CN111935184A - Data privacy protection method and device and computer readable storage medium - Google Patents

Data privacy protection method and device and computer readable storage medium Download PDF

Info

Publication number
CN111935184A
CN111935184A CN202011045709.5A CN202011045709A CN111935184A CN 111935184 A CN111935184 A CN 111935184A CN 202011045709 A CN202011045709 A CN 202011045709A CN 111935184 A CN111935184 A CN 111935184A
Authority
CN
China
Prior art keywords
data
aggregated
aggregation
encrypted
electric meter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011045709.5A
Other languages
Chinese (zh)
Other versions
CN111935184B (en
Inventor
曹珍富
董晓蕾
钱佳威
沈佳辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peng Cheng Laboratory
Original Assignee
Peng Cheng Laboratory
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peng Cheng Laboratory filed Critical Peng Cheng Laboratory
Priority to CN202011045709.5A priority Critical patent/CN111935184B/en
Publication of CN111935184A publication Critical patent/CN111935184A/en
Application granted granted Critical
Publication of CN111935184B publication Critical patent/CN111935184B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network
    • H04L12/2834Switching of information between an external network and a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)
  • Remote Monitoring And Control Of Power-Distribution Networks (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a data privacy protection method, a device and a computer readable storage medium, wherein the method comprises the following steps: the representative terminal equipment receives and aggregates the encrypted electric quantity of each terminal equipment to obtain first aggregated data, and sends the first aggregated data to the intelligent electric meter; the intelligent electric meter verifies the first aggregation data, acquires current accumulated aggregation data when the first aggregation data pass the verification, and aggregates the first aggregation data and the accumulated aggregation data to acquire second aggregation data; when the received data count reaches a preset threshold value, the intelligent electric meter signs second aggregation data based on the aggregation signature private key to obtain intermediate encrypted data; the control center decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter. The invention ensures the privacy of the user electric quantity data and the authenticity and integrity of the data received by the control center.

Description

Data privacy protection method and device and computer readable storage medium
Technical Field
The present invention relates to the field of data privacy protection, and in particular, to a data privacy protection method, apparatus, and computer-readable storage medium.
Background
In contrast to conventional grid technologies, smart grids are a type of grid that provides an economical, efficient, sustainable power system using communication and cryptography, and communication with consumers is dependent on home area networks. The intelligent electric meter is an important participant in an intelligent power grid, is connected with intelligent equipment in a home area network through a network and a sensor, and periodically summarizes household electricity consumption readings and sends the household electricity consumption readings to a superior utility, so that the superior utility can accurately calculate the electricity consumption of a user, and the superior utility can predict the future electricity demand and electricity price of the region through the information. In addition, the diversity of the access point may affect its performance and security, so in order to make it practical in a large smart grid, it is necessary to reduce the information exchange among the access point, the access network and the control center, and to use the data cipher text for information transmission to ensure the security of the power reading. Therefore, privacy protection for data aggregation is a challenging problem in smart grids, which provides flexible and efficient data aggregation while maintaining data integrity and data privacy.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a data privacy protection method, a data privacy protection device and a computer readable storage medium, and aims to solve the technical problem of privacy protection of power data in a smart grid.
In order to achieve the above object, the present invention provides a data privacy protection method, which is applied to a data privacy protection system, where the data privacy protection system includes a plurality of terminal devices, an intelligent electric meter, and a control center, and is characterized in that the data privacy protection method includes the following steps:
the representative terminal equipment receives the encrypted electric quantity of each terminal equipment, aggregates the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sends the first aggregated data to the intelligent electric meter;
the intelligent electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center;
and the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter.
Optionally, the step of receiving, by the representative terminal device, the encrypted electric quantity of each terminal device, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the smart meter includes:
the intelligent electric meter transmits first random numbers to each terminal device respectively;
each terminal device receives and encrypts respective electric quantity data based on the first random number to obtain the encrypted electric quantity, and sends the encrypted electric quantity to the representative terminal device;
and receiving the encrypted electric quantity by the representative terminal equipment, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the intelligent electric meter.
Optionally, the step of receiving, by the smart meter, the first aggregated data, performing identity verification on the first aggregated data, and acquiring current accumulated aggregated data when the first aggregated data passes the verification, and aggregating the first aggregated data and the accumulated aggregated data to obtain second aggregated data includes:
the intelligent electric meter transmits second random numbers to each terminal device respectively;
each terminal device receives and encrypts the device ID based on the second random number to obtain an encrypted ID, and the encrypted ID is sent to the intelligent electric meter through the representative terminal device;
the smart electric meter receives the first aggregation data, carries out identity verification on the first aggregation data based on the encrypted ID, obtains current accumulated aggregation data when the first aggregation data pass the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data.
Optionally, when the count of the received data of the smart electric meter reaches a preset threshold, the smart electric meter signs the second aggregated data based on an aggregated signature private key to obtain intermediate encrypted data corresponding to the second aggregated data, and sends the intermediate encrypted data to a control center, where the step includes:
the intelligent ammeter detects whether the received data count of the intelligent ammeter reaches a preset threshold value in real time;
when the fact that the received data count of the intelligent electric meter reaches a preset threshold value is detected, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center.
Optionally, when the count of the received data of the smart electric meter reaches a preset threshold, the smart electric meter signs the second aggregated data based on an aggregated signature private key to obtain intermediate encrypted data corresponding to the second aggregated data, and sends the intermediate encrypted data to a control center, where the step includes:
a third party trusted authority transmits the aggregated signature private key and a third random number to the intelligent electric meter;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter adds the second aggregation data to the third random number and then concatenates a timestamp to obtain intermediate data, and signs the intermediate data based on the aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregation data.
Optionally, the step of receiving, by the control center, the intermediate encrypted data, decrypting the intermediate encrypted data based on an aggregated signature public key corresponding to the aggregated signature private key to obtain second aggregated data, and aggregating the second aggregated data when the second aggregated data passes the authentication, so as to obtain the meter reading of the smart meter, includes:
the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on an aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregation data and the third random number, and extracts the second aggregation data from the second aggregation data and the third random number;
and the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, and aggregates the second aggregated data when the second aggregated data passes the identity verification to obtain the electric meter reading of the intelligent electric meter.
Optionally, the step of receiving, by the representative terminal device, the encrypted electric quantity of each terminal device, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the smart meter includes:
the method comprises the steps that a representative terminal device receives encrypted electric quantity of each terminal device, the encrypted electric quantity is aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, the first aggregated data are encrypted based on a preset public key, and then the first aggregated data are sent to an intelligent electric meter;
the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key to obtain the electric meter reading of the intelligent electric meter, wherein the step of performing identity verification on the second aggregated data comprises the following steps:
the control center conducts identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key corresponding to the preset public key to obtain the electric meter reading of the intelligent electric meter.
Optionally, the data privacy protection system is applied to a smart grid, where the smart grid includes a plurality of home area networks, and each terminal device corresponds to each node in the home area networks.
In addition, to achieve the above object, the present invention provides a data privacy protecting apparatus, including: the system comprises a memory, a processor and a data privacy protection program stored on the memory and capable of running on the processor, wherein the data privacy protection program realizes the steps of the data privacy protection method when being executed by the processor.
In addition, to achieve the above object, the present invention also provides a computer readable storage medium, on which a data privacy protecting program is stored, and the data privacy protecting program, when executed by a processor, implements the steps of the data privacy protecting method as described above.
The method comprises the steps that the representative terminal equipment receives encrypted electric quantity of each terminal equipment, the encrypted electric quantity is aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, and the first aggregated data are sent to an intelligent electric meter; the intelligent electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data; when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center; and the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter. In this embodiment, the smart meter collects the electric quantity data of each terminal device of the home area network by representing the terminal device, and sends the collected electric quantity data to the control center, wherein the smart meter aggregates the aggregated data of the accumulated times and sends the aggregated data to the control center, so that the privacy of the electric quantity data of the user and the authenticity and integrity of the data received by the control center are ensured, and the smart meter is suitable for an electric quantity data privacy protection scheme of a medium-sized network architecture such as a smart city.
Drawings
Fig. 1 is a schematic structural diagram of a data privacy protection apparatus in a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a data privacy protection method according to the present invention;
fig. 3 is a schematic structural diagram of a data privacy protection system applied by the data privacy protection method of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a data privacy protection apparatus in a hardware operating environment according to an embodiment of the present invention.
The data privacy protection device in the embodiment of the present invention may be a PC, or may be a mobile terminal device having a display function, such as a smart phone, a tablet computer, an electronic book reader, an MP3 (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3) player, an MP4 (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4) player, a portable computer, and the like.
As shown in fig. 1, the data privacy protecting apparatus may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the data privacy protecting apparatus may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors.
Those skilled in the art will appreciate that the data privacy device architecture shown in fig. 1 does not constitute a limitation of the data privacy device and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a data privacy protecting program.
In the data privacy protection apparatus shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be used to invoke a data privacy preserving program stored in the memory 1005.
In this embodiment, the data privacy protecting apparatus includes: the system comprises a memory 1005, a processor 1001 and a data privacy protection program stored on the memory 1005 and operable on the processor 1001, wherein when the processor 1001 calls the data privacy protection program stored in the memory 1005, the following operations are performed:
the representative terminal equipment receives the encrypted electric quantity of each terminal equipment, aggregates the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sends the first aggregated data to the intelligent electric meter;
the intelligent electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center;
and the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
the intelligent electric meter transmits first random numbers to each terminal device respectively;
each terminal device receives and encrypts respective electric quantity data based on the first random number to obtain the encrypted electric quantity, and sends the encrypted electric quantity to the representative terminal device;
and receiving the encrypted electric quantity by the representative terminal equipment, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the intelligent electric meter.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
the intelligent electric meter transmits second random numbers to each terminal device respectively;
each terminal device receives and encrypts the device ID based on the second random number to obtain an encrypted ID, and the encrypted ID is sent to the intelligent electric meter through the representative terminal device;
the smart electric meter receives the first aggregation data, carries out identity verification on the first aggregation data based on the encrypted ID, obtains current accumulated aggregation data when the first aggregation data pass the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
the intelligent ammeter detects whether the received data count of the intelligent ammeter reaches a preset threshold value in real time;
when the fact that the received data count of the intelligent electric meter reaches a preset threshold value is detected, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
a third party trusted authority transmits the aggregated signature private key and a third random number to the intelligent electric meter;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter adds the second aggregation data to the third random number and then concatenates a timestamp to obtain intermediate data, and signs the intermediate data based on the aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregation data.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on an aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregation data and the third random number, and extracts the second aggregation data from the second aggregation data and the third random number;
and the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, and aggregates the second aggregated data when the second aggregated data passes the identity verification to obtain the electric meter reading of the intelligent electric meter.
Further, the processor 1001 may call the data privacy protection program stored in the memory 1005, and further perform the following operations:
the method comprises the steps that a representative terminal device receives encrypted electric quantity of each terminal device, the encrypted electric quantity is aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, the first aggregated data are encrypted based on a preset public key, and then the first aggregated data are sent to an intelligent electric meter;
the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key to obtain the electric meter reading of the intelligent electric meter, wherein the step of performing identity verification on the second aggregated data comprises the following steps:
the control center conducts identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key corresponding to the preset public key to obtain the electric meter reading of the intelligent electric meter.
The invention further provides a data privacy protection method, and referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the data privacy protection method of the invention.
In this embodiment, the data privacy protection method includes the following steps:
step S10, on behalf of the terminal equipment, receiving the encrypted electric quantity of each terminal equipment, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to an intelligent electric meter;
referring to a schematic structural diagram of the data privacy protection system shown in fig. 3, the data privacy protection system includes a plurality of terminal devices (APs), an intelligent electric meter, and a Control Center (CC). The data privacy protection system is applied to a smart grid, the smart grid is a grid which provides an economic, efficient and sustainable power system by using communication and password technologies, the smart grid comprises a plurality of Home Area Networks (HANs), and each terminal device corresponds to each node in the home area networks. It should be noted that the home area network is an area divided in the smart grid of the user and using a home as a unit, and each terminal device in the home area network can communicate with each other; the terminal equipment is electric equipment in a home area network and comprises various electric equipment or electronic equipment and the like; the intelligent electric meter is a statistical electric device in a home area network, is connected with the intelligent device in the home area network through a network, and periodically summarizes the household electricity consumption and sends the summary to a control center, so that the intelligent electric meter can accurately calculate the user electricity consumption for counting the electricity consumption of the home area network, generally speaking, the electricity consumption is counted through one intelligent electric meter in one home area network; the control center can be a superior utility, collects the electric quantity data of the intelligent electric meters in each home area network, is a device or a device cluster for summarizing the electric quantity used by each home area network, and has the functions of calculating the electric charge of each home area network based on the electric quantity used by each home area network and predicting the future electric power demand and the electric charge of the region corresponding to each home area network based on the electric quantity data of each home area network. The number of the home area networks in this embodiment may be one or multiple, the number of the home area networks is not specifically limited, and one or multiple smart meters for counting electricity consumption in the home area networks may also be provided, and the number of the smart meters is not specifically limited in this embodiment.
The representative terminal device is any one of terminal devices in the home area network and is used for collecting electric quantity data of each terminal device.
When the intelligent electric meter receives the electric quantity collecting instruction, the target terminal device is selected from the terminal devices to serve as a representative terminal device, wherein the intelligent electric meter can trigger the electric quantity collecting instruction based on a preset time interval to collect the electric quantity, and the electric quantity collecting instruction can be triggered manually or triggered based on a preset program or hardware. After the representative terminal device is selected, the representative terminal device collects the encrypted electric quantity of each terminal device and obtains the encrypted electric quantity of the representative terminal device, the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, and the first aggregated data are sent to the intelligent electric meter after the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated.
Step S20, the smart electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to acquire second aggregation data;
when the smart meter receives the first aggregation data sent by the representative terminal device, the first aggregation data are subjected to identity verification, and the current accumulated aggregation data of the smart meter are obtained when the identity verification of the first aggregation data is passed. And then, aggregating the first aggregated data and the accumulated aggregated data to obtain second aggregated data. And if the authentication of the first aggregated data is not passed, the first aggregated data is indicated to be originated from the unknown device, and the first aggregated data is discarded.
Step S30, when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregation data, and sends the intermediate encrypted data to a control center;
after the intelligent electric meter aggregates the first aggregated data and the accumulated aggregated data, increasing the received data count of the intelligent electric meter; then, acquiring a received data count of the intelligent electric meter to detect whether the received data count reaches a preset threshold value; when the fact that the received data count of the intelligent electric meter reaches a preset threshold value is detected, the second aggregated data is signed based on the aggregated signature private key to obtain middle encrypted data corresponding to the second aggregated data, the middle encrypted data are sent to the control center, and the received data count is reset when the received data count of the intelligent electric meter reaches the preset threshold value.
Further, if it is detected that the received data count does not reach the preset threshold, the second aggregated data is used as the accumulated aggregated data for the following steps of continuing to execute the step of receiving the first aggregated data by the smart meter, performing identity verification on the first aggregated data, acquiring current accumulated aggregated data when the first aggregated data passes the verification, and aggregating the first aggregated data and the accumulated aggregated data to obtain the second aggregated data.
The receiving data count corresponding to the intelligent electric meter is associated with the electric quantity collecting instruction, the receiving data count is the accumulated number of times that the intelligent electric meter receives the aggregated data of the intelligent electric meter, the preset threshold value is the accumulated preset number of times, and when the electric quantity collecting instruction is triggered once a day, namely the electric quantity is collected once a day, the receiving data count is the number of days, and the preset threshold value is the accumulated number of days. The aggregated signature private key is transmitted to the smart electric meter by a third-party trusted authority, the aggregated signature private key corresponds to the aggregated signature public key, the aggregated signature private key and the aggregated signature public key are used for verifying the smart electric meter, it needs to be noted that the aggregated signature private key is a private key generated by aggregating a plurality of signatures into one signature, and each signature in the plurality of signatures is a signature corresponding to each terminal device.
Step S40, the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregate signature public key corresponding to the aggregate signature private key to obtain second aggregate data, and aggregates the second aggregate data when the second aggregate data passes the authentication to obtain the electric meter reading of the intelligent electric meter.
And when the control center receives the intermediate encrypted data, acquiring a polymerization signature public key, decrypting the intermediate encrypted data based on the polymerization signature public key to obtain second polymerization data, then performing identity verification on the second polymerization data, and polymerizing the second polymerization data when the second polymerization data passes the identity verification to obtain the electric meter reading of the intelligent electric meter. In fact, the second aggregated data is signed by the aggregated signature private key, and the control center decrypts the intermediate encrypted data by the aggregated signature public key, so that the control center can verify the identity of the second aggregated data to verify the integrity and authenticity of the data sent by the intelligent electric meter. The aggregation signature public key corresponds to an aggregation signature private key in the intelligent electric meter, and is transmitted to the control center by a third-party trusted authority.
According to the data privacy protection method provided by the embodiment, the representative terminal equipment receives the encrypted electric quantity of each terminal equipment, the encrypted electric quantity is aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, and the first aggregated data is sent to the intelligent electric meter; the intelligent electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data; when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center; and the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter. In this embodiment, the smart meter collects the electric quantity data of each terminal device of the home area network by representing the terminal device, and sends the collected electric quantity data to the control center, wherein the smart meter aggregates the aggregated data of the accumulated times and sends the aggregated data to the control center, so that the privacy of the electric quantity data of the user and the authenticity and integrity of the data received by the control center are ensured, and the smart meter is suitable for an electric quantity data privacy protection scheme of a medium-sized network architecture such as a smart city.
Based on the first embodiment, a second embodiment of the data privacy protecting method of the present invention is proposed, in this embodiment, step S10 includes:
step S11, the intelligent electric meter transmits a first random number to each terminal device;
step S12, each terminal device receives and encrypts the respective electric quantity data based on the first random number to obtain the encrypted electric quantity, and sends the encrypted electric quantity to the representative terminal device;
and step S13, receiving the encrypted electric quantity on behalf of the terminal equipment, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the intelligent electric meter.
Before the intelligent electric meter collects the electric quantity data of each terminal device, the data privacy protection system performs parameter initialization, the intelligent electric meter transmits first random numbers to each terminal device respectively, and it needs to be noted that the first random numbers received by each terminal device are different. And when the intelligent electric meter receives the electric quantity collecting instruction, selecting the target terminal equipment as the representative terminal equipment from the terminal equipment. Each terminal device encrypts respective electric quantity data based on the first random number to obtain encrypted electric quantity corresponding to the electric quantity data, and sends the encrypted electric quantity to the representative terminal device. The representative terminal device collects the encrypted electric quantity of each terminal device and obtains the encrypted electric quantity of the representative terminal device, the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, and the first aggregated data are sent to the intelligent electric meter after the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated.
Further, the step of receiving, by the smart meter, the first aggregated data, performing identity verification on the first aggregated data, and acquiring current accumulated aggregated data when the first aggregated data passes the verification, and aggregating the first aggregated data and the accumulated aggregated data to obtain second aggregated data includes:
step S21, the intelligent electric meter transmits second random numbers to each terminal device respectively;
step S22, each terminal device receives and encrypts the device ID based on the second random number to obtain an encrypted ID, and the encrypted ID is sent to the intelligent electric meter through a representative terminal device;
step S23, the smart meter receives the first aggregated data, performs identity verification on the first aggregated data based on the encrypted ID, obtains current accumulated aggregated data when the first aggregated data passes the verification, and aggregates the first aggregated data and the accumulated aggregated data to obtain second aggregated data.
Before the intelligent electric meter collects the electric quantity data of each terminal device, the data privacy protection system performs parameter initialization, the intelligent electric meter transmits second random numbers to each terminal device besides transmitting the first random numbers to each terminal device, and it needs to be noted that the second random numbers received by each terminal device are different. The data privacy protection system carries out parameter initialization, and the method further comprises the step that a third party trusted authority transmits the equipment ID to each terminal equipment through the intelligent electric meter, so that each terminal equipment holds the equipment ID of each terminal equipment, and the equipment IDs of the terminal equipment are different. Before each terminal device sends the electric quantity data to the intelligent electric meter, each terminal device encrypts the device ID based on the second random number to obtain an encrypted ID, and transmits the encrypted ID after the device ID is encrypted to the intelligent electric meter.
When the smart meter receives the first aggregation data sent by the representative terminal device, the first aggregation data are subjected to identity verification based on the encrypted ID, and the current accumulated aggregation data of the smart meter are obtained when the identity verification of the first aggregation data is passed. And then, aggregating the first aggregated data and the accumulated aggregated data to obtain second aggregated data.
Further, when the count of the received data of the smart electric meter reaches a preset threshold, the smart electric meter signs the second aggregated data based on an aggregated signature private key to obtain intermediate encrypted data corresponding to the second aggregated data, and sends the intermediate encrypted data to a control center, where the steps include:
step S24, the intelligent ammeter detects whether the received data count of the intelligent ammeter reaches a preset threshold value in real time;
and step S25, when the fact that the received data count of the intelligent electric meter reaches a preset threshold value is detected, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center.
The intelligent electric meter detects whether the received data count of the intelligent electric meter reaches a preset threshold value in real time so as to detect whether the current receiving of the intelligent electric meter represents that the aggregated data transmitted by the terminal equipment reaches preset times. After the intelligent electric meter aggregates the first aggregated data and the accumulated aggregated data, increasing the received data count of the intelligent electric meter; if the fact that the received data count of the intelligent electric meter reaches the preset threshold value is detected in real time, the second aggregated data is signed based on the aggregated signature private key to obtain middle encrypted data corresponding to the second aggregated data, the middle encrypted data are sent to the control center, and the received data count is reset when the received data count of the intelligent electric meter reaches the preset threshold value.
Further, if it is detected that the received data count does not reach the preset threshold, the second aggregated data is used as the accumulated aggregated data for the following steps of continuing to execute the step of receiving the first aggregated data by the smart meter, performing identity verification on the first aggregated data, acquiring current accumulated aggregated data when the first aggregated data passes the verification, and aggregating the first aggregated data and the accumulated aggregated data to obtain the second aggregated data.
Further, when the count of the received data of the smart electric meter reaches a preset threshold, the smart electric meter signs the second aggregated data based on an aggregated signature private key to obtain intermediate encrypted data corresponding to the second aggregated data, and sends the intermediate encrypted data to a control center, where the steps include:
step S31, the third party trusted authority transmits the aggregate signature private key and a third random number to the intelligent electric meter;
step S32, when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter adds the third random number to the second aggregation data and then concatenates a timestamp to obtain intermediate data, and signs the intermediate data based on the aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregation data.
Before the intelligent electric meter collects electric quantity data of each terminal device, the data privacy protection system carries out parameter initialization, the intelligent electric meter transmits a first random number and a second random number to each terminal device, and the intelligent electric meter also transmits a polymerization signature private key and a third random number to each terminal device respectively.
After the intelligent electric meter aggregates the first aggregated data and the accumulated aggregated data to obtain second aggregated data, increasing the received data count of the intelligent electric meter; then, acquiring a received data count of the intelligent electric meter to detect whether the received data count reaches a preset threshold value; when the fact that the received data count of the intelligent ammeter reaches a preset threshold value is detected, the intelligent ammeter adds a third random number to the second aggregated data, and after the result of adding the third random number to the second aggregated data, the obtained result is cascaded with a timestamp, so that intermediate data are obtained; and then, signing the intermediate data based on the aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregated data.
Further, the step of receiving, by the control center, the intermediate encrypted data, decrypting the intermediate encrypted data based on the public aggregation signature key corresponding to the private aggregation signature key to obtain second aggregated data, and aggregating the second aggregated data when the second aggregated data passes the authentication, so as to obtain the meter reading of the smart meter, includes:
step S41, the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregate signature public key corresponding to the aggregate signature private key to obtain the second aggregate data and the third random number, and extracts the second aggregate data from the second aggregate data and the third random number;
and step S42, the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, and aggregates the second aggregated data when the second aggregated data passes the identity verification to obtain the electric meter reading of the intelligent electric meter.
The control center acquires the aggregation signature public key when receiving the intermediate encrypted data, and decrypts the intermediate encrypted data based on the aggregation signature public key to obtain second aggregation data and a third random number; since the second aggregated data and the third random number are concatenated together, acquiring the second random number requires extracting the second aggregated data from the second aggregated data and the third random number. It should be noted that the second aggregated data and the third random number are signed by the aggregated signature private key, and the control center decrypts the intermediate encrypted data by the aggregated signature public key, so that the control center can verify the second aggregated data to verify the identity of the smart meter and the integrity and authenticity of the data sent by the smart meter. The aggregation signature public key corresponds to an aggregation signature private key in the intelligent electric meter, and is transmitted to the control center by a third-party trusted authority.
Further, the step of receiving the encrypted electric quantity of each terminal device by the representative terminal device, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the smart meter includes:
step S421, a representative terminal device receives the encrypted electric quantity of each terminal device, aggregates the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, encrypts the first aggregated data based on a preset public key, and then sends the first aggregated data to an intelligent electric meter;
step S422, the control center performs authentication on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the authentication on the second aggregated data passes, so as to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key, so as to obtain an electric meter reading of the smart electric meter, where the step of authenticating the second aggregated data includes:
the control center conducts identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key corresponding to the preset public key to obtain the electric meter reading of the intelligent electric meter.
The representative terminal device receives the encrypted electric quantity of each terminal device, aggregates the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, encrypts the first aggregated data based on a preset public key, and then sends the first aggregated data to the intelligent electric meter. And when the intelligent electric meter receives the electric quantity collecting instruction, selecting the target terminal equipment as the representative terminal equipment from the terminal equipment. After the representative terminal device is selected, the representative terminal device collects the encrypted electric quantity of each terminal device and obtains the encrypted electric quantity of the representative terminal device, the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, the first aggregated data are encrypted based on a preset public key after the encrypted electric quantity collected from each terminal device and the encrypted electric quantity of the representative terminal device are aggregated, and the encrypted first aggregated data are sent to the smart meter.
The control center acquires the aggregation signature public key after receiving the intermediate encrypted data, and decrypts the intermediate encrypted data based on the aggregation signature public key to obtain second aggregation data and a third random number; and extracting the second aggregation data from the second aggregation data and the third random number. After the second aggregated data is extracted, acquiring a timestamp associated with the second aggregated data, and performing identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp; and aggregating the second aggregated data when the second aggregated data passes the authentication to obtain third aggregated data. And then, decrypting the third aggregated data based on a preset private key in the control center to obtain the electric meter reading of the intelligent electric meter.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where a data privacy protection program is stored, and when executed by a processor, the data privacy protection program implements the steps of the data privacy protection method according to any one of the above.
The specific embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the data privacy protecting method described above, and details are not repeated herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A data privacy protection method is applied to a data privacy protection system, the data privacy protection system comprises a plurality of terminal devices, an intelligent ammeter and a control center, and the data privacy protection method is characterized by comprising the following steps:
the representative terminal equipment receives the encrypted electric quantity of each terminal equipment, aggregates the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sends the first aggregated data to the intelligent electric meter;
the intelligent electric meter receives the first aggregation data, performs identity verification on the first aggregation data, acquires current accumulated aggregation data when the first aggregation data passes the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center;
and the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on the aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregated data, and aggregates the second aggregated data when the second aggregated data passes the authentication to obtain the electric meter reading of the intelligent electric meter.
2. The data privacy protection method of claim 1, wherein the step of receiving, by the representative terminal device, the encrypted electric quantity of each terminal device, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the smart meter comprises:
the intelligent electric meter transmits first random numbers to each terminal device respectively;
each terminal device receives and encrypts respective electric quantity data based on the first random number to obtain the encrypted electric quantity, and sends the encrypted electric quantity to the representative terminal device;
and receiving the encrypted electric quantity by the representative terminal equipment, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the intelligent electric meter.
3. The data privacy protection method of claim 1, wherein the smart meter receives the first aggregated data, performs identity verification on the first aggregated data, acquires current accumulated aggregated data when the first aggregated data passes the verification, and performs aggregation on the first aggregated data and the accumulated aggregated data to obtain second aggregated data, and the step of performing the aggregation on the first aggregated data and the accumulated aggregated data includes:
the intelligent electric meter transmits second random numbers to each terminal device respectively;
each terminal device receives and encrypts the device ID based on the second random number to obtain an encrypted ID, and the encrypted ID is sent to the intelligent electric meter through the representative terminal device;
the smart electric meter receives the first aggregation data, carries out identity verification on the first aggregation data based on the encrypted ID, obtains current accumulated aggregation data when the first aggregation data pass the verification, and aggregates the first aggregation data and the accumulated aggregation data to obtain second aggregation data.
4. The data privacy protection method of claim 1, wherein when the received data count of the smart meter reaches a preset threshold, the smart meter signs the second aggregate data based on an aggregate signature private key to obtain intermediate encrypted data corresponding to the second aggregate data, and sends the intermediate encrypted data to a control center, and the step of sending the intermediate encrypted data comprises:
the intelligent ammeter detects whether the received data count of the intelligent ammeter reaches a preset threshold value in real time;
when the fact that the received data count of the intelligent electric meter reaches a preset threshold value is detected, the intelligent electric meter signs the second aggregation data based on an aggregation signature private key to obtain middle encrypted data corresponding to the second aggregation data, and the middle encrypted data are sent to a control center.
5. The data privacy protection method of claim 1, wherein when the received data count of the smart meter reaches a preset threshold, the smart meter signs the second aggregate data based on an aggregate signature private key to obtain intermediate encrypted data corresponding to the second aggregate data, and sends the intermediate encrypted data to a control center, and the step of sending the intermediate encrypted data comprises:
a third party trusted authority transmits the aggregated signature private key and a third random number to the intelligent electric meter;
when the received data count of the intelligent electric meter reaches a preset threshold value, the intelligent electric meter adds the second aggregation data to the third random number and then concatenates a timestamp to obtain intermediate data, and signs the intermediate data based on the aggregation signature private key to obtain intermediate encrypted data corresponding to the second aggregation data.
6. The data privacy protection method of claim 5, wherein the step of receiving the intermediate encrypted data by the control center, decrypting the intermediate encrypted data based on an aggregated signature public key corresponding to the aggregated signature private key to obtain the second aggregated data, and aggregating the second aggregated data when the second aggregated data passes authentication to obtain the meter reading of the smart meter comprises:
the control center receives the intermediate encrypted data, decrypts the intermediate encrypted data based on an aggregation signature public key corresponding to the aggregation signature private key to obtain second aggregation data and the third random number, and extracts the second aggregation data from the second aggregation data and the third random number;
and the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, and aggregates the second aggregated data when the second aggregated data passes the identity verification to obtain the electric meter reading of the intelligent electric meter.
7. The data privacy protection method of claim 6, wherein the step of receiving the encrypted electric quantity of each terminal device by the representative terminal device, aggregating the encrypted electric quantity to obtain first aggregated data corresponding to the encrypted electric quantity, and sending the first aggregated data to the smart meter comprises:
the method comprises the steps that a representative terminal device receives encrypted electric quantity of each terminal device, the encrypted electric quantity is aggregated to obtain first aggregated data corresponding to the encrypted electric quantity, the first aggregated data are encrypted based on a preset public key, and then the first aggregated data are sent to an intelligent electric meter;
the control center performs identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key to obtain the electric meter reading of the intelligent electric meter, wherein the step of performing identity verification on the second aggregated data comprises the following steps:
the control center conducts identity verification on the second aggregated data based on the attribute of the aggregated signature and the timestamp, aggregates the second aggregated data when the identity verification of the second aggregated data passes to obtain third aggregated data, and decrypts the third aggregated data based on a preset private key corresponding to the preset public key to obtain the electric meter reading of the intelligent electric meter.
8. The data privacy protection method of any one of claims 1 to 7, wherein the data privacy protection system is applied to a smart grid, the smart grid including a plurality of home area networks, and the respective terminal devices correspond to respective nodes in the home area networks.
9. A data privacy protecting apparatus, characterized in that the data privacy protecting apparatus comprises: memory, a processor and a data privacy preserving program stored on the memory and executable on the processor, the data privacy preserving program when executed by the processor implementing the steps of the data privacy preserving method as claimed in any one of claims 1 to 8.
10. A computer-readable storage medium, on which a data privacy protection program is stored, which when executed by a processor implements the steps of the data privacy protection method according to any one of claims 1 to 8.
CN202011045709.5A 2020-09-29 2020-09-29 Data privacy protection method and device and computer readable storage medium Active CN111935184B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011045709.5A CN111935184B (en) 2020-09-29 2020-09-29 Data privacy protection method and device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011045709.5A CN111935184B (en) 2020-09-29 2020-09-29 Data privacy protection method and device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111935184A true CN111935184A (en) 2020-11-13
CN111935184B CN111935184B (en) 2021-01-12

Family

ID=73334757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011045709.5A Active CN111935184B (en) 2020-09-29 2020-09-29 Data privacy protection method and device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111935184B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130556A1 (en) * 2010-11-18 2012-05-24 Marhoefer John J Virtual power plant system and method incorporating renewal energy, storage and scalable value-based optimization
US20140310524A1 (en) * 2013-04-16 2014-10-16 Kabushiki Kaisha Toshiba Data management device, power usage calculation system, data management method, and computer program product
WO2015116408A2 (en) * 2014-01-31 2015-08-06 Steffes Corporation Energy storage device power consumption management
CN105844172A (en) * 2016-03-22 2016-08-10 湖北工业大学 Multi-community multi-dimensional user electric quantity clustering system and method with privacy protection
CN110138538A (en) * 2019-05-09 2019-08-16 南京邮电大学 The smart grid security and secret protection data aggregation method calculated based on mist
CN110650116A (en) * 2019-07-04 2020-01-03 浙江工商大学 Multi-type multi-dimensional data aggregation method and system for security smart power grid
US20200034547A1 (en) * 2018-07-30 2020-01-30 Sap Se Secure Data Aggregation in Databases Using Dynamic Bucketization and Grouping Bucketization
CN111209334A (en) * 2019-12-23 2020-05-29 国网河北省电力有限公司雄安新区供电公司 Block chain-based power terminal data security management method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120130556A1 (en) * 2010-11-18 2012-05-24 Marhoefer John J Virtual power plant system and method incorporating renewal energy, storage and scalable value-based optimization
US20140310524A1 (en) * 2013-04-16 2014-10-16 Kabushiki Kaisha Toshiba Data management device, power usage calculation system, data management method, and computer program product
WO2015116408A2 (en) * 2014-01-31 2015-08-06 Steffes Corporation Energy storage device power consumption management
CN105844172A (en) * 2016-03-22 2016-08-10 湖北工业大学 Multi-community multi-dimensional user electric quantity clustering system and method with privacy protection
US20200034547A1 (en) * 2018-07-30 2020-01-30 Sap Se Secure Data Aggregation in Databases Using Dynamic Bucketization and Grouping Bucketization
CN110138538A (en) * 2019-05-09 2019-08-16 南京邮电大学 The smart grid security and secret protection data aggregation method calculated based on mist
CN110650116A (en) * 2019-07-04 2020-01-03 浙江工商大学 Multi-type multi-dimensional data aggregation method and system for security smart power grid
CN111209334A (en) * 2019-12-23 2020-05-29 国网河北省电力有限公司雄安新区供电公司 Block chain-based power terminal data security management method

Also Published As

Publication number Publication date
CN111935184B (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN109472166B (en) Electronic signature method, device, equipment and medium
CN113452719B (en) Application login method and device, terminal equipment and storage medium
CN110958118B (en) Certificate authentication management method, device, equipment and computer readable storage medium
CN109992949B (en) Equipment authentication method, over-the-air card writing method and equipment authentication device
CN103186720B (en) A kind of digital copyright management method, equipment and system
CN105516103A (en) Method, device and system for binding intelligent household electrical appliances
JP2012530311A5 (en)
CN112788042B (en) Method for determining device identifier of Internet of things and device of Internet of things
CN103095457A (en) Login and verification method for application program
CN102761870B (en) Terminal authentication and service authentication method, system and terminal
CN103488922A (en) Method and equipment for providing verification code
CN112823503B (en) Data access method, data access device and mobile terminal
CN112600671B (en) Data processing method, device, equipment and storage medium
CN111800400A (en) Multi-dimensional multi-angle electricity data aggregation system based on fog
CN110011987A (en) A kind of system and method that handset program is bound with Intelligent hardware
CN106411501B (en) Rights token generation method, system and its equipment
CN112912878B (en) Secure crypto processor
CN105376059A (en) Method and system for performing application signature based on electronic key
CN112200949A (en) Entrance guard starting method and device and identity verification system
CN111935184B (en) Data privacy protection method and device and computer readable storage medium
CN113364595A (en) Power grid private data signature aggregation method and device and computer equipment
CN115242412B (en) Certificateless aggregation signature method and electronic equipment
CN108512803A (en) Remind the method and device of change account bound phone number
CN112468285B (en) Data processing method and device based on privacy protection and server
CN113569261A (en) Power grid data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant