-of-things terminal cut-in method based on block chain Pending CN109495516A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910011681.4A CN109495516A (en) 2019-01-07 2019-01-07 Electric power internet-of-things terminal cut-in method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910011681.4A CN109495516A (en) 2019-01-07 2019-01-07 Electric power internet-of-things terminal cut-in method based on block chain

Publications (1)

Publication Number Publication Date
CN109495516A true CN109495516A (en) 2019-03-19

Family

ID=65714116

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910011681.4A Pending CN109495516A (en) 2019-01-07 2019-01-07 Electric power internet-of-things terminal cut-in method based on block chain

Country Status (1)

Country Link
CN (1) CN109495516A (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109981689A (en) * 2019-04-29 2019-07-05 清华大学 Cross-domain logical is isolated by force and safety access control method and device under scenes of internet of things
CN110049141A (en) * 2019-05-24 2019-07-23 南京工程学院 Internet of Things distributed authentication method and its framework based on block chain
CN110086821A (en) * 2019-05-07 2019-08-02 国网江苏省电力有限公司无锡供电分公司 The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
CN110147668A (en) * 2019-04-01 2019-08-20 深圳天顺智慧能源科技有限公司 A kind of equipment authentication method and device based on block chain
CN110166184A (en) * 2019-04-03 2019-08-23 特斯联(北京)科技有限公司 A kind of distributed communication confirmation request management method and system
CN110213230A (en) * 2019-04-26 2019-09-06 特斯联(北京)科技有限公司 A kind of network security verification method and device for distributed communication
CN110324331A (en) * 2019-06-28 2019-10-11 国电南瑞科技股份有限公司 Power system security stability contorting terminal identity authentication method based on block chain
CN110505227A (en) * 2019-08-23 2019-11-26 国网江苏省电力有限公司无锡供电分公司 Blockchain-based power communication network access authentication method and device
CN110620820A (en) * 2019-09-26 2019-12-27 国网山东省电力公司莱芜供电公司 Ubiquitous power Internet of things intelligent management system
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN111478902A (en) * 2020-04-07 2020-07-31 江苏润和智融科技有限公司 Power edge gateway equipment and sensing data uplink storage method based on same
CN111600884A (en) * 2020-05-15 2020-08-28 北京光润通科技发展有限公司 Network authentication smart card and method
CN112202812A (en) * 2020-10-27 2021-01-08 中国联合网络通信集团有限公司 Water conservancy Internet of things terminal access authentication method and system based on block chain
CN112333218A (en) * 2021-01-10 2021-02-05 广州技象科技有限公司 Internet of things access authentication method, device, equipment and storage medium
CN112637298A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Authentication method and member node
CN112788117A (en) * 2020-12-30 2021-05-11 北京八分量信息科技有限公司 Authentication system arranged on internet node, block chain system and related product
CN113497812A (en) * 2020-03-18 2021-10-12 瑞昱半导体股份有限公司 Internet of things network networking authentication system and method thereof
CN113794716A (en) * 2021-09-14 2021-12-14 中钞信用卡产业发展有限公司杭州区块链技术研究院 A terminal equipment network access authentication method, device, device and readable storage medium
CN114372245A (en) * 2021-12-30 2022-04-19 天翼物联科技有限公司 Blockchain-based IoT terminal authentication method, system, equipment and medium
CN114500081A (en) * 2021-06-28 2022-05-13 山东华科信息技术有限公司 Data transmission method of power distribution Internet of things based on block chain
CN114528573A (en) * 2022-02-14 2022-05-24 武汉虹旭信息技术有限责任公司 Internet of things information security audit system based on block chain
CN114584316A (en) * 2022-02-28 2022-06-03 广州世安智链科技有限公司 Decentralized DID identity aggregation verification method and device for Internet of things
CN114679305A (en) * 2022-03-16 2022-06-28 国网辽宁省电力有限公司沈阳供电公司 Power system equipment interaction method based on trusted computing and blockchain
WO2022143498A1 (en) * 2020-12-29 2022-07-07 中国移动通信有限公司研究院 Access control method and apparatus, and network-side device, terminal and blockchain node
CN115942306A (en) * 2021-08-23 2023-04-07 中车株洲电力机车研究所有限公司 A wireless device network access authentication method, system, storage medium and device
CN115987642A (en) * 2022-12-25 2023-04-18 众芯汉创(北京)科技有限公司 Electric power remote equipment encryption transmission system and method based on public network
WO2023065467A1 (en) * 2021-10-19 2023-04-27 中诚区块链研究院(南京)有限公司 Method for collaborative work between blockchain and internet of things
CN119135463A (en) * 2024-09-09 2024-12-13 珠海格力电器股份有限公司 Networking method, device, electronic device and storage medium for smart home appliances

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message processing method
CN107193672A (en) * 2017-05-31 2017-09-22 无锡井通网络科技有限公司 A kind of transregional piece of asynchronous call contract system
CN108306893A (en) * 2018-03-05 2018-07-20 北京大学深圳研究生院 A kind of Novel Distributed Intrusion Detection Method and system of ad-hoc network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789095A (en) * 2017-03-30 2017-05-31 腾讯科技(深圳)有限公司 Distributed system and message processing method
CN107193672A (en) * 2017-05-31 2017-09-22 无锡井通网络科技有限公司 A kind of transregional piece of asynchronous call contract system
CN108306893A (en) * 2018-03-05 2018-07-20 北京大学深圳研究生院 A kind of Novel Distributed Intrusion Detection Method and system of ad-hoc network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XIAOLIN CHEN等: "A Blockchain Based Access Authentication Scheme of Energy Internet", 《2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2)》 *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110147668A (en) * 2019-04-01 2019-08-20 深圳天顺智慧能源科技有限公司 A kind of equipment authentication method and device based on block chain
CN110166184A (en) * 2019-04-03 2019-08-23 特斯联(北京)科技有限公司 A kind of distributed communication confirmation request management method and system
CN110213230B (en) * 2019-04-26 2020-01-31 特斯联(北京)科技有限公司 network security verification method and device for distributed communication
CN110213230A (en) * 2019-04-26 2019-09-06 特斯联(北京)科技有限公司 A kind of network security verification method and device for distributed communication
CN109981689A (en) * 2019-04-29 2019-07-05 清华大学 Cross-domain logical is isolated by force and safety access control method and device under scenes of internet of things
WO2020220627A1 (en) * 2019-04-29 2020-11-05 清华大学 Method and device for strong cross-domain logic isolation and secure access control in internet of things scenario
CN109981689B (en) * 2019-04-29 2020-05-12 清华大学 Cross-domain logical strong isolation and secure access control method and device in IoT scenario
CN110086821A (en) * 2019-05-07 2019-08-02 国网江苏省电力有限公司无锡供电分公司 The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
CN110049141A (en) * 2019-05-24 2019-07-23 南京工程学院 Internet of Things distributed authentication method and its framework based on block chain
CN110324331A (en) * 2019-06-28 2019-10-11 国电南瑞科技股份有限公司 Power system security stability contorting terminal identity authentication method based on block chain
CN110324331B (en) * 2019-06-28 2021-08-10 国电南瑞科技股份有限公司 Block chain-based identity authentication method for safety and stability control terminal of power system
CN110505227A (en) * 2019-08-23 2019-11-26 国网江苏省电力有限公司无锡供电分公司 Blockchain-based power communication network access authentication method and device
CN110620820A (en) * 2019-09-26 2019-12-27 国网山东省电力公司莱芜供电公司 Ubiquitous power Internet of things intelligent management system
CN111131286B (en) * 2019-12-30 2022-06-17 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN113497812A (en) * 2020-03-18 2021-10-12 瑞昱半导体股份有限公司 Internet of things network networking authentication system and method thereof
US12010251B2 (en) 2020-04-07 2024-06-11 Jiangsu Zhirong Energy Technology Co., Ltd. Electric border gateway device and method for chaining and storage of sensing data based on the same
CN111478902B (en) * 2020-04-07 2021-03-23 江苏润和智融科技有限公司 Power edge gateway equipment and sensing data uplink storage method based on same
CN111478902A (en) * 2020-04-07 2020-07-31 江苏润和智融科技有限公司 Power edge gateway equipment and sensing data uplink storage method based on same
WO2021203733A1 (en) * 2020-04-07 2021-10-14 江苏润和智融科技有限公司 Power edge gateway device and device-based sensor data uplink storage method
CN111600884A (en) * 2020-05-15 2020-08-28 北京光润通科技发展有限公司 Network authentication smart card and method
CN112202812A (en) * 2020-10-27 2021-01-08 中国联合网络通信集团有限公司 Water conservancy Internet of things terminal access authentication method and system based on block chain
CN112637298A (en) * 2020-12-15 2021-04-09 中国联合网络通信集团有限公司 Authentication method and member node
WO2022143498A1 (en) * 2020-12-29 2022-07-07 中国移动通信有限公司研究院 Access control method and apparatus, and network-side device, terminal and blockchain node
CN112788117A (en) * 2020-12-30 2021-05-11 北京八分量信息科技有限公司 Authentication system arranged on internet node, block chain system and related product
CN112788117B (en) * 2020-12-30 2023-04-28 北京八分量信息科技有限公司 Authentication system, blockchain system and related products arranged on Internet node
CN112333218B (en) * 2021-01-10 2021-04-02 广州技象科技有限公司 Internet of things access authentication method, device, equipment and storage medium
CN112333218A (en) * 2021-01-10 2021-02-05 广州技象科技有限公司 Internet of things access authentication method, device, equipment and storage medium
CN114500081A (en) * 2021-06-28 2022-05-13 山东华科信息技术有限公司 Data transmission method of power distribution Internet of things based on block chain
CN114500081B (en) * 2021-06-28 2022-09-27 山东华科信息技术有限公司 Data transmission method of power distribution Internet of things based on block chain
CN115942306A (en) * 2021-08-23 2023-04-07 中车株洲电力机车研究所有限公司 A wireless device network access authentication method, system, storage medium and device
CN113794716A (en) * 2021-09-14 2021-12-14 中钞信用卡产业发展有限公司杭州区块链技术研究院 A terminal equipment network access authentication method, device, device and readable storage medium
WO2023065467A1 (en) * 2021-10-19 2023-04-27 中诚区块链研究院(南京)有限公司 Method for collaborative work between blockchain and internet of things
CN114372245A (en) * 2021-12-30 2022-04-19 天翼物联科技有限公司 Blockchain-based IoT terminal authentication method, system, equipment and medium
CN114528573A (en) * 2022-02-14 2022-05-24 武汉虹旭信息技术有限责任公司 Internet of things information security audit system based on block chain
CN114584316A (en) * 2022-02-28 2022-06-03 广州世安智链科技有限公司 Decentralized DID identity aggregation verification method and device for Internet of things
CN114679305A (en) * 2022-03-16 2022-06-28 国网辽宁省电力有限公司沈阳供电公司 Power system equipment interaction method based on trusted computing and blockchain
CN115987642A (en) * 2022-12-25 2023-04-18 众芯汉创(北京)科技有限公司 Electric power remote equipment encryption transmission system and method based on public network
CN119135463A (en) * 2024-09-09 2024-12-13 珠海格力电器股份有限公司 Networking method, device, electronic device and storage medium for smart home appliances

Similar Documents

Publication Publication Date Title
CN109495516A (en) Electric power internet-of-things terminal cut-in method based on block chain
CN110958111B (en) Block chain-based identity authentication mechanism of electric power mobile terminal
CN110086821A (en) The authentication method of electric power things-internet gateway and the access of electric power internet-of-things terminal based on block chain
CN112953727A (en) Internet of things-oriented equipment anonymous identity authentication method and system
CN112019349B (en) Cross-chain technology-based cross-domain authentication method for power internet of things
CN113079215B (en) Block chain-based wireless security access method for power distribution Internet of things
CN109040139A (en) A kind of identity authorization system and method based on block chain and intelligent contract
CN103139181B (en) A kind of authorization method of open authentication, device and system
CN110581854A (en) intelligent terminal safety communication method based on block chain
CN113055363A (en) Identification analysis system implementation method based on block chain trust mechanism
CN115021989B (en) Mutual trust and mutual recognition method and system for industrial internet heterogeneous identification analysis system
CN115021958B (en) A smart home identity authentication method and system integrating fog computing and blockchain
CN115378604B (en) An identity authentication method for edge computing terminal devices based on reputation value mechanism
CN112436940B (en) Internet of things equipment trusted boot management method based on zero-knowledge proof
CN110120868A (en) A kind of smart grid security data aggregation method and system based on block chain technology
CN110324331A (en) Power system security stability contorting terminal identity authentication method based on block chain
CN114553604B (en) A method for access control of IoT terminal nodes
CN113572765B (en) A Lightweight Authentication Key Agreement Method for Resource Constrained Terminals
Li et al. Research on Multidomain Authentication of IoT Based on Cross‐Chain Technology
CN113507370B (en) Forestry Internet of things equipment authorization authentication access control method based on block chain
Hendaoui et al. UAP: A unified authentication platform for IoT environment
CN103781026B (en) The authentication method of common authentication mechanism
CN115567198A (en) IoT Identity Authentication Method Based on Consortium Chain
CN110691358A (en) Access control system based on attribute cryptosystem in wireless sensor network
Varfolomeeva et al. Blockchain Fog-based scheme for identity authentication in smart building

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载