CN108900531A - A kind of data confidentiality tool suitable for electric power enterprise internal network - Google Patents
A kind of data confidentiality tool suitable for electric power enterprise internal network Download PDFInfo
- Publication number
- CN108900531A CN108900531A CN201810856443.9A CN201810856443A CN108900531A CN 108900531 A CN108900531 A CN 108900531A CN 201810856443 A CN201810856443 A CN 201810856443A CN 108900531 A CN108900531 A CN 108900531A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- authentication
- electric power
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Abstract
The invention discloses a kind of data confidentiality tools suitable for electric power enterprise internal network, including interior network termination.The present invention passes through interior network termination, step 1:User installation client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:Data information is encrypted using private key, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated:Privately owned block chain network, step 8 is added:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into and to the whole network broadcast synchronization, step 10:Data are generated into required amount of node, step 11:51% back end, step 12 are randomly selected using DPOS mechanism:And the creation of new data, verifying, the cooperation signing and supervise mutually fast to 51% back end progress new district, solve the problems, such as that conventional interior network data secrecy tool secrecy effect is poor.
Description
Technical field
The present invention relates to electric power enterprise internal network data confidentiality technical field of tools, specially a kind of electric power that is suitable for is looked forward to
The data confidentiality tool of industry internal network.
Background technique
With information-based deep development, information technology is maked rapid progress, and the following security breaches and hidden danger layer go out not
Thoroughly, presently, information security circle has been reached common understanding, and outside threat can not be eliminated, and can only be evaded even in minimum limit
Receive, i.e., no matter how perfect the safety protection technique of information system front and back end is made, and security risk always not can avoid;Change speech
It, hacker or attacker can always find a break-through point and break through to information system, and the traditional approach of information security is claimed
Data to be protected is needed always uniformly to be stored in central node in conventional information trouble free service for security boundary(Server and
Database)In, when facing outside threat, boundary is just set up therebetween(Wall), to which attacker is blocked in outside boundary,
However, this method effect is not very good, because boundary is always broken into, and once enter inside, attacker can obtain
Full control steals sensitive data, or adapter tube strength controls.
Electric power enterprise needs for enterprises account book and important sensitive information to be incorporated in Intranet, however now
The use of most of electric power enterprise accumulate all kinds of safety protection techniques on boundary, so that present electric power enterprise uses tradition mostly
Internal network data confidentiality tool, however traditional internal network data confidentiality tool secrecy effect difference and do not have high safety
Performance, at the same also can not the firewall to communication apparatus carry out encryption unlatching, to the power of the application unrelated about enterprise and information
Limit is forbidden to use, and criminal easily climbs over the important information that firewall invades enterprise by unrelated application and information, together
When can not the identity information to user strictly verified, the means such as cannot verify by timestamp and the whole network ensure data
Safety, can not achieve the essence that the decentralization, distributed storage, information of block chain itself can not distort, and criminal holds
Easily to inside electric power enterprise account book and sensitive information steal, cause significant wound to electric power enterprise, easily give electric power enterprise
Industry causes consequence very serious, easily causes the Public Relations Crisis of Utilities Electric Co..
Summary of the invention
The purpose of the present invention is to provide a kind of data confidentiality tools suitable for electric power enterprise internal network, have secrecy
The advantages of effect is good and high security, solves conventional interior network data secrecy tool secrecy effect difference and security performance is low
Problem.
To achieve the above object, the present invention provides the following technical solutions:A kind of number suitable for electric power enterprise internal network
According to secrecy tool, including interior network termination, the user is operated the account book record of enterprises by interior network termination, is had
Steps are as follows for gymnastics work:
Step 1:User installation client plug-in;
Step 2:User's Agreement Protocol book;
Step 3:User carries out authentication;
Step 4:Data information is encrypted using private key;
Step 5:Setting generates authentication ids information;
Step 6:Private key is saved, public key is generated;
Step 7:Privately owned block chain network is added;
Step 8:The transmission of terminal-server data is changed to chain type transmission;
Step 9:It writes data into and to the whole network broadcast synchronization;
Step 10:Data are generated into required amount of node;
Step 11:51% back end is randomly selected using DPOS mechanism;
Step 12:Fast to 51% back end progress new district and new data creation, signs and supervises mutually, identity letter at verifying
Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number
According to control extension module, data memory module.
Preferably, the step 3:It includes identity information acquisition module, authentication module, people that user, which carries out authentication,
Face is imaged identification module, face information acquisition module, authentication processing chip, data encryption control module and data and stores mould
Block, the identity information acquisition module and face imaging identification module output end respectively with authentication module and face information
The input terminal of acquisition module is unidirectionally electrically connected, and output end and the identity of the authentication module and face information acquisition module are recognized
The input terminal of card processing chip is unidirectionally electrically connected, the output end and data encryption control module of the authentication processing chip
Input terminal is unidirectionally electrically connected, and the output end of the data encryption control module and the input terminal of data memory module are unidirectionally electrically connected
It connects.
Preferably, the step 11:It is to randomly select using the back end that DPOS mechanism randomly selects 51%, and it is every
The back end of secondary generation can all record account book and safeguard, and the malice of each node is distorted, remaining node cannot be obtained
Approval, and data are synchronous between all nodes, and are added and traced according to timestamp.
Preferably, the step 9:It writes data into and to the whole network broadcast synchronization, each data write-in all passes through three
Secondary 51% node that randomly selects is confirmed.
Compared with prior art, beneficial effects of the present invention are as follows:
1, the present invention passes through interior network termination, step 1:User installation client plug-in, step 2:User's Agreement Protocol book, step 3:
User carries out authentication, step 4:Data information is encrypted using private key, step 5:Setting generates authentication ids letter
Breath, step 6:Private key is saved, public key, step 7 are generated:Privately owned block chain network, step 8 is added:Terminal-server data are passed
It is defeated to be changed to chain type transmission, step 9:It writes data into and to the whole network broadcast synchronization, step 10:Data are generated into required amount of section
Point, step 11:51% back end, step 12 are randomly selected using DPOS mechanism:It is fast that new district is carried out to 51% back end
Creation, verifying with new data, the cooperation signed and supervised mutually, the means such as can verify by timestamp and the whole network ensure data
Safety is able to achieve the essence that the decentralization, distributed storage, information of block chain itself can not distort, enhances electric power enterprise
The secrecy effect of internal network data solves the problems, such as that conventional interior network data secrecy tool secrecy effect is poor, prevents not
Method molecule in electric power enterprise internal network account book and sensitive information steal, avoid causing to electric power enterprise serious
Consequence prevents the Public Relations Crisis for causing Utilities Electric Co., is worth of widely use.
2, the present invention is adopted by identity information acquisition module, authentication module, face imaging identification module, face information
Collect module, authentication processing chip, data encryption control module and data memory module, improves the identification energy of user identity
Power prevents criminal from carrying out stealing enterprise-essential account book and sensitive information using false identity, by step 11:Utilize DPOS
The back end that mechanism randomly selects 51% is that the back end randomly selected, and generate every time all can record progress to account book
Maintenance, and the malice of each node is distorted, and the approval of remaining node cannot be obtained, and data are synchronous between all nodes, and root
It is added and is traced according to timestamp, keep the randomness of node selection, decentralization can carried out to block chain, enhance number of nodes
According to secrecy effect, all confirmed by randomly selecting 51% node three times by the write-in of each data, improve write-in and to complete
Net the safety of the data of broadcast.
Detailed description of the invention
Fig. 1 is schematic structural view of the invention;
Fig. 2 is step 3 of the present invention:User carries out authentication structural system schematic diagram.
Specific embodiment
Below in conjunction with the embodiment of the present invention, technical scheme in the embodiment of the invention is clearly and completely described,
Obviously, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based in the present invention
Embodiment, every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all
Belong to the scope of protection of the invention.
A kind of data confidentiality tool suitable for electric power enterprise internal network referring to FIG. 1-2, including interior network termination, make
User is operated the account book record of enterprises by interior network termination, and concrete operation step is as follows:Step 1:User installation
Client plug-in;Step 2:User's Agreement Protocol book;Step 3:User carries out authentication;Step 3:User carries out authentication
Identification module, face information acquisition module, authentication is imaged including identity information acquisition module, authentication module, face
Chip, data encryption control module and data memory module are handled, identification module is imaged in identity information acquisition module and face
Output end is unidirectionally electrically connected with the input terminal of authentication module and face information acquisition module respectively, authentication module and people
The output end of face information acquisition module is unidirectionally electrically connected with the input terminal of authentication processing chip, and authentication handles chip
Output end is unidirectionally electrically connected with the input terminal of data encryption control module, and the output end and data of data encryption control module store
The input terminal of module is unidirectionally electrically connected, and identification module, people is imaged by identity information acquisition module, authentication module, face
Face information acquisition module, authentication processing chip, data encryption control module and data memory module, improve user identity
Recognition capability prevents criminal from carrying out stealing enterprise-essential account book and sensitive information, step 4 using false identity:Utilize private
Key encrypts data information;Step 5:Setting generates authentication ids information;Step 6:Private key is saved, public key is generated;Step
Rapid 7:Privately owned block chain network is added;Step 8:The transmission of terminal-server data is changed to chain type transmission;Step 9:Data are write
Enter and to the whole network broadcast synchronization;Step 9:Write data into and to the whole network broadcast synchronization, each data write-in all by three times with
Machine is chosen 51% node and is confirmed, is all confirmed by randomly selecting 51% node three times by the write-in of each data, is improved
Write-in and the safety for the data broadcasted to the whole network, step 10:Data are generated into required amount of node;Step 11:It utilizes
DPOS mechanism randomly selects 51% back end;Step 11:It is using the back end that DPOS mechanism randomly selects 51%
The back end for randomly selecting, and generating every time can all record account book and safeguard, and the malice of each node is distorted, cannot
The approval of remaining node is obtained, and data are synchronous between all nodes, and are added and traced according to timestamp, and step is passed through
11:Being the back end randomly selected, and generate every time using the back end that DPOS mechanism randomly selects 51% all can be right
Account book record is safeguarded, and the malice of each node is distorted, and the approval of remaining node cannot be obtained, and number between all nodes
It is added and is traced according to synchronization, and according to timestamp, keep the randomness of node selection, center can be carried out to block chain
Change, enhances the secrecy effect of node data, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying,
It signs and supervises mutually, identity information acquisition module, authentication module, face imaging identification module, face information acquisition mould
Block, authentication handle chip, data encryption control module, data memory module, pass through interior network termination, step 1:User installation
Client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:Data are believed using private key
Breath encrypted, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated:It is added private
There are block chain network, step 8:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into and to the whole network
Broadcast synchronization, step 10:Data are generated into required amount of node, step 11:51% number is randomly selected using DPOS mechanism
According to node, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, is signed and that supervises mutually matches
It closes, can ensure data safety by the means such as timestamp and the whole network verifying, be able to achieve the decentralization, distribution of block chain itself
Storage, the essence that can not distort of information, enhance the secrecy effect of electric power enterprise internal network data, solve conventional interior net
The problem of network data confidentiality tool secrecy effect difference, prevents criminal to the account book and sensitivity in electric power enterprise internal network
Information is stolen, and avoids causing serious consequence to electric power enterprise, prevents the Public Relations Crisis for causing Utilities Electric Co..
In use, user is operated the account book record of enterprises by interior network termination, concrete operation step;Step
Rapid 1:User installation client plug-in;Step 2:User's Agreement Protocol book;Step 3:User carries out authentication;Believed by identity
Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number
According to control extension module and data memory module, improve the recognition capability of user identity, prevent criminal using false identity into
Pirate takes enterprise-essential account book and sensitive information, step 4:Data information is encrypted using private key;Step 5:Setting life
At authentication ids information;Step 6:Private key is saved, public key is generated;Step 7:Privately owned block chain network is added;Step 8:It will be whole
End-server data transport is changed to chain type transmission;Step 9:It writes data into and to the whole network broadcast synchronization;It is write by each data
Enter and all confirmed by randomly selecting 51% node three times, improves the safety of write-in and the data to the whole network broadcast, step
10:Data are generated into required amount of node;Step 11:51% back end is randomly selected using DPOS mechanism;Pass through step
Rapid 11:It is that the back end randomly selected, and generate every time all may be used using the back end that DPOS mechanism randomly selects 51%
Account book record is safeguarded, and the malice of each node is distorted, and cannot obtain the approval of remaining node, and between all nodes
Data are synchronous, and are added and traced according to timestamp, keep the randomness of node selection, can carry out center to block chain
Change, enhances the secrecy effect of node data, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying,
It signs and supervises mutually, enhance the secrecy effect of Intranet data.
In summary:This is suitable for the data confidentiality tool of electric power enterprise internal network, passes through interior network termination, step 1:With
Family is installed by client plug-in, step 2:User's Agreement Protocol book, step 3:User carries out authentication, step 4:It will using private key
Data information encrypted, step 5:Setting generates authentication ids information, step 6:Private key is saved, public key, step 7 are generated:
Privately owned block chain network, step 8 is added:The transmission of terminal-server data is changed to chain type transmission, step 9:It writes data into simultaneously
To the whole network broadcast synchronization, step 10:Data are generated into required amount of node, step 11:It is randomly selected using DPOS mechanism
51% back end, step 12:New district is fast is carried out to 51% back end and the creation of new data, verifying, signature and mutual
The cooperation of supervision solves the problems, such as that conventional interior network data secrecy tool secrecy effect is poor.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with
A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding
And modification, the scope of the present invention is defined by the appended.
Claims (4)
1. a kind of data confidentiality tool suitable for electric power enterprise internal network, including interior network termination, it is characterised in that:It is described to make
User is operated the account book record of enterprises by interior network termination, and concrete operation step is as follows:
Step 1:User installation client plug-in;
Step 2:User's Agreement Protocol book;
Step 3:User carries out authentication;
Step 4:Data information is encrypted using private key;
Step 5:Setting generates authentication ids information;
Step 6:Private key is saved, public key is generated;
Step 7:Privately owned block chain network is added;
Step 8:The transmission of terminal-server data is changed to chain type transmission;
Step 9:It writes data into and to the whole network broadcast synchronization;
Step 10:Data are generated into required amount of node;
Step 11:51% back end is randomly selected using DPOS mechanism;
Step 12:Fast to 51% back end progress new district and new data creation, signs and supervises mutually, identity letter at verifying
Cease acquisition module, authentication module, face imaging identification module, face information acquisition module, authentication processing chip, number
According to control extension module, data memory module.
2. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that:
The step 3:User carry out authentication include identity information acquisition module, authentication module, face imaging identification module,
Face information acquisition module, authentication processing chip, data encryption control module and data memory module, the identity information
The output end input with authentication module and face information acquisition module respectively of acquisition module and face imaging identification module
The output end of the unidirectional electrical connection in end, the authentication module and face information acquisition module is defeated with authentication processing chip
Enter the unidirectional electrical connection in end, the output end of the authentication processing chip and the input terminal of data encryption control module are unidirectionally electrically connected
It connects, the output end of the data encryption control module is unidirectionally electrically connected with the input terminal of data memory module.
3. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that:
The step 11:It is the data section randomly selected, and generate every time using the back end that DPOS mechanism randomly selects 51%
Point can all record account book and safeguard, and the malice of each node is distorted, and the approval of remaining node, and all sections cannot be obtained
Data are synchronous between point, and are added and traced according to timestamp.
4. a kind of data confidentiality tool suitable for electric power enterprise internal network according to claim 1, it is characterised in that:
The step 9:It writes data into and to the whole network broadcast synchronization, each data write-in all by randomly selecting 51% section three times
Point is confirmed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810856443.9A CN108900531A (en) | 2018-07-31 | 2018-07-31 | A kind of data confidentiality tool suitable for electric power enterprise internal network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810856443.9A CN108900531A (en) | 2018-07-31 | 2018-07-31 | A kind of data confidentiality tool suitable for electric power enterprise internal network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108900531A true CN108900531A (en) | 2018-11-27 |
Family
ID=64352752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810856443.9A Pending CN108900531A (en) | 2018-07-31 | 2018-07-31 | A kind of data confidentiality tool suitable for electric power enterprise internal network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900531A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417494A (en) * | 2020-10-26 | 2021-02-26 | 国网浙江省电力有限公司电力科学研究院 | Power block chain system based on trusted computing |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105915542A (en) * | 2016-06-08 | 2016-08-31 | 惠众商务顾问(北京)有限公司 | Distributed cloud authentication system based on random instruction, apparatus and method thereof |
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
CN106878318A (en) * | 2017-03-03 | 2017-06-20 | 钱德君 | A kind of block chain real time polling cloud system |
CN107181599A (en) * | 2017-07-18 | 2017-09-19 | 天津理工大学 | The storage of route location data confidentiality and sharing method based on block chain |
US9875510B1 (en) * | 2015-02-03 | 2018-01-23 | Lance Kasper | Consensus system for tracking peer-to-peer digital records |
CN107688944A (en) * | 2017-07-21 | 2018-02-13 | 杭州云象网络技术有限公司 | A kind of power system method of commerce based on block chain |
CN108304710A (en) * | 2018-02-11 | 2018-07-20 | 安云印(天津)大数据科技有限公司 | A kind of E-seal signature method of the involvement identity authentication function based on block chain |
-
2018
- 2018-07-31 CN CN201810856443.9A patent/CN108900531A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9875510B1 (en) * | 2015-02-03 | 2018-01-23 | Lance Kasper | Consensus system for tracking peer-to-peer digital records |
CN105915542A (en) * | 2016-06-08 | 2016-08-31 | 惠众商务顾问(北京)有限公司 | Distributed cloud authentication system based on random instruction, apparatus and method thereof |
CN106789047A (en) * | 2017-03-03 | 2017-05-31 | 钱德君 | A kind of block chain identification system |
CN106878318A (en) * | 2017-03-03 | 2017-06-20 | 钱德君 | A kind of block chain real time polling cloud system |
CN107181599A (en) * | 2017-07-18 | 2017-09-19 | 天津理工大学 | The storage of route location data confidentiality and sharing method based on block chain |
CN107688944A (en) * | 2017-07-21 | 2018-02-13 | 杭州云象网络技术有限公司 | A kind of power system method of commerce based on block chain |
CN108304710A (en) * | 2018-02-11 | 2018-07-20 | 安云印(天津)大数据科技有限公司 | A kind of E-seal signature method of the involvement identity authentication function based on block chain |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417494A (en) * | 2020-10-26 | 2021-02-26 | 国网浙江省电力有限公司电力科学研究院 | Power block chain system based on trusted computing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104065653B (en) | A kind of interactive auth method, device, system and relevant device | |
CN109145540B (en) | Intelligent terminal identity authentication method and device based on block chain | |
CN110753344B (en) | NB-IoT-based smart meter secure access system | |
CN113301022B (en) | Internet of things equipment identity security authentication method based on block chain and fog calculation | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
CN108199845A (en) | A kind of light-weight authentication equipment and authentication method based on PUF | |
CN102281143B (en) | Remote unlocking system of intelligent card | |
CN109104476B (en) | Electric power information safety system based on block chain | |
KR101344074B1 (en) | Smart grid data transaction scheme for privacy | |
CN110336663A (en) | A kind of PUFs based on block chain technology certificate scheme group to group | |
CN105610872B (en) | Internet-of-things terminal encryption method and internet-of-things terminal encryption device | |
CN113312608A (en) | Electric power metering terminal identity authentication method and system based on timestamp | |
CN110225014B (en) | Internet of things equipment identity authentication method based on fingerprint centralized issuing mode | |
CN100488270C (en) | Mobile terminal, SIM card and validation method for same | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN107733936B (en) | Encryption method for mobile data | |
CN112202773B (en) | Computer network information security monitoring and protection system based on internet | |
CN111435389A (en) | Power distribution terminal operation and maintenance tool safety protection system | |
CN113591103A (en) | Identity authentication method and system between intelligent terminals of power internet of things | |
CN108900531A (en) | A kind of data confidentiality tool suitable for electric power enterprise internal network | |
Huang et al. | A novel identity authentication for FPGA based IP designs | |
CN201846357U (en) | Security network architecture for non-field industries | |
CN114172696B (en) | Terminal authentication method for cloud edge end cooperative dual authentication in electric power Internet of things | |
CN109412799A (en) | System and method for generating local key | |
CN102270182A (en) | Encrypted mobile storage equipment based on synchronous user and host machine authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181127 |