CN111885076A - Energy block chain transaction system and method based on credit value lending - Google Patents

Energy block chain transaction system and method based on credit value lending Download PDF

Info

Publication number
CN111885076A
CN111885076A CN202010752649.4A CN202010752649A CN111885076A CN 111885076 A CN111885076 A CN 111885076A CN 202010752649 A CN202010752649 A CN 202010752649A CN 111885076 A CN111885076 A CN 111885076A
Authority
CN
China
Prior art keywords
industrial
mqtt
gateway
energy
credit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010752649.4A
Other languages
Chinese (zh)
Inventor
胡明
颜辉
于萍
耿晓中
陈瀚林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun Institute of Applied Chemistry of CAS
Changchun Institute Technology
Original Assignee
Changchun Institute of Applied Chemistry of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun Institute of Applied Chemistry of CAS filed Critical Changchun Institute of Applied Chemistry of CAS
Priority to CN202010752649.4A priority Critical patent/CN111885076A/en
Publication of CN111885076A publication Critical patent/CN111885076A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S50/00Market activities related to the operation of systems integrating technologies related to power network operation or related to communication or information technologies
    • Y04S50/12Billing, invoicing, buying or selling transactions or other related activities, e.g. cost or usage evaluation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an energy block chain transaction system and method based on credit value lending, which comprises an industrial exchanger, an industrial safety gateway, an energy block chain network analyzer, an MQTT industrial gateway A, MQTT industrial gateway B, MQTT industrial gateway C, MQTT industrial gateway D, MQTT industrial gateway E, MQTT industrial honey pot, a power plant electric meter, a user electric meter A1, a user electric meter B1, a user electric meter C1 and a user electric meter N; the industrial switch is respectively connected with an industrial security gateway and an energy block chain network analyzer, and the industrial security gateway is connected with an MQTT industrial honeypot. The energy block chain transaction system and method based on credit loan can deceive the network asset search engines by using the MQTT industrial honeypot, are used as traps constructed from the perspective of attackers, delay and confuse the attack of hackers, and provide help in the aspects of improving active defense capacity, obtaining basic threat information, assisting decision support and the like.

Description

Energy block chain transaction system and method based on credit value lending
Technical Field
The present invention relates to energy blockchain transaction systems, and more particularly, to an energy blockchain transaction system and method based on credit loan.
Background
The traditional Web honeypots, service honeypots and database honeypots can deceive attacks of hackers and vulnerability scanners by simulating related services, help us to acquire potential threats in a network space and know novel attack means, and are important parts for realizing active defense and attack deception of an information system.
Network security attacks aiming at industrial control systems are increasing day by day, and more important industrial control system security events are paid attention. With the development of the internet of things, researchers find a large number of industrial control equipment bugs, and the bugs of an industrial control system are found in a large number according to the report of the Samenatek. Some hackers may quickly explore the device assets exposed by a particular organization in the network space using Shodan, Zoomeye, Fofa, etc. search engines.
Disclosure of Invention
The invention aims to provide an energy blockchain transaction system and method based on credit loan, which can improve the active defense capacity, obtain basic threat information, assist decision support and the like, and solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme: an energy block chain transaction system based on credit value lending comprises an industrial switch, an industrial safety gateway, an energy block chain network analyzer, an MQTT industrial gateway A, MQTT industrial gateway B, MQTT industrial gateway C, MQTT industrial gateway D, MQTT industrial gateway E, MQTT industrial honeypot, a power plant electric meter, a user electric meter A1, a user electric meter B1, a user electric meter C1 and a user electric meter N; wherein:
the industrial switch is used for an Ethernet switch in the field of industrial control and adopts a uniform TCP/IP protocol;
the industrial security gateway is used for solving the problem of security protection when the industrial control system is accessed to the information network and providing security guarantee for the connection between the control network and the management information network;
the energy block chain network analyzer is used for scanning and measuring the energy block chain in a wide frequency band so as to determine the comprehensiveness of network parameters;
the MQTT industrial gateways A to E are used for solving the safety protection problem when the industrial control system is accessed to the information network and providing safety guarantee for the connection of the control network and the management information network;
the MQTT industrial honeypot is used for deceiving a network asset search engine and is used as a trap constructed from an attacker view angle to delay and confuse the attack of a hacker;
the power plant ammeter is used for measuring the electric power value output by the power plant;
the user electric meters A1-N are all used for measuring the actual electricity consumption of each user.
Preferably, the system further comprises an energy seller, an energy buyer, a token, a shared wallet, a credit bank, a storage pool, an account pool and an energy currency; the energy seller is connected with the energy buyer, the token is connected with the sharing wallet, the credit bank is respectively connected with the energy seller, the energy buyer, the token and the sharing wallet, the storage pool and the account pool are connected with the credit bank, and the storage pool is connected with the account pool.
Preferably, the industrial switch is respectively connected with an industrial security gateway and an energy block chain network analyzer, and the industrial security gateway is connected with the MQTT industrial honeypot.
Preferably, the MQTT industrial gateway A, MQTT industrial gateway B, MQTT industrial gateway C, MQTT industrial gateway D and MQTT industrial gateway E are both connected to an industrial switch.
Preferably, the power plant meters are connected with an MQTT industrial gateway A, and the user meters A1, B1, C1 and N are respectively connected with an MQTT industrial gateway B, MQTT, an MQTT industrial gateway C and an MQTT industrial gateway D.
Compared with the prior art, the invention has the beneficial effects that:
the energy block chain transaction system and method based on credit loan provided by the invention can deceive these network asset search engines by using the MQTT industrial honeypot, are used as traps constructed from the perspective of attackers, delay and confuse the attack of hackers, and provide help in the aspects of improving active defense capacity, obtaining basic threat information, assisting decision support and the like.
Drawings
FIG. 1 is a functional diagram of an energy blockchain transaction based on credit loan in accordance with the present invention;
FIG. 2 is a circuit diagram of an energy blockchain transaction circuit based on credit loan in accordance with the present invention;
fig. 3 is a diagram of a point-to-point energy transaction scheme based on credit payment according to the present invention.
In the figure: 1. an industrial switch; 2. an industrial security gateway; 3. an energy blockchain network analyzer; 4. MQTT industrial gateway A; 5. MQTT industrial gateway B; 6. MQTT industrial gateway C; 7. MQTT industrial gateway D; 8. MQTT industrial gateway E; 9. MQTT industrial honeypots; 10. a power plant electric meter; 11. a user electricity meter a 1; 12. a user electricity meter B1; 13. a user electricity meter C1; 14. a user ammeter N; 15. an energy vendor; 16. an energy buyer; 17. a token; 18. a sharing wallet; 19. a credit bank; 20. a storage pool; 21. a pool of accounts; 22. energy currency.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, an energy block chain transaction system based on credit loan includes an industrial switch 1, an industrial security gateway 2, an energy block chain network analyzer 3, an MQTT industrial gateway a4, an MQTT industrial gateway B5, an MQTT industrial gateway C6, an MQTT industrial gateway D7, an MQTT industrial gateway E8, an MQTT industrial honeypot 9, a power plant electric meter 10, a user electric meter a111, a user electric meter B112, a user electric meter C113, and a user electric meter N14; the industrial switch 1 is used for an Ethernet switch in the field of industrial control and adopts a uniform TCP/IP protocol; the industrial security gateway 2 is used for solving the problem of security protection when the industrial control system is accessed to the information network, and providing security guarantee for the connection between the control network and the management information network; the energy source block chain network analyzer 3 is used for scanning and measuring the energy source block chain in a wide frequency band to determine the comprehensiveness of network parameters; MQTT industrial gateways A4-E8 are used for solving the safety protection problem when the industrial control system is accessed to the information network and providing safety guarantee for the connection of the control network and the management information network; the MQTT industrial honeypot 9 is used for deceiving a network asset search engine as a trap constructed from the perspective of an attacker, delaying and confusing the attack of a hacker; the power plant electricity meter 10 is used for measuring the power value output by the power plant; the user electric meters a111 to N14 are used to measure the actual electricity consumption of each user.
The industrial switch 1 is respectively connected with an industrial security gateway 2 and an energy block chain network analyzer 3, and the industrial security gateway 2 is connected with an MQTT industrial honeypot 4; the MQTT industrial gateway A4, the MQTT industrial gateway B4, the MQTT industrial gateway C4, the MQTT industrial gateway D4 and the MQTT industrial gateway E4 are all connected with the industrial switch 1; the power plant meter 5 is connected with an MQTT industrial gateway A4, and the user meter A16, the user meter B16, the user meter C16 and the user meter N6 are respectively connected with an MQTT industrial gateway B4, an MQTT industrial gateway C4 and an MQTT industrial gateway D4.
Referring to fig. 3, also included are an energy seller 15, an energy buyer 16, a token 17, a shared wallet 18, a credit bank 19, a storage pool 20, an account pool 21, and an energy coin 22; the energy seller 15 is connected with the energy buyer 16, the token 17 is connected with the sharing wallet 18, the credit bank 19 is respectively connected with the energy seller 15, the energy buyer 16, the token 17 and the sharing wallet 18, the storage pool 20 and the account pool 21 are both connected with the credit bank 19, and the storage pool 20 is connected with the account pool 21.
In order to better show the transaction process of the energy blockchain transaction system based on credit loan, the embodiment provides an energy blockchain transaction method based on credit loan, including the following steps:
step 1: the lender Bi sends a token 17 requesting the energy agent consisting of the credit bank 19, the pool 20 and the account pool 21, including the true identity IDi of the lender, the identity certificate Certi, the address of the wallet used:
Figure RE-GDA0002697277430000041
the loan amount amounti and the current credit value creatiti. Namely:
Figure RE-GDA0002697277430000042
step 2: the credit bank 19, upon receiving the request, verifies the identity of Bi and checks the flow of funds for the given wallet address against the account pool 21 and the credit bank's 19 records, thereby calculating the current wealth of the lender.
And step 3: the token may be obtained if the lender satisfies the following requirements: i.e. there is a certain amount of wealth in the source account, the account has fixed income and the credit value of Bi is not negative; the credit bank calculates the optimal credit amount and the corresponding interest rate and fine rate, and then the credit bank weighs the credit price.
And 4, step 4: credit bank 19 creates a shared wallet 18, shown as
Figure RE-GDA0002697277430000051
And use the public and private keys of the wallet, i.e.
Figure RE-GDA0002697277430000052
And
Figure RE-GDA0002697277430000053
sending the data to a lender Bi;
Figure RE-GDA0002697277430000054
is the address of the credit bank 19 and the sharing wallet 18 of the lender Bi; the credit bank 19 and the lender Bi can use the walletAnd recharging the wallet if necessary.
And 5: the lender Bi receives a reply containing a token 17, denoted Tokeni and the token signature SignSKcbTokeni; specifically, the following are shown:
Figure RE-GDA0002697277430000055
wherein Tokeni includes the current balance, the loan amount amounti and the authorization certificate
Figure RE-GDA0002697277430000056
The effective period t of the wallet, the repayment buffer period and the previous loan record pre _ recordi; the lender Bi should repay the owed loan in the repayment buffer period, otherwise, the lender Bi will bear the late fee; the previous payment record contains the debt payment condition RPi (s, f) and the hash value hash (txi) of the previous credit payment record. In RPi (s, f), s is the number of previous normal payments, and f is the number of untimely payments.
Use in a common wallet during energy transactions
Figure RE-GDA0002697277430000057
The internal energy bank note 22 completes payment; sharing wallet
Figure RE-GDA0002697277430000058
Each payment in (a) is verified and recorded by the local credit bank 19; the credit bank 19 stores the hash value of the payment related data in pre _ recordi. The method comprises the following specific steps:
step 1: the lender will contain the token 17, denoted token signature and authorization certificate
Figure RE-GDA0002697277430000061
The Payment information Payment in the Payment information Payment is sent to the energy seller 15, namely represented as Sj; sj verifies the validity of Tokeni and shares the wallet
Figure RE-GDA0002697277430000062
The validity period t and check all previous records of credit-based payments in the chain of energy blocks to calculate the balance of the current common wallet. Specifically, the following are shown:
Figure RE-GDA0002697277430000063
step 2: the energy seller 15 sends the received token 17, the energy bill, a wallet address WIDSj for receiving the energy currency, and a digital signature on the above information to the credit bank. Is represented as follows:
Figure RE-GDA0002697277430000064
and step 3: the credit bank 19 verifies the received Tokeni and compares it with the original Tokeni stored at the credit bank 19. The credit bank 19 checks if the balance of Tokeni is sufficient to pay the bill. If sufficient, the credit bank 19 will transfer to
Figure RE-GDA0002697277430000065
The energy bank note 22 in (1) completes the payment to the designated collection address. If the balance is insufficient, the credit bank 19 will send a notification to the lender of the insufficient balance.
And 4, step 4: credit Bank 19 updates Tokeni and
Figure RE-GDA0002697277430000066
and adding a digital signature thereof to the updated balance information
Figure RE-GDA0002697277430000067
In (1). The credit-based payment record is verified and recorded in the energy blockchain, and a new token 17 is sent to the lender for information updating.
Repayment of energy bank 22 loan: after the Tokeni expiration date, Bi will receive the latest
Figure RE-GDA0002697277430000068
This token 17 comprises all hash values of the credit-based payment record using Tokeni.
The following are three scenarios on payment:
scene one: if Bi repays the energy currency 22 loan in its repayment buffer, Bi only needs to pay the loan interest to the credit bank as a transaction fee.
Scene two: if Bi cannot timely repay the loan, F in RPI (S, F) will be added with 1 and the credit value of the lender will be reduced. The new credit value of the lender is expressed as
Figure RE-GDA0002697277430000069
Wherein
Figure RE-GDA00026972774300000610
Is the NththCredit value for secondary energy transactions. d is a constant and d>0. The credit bank 19 generates a record about this transaction event and stores the record in a storage pool while uploading it to the chain of energy sourcing blocks. When the lender finishes the return of the energy bank 22, Bi will be subject to the penalty of the corresponding loan amount.
Scene three: if Bi refuses to make a payment or a long outstanding payment, the credit bank 19 blacklists the lender and broadcasts the blacklist to all nodes in the energy blockchain. All industrial internet of things nodes and credit banks 19 would refuse to cooperate with this lender.
According to the energy block chain transaction system and method based on credit loan, the network asset search engines can be deceived by using the MQTT industrial honeypot 4, the network asset search engines are used as traps constructed from the perspective of attackers, attack of hackers is delayed and puzzled, and help is provided in the aspects of improving active defense capacity, obtaining basic threat information, assisting decision support and the like.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be able to cover the technical solutions and the inventive concepts of the present invention within the technical scope of the present invention.

Claims (5)

1. An energy block chain transaction system based on credit value lending is characterized by comprising an industrial switch (1), an industrial safety gateway (2), an energy block chain network analyzer (3), an MQTT industrial gateway A (4), an MQTT industrial gateway B (5), an MQTT industrial gateway C (6), an MQTT industrial gateway D (7), an MQTT industrial gateway E (8), an MQTT industrial honeypot (9), a power plant ammeter (10), a user ammeter A1(11), a user ammeter B1(12), a user ammeter C1(13) and a user ammeter N (14); wherein:
the industrial switch (1) is used for an Ethernet switch in the field of industrial control, and adopts a uniform TCP/IP protocol;
the industrial security gateway (2) is used for solving the problem of security protection when the industrial control system is accessed to the information network and providing security guarantee for the connection between the control network and the management information network;
the energy blockchain network analyzer (3) is used for scanning and measuring the energy blockchain in a wide frequency band so as to determine the comprehensiveness of network parameters;
the MQTT industrial gateways A (4) -E (8) are used for solving the safety protection problem when the industrial control system is accessed to the information network and providing safety guarantee for the connection of a control network and a management information network;
the MQTT industrial honeypot (9) is used for deceiving a network asset search engine and serving as a trap constructed from an attacker view angle to delay and confuse attack of a hacker;
the power plant electric meter (10) is used for measuring the electric power value output by the power plant;
the user electric meters A1(11) -N (14) are all used for measuring the actual electricity consumption of each user.
2. The credit-based debit energy blockchain transaction system according to claim 1, further comprising an energy seller (15), an energy buyer (16), a token (17), a shared wallet (18), a credit bank (19), a storage pool (20), an account pool (21), and an energy coin (22), wherein the energy seller (15) is connected to the energy buyer (16), the token (17) is connected to the shared wallet (18), the credit bank (19) is connected to the energy seller (15), the energy buyer (16), the token (17), and the shared wallet (18), the storage pool (20) and the account pool (21) are connected to the credit bank (19), and the storage pool (20) is connected to the account pool (21).
3. The credit-based energy blockchain transaction system according to claim 1, wherein the industrial switch (1) is connected to an industrial security gateway (2) and an energy blockchain network analyzer (3), respectively, and the industrial security gateway (2) is connected to the MQTT industrial honeypot (4).
4. The credit-based energy blockchain transaction system according to claim 1, wherein the MQTT industrial gateway a (4), MQTT industrial gateway B (5), MQTT industrial gateway C (6), MQTT industrial gateway D (74), and MQTT industrial gateway E (8) are connected to the industrial switch (1).
5. The credit-based energy blockchain trading system of claim 1, wherein the power plant meters (10) are connected to MQTT industrial gateway a (4), and the user meters a1(11), B1(12), C1(13) and N (14) are connected to MQTT industrial gateway B (5), C (6) and D (7), respectively.
CN202010752649.4A 2020-07-30 2020-07-30 Energy block chain transaction system and method based on credit value lending Pending CN111885076A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010752649.4A CN111885076A (en) 2020-07-30 2020-07-30 Energy block chain transaction system and method based on credit value lending

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010752649.4A CN111885076A (en) 2020-07-30 2020-07-30 Energy block chain transaction system and method based on credit value lending

Publications (1)

Publication Number Publication Date
CN111885076A true CN111885076A (en) 2020-11-03

Family

ID=73204565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010752649.4A Pending CN111885076A (en) 2020-07-30 2020-07-30 Energy block chain transaction system and method based on credit value lending

Country Status (1)

Country Link
CN (1) CN111885076A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116931844A (en) * 2023-09-18 2023-10-24 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107770199A (en) * 2017-12-08 2018-03-06 东北大学 It is a kind of towards industry internet with the industry control agreement honey jar of self-learning function and application
US20190081980A1 (en) * 2017-07-25 2019-03-14 Palo Alto Networks, Inc. Intelligent-interaction honeypot for iot devices
CN109903033A (en) * 2019-02-25 2019-06-18 重庆邮电大学 A kind of block chain distributed energy method for secure transactions
CN110266585A (en) * 2019-06-14 2019-09-20 长飞光纤光缆股份有限公司 A kind of full light intelligent industrial gateway based on edge calculations

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190081980A1 (en) * 2017-07-25 2019-03-14 Palo Alto Networks, Inc. Intelligent-interaction honeypot for iot devices
CN107770199A (en) * 2017-12-08 2018-03-06 东北大学 It is a kind of towards industry internet with the industry control agreement honey jar of self-learning function and application
CN109903033A (en) * 2019-02-25 2019-06-18 重庆邮电大学 A kind of block chain distributed energy method for secure transactions
CN110266585A (en) * 2019-06-14 2019-09-20 长飞光纤光缆股份有限公司 A kind of full light intelligent industrial gateway based on edge calculations

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HANLIN CHEN ET AL: "Research on Industrial Internet of Things Security Architecture and Protection", 《2019 INTERNATIONAL CONFERENCE ON VIRTUAL REALITY AND INTELLIGENT SYSTEMS (ICVRIS)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116931844A (en) * 2023-09-18 2023-10-24 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain
CN116931844B (en) * 2023-09-18 2024-02-23 北京云尚汇信息技术有限责任公司 Data storage method and device based on multi-block subchain in block chain

Similar Documents

Publication Publication Date Title
Peng et al. Privacy preservation in permissionless blockchain: A survey
Baza et al. B-ride: Ride sharing with privacy-preservation, trust and fair payment atop public blockchain
Miglani et al. Blockchain for Internet of Energy management: Review, solutions, and challenges
US20220058622A1 (en) Protocols in Blockchain Environments
Gao et al. A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks
Knirsch et al. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions
CN108604344B (en) Method and system for creating trusted digital asset transfers using digital signatures
Poon et al. The bitcoin lightning network
CN108510252B (en) Intelligent electric vehicle power grid safety payment method based on block chain
US20210350343A1 (en) Blockchain compliance verification network
CN107533700A (en) Verify electronic transaction
CN109472664A (en) Radio Spectrum Resource transaction system
Snow et al. Business processes secured by immutable audit trails on the blockchain
Jain et al. Blockchain for the common good: A digital currency for citizen philanthropy and social entrepreneurship
CN115442380A (en) Transaction blocking method and device for intelligent contract vulnerability attack
CN111885076A (en) Energy block chain transaction system and method based on credit value lending
Szefer et al. Bitdeposit: Deterring attacks and abuses of cloud computing services through economic measures
KR102195830B1 (en) System for security enforced crypto currency based on block chain
Zhang et al. Peak: Privacy-enhanced incentive mechanism for distributed k-anonymity in LBS
Guo et al. Vehicloak: A blockchain-enabled privacy-preserving payment scheme for location-based vehicular services
Rahimpour et al. Hashcashed reputation with application in designing watchtowers
CN113570373B (en) Responsibility pursuing transaction method and system based on block chain
KR102291341B1 (en) Method, system and program for create virtual account for each cryptocurrency for financial transactions
McCorry Applications of the Blockchain using Cryptography
Li et al. Cryptocurrency, Imperfect Information, and Fraud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103

RJ01 Rejection of invention patent application after publication