CN108900531A - A kind of data confidentiality tool suitable for electric power enterprise internal network - Google Patents

A kind of data confidentiality tool suitable for electric power enterprise internal network Download PDF

Info

Publication number
CN108900531A
CN108900531A CN201810856443.9A CN201810856443A CN108900531A CN 108900531 A CN108900531 A CN 108900531A CN 201810856443 A CN201810856443 A CN 201810856443A CN 108900531 A CN108900531 A CN 108900531A
Authority
CN
China
Prior art keywords
data
module
authentication
electric power
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810856443.9A
Other languages
Chinese (zh)
Inventor
郑文斌
徐盛
蔡钺
郑立
朱犇
蔡怡挺
陈梦娴
孙望舒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WENZHOU TUSHENG TECHNOLOGY Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
WENZHOU TUSHENG TECHNOLOGY Co Ltd
Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WENZHOU TUSHENG TECHNOLOGY Co Ltd, Wenzhou Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical WENZHOU TUSHENG TECHNOLOGY Co Ltd
Priority to CN201810856443.9A priority Critical patent/CN108900531A/en
Publication of CN108900531A publication Critical patent/CN108900531A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Abstract

The invention discloses a kind of data confidentiality tools suitable for electric power enterprise internal network, including interior network termination.The present invention passes through interior network termination, step 1:User installation client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:Data information is encrypted using private key, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated:Privately owned block chain network, step 8 is added:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into and to the whole network broadcast synchronization, step 10:Data are generated into required amount of node, step 11:51% back end, step 12 are randomly selected using DPOS mechanism:And the creation of new data, verifying, the cooperation signing and supervise mutually fast to 51% back end progress new district, solve the problems, such as that conventional interior network data secrecy tool secrecy effect is poor.

Description

A kind of data confidentiality tool suitable for electric power enterprise internal network
Technical field
The present invention relates to electric power enterprise internal network data confidentiality technical field of tools, specially a kind of electric power that is suitable for is looked forward to The data confidentiality tool of industry internal network.
Background technique
With information-based deep development, information technology is maked rapid progress, and the following security breaches and hidden danger layer go out not Thoroughly, presently, information security circle has been reached common understanding, and outside threat can not be eliminated, and can only be evaded even in minimum limit Receive, i.e., no matter how perfect the safety protection technique of information system front and back end is made, and security risk always not can avoid;Change speech It, hacker or attacker can always find a break-through point and break through to information system, and the traditional approach of information security is claimed Data to be protected is needed always uniformly to be stored in central node in conventional information trouble free service for security boundary(Server and Database)In, when facing outside threat, boundary is just set up therebetween(Wall), to which attacker is blocked in outside boundary, However, this method effect is not very good, because boundary is always broken into, and once enter inside, attacker can obtain Full control steals sensitive data, or adapter tube strength controls.
Electric power enterprise needs for enterprises account book and important sensitive information to be incorporated in Intranet, however now The use of most of electric power enterprise accumulate all kinds of safety protection techniques on boundary, so that present electric power enterprise uses tradition mostly Internal network data confidentiality tool, however traditional internal network data confidentiality tool secrecy effect difference and do not have high safety Performance, at the same also can not the firewall to communication apparatus carry out encryption unlatching, to the power of the application unrelated about enterprise and information Limit is forbidden to use, and criminal easily climbs over the important information that firewall invades enterprise by unrelated application and information, together When can not the identity information to user strictly verified, the means such as cannot verify by timestamp and the whole network ensure data Safety, can not achieve the essence that the decentralization, distributed storage, information of block chain itself can not distort, and criminal holds Easily to inside electric power enterprise account book and sensitive information steal, cause significant wound to electric power enterprise, easily give electric power enterprise Industry causes consequence very serious, easily causes the Public Relations Crisis of Utilities Electric Co..
Summary of the invention
The purpose of the present invention is to provide a kind of data confidentiality tools suitable for electric power enterprise internal network, have secrecy The advantages of effect is good and high security, solves conventional interior network data secrecy tool secrecy effect difference and security performance is low Problem.
To achieve the above object, the present invention provides the following technical solutions:A kind of number suitable for electric power enterprise internal network According to secrecy tool, including interior network termination, the user is operated the account book record of enterprises by interior network termination, is had Steps are as follows for gymnastics work:
Step 1:User installation client plug-in;
Step 2:User's Agreement Protocol book;
Step 3:User carries out authentication;
Step 4:Data information is encrypted using private key;
Step 5:Setting generates authentication ids information;
Step 6:Private key is saved, public key is generated;
Step 7:Privately owned block chain network is added;
Step 8:The transmission of terminal-server data is changed to chain type transmission;
Step 9:It writes data into and to the whole network broadcast synchronization;
Step 10:Data are generated into required amount of node;
Step 11:51% back end is randomly selected using DPOS mechanism;
Step 12:Fast to 51% back end progress new district and new data creation, signs and supervises mutually, identity letter at verifying Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number According to control extension module, data memory module.
Preferably, the step 3:It includes identity information acquisition module, authentication module, people that user, which carries out authentication, Face is imaged identification module, face information acquisition module, authentication processing chip, data encryption control module and data and stores mould Block, the identity information acquisition module and face imaging identification module output end respectively with authentication module and face information The input terminal of acquisition module is unidirectionally electrically connected, and output end and the identity of the authentication module and face information acquisition module are recognized The input terminal of card processing chip is unidirectionally electrically connected, the output end and data encryption control module of the authentication processing chip Input terminal is unidirectionally electrically connected, and the output end of the data encryption control module and the input terminal of data memory module are unidirectionally electrically connected It connects.
Preferably, the step 11:It is to randomly select using the back end that DPOS mechanism randomly selects 51%, and it is every The back end of secondary generation can all record account book and safeguard, and the malice of each node is distorted, remaining node cannot be obtained Approval, and data are synchronous between all nodes, and are added and traced according to timestamp.
Preferably, the step 9:It writes data into and to the whole network broadcast synchronization, each data write-in all passes through three Secondary 51% node that randomly selects is confirmed.
Compared with prior art, beneficial effects of the present invention are as follows:
1, the present invention passes through interior network termination, step 1:User installation client plug-in, step 2:User's Agreement Protocol book, step 3: User carries out authentication, step 4:Data information is encrypted using private key, step 5:Setting generates authentication ids letter Breath, step 6:Private key is saved, public key, step 7 are generated:Privately owned block chain network, step 8 is added:Terminal-server data are passed It is defeated to be changed to chain type transmission, step 9:It writes data into and to the whole network broadcast synchronization, step 10:Data are generated into required amount of section Point, step 11:51% back end, step 12 are randomly selected using DPOS mechanism:It is fast that new district is carried out to 51% back end Creation, verifying with new data, the cooperation signed and supervised mutually, the means such as can verify by timestamp and the whole network ensure data Safety is able to achieve the essence that the decentralization, distributed storage, information of block chain itself can not distort, enhances electric power enterprise The secrecy effect of internal network data solves the problems, such as that conventional interior network data secrecy tool secrecy effect is poor, prevents not Method molecule in electric power enterprise internal network account book and sensitive information steal, avoid causing to electric power enterprise serious Consequence prevents the Public Relations Crisis for causing Utilities Electric Co., is worth of widely use.
2, the present invention is adopted by identity information acquisition module, authentication module, face imaging identification module, face information Collect module, authentication processing chip, data encryption control module and data memory module, improves the identification energy of user identity Power prevents criminal from carrying out stealing enterprise-essential account book and sensitive information using false identity, by step 11:Utilize DPOS The back end that mechanism randomly selects 51% is that the back end randomly selected, and generate every time all can record progress to account book Maintenance, and the malice of each node is distorted, and the approval of remaining node cannot be obtained, and data are synchronous between all nodes, and root It is added and is traced according to timestamp, keep the randomness of node selection, decentralization can carried out to block chain, enhance number of nodes According to secrecy effect, all confirmed by randomly selecting 51% node three times by the write-in of each data, improve write-in and to complete Net the safety of the data of broadcast.
Detailed description of the invention
Fig. 1 is schematic structural view of the invention;
Fig. 2 is step 3 of the present invention:User carries out authentication structural system schematic diagram.
Specific embodiment
Below in conjunction with the embodiment of the present invention, technical scheme in the embodiment of the invention is clearly and completely described, Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based in the present invention Embodiment, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all Belong to the scope of protection of the invention.
A kind of data confidentiality tool suitable for electric power enterprise internal network referring to FIG. 1-2, including interior network termination, make User is operated the account book record of enterprises by interior network termination, and concrete operation step is as follows:Step 1:User installation Client plug-in;Step 2:User's Agreement Protocol book;Step 3:User carries out authentication;Step 3:User carries out authentication Identification module, face information acquisition module, authentication is imaged including identity information acquisition module, authentication module, face Chip, data encryption control module and data memory module are handled, identification module is imaged in identity information acquisition module and face Output end is unidirectionally electrically connected with the input terminal of authentication module and face information acquisition module respectively, authentication module and people The output end of face information acquisition module is unidirectionally electrically connected with the input terminal of authentication processing chip, and authentication handles chip Output end is unidirectionally electrically connected with the input terminal of data encryption control module, and the output end and data of data encryption control module store The input terminal of module is unidirectionally electrically connected, and identification module, people is imaged by identity information acquisition module, authentication module, face Face information acquisition module, authentication processing chip, data encryption control module and data memory module, improve user identity Recognition capability prevents criminal from carrying out stealing enterprise-essential account book and sensitive information, step 4 using false identity:Utilize private Key encrypts data information;Step 5:Setting generates authentication ids information;Step 6:Private key is saved, public key is generated;Step Rapid 7:Privately owned block chain network is added;Step 8:The transmission of terminal-server data is changed to chain type transmission;Step 9:Data are write Enter and to the whole network broadcast synchronization;Step 9:Write data into and to the whole network broadcast synchronization, each data write-in all by three times with Machine is chosen 51% node and is confirmed, is all confirmed by randomly selecting 51% node three times by the write-in of each data, is improved Write-in and the safety for the data broadcasted to the whole network, step 10:Data are generated into required amount of node;Step 11:It utilizes DPOS mechanism randomly selects 51% back end;Step 11:It is using the back end that DPOS mechanism randomly selects 51% The back end for randomly selecting, and generating every time can all record account book and safeguard, and the malice of each node is distorted, cannot The approval of remaining node is obtained, and data are synchronous between all nodes, and are added and traced according to timestamp, and step is passed through 11:Being the back end randomly selected, and generate every time using the back end that DPOS mechanism randomly selects 51% all can be right Account book record is safeguarded, and the malice of each node is distorted, and the approval of remaining node cannot be obtained, and number between all nodes It is added and is traced according to synchronization, and according to timestamp, keep the randomness of node selection, center can be carried out to block chain Change, enhances the secrecy effect of node data, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, It signs and supervises mutually, identity information acquisition module, authentication module, face imaging identification module, face information acquisition mould Block, authentication handle chip, data encryption control module, data memory module, pass through interior network termination, step 1:User installation Client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:Data are believed using private key Breath encrypted, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated:It is added private There are block chain network, step 8:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into and to the whole network Broadcast synchronization, step 10:Data are generated into required amount of node, step 11:51% number is randomly selected using DPOS mechanism According to node, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, is signed and that supervises mutually matches It closes, can ensure data safety by the means such as timestamp and the whole network verifying, be able to achieve the decentralization, distribution of block chain itself Storage, the essence that can not distort of information, enhance the secrecy effect of electric power enterprise internal network data, solve conventional interior net The problem of network data confidentiality tool secrecy effect difference, prevents criminal to the account book and sensitivity in electric power enterprise internal network Information is stolen, and avoids causing serious consequence to electric power enterprise, prevents the Public Relations Crisis for causing Utilities Electric Co..
In use, user is operated the account book record of enterprises by interior network termination, concrete operation step;Step Rapid 1:User installation client plug-in;Step 2:User's Agreement Protocol book;Step 3:User carries out authentication;Believed by identity Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number According to control extension module and data memory module, improve the recognition capability of user identity, prevent criminal using false identity into Pirate takes enterprise-essential account book and sensitive information, step 4:Data information is encrypted using private key;Step 5:Setting life At authentication ids information;Step 6:Private key is saved, public key is generated;Step 7:Privately owned block chain network is added;Step 8:It will be whole End-server data transport is changed to chain type transmission;Step 9:It writes data into and to the whole network broadcast synchronization;It is write by each data Enter and all confirmed by randomly selecting 51% node three times, improves the safety of write-in and the data to the whole network broadcast, step 10:Data are generated into required amount of node;Step 11:51% back end is randomly selected using DPOS mechanism;Pass through step Rapid 11:It is that the back end randomly selected, and generate every time all may be used using the back end that DPOS mechanism randomly selects 51% Account book record is safeguarded, and the malice of each node is distorted, and cannot obtain the approval of remaining node, and between all nodes Data are synchronous, and are added and traced according to timestamp, keep the randomness of node selection, can carry out center to block chain Change, enhances the secrecy effect of node data, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, It signs and supervises mutually, enhance the secrecy effect of Intranet data.
In summary:This is suitable for the data confidentiality tool of electric power enterprise internal network, passes through interior network termination, step 1:With Family is installed by client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:It will using private key Data information encrypted, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated: Privately owned block chain network, step 8 is added:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into simultaneously To the whole network broadcast synchronization, step 10:Data are generated into required amount of node, step 11:It is randomly selected using DPOS mechanism 51% back end, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, signature and mutual The cooperation of supervision solves the problems, such as that conventional interior network data secrecy tool secrecy effect is poor.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (4)

1. a kind of data confidentiality tool suitable for electric power enterprise internal network, including interior network termination, it is characterised in that:It is described to make User is operated the account book record of enterprises by interior network termination, and concrete operation step is as follows:
Step 1:User installation client plug-in;
Step 2:User's Agreement Protocol book;
Step 3:User carries out authentication;
Step 4:Data information is encrypted using private key;
Step 5:Setting generates authentication ids information;
Step 6:Private key is saved, public key is generated;
Step 7:Privately owned block chain network is added;
Step 8:The transmission of terminal-server data is changed to chain type transmission;
Step 9:It writes data into and to the whole network broadcast synchronization;
Step 10:Data are generated into required amount of node;
Step 11:51% back end is randomly selected using DPOS mechanism;
Step 12:Fast to 51% back end progress new district and new data creation, signs and supervises mutually, identity letter at verifying Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number According to control extension module, data memory module.
2. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that: The step 3:User carry out authentication include identity information acquisition module, authentication module, face imaging identification module, Face information acquisition module, authentication processing chip, data encryption control module and data memory module, the identity information The output end input with authentication module and face information acquisition module respectively of acquisition module and face imaging identification module The output end of the unidirectional electrical connection in end, the authentication module and face information acquisition module is defeated with authentication processing chip Enter the unidirectional electrical connection in end, the output end of the authentication processing chip and the input terminal of data encryption control module are unidirectionally electrically connected It connects, the output end of the data encryption control module is unidirectionally electrically connected with the input terminal of data memory module.
3. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that: The step 11:It is the data section randomly selected, and generate every time using the back end that DPOS mechanism randomly selects 51% Point can all record account book and safeguard, and the malice of each node is distorted, and the approval of remaining node, and all sections cannot be obtained Data are synchronous between point, and are added and traced according to timestamp.
4. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that: The step 9:It writes data into and to the whole network broadcast synchronization, each data write-in all by randomly selecting 51% section three times Point is confirmed.
CN201810856443.9A 2018-07-31 2018-07-31 A kind of data confidentiality tool suitable for electric power enterprise internal network Pending CN108900531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810856443.9A CN108900531A (en) 2018-07-31 2018-07-31 A kind of data confidentiality tool suitable for electric power enterprise internal network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810856443.9A CN108900531A (en) 2018-07-31 2018-07-31 A kind of data confidentiality tool suitable for electric power enterprise internal network

Publications (1)

Publication Number Publication Date
CN108900531A true CN108900531A (en) 2018-11-27

Family

ID=64352752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810856443.9A Pending CN108900531A (en) 2018-07-31 2018-07-31 A kind of data confidentiality tool suitable for electric power enterprise internal network

Country Status (1)

Country Link
CN (1) CN108900531A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417494A (en) * 2020-10-26 2021-02-26 国网浙江省电力有限公司电力科学研究院 Power block chain system based on trusted computing

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105915542A (en) * 2016-06-08 2016-08-31 惠众商务顾问(北京)有限公司 Distributed cloud authentication system based on random instruction, apparatus and method thereof
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
US9875510B1 (en) * 2015-02-03 2018-01-23 Lance Kasper Consensus system for tracking peer-to-peer digital records
CN107688944A (en) * 2017-07-21 2018-02-13 杭州云象网络技术有限公司 A kind of power system method of commerce based on block chain
CN108304710A (en) * 2018-02-11 2018-07-20 安云印(天津)大数据科技有限公司 A kind of E-seal signature method of the involvement identity authentication function based on block chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9875510B1 (en) * 2015-02-03 2018-01-23 Lance Kasper Consensus system for tracking peer-to-peer digital records
CN105915542A (en) * 2016-06-08 2016-08-31 惠众商务顾问(北京)有限公司 Distributed cloud authentication system based on random instruction, apparatus and method thereof
CN106789047A (en) * 2017-03-03 2017-05-31 钱德君 A kind of block chain identification system
CN106878318A (en) * 2017-03-03 2017-06-20 钱德君 A kind of block chain real time polling cloud system
CN107181599A (en) * 2017-07-18 2017-09-19 天津理工大学 The storage of route location data confidentiality and sharing method based on block chain
CN107688944A (en) * 2017-07-21 2018-02-13 杭州云象网络技术有限公司 A kind of power system method of commerce based on block chain
CN108304710A (en) * 2018-02-11 2018-07-20 安云印(天津)大数据科技有限公司 A kind of E-seal signature method of the involvement identity authentication function based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417494A (en) * 2020-10-26 2021-02-26 国网浙江省电力有限公司电力科学研究院 Power block chain system based on trusted computing

Similar Documents

Publication Publication Date Title
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
CN109145540B (en) Intelligent terminal identity authentication method and device based on block chain
CN110753344B (en) NB-IoT-based smart meter secure access system
CN113301022B (en) Internet of things equipment identity security authentication method based on block chain and fog calculation
CN110519046A (en) Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD
CN108199845A (en) A kind of light-weight authentication equipment and authentication method based on PUF
CN102281143B (en) Remote unlocking system of intelligent card
CN109104476B (en) Electric power information safety system based on block chain
KR101344074B1 (en) Smart grid data transaction scheme for privacy
CN110336663A (en) A kind of PUFs based on block chain technology certificate scheme group to group
CN105610872B (en) Internet-of-things terminal encryption method and internet-of-things terminal encryption device
CN113312608A (en) Electric power metering terminal identity authentication method and system based on timestamp
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN100488270C (en) Mobile terminal, SIM card and validation method for same
CN110572392A (en) Identity authentication method based on HyperLegger network
CN107733936B (en) Encryption method for mobile data
CN112202773B (en) Computer network information security monitoring and protection system based on internet
CN111435389A (en) Power distribution terminal operation and maintenance tool safety protection system
CN113591103A (en) Identity authentication method and system between intelligent terminals of power internet of things
CN108900531A (en) A kind of data confidentiality tool suitable for electric power enterprise internal network
Huang et al. A novel identity authentication for FPGA based IP designs
CN201846357U (en) Security network architecture for non-field industries
CN114172696B (en) Terminal authentication method for cloud edge end cooperative dual authentication in electric power Internet of things
CN109412799A (en) System and method for generating local key
CN102270182A (en) Encrypted mobile storage equipment based on synchronous user and host machine authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181127