CN112491841A - Data processing method, device and system - Google Patents

Data processing method, device and system Download PDF

Info

Publication number
CN112491841A
CN112491841A CN202011288105.3A CN202011288105A CN112491841A CN 112491841 A CN112491841 A CN 112491841A CN 202011288105 A CN202011288105 A CN 202011288105A CN 112491841 A CN112491841 A CN 112491841A
Authority
CN
China
Prior art keywords
block chain
things
data
node
power internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011288105.3A
Other languages
Chinese (zh)
Inventor
李群
王超
王小虎
任天宇
董佳涵
郭广鑫
师恩洁
李志浩
叶志远
曹灿
倪鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Anhui Jiyuan Software Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Beijing Electric Power Co Ltd
Anhui Jiyuan Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Beijing Electric Power Co Ltd, Anhui Jiyuan Software Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202011288105.3A priority Critical patent/CN112491841A/en
Publication of CN112491841A publication Critical patent/CN112491841A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses a data processing method, a data processing device and a data processing system. Wherein, the method comprises the following steps: the power Internet of things node acquires a data security processing request; the electric power internet of things node sends a data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power internet of things node; the electric power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain node adopts a data processing mechanism of the block chain network to process the data security processing request to obtain a result. The invention solves the technical problem of unsafe information transmission in the field of power Internet of things.

Description

Data processing method, device and system
Technical Field
The invention relates to the field of power internet of things, in particular to a data processing method, a data processing device and a data processing system.
Background
Because a large amount of sensing equipment of various types is deployed in the external environment and is unattended in the power internet of things, compared with the traditional power information network, the power internet of things is more easily disturbed by the outside world in the information transmission process, so that information data is leaked, and further the information security of the whole system is threatened. The security of the whole power system is threatened due to the loophole of the security protection of the power internet of things, and chain reaction is generated.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a data processing method, a data processing device and a data processing system, which are used for at least solving the technical problem that information transmission is unsafe in the field of power Internet of things.
According to an aspect of an embodiment of the present invention, there is provided a data processing method including: the power Internet of things node acquires a data security processing request; the electric power internet of things node sends the data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power internet of things node; the electric power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain node adopts a data processing mechanism of a block chain network to process the data security processing request to obtain a result.
Optionally, the receiving, by the power internet of things node, the data processing result returned by the block chain node includes: under the condition that the data security processing request is used for arbitrating the data of the power internet of things, the power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points arbitrate conflicts in the data of the power internet of things according to the block chain network to obtain arbitration results.
Optionally, the receiving, by the power internet of things node, the data processing result returned by the block chain node includes at least one of: under the condition that the data security processing request is used for performing access authentication on the access terminal of the power internet of things, the node of the power internet of things receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: the block chain link point performs consensus authentication on the access of the access terminal according to the block chain network to obtain an authentication result;
under the condition that the data security processing request is used for verifying the authority of the power Internet of things terminal, the power Internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points carry out consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result.
Optionally, the data processing method further includes: under the condition that the data security processing request is used for confirming an access request of the terminal of the power internet of things, the node of the power internet of things also receives access request data returned by the block chain node, wherein the access request data comprises: and the access request data stored in the block chain network is extracted by the block chain nodes according to the access request of the power Internet of things terminal.
Optionally, the data processing method further includes: and under the condition that the data security processing request is used for confirming the transmission data of the electric power Internet of things terminal, the electric power Internet of things node also receives the transmission data of the electric power Internet of things terminal and sends the transmission data to the block chain node.
Optionally, the receiving, by the power internet of things node, the data processing result returned by the block chain node includes: under the condition that the data security processing request is used for detecting an abnormal condition, the power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points detect the abnormal conditions according to the block chain network to obtain a detection result.
According to another aspect of the embodiments of the present invention, there is also provided a data processing method, including: a block chain node in a block chain network receives a data security processing request sent by a power Internet of things node; the block chain node processes the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result; and the block link point returns the data security processing result to the power Internet of things node.
Optionally, the processing of the data security processing request by the blockchain node using a data processing mechanism of the blockchain network to obtain a data security processing result includes at least one of: when the data security processing request is used for arbitrating the data of the power internet of things, the block chain nodes arbitrate conflicts in the data of the power internet of things by adopting the block chain network to obtain an arbitration result; under the condition that the data security processing request is used for performing access authentication on the access terminal of the power internet of things, the block chain link points perform consensus authentication on the access of the access terminal according to the block chain network to obtain an authentication result; under the condition that the data security processing request is used for verifying the authority of the electric power Internet of things terminal, the block chain link points perform consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result; and under the condition that the data security processing request is used for detecting an abnormal condition, the block chain link point detects the abnormal condition according to the block chain network to obtain a detection result.
Optionally, the data processing method further includes: under the condition that the data security processing request is used for confirming an access request of the terminal of the power internet of things, the block chain node extracts access request data stored in the block chain network according to the access request of the terminal of the power internet of things; under the condition that the data security processing request is used for confirming the transmission data of the electric power Internet of things terminal, the block chain link point stores the transmission data of the electric power Internet of things terminal in the block chain network.
According to another aspect of the embodiments of the present invention, there is also provided a data processing method, including: the power Internet of things node acquires a data security processing request; the electric power Internet of things node sends the data security processing request to a block chain node in a block chain network; the block chain node processes the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result; and the block link point returns the data security processing result to the power Internet of things node.
Optionally, the method further comprises: and the block link point backs up the data security processing request and the data security processing result.
According to another aspect of the embodiments of the present invention, there is also provided a data processing apparatus applied to a node of an internet of things for power, including: the acquisition module is used for acquiring a data security processing request; the first sending module is used for sending the data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power internet of things node; a first receiving module, configured to receive a data security processing result returned by the blockchain node, where the data security processing result includes: and the block chain node adopts a data processing mechanism of the block chain network to process the data security processing request to obtain a result.
According to another aspect of the embodiments of the present invention, there is also provided a data processing apparatus applied to a blockchain node in a blockchain network, including: the second receiving module is used for receiving a data security processing request sent by the power Internet of things node; the processing module is used for processing the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result; and the second sending module is used for returning the data security processing result to the power Internet of things node.
According to still another aspect of the embodiments of the present invention, there is also provided a data processing system including any one of the data processing apparatuses described above.
In the embodiment of the invention, a mode that the electric power internet of things node acquires the data security processing request is adopted, and the data security processing request is sent to the block chain node in the block chain network corresponding to the electric power internet of things node and processed in the block chain network, so that the purpose of obtaining the data security processing result is achieved, the technical effect of guaranteeing the information security in the field of the electric power internet of things is realized, and the technical problem of unsafe information transmission in the field of the electric power internet of things is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of a first data processing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a security architecture of an electric Internet of things in the prior art;
fig. 3 is a schematic structural diagram of an electric power internet of things platform provided according to an alternative embodiment of the invention;
fig. 4 is a schematic diagram of an authentication process of a terminal device of the power internet of things according to an alternative embodiment of the invention;
fig. 5 is a schematic diagram illustrating a verification process of an access request of a terminal device of the power internet of things according to an alternative embodiment of the invention;
FIG. 6 is a flowchart of a second data processing method according to an embodiment of the present invention;
FIG. 7 is a flowchart of a third data processing method according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a power internet of things node according to an alternative embodiment of the invention;
FIG. 9 is a block diagram of a first data processing apparatus according to an alternative embodiment of the present invention;
fig. 10 is a block diagram of a second data processing apparatus according to an alternative embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
In accordance with an embodiment of the present invention, there is provided a data processing method, it should be noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
Fig. 1 is a flowchart of a first data processing method according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, the power Internet of things node acquires a data security processing request;
step S104, the electric power Internet of things node sends a data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power Internet of things node;
step S106, the power Internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain node adopts a data processing mechanism of the block chain network to process the data security processing request to obtain a result.
Through the steps, the information security processing is carried out by adopting the block chain network, so that the purpose of obtaining the data security processing result is achieved when the electric power Internet of things node receives the data security processing result returned by the block chain link point, the technical effect of guaranteeing the information security of the electric power Internet of things system is achieved, and the technical problem of unsafe information transmission in the electric power Internet of things system is solved.
In the prior art, the power internet of things has security challenges in privacy, verification, system configuration, authorization, access control, information storage and management and the like, while a large contradiction exists between the traditional power security isolation protection architecture and the interconnection and intercommunication efficiency of the power internet of things, and the security problem of the power internet of things cannot be solved. Fig. 2 is a schematic diagram of a security architecture of an electric internet of things in the prior art. As shown in fig. 2, due to the characteristics of the power internet of things, there are a large number of devices exposed in the external environment, and the risk of receiving a network attack is large, and when the network attack is received, the service interruption may be caused, and the information security of the power infrastructure is seriously damaged. In the current electric power internet of things security architecture, safety risks exist in the collection of information of the internet of things, the transmission of the information and the processing of the information. For example, as shown in the figure, the sensing layer may acquire information such as device states and images through sensing devices such as an electronic tag, a camera, and a sensor, and then perform information dissemination through a wireless network and the like, and the security of the sensing layer mainly includes Radio Frequency Identification (RFID) security, Wireless Sensor Network (WSN) security, robust network (RSN) security, and the like. And the gateway of the network layer processes and analyzes the acquired data and then transmits the information to the application server through the electric power private network. The large number of access of the device terminals brings risks of concurrent data uploading, resulting in data loss and device failure, and also resulting in network congestion. The security of the network layer mainly includes access network security, bearer network security, core network security, 5G and other mobile network security. The application layer mainly processes and analyzes information and controls and manages applications. The security of the application layer mainly comprises the security of software updating, the security of device configuration management, the security of a Message Queuing Telemetry Transport (MQTT) protocol, the security of an Advanced Message Queuing (AMQP) protocol, the security of a restricted common program (CoAP) protocol, the security of an extensible message passing and presence (XMPP) protocol and the like.
In a traditional central system, the information processing of the nodes of the power internet of things has safety risks due to the reasons. According to the data processing method provided by the embodiment of the invention, the block chain network is adopted to process the information, so that the safety of the information can be well ensured. Fig. 3 is a schematic structural diagram of an electric power internet of things platform according to an optional embodiment of the present invention, and as shown in fig. 3, the electric power internet of things platform may include a plurality of electric power internet of things nodes, and the plurality of circuit internet of things nodes may be used for information interaction between electric power internet of things devices and the platform, data visualization of the devices, and external service encapsulation of the platform. The electric power Internet of things platform can also be used for functions such as authority management, access authentication and intrusion detection. Each power internet of things node can call an interface through the web3j and communicate with a block chain node such as a Geth client through JSON-RPC, and the block chain network is accessed through the method. The Geth client serves as a lower-layer block chain node, can authenticate, vote and store information sent by the power Internet of things equipment, judges the information based on execution of an intelligent contract, returns a result to the power Internet of things node, and returns the power Internet of things node to the power Internet of things equipment. The block chain network is a decentralized distributed network, so that the safety and the accuracy of information can be well ensured.
As an optional embodiment, the data processing result returned by the power internet of things node receiving block chain node may adopt the following manner: under the condition that the data security processing request is used for arbitrating the data of the power internet of things, the node of the power internet of things receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points arbitrate conflicts in the data of the power internet of things according to the block chain network to obtain arbitration results.
In order to realize safe and fair judgment of conflict or objection, the arbitration of conflict or objection can be realized by using a block chain technology. As an optional implementation manner, in the case that the blockchain network is an ethernet, the arbitration of the power internet-of-things node through the blockchain network may include the following steps: s1, the power Internet of things node sends an arbitration request to the Geth node through JSON-RPC; s2, the Geth node starts arbitration through the intelligent contract and executes the intelligent contract; s3, the Geth node network forms an arbitration result through majority voting; and S4, the Geth node returns the result to the internet of things sub-node through JSON-RPC to complete the arbitration process.
As an optional embodiment, the data processing result returned by the power internet of things node receiving block chain node may be performed in different manners according to different situations, for example, by at least one of the following manners: under the condition that the data security processing request is used for performing access authentication on the power Internet of things access terminal, the power Internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: the block chain link point performs consensus authentication on the access of the access terminal according to the block chain network to obtain an authentication result; under the condition that the data security processing request is used for verifying the authority of the power Internet of things terminal, the power Internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points carry out consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result.
The block chain network can carry out equipment authentication and authority verification on the access terminal of the power internet of things, the safety of the access terminal is guaranteed, the authentication and verification processes are placed at the block chain network end, the information safety risk of a centralized system can be effectively avoided, and the accuracy of authentication and verification results is guaranteed.
As an optional implementation manner, fig. 4 is a schematic diagram of an authentication process of a terminal device in an electric power internet of things according to an optional implementation manner of the present invention, and as shown in fig. 4, an access authentication of a device by an electric power internet of things node through a blockchain network may be performed in the following manner: s1, the access terminal of the electric power Internet of things equipment sends an access authentication request to the electric power Internet of things node and gives registration information; s2, the power Internet of things node encapsulates request information according to the information format of the block chain, sends request verification to the Geth node, and triggers an intelligent contract; s3, the Geth node runs an intelligent contract, acquires access authentication table information, performs consensus authentication on the nodes, and returns an authentication result to the power Internet of things node; s4, after receiving the authentication result, the power Internet of things node stores the authentication result information; s5, after the information is stored in the block chain network, returning the information storage result to the power Internet of things node; and S6, the power Internet of things node returns the authentication result to the power Internet of things equipment terminal.
As an optional embodiment, in a case that the data security processing request is used to confirm an access request of the terminal of the power internet of things, the node of the power internet of things further receives access request data returned by the blockchain node, where the access request data includes: and the block chain link points extract access request data stored in the block chain network according to the access request of the circuit Internet of things terminal.
As an optional embodiment, in a case that the data security processing request is used to confirm the transmission data of the power internet of things terminal, the power internet of things node further receives the transmission data of the power internet of things terminal and sends the transmission data to the block chain node.
The power internet of things equipment terminal can also realize scheduling and storage of information through the block chain network, for example, data of the power internet of things equipment terminal is sent to the block chain network for storage according to a data transmission request, or data in the block chain network can be sent to the power internet of things equipment terminal according to a data access request. Before information data is scheduled, the authority of the power internet of things equipment terminal can be judged based on a consensus mechanism of a block chain network, and when the equipment terminal has the corresponding authority, the information data is scheduled according to an information scheduling request sent by the equipment terminal.
As an optional implementation manner, the blockchain network may judge the authority of the power internet of things device terminal, and schedule information through the blockchain network based on the authority of the power internet of things device terminal. The authority of the power internet of things device can comprise multiple kinds, such as access authority, data transmission authority, query authority, data modification authority and the like. Taking the verification of the access right of the electric power internet-of-things device through the blockchain network as an example, fig. 5 is a schematic view of a verification process of an access request of the electric power internet-of-things terminal device according to an optional embodiment of the present invention, and as shown in fig. 5, the following method may be adopted for identifying and verifying the access request of the electric power internet-of-things device access terminal: s1, the power Internet of things terminal equipment sends an access request to the power Internet of things node; s2, the power Internet of things node broadcasts request information to the block link nodes, executes a consensus algorithm, and judges whether the power Internet of things equipment has access authority; s3, the power Internet of things node packages a verification request according to the format of the block chain and sends the verification request to the Geth node; s4, triggering and operating an intelligent contract by the Geth node, extracting an authority control table, performing consensus authentication after obtaining verification request information, and returning a verification result to the power Internet of things node; s5, after receiving the verification result, the power Internet of things node packages the information content required to be accessed by the access request according to the format of the block chain through information verification and sends the information content to the Geth node; s6, after receiving the access request, the Geth node extracts the information content which the access request requires to access, and returns the information content to the power Internet of things node; and S7, after receiving the returned information content requiring access, the power Internet of things node sends the information content requiring access to the power Internet of things equipment terminal.
As an optional embodiment, the receiving, by the power internet of things node, the data processing result returned by the blockchain node includes: under the condition that the data security processing request is used for detecting abnormal conditions, the power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises the following steps: and detecting the abnormal condition of the block chain link points according to the block chain network to obtain a detection result.
For example, when the power internet of things device faces an illegal intrusion, the following method can be adopted to detect the illegal intrusion: s1, the power Internet of things node detects the information running condition of the power Internet of things equipment, and if an abnormal condition or a malignant event is found, the malignant event data collected by the power Internet of things node is analyzed; s2, sending the data of the malignant event to a block chain network through the power Internet of things node, arbitrating the malignant event by the block chain network, and returning an arbitration conclusion to the power Internet of things node; and S3, analyzing and judging the event again by the power Internet of things node, if the event is a malignant event, performing corresponding processing, and displaying the occurrence of the malignant event through a data display module in the power Internet of things node. The block chain network can arbitrate and judge data of the malignant event, so that fairness and justness of arbitration and judgment are guaranteed, the power internet of things node analyzes and judges the event, considers arbitration results of the block chain network, comprehensively considers other factors such as time, scenes and possible reasons of the event, comprehensively evaluates the event, and finally obtains a conclusion.
Fig. 6 is a flowchart of a second data processing method according to an embodiment of the present invention, and as shown in fig. 6, the method includes the following steps:
step S602, a block chain node in a block chain network receives a data security processing request sent by a power Internet of things node;
step S604, the block chain link points adopt a data processing mechanism of a block chain network to process the data security processing request to obtain a data security processing result;
and step S606, the block node returns the data security processing result to the power Internet of things node.
Through the steps, the block chain network processes the data security processing request through the block chain link points and returns the data security processing result to the power internet of things node, and the purpose of obtaining the data security processing result is achieved, so that the technical effect of guaranteeing the information security in the field of the power internet of things is achieved, and the technical problem of unsafe information transmission in the field of the power internet of things is solved.
As an alternative embodiment, the block link point uses a data processing mechanism of the block link network to process the data security processing request, and the obtained data security processing result may be obtained in various manners, where the manners may include at least one of the following: when the data security processing request is used for arbitrating the data of the power internet of things, the block chain link points arbitrate conflicts in the data of the power internet of things by adopting a block chain network to obtain an arbitration result; under the condition that the data security processing request is used for performing access authentication on the power Internet of things access terminal, the block chain link points perform consensus authentication on the access of the access power Internet of things terminal according to the block chain network to obtain an authentication result; under the condition that the data security processing request is used for verifying the authority of the electric power Internet of things terminal, the block chain link points perform consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result; and under the condition that the data security processing request is used for detecting the abnormal condition, the block chain link point detects the abnormal condition according to the block chain network to obtain a detection result.
As an optional embodiment, the block link point may further extract, when the data security processing request is used to confirm the access request of the power internet of things terminal, access request data stored in the block chain network according to the access request of the circuit internet of things terminal; under the condition that the data security processing request is used for confirming the transmission data of the power internet of things terminal, the block chain link point stores the transmission data of the power internet of things terminal in the block chain network.
Fig. 7 is a flowchart of a third data processing method according to an embodiment of the present invention, and as shown in fig. 7, the method includes the following steps:
step S702, the power Internet of things node acquires a data security processing request;
step S704, the electric power Internet of things node sends a data security processing request to a block chain node in a block chain network;
step S706, the block chain link points adopt a data processing mechanism of a block chain network to process the data security processing request to obtain a data security processing result;
in step S708, the block node returns the data security processing result to the power internet of things node.
Through the steps, the electric power internet of things node acquires the data security processing request from the electric power internet of things equipment, sends the request to the block chain link point in the block chain network and receives the returned data security processing result, and returns the data security processing result to the electric power internet of things equipment, so that the security verification and the security processing of information data in the electric power internet of things equipment are realized, the technical effect of guaranteeing the information security in the field of the electric power internet of things is realized, and the technical problem of unsafe transmission of information in the field of the electric power internet of things is solved.
As an alternative embodiment, the method further includes: and the block link point backs up the data security processing request and the data security processing result.
Fig. 8 is a schematic structural diagram of a power internet of things node according to an alternative embodiment of the present invention, and as shown in fig. 8, the power internet of things node may include the following modules: the system comprises an operation information transmission module, a terminal equipment interaction module, a data processing module, an intrusion tolerance module, an information access control module, an access authentication module, a data display module, a database and an external service interface; the blockchain network may include node consensus and ledger maintenance. Through the functional module, the coordination work inside the power internet of things node is realized, and the functions of data visualization, external service encapsulation, access authentication, intrusion detection and the like of the power internet of things equipment are supported.
Example 2
Fig. 9 is a block diagram of a first data processing device according to an alternative embodiment of the present invention, and as shown in fig. 9, the first data processing device 90 includes the following components: the acquiring module 92, the first sending module 94 and the first receiving module 96, which are described in detail below.
An obtaining module 92, configured to obtain a data security processing request;
a first sending module 94, connected to the obtaining module 92, configured to send the data security processing request to a block chain node in a block chain network, where the block chain node corresponds to an electric power internet of things node;
a first receiving module 96, connected to the first sending module 94, for receiving a data security processing result returned by the block link point, where the data security processing result includes: and the block chain node adopts a data processing mechanism of the block chain network to process the data security processing request to obtain a result.
Example 3
Fig. 10 is a block diagram of a second data processing device according to an alternative embodiment of the present invention, and as shown in fig. 10, the second data processing device 100 includes the following components: the second receiving module 102, the processing module 104 and the second sending module 106 are described in detail below.
The second receiving module 102 is configured to receive a data security processing request sent by a power internet of things node;
a processing module 104, connected to the second receiving module 102, configured to process the data security processing request by using a data processing mechanism of a blockchain network, so as to obtain a data security processing result;
and a second sending module 106, connected to the processing module 104, for returning the data security processing result to the power internet of things node.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (14)

1. A data processing method, comprising:
the power Internet of things node acquires a data security processing request;
the electric power internet of things node sends the data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power internet of things node;
the electric power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain node adopts a data processing mechanism of a block chain network to process the data security processing request to obtain a result.
2. The method of claim 1, wherein the receiving, by the power internet of things node, the data processing result returned by the blockchain node comprises:
under the condition that the data security processing request is used for arbitrating the data of the power internet of things, the power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points arbitrate conflicts in the data of the power internet of things according to the block chain network to obtain arbitration results.
3. The method of claim 1, wherein the receiving, by the power internet of things node, the data processing result returned by the blockchain node comprises at least one of:
under the condition that the data security processing request is used for performing access authentication on the access terminal of the power internet of things, the node of the power internet of things receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: the block chain link point performs consensus authentication on the access of the access terminal according to the block chain network to obtain an authentication result;
under the condition that the data security processing request is used for verifying the authority of the power Internet of things terminal, the power Internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points carry out consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result.
4. The method of claim 1, further comprising:
under the condition that the data security processing request is used for confirming an access request of the terminal of the power internet of things, the node of the power internet of things also receives access request data returned by the block chain node, wherein the access request data comprises: and the access request data stored in the block chain network is extracted by the block chain nodes according to the access request of the power Internet of things terminal.
5. The method of claim 1, further comprising:
and under the condition that the data security processing request is used for confirming the transmission data of the electric power Internet of things terminal, the electric power Internet of things node also receives the transmission data of the electric power Internet of things terminal and sends the transmission data to the block chain node.
6. The method of claim 1, wherein the receiving, by the power internet of things node, the data processing result returned by the blockchain node comprises:
under the condition that the data security processing request is used for detecting an abnormal condition, the power internet of things node receives a data security processing result returned by the block chain node, wherein the data security processing result comprises: and the block chain link points detect the abnormal conditions according to the block chain network to obtain a detection result.
7. A data processing method, comprising:
a block chain node in a block chain network receives a data security processing request sent by a power Internet of things node;
the block chain node processes the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result;
and the block link point returns the data security processing result to the power Internet of things node.
8. The method according to claim 7, wherein the blockchain node processes the data security processing request by using a data processing mechanism of the blockchain network, and obtaining a data security processing result comprises at least one of:
when the data security processing request is used for arbitrating the data of the power internet of things, the blockchain nodes arbitrate conflicts in the data of the power internet of things by adopting the blockchain network to obtain an arbitration result;
under the condition that the data security processing request is used for performing access authentication on the power Internet of things access terminal, the block chain link points perform consensus authentication on the access of the power Internet of things access terminal according to the block chain network to obtain an authentication result;
under the condition that the data security processing request is used for verifying the authority of the electric power Internet of things terminal, the block chain link points perform consensus verification on the authority of the electric power Internet of things terminal according to the block chain network to obtain a verification result;
and under the condition that the data security processing request is used for detecting an abnormal condition, the block chain link point detects the abnormal condition according to the block chain network to obtain a detection result.
9. The method of claim 7, further comprising:
under the condition that the data security processing request is used for confirming an access request of the terminal of the power internet of things, the block chain node extracts access request data stored in the block chain network according to the access request of the terminal of the power internet of things;
under the condition that the data security processing request is used for confirming the transmission data of the electric power Internet of things terminal, the block chain link point stores the transmission data of the electric power Internet of things terminal in the block chain network.
10. A data processing method, comprising:
the power Internet of things node acquires a data security processing request;
the electric power Internet of things node sends the data security processing request to a block chain node in a block chain network;
the block chain node processes the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result;
and the block link point returns the data security processing result to the power Internet of things node.
11. The method of claim 10, further comprising:
and the block link point backs up the data security processing request and the data security processing result.
12. The utility model provides a data processing apparatus, its characterized in that is applied to electric power thing networking node, includes:
the acquisition module is used for acquiring a data security processing request;
the first sending module is used for sending the data security processing request to a block chain node in a block chain network, wherein the block chain node corresponds to the electric power internet of things node;
a first receiving module, configured to receive a data security processing result returned by the blockchain node, where the data security processing result includes: and the block chain node adopts a data processing mechanism of the block chain network to process the data security processing request to obtain a result.
13. A data processing apparatus, for use in a block chain node in a block chain network, comprising:
the second receiving module is used for receiving a data security processing request sent by the power Internet of things node;
the processing module is used for processing the data security processing request by adopting a data processing mechanism of the block chain network to obtain a data security processing result;
and the second sending module is used for returning the data security processing result to the power Internet of things node.
14. A data processing system comprising a data processing apparatus as claimed in claim 12 and a data processing apparatus as claimed in claim 13.
CN202011288105.3A 2020-11-17 2020-11-17 Data processing method, device and system Pending CN112491841A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011288105.3A CN112491841A (en) 2020-11-17 2020-11-17 Data processing method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011288105.3A CN112491841A (en) 2020-11-17 2020-11-17 Data processing method, device and system

Publications (1)

Publication Number Publication Date
CN112491841A true CN112491841A (en) 2021-03-12

Family

ID=74931100

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011288105.3A Pending CN112491841A (en) 2020-11-17 2020-11-17 Data processing method, device and system

Country Status (1)

Country Link
CN (1) CN112491841A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965399A (en) * 2021-10-29 2022-01-21 重庆忽米网络科技有限公司 Internet of things equipment data transmission method based on MQTT protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110278569A (en) * 2019-05-28 2019-09-24 杭州电力设备制造有限公司 A kind of shared system, device and its sharing method of ubiquitous Internet of Things indoor distribution
US20190317934A1 (en) * 2018-04-16 2019-10-17 Slock.It Gmbh Trustless Stateless Incentivized Remote Node Network Using Minimal Verification Clients
CN110427376A (en) * 2019-07-31 2019-11-08 北京米弘科技有限公司 Traceability system, method, computer equipment and the computer readable storage medium of block chain
CN110933176A (en) * 2019-12-05 2020-03-27 国家电网有限公司 Electric power internet of things management and service platform
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190317934A1 (en) * 2018-04-16 2019-10-17 Slock.It Gmbh Trustless Stateless Incentivized Remote Node Network Using Minimal Verification Clients
CN110278569A (en) * 2019-05-28 2019-09-24 杭州电力设备制造有限公司 A kind of shared system, device and its sharing method of ubiquitous Internet of Things indoor distribution
CN110427376A (en) * 2019-07-31 2019-11-08 北京米弘科技有限公司 Traceability system, method, computer equipment and the computer readable storage medium of block chain
CN110933176A (en) * 2019-12-05 2020-03-27 国家电网有限公司 Electric power internet of things management and service platform
CN111447066A (en) * 2020-02-19 2020-07-24 江苏荣泽信息科技股份有限公司 Thing networking platform based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965399A (en) * 2021-10-29 2022-01-21 重庆忽米网络科技有限公司 Internet of things equipment data transmission method based on MQTT protocol

Similar Documents

Publication Publication Date Title
Sahani et al. Web-based online embedded door access control and home security system based on face recognition
CN103150637B (en) Terminal real-name management system and implementation method are collected in express delivery based on barcode technology
CN105184881A (en) Method, apparatus, server and system for identifying user identity
CN102984689B (en) System and method for verifying mobile terminal
CN104495545B (en) Electronic elevator maintenance supervision and management system and method for elevator maintenance based on dynamic two-dimensional codes
CN103916625A (en) Video monitoring system and method based on cloud computing
CN109743532B (en) Doorbell control method, electronic equipment, doorbell system and storage medium
CN103078757B (en) Based on the network element managing method and system of near-field communication, inspection terminal, webmaster and network element device
CN111798664B (en) Illegal data identification method and device and electronic equipment
CN105610819A (en) Method and apparatus for providing service for inquiring server information
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN112491841A (en) Data processing method, device and system
CN115563600A (en) Data auditing method and device, electronic equipment and storage medium
EP3725079B1 (en) Securing digital data transmission in a communication network
CN105074678A (en) Information terminal, access system, information processing method, and program
CN107563829A (en) A kind of lending locking means, lease terminal and lending system
CN114125812B (en) Data synchronization method, device, server and storage medium
TWI487341B (en) Identify networked devices to establish point-to-point connections to systems and methods
CN109271454A (en) A kind of method and the network equipment that data are synchronous
CN112469034B (en) Internet of things gateway device capable of safely authenticating physical sensing equipment and access method thereof
CN105163335B (en) A kind of network access management method, server, mobile terminal and system
CN109039642B (en) User authentication method and system
CN111324656B (en) Personnel management method and related equipment
CN111182507A (en) Method and device for operation, maintenance and management of Internet of things network
CN113438598B (en) Terminal positioning method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210312

RJ01 Rejection of invention patent application after publication