CN111132151B - High-reliability user electricity metering device adopting block chain technology - Google Patents

High-reliability user electricity metering device adopting block chain technology Download PDF

Info

Publication number
CN111132151B
CN111132151B CN202010226375.5A CN202010226375A CN111132151B CN 111132151 B CN111132151 B CN 111132151B CN 202010226375 A CN202010226375 A CN 202010226375A CN 111132151 B CN111132151 B CN 111132151B
Authority
CN
China
Prior art keywords
data
buffer area
node
metering
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010226375.5A
Other languages
Chinese (zh)
Other versions
CN111132151A (en
Inventor
胡珊妹
卢玉凤
应东东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Holley Technology Co Ltd
Original Assignee
Holley Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Holley Technology Co Ltd filed Critical Holley Technology Co Ltd
Priority to CN202010226375.5A priority Critical patent/CN111132151B/en
Publication of CN111132151A publication Critical patent/CN111132151A/en
Application granted granted Critical
Publication of CN111132151B publication Critical patent/CN111132151B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention relates to the technical field of power system equipment, in particular to a high-reliability user electricity metering device adopting a block chain technology, which comprises a master station and an intelligent interactive terminal, wherein the intelligent interactive terminal comprises an encrypted communication unit, a memory and a controller, an acquisition module, a block chain module, an encrypted storage module, a backup module and a reporting module are operated in the controller, the acquisition module periodically reads metering data of a corresponding user meter, the block chain modules of all the intelligent interactive terminals form a block chain, the encrypted storage module encrypts and stores the metering data acquired by the acquisition module based on the block chain technology and periodically generates digital fingerprints of the metering data to be uploaded to the block chain, the backup module periodically backs up the metering data of the user meter, and the reporting module periodically uploads the stored metering data to a server. The substantial effects of the invention are as follows: by establishing a block chain, data authentication service is provided, and the reliability of the metering data is improved.

Description

High-reliability user electricity metering device adopting block chain technology
Technical Field
The invention relates to the technical field of power system equipment, in particular to a high-reliability user electricity metering device adopting a block chain technology.
Background
With the rapid development of economy, the size and capacity of power distribution networks have also increased rapidly. At present, the power distribution network in China is large in scale and large in user quantity, daily operation management and maintenance of the power distribution network and charging management of users are important and work with huge workload, and great pressure is brought to operation of the power distribution network. The accurate measurement of the power consumption of the user not only relates to the economic benefits of power supply enterprises and users, but also relates to the equitable transaction and social stability. Metering devices are typically provided by power utilities and are installed in switchboxes at or near the line of users. Metering device quantity is many, the distribution is scattered, and power supply enterprise is difficult to supervise the management, leads to some users to have the action of stealing electricity, reforms transform metering device or changes metering data. And some users have doubt about that the power supply enterprises can change the data reported by the metering devices of the power supply enterprises privately. The trust problem of power supply enterprises and users always troubles the power supply enterprises and the power utilization users. With the development of the blockchain technology, the data tamper-resistant technology based on the blockchain is used. Therefore, developing a system for ensuring the credibility of the metering data in combination with the blockchain becomes an important research topic of the power supply enterprise.
Chinese patent CN108665362A, published 2018, 5, month and 4, a distributed power station accounting system comprises a distributed power station and an accounting platform; the distributed power station comprises a power generation unit, a facility unit and an electric energy consumption unit; the power generation unit and the electric energy consumption unit are respectively electrically connected with the infrastructure unit; each unit is provided with an electric energy metering device and a force calculating module; each investment user subscribes to any one or more of the power generation unit, the infrastructure unit or the electric energy consumption unit by using the account; the electric energy metering device on each unit detects the electric energy transmission quantity flowing through the unit, converts the electric energy transmission quantity into electric quantity integral through an intelligent contract and accumulates the electric quantity integral on the account of the unit subscriber; the investment user exchanges the electric quantity point on the account for electric energy consumption on the electric energy consumption unit; the accounting platform is formed by all the calculation force modules together, the calculation force modules broadcast the electric quantity integral change information to the accounting platform and a calculation force module selected from the accounting platform records the change information; the trust problem in the transaction process of the electric quantity points is solved. But it is only suitable for investment account to carry out point management, and can not solve the credibility problem of common user metering data.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: at present, the metering data has the technical problem of being tampered and counterfeited. The high-reliability user electricity metering device adopting the block chain technology can avoid the falsification and the forgery of metering data, improve the reliability of the metering data and contribute to maintaining the fair power transaction order.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a high-reliability user electricity consumption metering device adopting a block chain technology comprises a main station, a plurality of user meter meters and a plurality of intelligent interaction terminals, wherein the intelligent interaction terminals are connected with the user meter meters, each intelligent interaction terminal comprises an encryption communication unit, a memory and a controller, the encryption communication units and the memories are connected with the controllers, the encryption communication units are in communication connection with the main station, the encryption communication units are in encryption communication connection, an acquisition module, a block chain module, an encryption storage module, a backup module and a reporting module run in the controllers, the acquisition module periodically reads metering data of the corresponding user meter meters, the block chain modules of all the intelligent interaction terminals form a block chain, the block chain provides data downloading service for the main station, and the encryption storage module encrypts and stores the metering data acquired by the acquisition module based on the block chain technology, and periodically generating digital fingerprints of the metering data and uploading the digital fingerprints to a block chain, wherein the backup module periodically backs up the metering data of the user meter, and the reporting module periodically uploads the stored metering data to the master station. The block chain modules of all intelligent interactive terminals form a block chain, an inspection approach is provided for data tamper-proofing and forgery-proofing, the encryption storage modules and the backup modules of a plurality of intelligent interactive terminals work cooperatively in a centerless mode, the difficulty of data storage tamper and forgery is further improved, the backup modules backup metering data, the destructiveness of the metering data is improved, the reliability of the metering data is improved, and a fair and credible environment is provided for power transaction.
Preferably, communication rings are established among the intelligent interactive terminals, all the intelligent interactive terminals are divided into a plurality of communication rings by a master station, each intelligent interactive terminal only records communication addresses of a previous node and a next node of the communication ring, the communication rings distribute data transmission rights in a token mode, a period of reading metering data by an acquisition module is T, metering data read by the acquisition module in one period form a metering data frame, an encryption storage module encrypts and stores the metering data frame and uploads digital fingerprints of the metering data frame to a block chain, a backup module backs up and encrypts and stores the metering data frame, a reporting module reports k encrypted metering data frames to the master station when k encrypted metering data frames are accumulated, and a storage stores metering data within a certain time and rolls to remove outdated metering data. By adopting a centerless communication mode, the security of the device is improved, and the difficulty of data stealing and tampering of the device is increased.
Preferably, the master station inserts a virtual node into the communication ring, the virtual node records the communication addresses of the previous node and the next node, when the virtual node receives data, the virtual node checks whether the data format meets the preset format, if the data format does not meet the preset format, the virtual node discards the data, if the data format meets the preset format, the virtual node sends the data on the name of the virtual node, if the virtual node receives the data sent by the previous node, the virtual node sends the data to the next node of the virtual node, and if the virtual node receives the data sent by the next node, the virtual node sends the data to the previous node of the virtual node; at least two virtual nodes are inserted into each communication ring, and the virtual nodes are physical nodes with communication and data checking functions or virtual machines running in the main station. The attack of illegally acquiring the whole communication ring can not be successfully achieved due to the addition of the virtual nodes, the safety of the communication ring is improved, all the nodes in the communication ring can not be found, the data can not be stolen and modified by combining the distributed data storage scheme of the encryption storage module, and the safety and the reliability of the metering data are further improved.
Preferably, the encryption storage module performs the following steps to implement encryption storage: A11) opening up a first buffer area, a second buffer area, a third buffer area and an off-port flag bit in a memory; A12) when the period T is over and the acquisition module acquires the metering data, the encryption storage module reads the metering data frame into a first buffer area, and the off-port mark position is 0; A13) the encryption storage module where the token is located determines whether to store the data frame off-port with probability p, if it is determined not to store off-port, the token is transmitted to the next node of the communication ring and the step is repeated, if it is determined to store off-port, the step A14 is entered); A14) the encryption storage module copies the data in the first buffer area to a second buffer area, and clears the first buffer area from the position 1 of the exit tag; A15) the encryption storage module at the current position of the token sends the data in the second buffer area to the second buffer area of the next node of the communication ring, the data is ensured to be correctly and completely received through a verification and retransmission mechanism, then the data in the second buffer area is emptied, and the token is sent to the next node; A16) after the next node receives the token, firstly judging whether the data in the first buffer area of the node is empty, if so, entering the step A18), and if not, entering the step A17); A17) determining whether to exchange data in the first buffer area and the second buffer area according to the probability p, wherein the third buffer area is used for realizing data exchange, if yes, the position of the exit flag is 1 after exchange is finished, if no, the exit flag is kept at 0, the data in the first buffer area is encrypted and stored after being associated with the exit flag, the first buffer area is emptied, and then the step A15) is returned to execute; A18) the data in the second buffer area is encrypted and stored after being associated with the off-port flag bit, and the token is kept until the next period T is finished, and the execution is started by the step A12); and after receiving the data uploaded by all the nodes in the communication ring, the master station restores the metering data according to the off-port zone bit. The metering data collected by each intelligent interactive terminal is partially stored locally and partially stored in other nodes, the security of data storage is improved through a scattered storage technology, each intelligent interactive terminal cannot obtain the node on which the off-port data is stored, so that the single or partial intelligent interactive terminal storage data is obtained, the metering data of any meter can not be recovered, and the recovery of all the data can be ensured only by obtaining the metering data of all the nodes in the communication ring, so that the data cannot be stolen and tampered, and the reliability and the credibility of the metering data are further improved.
Preferably, after receiving data uploaded by all nodes in the communication ring, the master station restores the metering data according to the off-port flag bit, and the method comprises the following steps: B11) if the communication ring has the virtual node, the virtual node is removed, and two nodes on two sides of the virtual node form an adjacent node; B12) starting from any node with a1 bit off-port flag in the communication ring, the node is called an active node; B13) searching a node with the next off-port flag bit being 1 downwards, exchanging the metering data frames of the two nodes, and updating the off-port flag position of the active node to be 0 and the active node to be the node with the next off-port flag bit being 1; B14) repeating the step B13) until all off-port flag bits in the communication ring are 0, namely, completing the reduction of the metering data frame, and reducing each metering data frame in the time sequence to obtain the metering data reported by each user meter; B15) the master station downloads the corresponding data fingerprints from the block chain, verifies whether the digital fingerprints of the metering data obtained by reduction are matched, accepts the metering data if the digital fingerprints are matched, and gives an alarm if the digital fingerprints are not matched. By improving the reporting frequency, the data tampering condition is found in time, and the loss is reduced.
Preferably, the master station sets a backup number k and a backup track number n, n > k, the backup module stores values of n and k, the period T is ended, after the encryption storage module finishes encryption storage, the backup module establishes a temporary variable i to represent a current backup channel, each backup module randomly selects k backup tracks from the n backup tracks, the backup modules in the same backup track shift backup according to a communication sequence of a communication ring to realize cross and multi-clock backup, the backup module transmits a metering data frame and the temporary variable i in the communication ring according to a preset rule until a rule of stopping communication is met, and the backup process is finished under a decentering condition, which specifically comprises: C1) the backup module opens up a fourth buffer area, a fifth buffer area and a sixth buffer area in the memory, and establishes an integer temporary array X, wherein the length of the array is k, and the initial value of a temporary variable i is 0; C2) after the period T is finished, after the encryption storage module finishes the encryption storage, deleting the associated off-port flag bit of the stored metering data frame, copying the metering data frame to a sixth buffer area, emptying a fourth buffer area and a fifth buffer area, and randomly selecting k integers from n integers of [1, n ] by the backup module and storing the k integers into an array X, wherein X = { X1, X2, …, xk }; C3) starting from a node where a token of a communication ring is located, changing the value of a temporary variable i from 0 to 1; C5) if the array X contains a value equal to the value i, copying the data in the sixth buffer area to a fourth buffer area, exchanging the data in the fourth buffer area with the data in the fifth buffer area, if the data in the fourth buffer area is not empty, associating the data in the fourth buffer area with the value i and then storing the data, if the X does not contain a value equal to the value i, not participating in the round of backup, not exchanging the data in the fourth buffer area and the fifth buffer area, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, and then emptying the fifth buffer area and transmitting the token to the next node; C6) when the node receives the token, the data sent by the previous node and the value i, the following judgment and steps are executed: a. if the data in the fifth buffer area is empty and the received i value is the same as the current i value of the node: adding 1 to the value of i, if the value of i after adding 1 is not more than n, jumping to the step C5) for execution, running the next backup track, if the value of i after adding 1 is more than n, ending the backup, emptying a fourth buffer area, a fifth buffer area and a sixth buffer area, setting i as 0, sending the value (n +1) as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6); b. if the received i value is (n + 1): if the value of i of the node is 0, retaining the token, not sending data to the next node, starting to execute the step A12) until the end of the next period T, if the value of i of the node is not 0, setting i of the node to be 0, sending the value (n +1) as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6); c. if the received i value is 1 greater than the node and is not (n + 1): adding 1 to the value i of the node, and executing step C5), if the fifth buffer data is not empty and the received value i is the same as the current value i of the node: judging whether the array X of the node contains elements with the same value as the value i, if so, entering the step C7), and if not, entering the step C8); C7) judging whether the data in the fifth buffer area is the same as the data in the sixth buffer area, if not, exchanging the data in the fourth buffer area and the fifth buffer area, associating the data in the fourth buffer area with the value i and then storing the data, adding 1 to the value i of the node, and executing the step C5), if so, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, emptying the fifth buffer area, sending the token to the next node, and triggering the next node to execute the step C6); C8) and determining whether to exchange the data of the fourth buffer area and the fifth buffer area according to the probability q, then sending the data of the fifth buffer area to a fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, then emptying the fifth buffer area, transmitting the token to the next node, and triggering the next node to execute the step C6). Through the backup of the backup module, k backup exists in each metering data frame, the backup is stored in a scattered mode, no record is made in the stored position, the data can be restored only by obtaining the data of all nodes, the backup data cannot be found and modified, the authenticity verification is carried out by combining the block chain, the backup record which is not tampered can be distinguished, and therefore the safety and the anti-tampering property of the metering data are greatly improved.
Preferably, the intelligent interactive terminal downloads the data record from the master station before clearing the expired data, downloads the corresponding digital fingerprint from the block chain, clears the expired data if the data downloaded from the master station is consistent with the digital fingerprint, and reports an error and retains the expired data otherwise. And the data is downloaded from the master station and verified, so that the master station can be prevented from modifying the metering data, and the credible metering data can be provided for the user.
Preferably, the mobile phone further comprises a short message server, each intelligent interactive terminal records the communication address of the short message server and the number of the mobile phone of the user, the intelligent interactive terminal downloads the data record from the master station before clearing the overdue data and downloads the corresponding digital fingerprint from the block chain, if the data downloaded from the master station is consistent with the digital fingerprint, the electricity consumption of the user in the corresponding time is generated and sent to the mobile phone of the user through the short message server, then the overdue data is cleared, otherwise, the intelligent interactive terminal reports an error and sends the error to the mobile phone of the user through the short message server, and the overdue data is reserved.
Preferably, the method for periodically generating the digital fingerprint of the metering data by the encryption storage module comprises the following steps: B11) the metering data frame is regarded as a binary unsigned integer, and a master station periodically distributes a binary large number; B12) dividing the unsigned integer corresponding to the metering data frame by the binary large number distributed by the master station to obtain a remainder; B13) and taking the binary large number and the remainder allocated by the master station as the digital fingerprint of the metering data frame. The remainder is a calculation process which is faster in binary system calculation, and the digit of binary system large number needs to be controlled to prevent collision.
The substantial effects of the invention are as follows: by establishing a block chain, providing data authentication service and improving the reliability of the metering data; the metering data is stored dispersedly, the difficulty of tampering the metering data is improved, the metering data is backed up through the backup module, the data can be recovered when the metering data is lost or damaged, the metering data is effectively protected from tampering and damage, the metering data is more stable and reliable, and the reliability and the credibility of the metering data are further improved.
Drawings
FIG. 1 is a schematic diagram illustrating a communication relationship between a user electricity metering device according to an embodiment.
FIG. 2 is a schematic diagram of a user electricity metering device according to an embodiment.
FIG. 3 is a flowchart illustrating steps performed by the encryption storage module according to an embodiment.
FIG. 4 is a flowchart illustrating steps performed by the backup module according to an embodiment.
Wherein: 100. the intelligent interactive system comprises a user meter, 101, an encryption communication unit, 102, a memory, 200, a communication ring, 300, a block chain, 400, a controller, 401, an acquisition module, 402, a block chain module, 403, an encryption storage module, 404, a backup module, 405, a reporting module, 500, an intelligent interactive terminal, 600 and a master station.
Detailed Description
The following provides a more detailed description of the present invention, with reference to the accompanying drawings.
The first embodiment is as follows:
a high-reliability user electricity consumption metering device adopting a block chain 300 technology is disclosed, as shown in FIG. 1, the embodiment includes a master station 600, a plurality of user meter meters 100 and a plurality of intelligent interaction terminals 500, each intelligent interaction terminal 500 includes an encrypted communication unit 101, a memory 102 and a controller 400, the encrypted communication unit 101 and the memory 102 are both connected with the controller 400, the intelligent interaction terminal 500 is connected with the plurality of user meter meters 100, as shown in FIG. 2, the encrypted communication unit 101 is in communication connection with the master station 600, the encrypted communication units 101 are in encrypted communication connection, a collection module 401, a block chain module 402, an encrypted storage module 403, a backup module 404 and a reporting module 405 are operated in the controller 400, the collection module 401 periodically reads metering data of the corresponding user meter meters 100, the block chain modules 402 of all the intelligent interaction terminals 500 form the block chain 300, the block chain 300 provides data downloading service for the master station 600, the encryption storage module 403 encrypts and stores the metering data acquired by the acquisition module 401 based on the block chain 300 technology, periodically generates digital fingerprints of the metering data and uploads the digital fingerprints to the block chain 300, the backup module 404 periodically backs up the metering data of the user meter, and the reporting module 405 periodically uploads the stored metering data to the master station 600. The encryption communication unit 101 communicates with the master station 600 by 2G/3G/4G/5G, or the encryption communication unit 101 can be changed into an optical fiber communication unit, and the optical fiber communication unit is connected with the master station by an optical fiber. The intelligent interactive terminal 500 preferably adopts a modular design, the communication of the intelligent interactive terminal 500 supports a GPRS/CDMA/Ethernet communication module, the downlink communication is compatible with multiple communication modes of RS485, MBus, carrier, small wireless and ZigBee, the communication of the intelligent interactive terminal 500 and an electricity meter adopts a national network latest object-oriented electricity consumption information data exchange protocol, and the communication with other meters conforms to GB/T26831 Community energy metering and collecting System Specification, the intelligent interactive terminal 500 adopts dual-core backup, has self-diagnosis remote upgrade and self-detection functions, and the intelligent interactive terminal 500 realizes maintenance-free key functions.
The communication ring 200 is established between the user meters, the master station 600 divides all the intelligent interactive terminals 500 into a plurality of communication rings 200, each intelligent interactive terminal 500 only records the communication addresses of the previous and next nodes of the communication ring 200, the communication ring 200 distributes the data transmission right in a token mode, the period of reading the metering data by the acquisition module 401 is T, the metering data read by the acquisition module 401 in one period forms a metering data frame, the encryption storage module 403 encrypts and stores the metering data frame and uploads the digital fingerprint of the metering data frame to the block chain 300, the backup module 404 backs up and encrypts and stores the metering data frame, and the reporting module 405 accumulates k encrypted metering data frames, k encrypted metering data frames are reported to the master station 600, and the memory 102 stores the metering data within a certain time and removes expired metering data in a rolling manner.
The master station 600 inserts a virtual node into the communication ring 200, the virtual node records the communication addresses of the previous node and the next node, when the virtual node receives data, it checks whether the data format conforms to the preset format, if not, it discards the data, if it conforms to the preset format, it sends the data on the name of the virtual node, if it receives the data sent by the previous node, it sends the data to the next node of the virtual node, and if it receives the data sent by the next node, it sends the data to the previous node of the virtual node; at least two virtual nodes, which are physical nodes having communication and data checking functions or virtual machines running in the master station 600, are inserted into each communication ring 200. The addition of the virtual node makes the attack of illegally obtaining the whole communication ring 200 unsuccessful, improves the security of the communication ring 200, cannot find all the nodes in the communication ring 200, combines with the distributed data storage scheme of the encryption storage module 403, makes the data not be stolen and modified, and further improves the security and the credibility of the metering data.
As shown in fig. 3, the encrypted storage module 403 performs the following steps to implement encrypted storage: A11) opening a first buffer area, a second buffer area, a third buffer area and an off-port flag bit in the memory 102; A12) when the period T is over and the acquisition module 401 acquires the metering data, the encryption storage module 403 reads the metering data frame into the first buffer area, and the off-port flag position is 0; A13) the encryption storage module 403 where the token is located determines whether to store the data frame off-port with probability p, if it is determined not to store off-port, the token is transmitted to the next node of the communication ring 200 and the step is repeated, if it is determined to store off-port, the step a14 is entered); A14) the encryption storage module 403 copies the data in the first buffer area to the second buffer area, and clears the first buffer area from the position 1 of the outgoing flag; A15) the encryption storage module 403 where the token is currently located sends the data in the second buffer area to the second buffer area of the next node of the communication ring 200, and ensures that the data is correctly and completely received through a verification and retransmission mechanism, and then empties the data in the second buffer area, and sends the token to the next node; A16) after the next node receives the token, firstly judging whether the data in the first buffer area of the node is empty, if so, entering the step A18), and if not, entering the step A17); A17) determining whether to exchange data in the first buffer area and the second buffer area according to the probability p, wherein the third buffer area is used for realizing data exchange, if yes, the position of the exit flag is 1 after exchange is finished, if no, the exit flag is kept at 0, the data in the first buffer area is encrypted and stored after being associated with the exit flag, the first buffer area is emptied, and then the step A15) is returned to execute; A18) the data in the second buffer area is encrypted and stored after being associated with the off-port flag bit, and the token is kept until the next period T is finished, and the execution is started by the step A12); the master station 600 receives the data uploaded by all the nodes in the communication ring 200, and then restores the metering data according to the off-port flag. The metering data collected by each intelligent interactive terminal 500 is partially stored locally and partially stored in other nodes, the security of data storage is improved through a scattered storage technology, and each intelligent interactive terminal 500 cannot obtain the node on which the off-port data is stored, so that the storage data of an individual or partial intelligent interactive terminal 500 is obtained, the metering data of any meter cannot be recovered, and only the metering data of all the nodes in the communication ring 200 is obtained, the recovery of all the data can be ensured, so that the data cannot be stolen and tampered, and the reliability and the credibility of the metering data are further improved.
The master station 600 formulates a backup number k and a backup track number n, n > k, the backup module 404 stores values of n and k, the period T is ended, after the encryption storage module 403 finishes encryption storage, the backup module 404 establishes a temporary variable i to indicate a current backup channel, each backup module 404 randomly selects k backup tracks from the n backup tracks, the backup module 404 in the same backup track shifts backup according to a communication sequence of the communication ring 200 to implement cross and multi-clock backup, the backup module 404 transmits a metering data frame and the temporary variable i in the communication ring 200 according to a preset rule until a rule of stopping communication is satisfied, and the backup process is completed under a decentering condition, as shown in fig. 4, the method specifically includes: C1) the backup module 404 opens up a fourth buffer area, a fifth buffer area and a sixth buffer area in the memory 102, and establishes an integer temporary array X, where the length of the array is k, and the initial value of the temporary variable i is 0; C2) after the period T is over, after the encryption storage module 403 completes the encryption storage, the encryption storage module 403 deletes the associated off-port flag of the stored metering data frame, copies the off-port flag to the sixth buffer, and clears the fourth buffer and the fifth buffer, and the backup module 404 randomly selects k integers from n integers of [1, n ] and stores the k integers into the array X, where X = { X1, X2, …, xk }; C3) starting from the node where the token of the communication ring 200 is located, changing the value of the temporary variable i from 0 to 1; C5) if the array X contains a value equal to the value i, copying the data in the sixth buffer area to a fourth buffer area, exchanging the data in the fourth buffer area with the data in the fifth buffer area, if the data in the fourth buffer area is not empty, associating the data in the fourth buffer area with the value i and then storing the data, if the X does not contain a value equal to the value i, not participating in the round of backup, not exchanging the data in the fourth buffer area and the fifth buffer area, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, and then emptying the fifth buffer area and transmitting the token to the next node; C6) when the node receives the token, the data sent by the previous node and the value i, the following judgment and steps are executed: a. if the data in the fifth buffer area is empty and the received i value is the same as the current i value of the node: adding 1 to the value of i, if the value of i after adding 1 is not more than n, jumping to the step C5) for execution, running the next backup track, if the value of i after adding 1 is more than n, ending the backup, emptying a fourth buffer area, a fifth buffer area and a sixth buffer area, setting i as 0, sending the value (n +1) as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6); b. if the received i value is (n + 1): if the value of i of the node is 0, retaining the token, not sending data to the next node, starting to execute the step A12) until the end of the next period T, if the value of i of the node is not 0, setting i of the node to be 0, sending the value (n +1) as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6); c. if the received i value is 1 greater than the node and is not (n + 1): adding 1 to the value i of the node, and executing step C5), if the fifth buffer data is not empty and the received value i is the same as the current value i of the node: judging whether the array X of the node contains elements with the same value as the value i, if so, entering the step C7), and if not, entering the step C8); C7) judging whether the data in the fifth buffer area is the same as the data in the sixth buffer area, if not, exchanging the data in the fourth buffer area and the fifth buffer area, associating the data in the fourth buffer area with the value i and then storing the data, adding 1 to the value i of the node, and executing the step C5), if so, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, emptying the fifth buffer area, sending the token to the next node, and triggering the next node to execute the step C6); C8) and determining whether to exchange the data of the fourth buffer area and the fifth buffer area according to the probability q, then sending the data of the fifth buffer area to a fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, then emptying the fifth buffer area, transmitting the token to the next node, and triggering the next node to execute the step C6). Through the backup of the backup module 404, each metering data frame has k backups, and the backups are stored in a dispersed manner, no record is made at the stored position, and the data can be restored only by obtaining the data of all nodes, so that the backup data cannot be found and modified, and the authenticity verification is performed in combination with the block chain 300, so that the backup records which are not tampered can be identified, and the safety and tamper resistance of the metering data are greatly improved.
After receiving the data uploaded by all nodes in the communication ring 200, the master station 600 restores the metering data according to the off-port flag bit, including: B11) if the communication ring 200 has a virtual node, the virtual node is removed, and two nodes on two sides of the virtual node form an adjacent node; B12) starting from any node in the communication ring 200 with an off-port flag bit of 1, this node is called the active node; B13) searching a node with the next off-port flag bit being 1 downwards, exchanging the metering data frames of the two nodes, and updating the off-port flag position of the active node to be 0 and the active node to be the node with the next off-port flag bit being 1; B14) repeating the step B13) until all off-port flag bits in the communication ring 200 are 0, completing the reduction of the metering data frame, and reducing each metering data frame in the time sequence to obtain the metering data reported by each user meter; B15) the master station 600 downloads the corresponding data fingerprints from the blockchain 300, verifies whether the digital fingerprints of the metering data obtained by restoration are matched, accepts the metering data if the digital fingerprints are matched, and gives an alarm if the digital fingerprints are not matched. By improving the reporting frequency, the data tampering condition is found in time, and the loss is reduced. Each intelligent interactive terminal 500 records the communication address of the short message server and the number of the mobile phone of the user, before clearing the overdue data, the intelligent interactive terminal 500 downloads the data record from the master station 600 and downloads the corresponding digital fingerprint from the blockchain 300, if the data downloaded from the master station 600 is consistent with the digital fingerprint, the power consumption of the user in the corresponding time is generated and sent to the mobile phone of the user through the short message server, and then the overdue data is cleared, otherwise, the error is reported and sent to the mobile phone of the user through the short message server, and the overdue data is reserved. The method for periodically generating the digital fingerprint of the metering data by the encryption storage module 403 comprises the following steps: B11) the metering data frame is regarded as a binary unsigned integer, and the master station 600 periodically distributes binary large numbers; B12) dividing the unsigned integer corresponding to the metering data frame by the binary large number allocated by the master station 600 to obtain a remainder; B13) the binary large number and the remainder assigned by the master station 600 are used as the digital fingerprint of the metering data frame.
Before clearing the expired data, the intelligent interactive terminal 500 downloads the data record from the master station 600, downloads the corresponding digital fingerprint from the blockchain 300, clears the expired data if the data downloaded from the master station 600 conforms to the digital fingerprint, and reports an error and retains the expired data otherwise. Downloading data from the master station 600 and verifying it can prevent the master station 600 from modifying the metering data and providing authentic metering data to the user.
The beneficial effect of this embodiment does: the blockchain modules 402 of all the intelligent interactive terminals 500 form the blockchain 300, so that an inspection way is provided for data tamper resistance and forgery prevention, the encryption storage modules 403 and the backup modules 404 of the intelligent interactive terminals 500 work cooperatively in a centerless mode, so that the difficulty of data storage tamper and forgery is further improved, the backup modules 404 backup the metering data, the destructiveness of the metering data is improved, the reliability of the metering data is improved, and a fairer and more reliable environment is provided for power transaction.
The above-described embodiments are only preferred embodiments of the present invention, and are not intended to limit the present invention in any way, and other variations and modifications may be made without departing from the spirit of the invention as set forth in the claims.

Claims (8)

1. A high-reliability user electricity metering device adopting a block chain technology comprises a main station and a plurality of user metering meters, and is characterized in that,
the intelligent interactive terminal is connected with a plurality of user metering meters and comprises an encryption communication unit, a memory and a controller, wherein the encryption communication unit and the memory are connected with the controller, the encryption communication unit is in communication connection with a master station, the encryption communication unit is in encryption communication connection with the encryption communication unit, a collection module, a block chain module, an encryption storage module, a backup module and a reporting module run in the controller, the collection module periodically reads the metering data of the corresponding user metering meters, the block chain modules of all the intelligent interactive terminals form a block chain, the block chain provides data downloading service for the master station, the encryption storage module encrypts and stores the metering data acquired by the collection module based on a block chain technology and periodically generates digital fingerprints of the metering data to be uploaded to the block chain, the backup module periodically backs up the metering data of the user meter, and the reporting module periodically uploads the stored metering data to the master station;
the method comprises the steps that communication rings are established among intelligent interactive terminals, a master station divides all the intelligent interactive terminals into a plurality of communication rings, each intelligent interactive terminal only records communication addresses of a previous node and a next node of the communication ring, the communication rings distribute data sending rights in a token mode, an acquisition module reads metering data with a period of T, the metering data read by the acquisition module in one period form a metering data frame, an encryption storage module encrypts and stores the metering data frame and uploads digital fingerprints of the metering data frame to a block chain, a backup module backs up and encrypts and stores the metering data frame, a reporting module reports the k encrypted metering data frame to the master station when accumulating the k encrypted metering data frames, and a storage stores the metering data within a certain time and rolls to remove outdated metering data.
2. The high-reliability user electricity metering device adopting the block chain technology as claimed in claim 1,
the method comprises the steps that a master station inserts a virtual node into a communication ring, the virtual node records communication addresses of a previous node and a next node, when the virtual node receives data, whether the data format accords with a preset format is checked, if the data format does not accord with the preset format, the virtual node discards the data, if the data format accords with the preset format, the data is sent on the name of the virtual node, if the virtual node receives the data sent by the previous node, the data is sent to the next node of the virtual node, and if the virtual node receives the data sent by the next node, the data is sent to the previous node of the virtual node;
at least two virtual nodes are inserted into each communication ring, and the virtual nodes are physical nodes with communication and data checking functions or virtual machines running in the main station.
3. The high-reliability user electricity metering device adopting the block chain technology according to the claim 1 or 2,
the encryption storage module executes the following steps to realize encryption storage:
A11) opening up a first buffer area, a second buffer area, a third buffer area and an off-port flag bit in a memory;
A12) when the period T is over and the acquisition module acquires the metering data, the encryption storage module reads the metering data frame into a first buffer area, and the off-port mark position is 0;
A13) the encryption storage module where the token is located determines whether to store the data frame off-port with probability p, if it is determined not to store off-port, the token is transmitted to the next node of the communication ring and the step is repeated, if it is determined to store off-port, the step A14 is entered);
A14) the encryption storage module copies the data in the first buffer area to a second buffer area, and clears the first buffer area from the position 1 of the exit tag;
A15) the encryption storage module at the current position of the token sends the data in the second buffer area to the second buffer area of the next node of the communication ring, the data is ensured to be correctly and completely received through a verification and retransmission mechanism, then the data in the second buffer area is emptied, and the token is sent to the next node;
A16) after the next node receives the token, firstly judging whether the data in the first buffer area of the node is empty, if so, entering the step A18), and if not, entering the step A17);
A17) determining whether to exchange data in the first buffer area and the second buffer area according to the probability p, wherein the third buffer area is used for realizing data exchange, if yes, the position of the exit flag is 1 after exchange is finished, if no, the exit flag is kept at 0, the data in the first buffer area is encrypted and stored after being associated with the exit flag, the first buffer area is emptied, and then the step A15) is returned to execute;
A18) the data in the second buffer area is encrypted and stored after being associated with the off-port flag bit, and the token is kept until the next period T is finished, and the execution is started by the step A12);
and after receiving the data uploaded by all the nodes in the communication ring, the master station restores the metering data according to the off-port zone bit.
4. The high-reliability user electricity metering device adopting the block chain technology as claimed in claim 3,
after the master station receives the data uploaded by all the nodes in the communication ring, the method for restoring the metering data according to the off-port zone bit comprises the following steps:
B11) if the communication ring has the virtual node, the virtual node is removed, and two nodes on two sides of the virtual node form an adjacent node;
B12) starting from any node with a1 bit off-port flag in the communication ring, the node is called an active node;
B13) searching a node with the next off-port flag bit being 1 downwards, exchanging the metering data frames of the two nodes, and updating the off-port flag position of the active node to be 0 and the active node to be the node with the next off-port flag bit being 1;
B14) repeating the step B13) until all off-port flag bits in the communication ring are 0, namely, completing the reduction of the metering data frame, and reducing each metering data frame in the time sequence to obtain the metering data reported by each user meter;
B15) the master station downloads the corresponding data fingerprints from the block chain, verifies whether the digital fingerprints of the metering data obtained by reduction are matched, accepts the metering data if the digital fingerprints are matched, and gives an alarm if the digital fingerprints are not matched.
5. The high-reliability user electricity metering device adopting the block chain technology as claimed in claim 3,
the method comprises the following steps that a main station sets a backup number k and a backup track number n, n > k, a backup module stores values of n and k, a period T is ended, after an encryption storage module finishes encryption storage, the backup module establishes a temporary variable i to represent a current backup channel, each backup module randomly selects k backup tracks from the n backup tracks, the backup modules in the same backup track shift backup according to a communication sequence of a communication ring to realize cross backup and multi-clock backup, the backup module transmits a metering data frame and the temporary variable i in the communication ring according to a preset rule until a rule of stopping communication is met, and the backup process is finished under a de-centering condition, and the method specifically comprises the following steps:
C1) the backup module opens up a fourth buffer area, a fifth buffer area and a sixth buffer area in the memory, and establishes an integer temporary array X, wherein the length of the array is k, and the initial value of a temporary variable i is 0;
C2) after the period T is finished, after the encryption storage module finishes the encryption storage, deleting the associated off-port flag bit of the stored metering data frame, copying the metering data frame to a sixth buffer area, emptying a fourth buffer area and a fifth buffer area, and randomly selecting k integers from n integers of [1, n ] by the backup module and storing the k integers into an array X, wherein X = { X1, X2, …, xk };
C3) starting from a node where a token of a communication ring is located, changing the value of a temporary variable i from 0 to 1;
C5) if the array X contains a value equal to the value i, copying the data in the sixth buffer area to a fourth buffer area, exchanging the data in the fourth buffer area with the data in the fifth buffer area, if the data in the fourth buffer area is not empty, associating the data in the fourth buffer area with the value i and then storing the data, if the X does not contain a value equal to the value i, not participating in the round of backup, not exchanging the data in the fourth buffer area and the fifth buffer area, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, and then emptying the fifth buffer area and transmitting the token to the next node;
C6) when the node receives the token, the data sent by the previous node and the value i, the following judgment and steps are executed:
a. if the data in the fifth buffer area is empty and the received i value is the same as the current i value of the node:
adding 1 to the value of i, if the value of i after adding 1 is not more than n, jumping to the step C5) to execute, running the next backup track, if the value of i after adding 1 is more than n, ending the backup, emptying a fourth buffer area, a fifth buffer area and a sixth buffer area, setting i as 0, sending the value n +1 as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6);
b. if the received i value is n + 1:
if the value of i of the node is 0, retaining the token, not sending data to the next node, starting to execute the step A12) until the end of the next period T, if the value of i of the node is not 0, setting i of the node to be 0, sending the value n +1 as the value of i and the data of the fifth buffer area to the next node, transmitting the token to the next node, and triggering the next node to execute the step C6);
c. if the received i value is 1 larger than the node and is not n + 1:
then, after adding 1 to the value i of the present node, step C5 is executed,
d. if the data in the fifth buffer area is not empty and the received i value is the same as the current i value of the node:
judging whether the array X of the node contains elements with the same value as the value i, if so, entering the step C7), and if not, entering the step C8);
C7) judging whether the data in the fifth buffer area is the same as the data in the sixth buffer area, if not, exchanging the data in the fourth buffer area and the fifth buffer area, associating the data in the fourth buffer area with the value i and then storing the data, adding 1 to the value i of the node, and executing the step C5), if so, sending the data in the fifth buffer area to the fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, emptying the fifth buffer area, sending the token to the next node, and triggering the next node to execute the step C6);
C8) and determining whether to exchange the data of the fourth buffer area and the fifth buffer area according to the probability q, then sending the data of the fifth buffer area to a fifth buffer area of the next node, simultaneously sending the value i of the current node to the next node, then emptying the fifth buffer area, transmitting the token to the next node, and triggering the next node to execute the step C6).
6. The high-reliability user electricity metering device adopting the block chain technology according to the claim 1 or 2,
the intelligent interactive terminal downloads the data from the main station before clearing the expired data, downloads the corresponding digital fingerprints from the block chain, clears the expired data if the data downloaded from the main station is consistent with the digital fingerprints, and reports an error and retains the expired data if the data downloaded from the main station is not consistent with the digital fingerprints.
7. The device for metering user electricity consumption with high reliability by using block chain technology as claimed in claim 6,
the intelligent interactive terminal downloads the data from the master station before clearing the expired data and downloads the corresponding digital fingerprints from the block chain, if the data downloaded from the master station is consistent with the digital fingerprints, the power consumption of the user in corresponding time is generated and sent to the mobile phone of the user through the short message server, and then the expired data is cleared, otherwise, an error is reported and sent to the mobile phone of the user through the short message server, and the expired data is reserved.
8. The high-reliability user electricity metering device adopting the block chain technology as claimed in claim 1,
the method for periodically generating the digital fingerprint of the metering data by the encryption storage module comprises the following steps:
B11) the metering data frame is regarded as a binary unsigned integer, and a master station periodically distributes a binary large number;
B12) dividing the unsigned integer corresponding to the metering data frame by the binary large number distributed by the master station to obtain a remainder;
B13) and taking the binary large number and the remainder allocated by the master station as the digital fingerprint of the metering data frame.
CN202010226375.5A 2020-03-27 2020-03-27 High-reliability user electricity metering device adopting block chain technology Active CN111132151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010226375.5A CN111132151B (en) 2020-03-27 2020-03-27 High-reliability user electricity metering device adopting block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010226375.5A CN111132151B (en) 2020-03-27 2020-03-27 High-reliability user electricity metering device adopting block chain technology

Publications (2)

Publication Number Publication Date
CN111132151A CN111132151A (en) 2020-05-08
CN111132151B true CN111132151B (en) 2020-07-28

Family

ID=70493923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010226375.5A Active CN111132151B (en) 2020-03-27 2020-03-27 High-reliability user electricity metering device adopting block chain technology

Country Status (1)

Country Link
CN (1) CN111132151B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073661B (en) * 2020-08-03 2022-10-25 浙江旅游职业学院 Tamper-proof video monitoring system for sterile workshop
CN112485723B (en) * 2020-09-15 2022-12-02 国网浙江省电力有限公司湖州供电公司 Intelligent power monitoring method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426234A (en) * 2017-08-08 2017-12-01 武汉协鑫新能源电力设计有限公司 A kind of green electric power supply authentication mechanism based on block chain technology
CN107817381A (en) * 2017-11-10 2018-03-20 赫普科技发展(北京)有限公司 A kind of intelligent electric meter
CN109684861A (en) * 2019-01-11 2019-04-26 阳光电源股份有限公司 Multi-energy data storage method, system and data audit center based on block chain
CN209641059U (en) * 2018-10-11 2019-11-15 安徽继远软件有限公司 A kind of intelligent electric meter data acquisition remote transmission device based on NB-IoT
CN110880130A (en) * 2019-12-06 2020-03-13 上海分未信息科技有限公司 Block chain-based electric power transaction settlement system with virtual electric meters and settlement charge-out method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10367645B2 (en) * 2016-10-26 2019-07-30 International Business Machines Corporation Proof-of-work for smart contracts on a blockchain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426234A (en) * 2017-08-08 2017-12-01 武汉协鑫新能源电力设计有限公司 A kind of green electric power supply authentication mechanism based on block chain technology
CN107817381A (en) * 2017-11-10 2018-03-20 赫普科技发展(北京)有限公司 A kind of intelligent electric meter
CN209641059U (en) * 2018-10-11 2019-11-15 安徽继远软件有限公司 A kind of intelligent electric meter data acquisition remote transmission device based on NB-IoT
CN109684861A (en) * 2019-01-11 2019-04-26 阳光电源股份有限公司 Multi-energy data storage method, system and data audit center based on block chain
CN110880130A (en) * 2019-12-06 2020-03-13 上海分未信息科技有限公司 Block chain-based electric power transaction settlement system with virtual electric meters and settlement charge-out method

Also Published As

Publication number Publication date
CN111132151A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111132151B (en) High-reliability user electricity metering device adopting block chain technology
CN106982203A (en) The ATM network system and its information processing method of robust based on block chain technology
CN1459184A (en) Method, system and device for monitoring activity of wireless communcation device
CN109451467A (en) A kind of vehicular ad hoc network data safety based on block chain technology is shared and storage system
CN111506585B (en) Power distribution network energy metering system based on block chain technology
CN109144981A (en) Electric car based on block chain shares battery lifecycle management system and method
CA2233288A1 (en) Operating apparatus with payment for usage
CN113034124B (en) Traffic two-dimensional code cross-region transaction clearing and settlement method and system
CN108768672B (en) Data processing method, device and storage medium
CN102647612B (en) Overall network management wired audio-video on demand accounting and charging system
CN108647991A (en) Electric power data management method, platform and equipment
CN111343212B (en) Message processing method, device, equipment and storage medium
CN113408752A (en) Garbage recovery supervision system and method based on block chain
CN110619023A (en) Water source detection data chaining method and device of Internet of things by combining block chains
CN109816802A (en) Highway tolling system based on cloud mode
CN112417052B (en) Data synchronization method, device, equipment and storage medium in block chain network
CN111626718B (en) Intelligent electric energy meter with block chain function support
CN112600821A (en) Data storage system and method based on Internet of things and block chain technology
CN111931248A (en) Block chain technology-based power distribution terminal tamper-proof technology and system
CN216490530U (en) Data anti-counterfeiting dongle for monitoring ecological flow of hydropower station
CN115495526A (en) Maintenance system and method based on block chain characteristics
CN113591137B (en) Block chain-based management method and device
CN113794780B (en) Site real-time control method and system for platform area edge terminal
CN112565361A (en) Highway toll data storage method and device based on distributed accounting system
CN117614605A (en) Data acquisition management system applied to intelligent ammeter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant