CN115396173B - Key monitoring system for electric power fund safety control - Google Patents

Key monitoring system for electric power fund safety control Download PDF

Info

Publication number
CN115396173B
CN115396173B CN202211010673.6A CN202211010673A CN115396173B CN 115396173 B CN115396173 B CN 115396173B CN 202211010673 A CN202211010673 A CN 202211010673A CN 115396173 B CN115396173 B CN 115396173B
Authority
CN
China
Prior art keywords
key
data
financial
electric power
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211010673.6A
Other languages
Chinese (zh)
Other versions
CN115396173A (en
Inventor
胡婷婷
王灿
张莉
朱宁宁
吴宇
姜克兢
杨益伟
袁毅
陈萌
郎慧
叶芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Integrated Service Center of State Grid Anhui Electric Power Co Ltd
Original Assignee
Integrated Service Center of State Grid Anhui Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Integrated Service Center of State Grid Anhui Electric Power Co Ltd filed Critical Integrated Service Center of State Grid Anhui Electric Power Co Ltd
Priority to CN202211010673.6A priority Critical patent/CN115396173B/en
Publication of CN115396173A publication Critical patent/CN115396173A/en
Application granted granted Critical
Publication of CN115396173B publication Critical patent/CN115396173B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Abstract

The invention discloses a key monitoring system for electric power fund safety control, which relates to the technical field of electric power control, and comprises: the device monitoring module monitors most of main devices in the electric power financial operation environment, the financial key monitoring module marks three different electric power fund management and control keys, the three different electric power fund management and control keys are respectively defined as a primary key, a secondary key and a tertiary key, position data, time data, temperature data and humidity data of each key are recorded, and the tertiary financial key verification module is used for verifying the three different electric power fund management and control keys. According to the invention, three-level financial key verification modules are arranged and are respectively scattered in local area networks, field networks and electric network financial centers, financial information of a last-level key verifier can be received only in a designated network, and a scattered keeping mode is adopted to facilitate the realization of 'three keys are kept separately' in electric network management requirements, so that the situation that supervision of the same building is not in place is avoided.

Description

Key monitoring system for electric power fund safety control
Technical Field
The invention relates to the technical field of electric network financial management and control, in particular to a key monitoring system for electric power fund safety management and control.
Background
Although the external network bank Ukey of the national network Anhui electric power group has realized manual registration management and control in the financial management and control-key ledger function, the monitoring of the key lacks corresponding online monitoring means, because the electric network is distributed in all places of the country, the condition of incapability of supervising the key is low-efficient through a manual registration mode, especially, whether three keys are separately stored or not is difficult to realize, whether the key of each electric network is in a normal waiting work state or not is difficult to know on time, whether discarding and the like are caused, so that the fund payment safety management and control of the external bank account of the group is enhanced, the payment risk of the external bank account of the group is prevented, the convenience and the flexibility of the external bank network bank Ukey storage authority are improved, and the existing manual registration management and control mode obviously cannot meet the updating requirement of the electric network financial industry.
Disclosure of Invention
The invention aims to solve the problems, and provides a key monitoring system for electric power fund safety control.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a key monitoring system for electrical funds security management, the system comprising:
the device monitoring module monitors most of main devices in the electric power financial operation environment, wherein the main devices comprise a server, network devices and keys, the server monitors performance indexes of a system operated by the server, and if the data indexes exceed a set threshold or data cannot be received, an alarm is given later to inform operation and maintenance personnel to process the performance indexes; the network equipment monitors whether the network load is excessive or the network cannot be communicated; monitoring the secret key mainly pays attention to whether the secret key works normally or not;
the financial key monitoring module marks three different electric power fund management and control keys, records position data, time data, temperature data and humidity data of each key, records the starting position K1 and the current time K2 of each electric power fund management and control key through Beidou navigation when the electric power fund management and control keys are used, and collects and calculates the temperature value K3 and the environment data of each key through a temperature and humidity sensor during the starting period of the electric power fund management and control keys, wherein the environment data comprises noise intensity K4 and humidity value K4, and index spaces K, K= { K1, K2, K3 and K4};
the three-level financial key verification module sets a certain fixed time period, takes the first-level key acquisition index space K as a message, and then a first-level key verifier selects a random numberThen the collected monitoring data is encrypted to generate electric power financial data ciphertext A ij
While signing the encrypted power financial data using the tamper resistant device TPD:
wherein T is ij Representing the electric power financial ciphertext A ij The previous time;
and then one is connected withThe level key verifier verifies data A ij ||B i ||P ij ||K ij ||T bi ||σ Bi Transmitting to LAN, making the current time of received message be T ij ' the maximum transmission delay value allowed under the electric network financial system is delta T, when the information sent by the secret key is received, the local area network firstly judges the inequality T ij ′-T ij Whether deltat holds true or not to verify the validity of the message:
if the inequality is not true, the local server may choose to reject or discard the message, assuming the message has failed; if so, continuing to verify the validity of the message signature, and before verifying the validity of the message, executing the following steps:
Wherein H is 1 ,H 2 P is a secure hash function ij For three keys, B j Is the local area network of the ith electric power financial building, K ij For a random number, then verify if the following equation holds:
e(σ ij ,p)=e(K ij ,h i,2 )e(h i,1 P pub ,h i,2 ) Wherein σ is ij Signing the encrypted financial data for the tamper resistant device TPD using its own key;
if the equation is satisfied, the data sent by the key is legal, otherwise the local server chooses to reject or discard the electric financial data message, and the encrypted data PA is aggregated through primary data encryption after the validity of the message is verified 1 Uploading to a neighborhood network and sending to a secondary key verifier;
when the secondary key verifier receives the data PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi At this time, the message is verified, then calculated and verifiedWhether or not the following equation holds:
e(P,σ Bi )=e(Y bi ,H2(PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi )),
if the equation is true, the data sent by the secondary key verifier is considered to be legal; otherwise rejecting or discarding the message;
after verifying the validity of the message, the encrypted data PA is aggregated through secondary data encryption 2 Uploading to a grid financial center and sending to a third-level key verifier.
Optionally, the protection measure of the primary data encryption aggregation is as follows:
s1, calculating financial data C of a user i1 ,C i2 ,C i3 ,...,C Above encrypted aggregated data PA 1
S2, using private key X Bi Signature:
σBi=x bi H 2 (PA i ||NAN||B i ||P ij ||T bi ) Wherein T is bi Representing encryption of aggregated data PA for primary data 1 The current time of signature, NAN is the neighborhood network of the adjacent electric financial building;
finally, the encrypted data PA i ||NAN||B i ||P ij ||T bi ||σ Bi Uploading to a neighborhood network and transmitting to a secondary key verifier.
Optionally, the second-stage data encryption aggregation PA 2 The protection measures of (2) are as follows:
s1, calculating
S2, using private key X N Signature:
σN=x N H 2 (SA i ||NAN||P ij ||T N ) Wherein T is N Representing the encryption aggregation of a PA for a secondary data 2 The current time of the signature.
Optionally, the batch authentication operation performed by the local server is as follows:
wherein P is pub If the equation is satisfied, the batch message is valid and sent to the next-stage key verifier, otherwise the local server chooses to reject or discard the electric financial data message.
Compared with the prior art, the invention has the following advantages:
according to the invention, by arranging the equipment monitoring module, the equipment monitoring module monitors most of main equipment in the electric power financial operation environment, the main equipment comprises a server, network equipment and a secret key, and the normal operation of the equipment is monitored, so that a foundation is laid for further monitoring of the secret key.
According to the invention, three different electric power fund management and control keys are marked by arranging a financial key monitoring module, the starting position K1 of each electric power fund management and control key recorded through Beidou navigation and the current time K2 are recorded, the temperature value K3 and environmental data of each key are acquired and calculated through a temperature and humidity sensor during the starting period of each electric power fund management and control key, the environmental data comprises noise intensity K4, an index space K is obtained, and encryption data are transmitted in real time through the K values for the verification work of three key verifiers.
According to the invention, three-level financial key verification modules are arranged and are respectively scattered in local area networks, field networks and electric network financial centers, financial information of a last-level key verifier can be received only in a designated network, and a scattered keeping mode is adopted to facilitate the realization of 'three keys are kept separately' in electric network management requirements, so that the situation that supervision of the same building is not in place is avoided. The invention judges the validity of the encrypted data sent by the key verifier at the upper level through the algorithm, if the algorithm can be continuously sent to the key verifier at the lower level, the verification is carried out in such a way, and whether the three keys are in a normal waiting state or not can be known by the verification work of the three verifiers each day.
Drawings
FIG. 1 is a schematic diagram of three keys and three persons separately stored in the invention;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments.
A key monitoring system for electrical funds security management, the system comprising:
the device monitoring module monitors most of main devices in the electric power financial operation environment, wherein the main devices comprise a server, network devices and keys, the server monitors performance indexes of a system operated by the server, and if the data indexes exceed a set threshold or data cannot be received, an alarm is given later to inform operation and maintenance personnel to process the performance indexes; the network equipment monitors whether the network load is excessive or the network cannot be communicated; monitoring the secret key mainly pays attention to whether the secret key works normally or not;
the financial key monitoring module marks three different electric power fund management and control keys, records position data, time data, temperature data and humidity data of each key, records the starting position K1 and the current time K2 of each electric power fund management and control key through Beidou navigation when the electric power fund management and control keys are used, and collects and calculates the temperature value K3 and the humidity value K4 of each key through a temperature and humidity sensor during the starting of the electric power fund management and control keys to obtain index spaces K, K= { K1, K2, K3 and K4};
and the third-level financial key verification module is characterized in that first-level key verifiers are located in a local area network of a certain building, second-level key verifiers are located in a neighborhood network of the first-level key verifiers, and third-level key verifiers are located in a financial center of a power grid. Setting a certain fixed time period, such as 9 hours of working in the morning or 5-6 hours of working in the morning, and adopting primary keyThe index space K is collected as a message, and then a primary key verifier selects a random numberThen the collected monitoring data is encrypted to generate electric power financial data ciphertext A ij
While signing the encrypted power financial data using the tamper resistant device TPD:
wherein T is ij Representing the electric power financial ciphertext A ij The previous time;
next, the primary key verifier verifies data A ij ||B i ||P ij ||K ij ||T bi ||σ Bi Transmitting to local area network, making the current time of receiving message be T' ij When receiving the information sent by the key, the local area network firstly judges the inequality |T '' ij -T ij Whether deltat is true or not verifies the validity of the message.
If the inequality is not true, the local server may choose to reject or discard the message, assuming the message has failed; if so, continuing to verify the validity of the message signature, and before verifying the validity of the message, executing the following steps:
Wherein H is 1 ,H 2 P is a secure hash function ij For three keys, B j Local area for the ith power financial buildingNet, K ij The building regional network is a node in the block chain-based electric network finance, is responsible for primary data encryption aggregation after collecting encrypted data transmitted by a plurality of primary key verifiers governed by the building regional network, and signs and uploads the encrypted data to the neighborhood network.
The neighborhood network is also one of nodes in the electric network finance, and the neighborhood network is used for aggregating the financial data uploaded by a plurality of primary key verifiers into a data whole, is responsible for secondary data encryption aggregation and then uploads the data to the electric network finance center.
Then, it is verified whether the following equation is satisfied:
e(σ ij ,p)=e(K ij ,h i,2 )e(h i,1 P pub ,h i,2 ) Wherein σ is ij The encrypted financial data is signed for the tamper resistant device TPD using its own key.
If the equation is satisfied, the data sent by the key is legal, otherwise the local server chooses to reject or discard the electric financial data message, and the encrypted data PA is aggregated through primary data encryption after the validity of the message is verified 1 Uploading to a neighborhood network and transmitting to a secondary key verifier.
Specifically, the protection measure of the primary data encryption aggregation is as follows:
s1, calculating financial data C of a user i1 ,C i2 ,C i3 ,...,C Above encrypted aggregated data PA 1
S2, using private key X Bi Signature:
σBi=x bi H 2 (PA 1 ||NAN||B i ||P ij ||T bi ) Wherein T is bi Representing encryption of aggregated data PA for primary data 1 The NAN is the neighborhood network of the neighboring electric financial building at the current time of the signature.
Finally will addPost-secret data PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi Uploading to a neighborhood network and transmitting to a secondary key verifier.
When the secondary key verifier receives the data PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi At this time, the message is verified, and then the following equation is calculated and verified as being satisfied:
e(P,σ Bi )=e(Y bi ,H2(PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi )),
if the equation is true, the data sent by the secondary key verifier is considered to be legal; otherwise reject or discard the message.
After verifying the validity of the message, the encrypted data PA is aggregated through secondary data encryption 2 Uploading to a grid financial center and sending to a third-level key verifier.
Specifically, two-level data encryption aggregation PA 2 The protection measures of (2) are as follows:
s1, calculating
S2, using private key X N Signature:
σN=x N H 2 (SA i ||NAN||P ij ||T N ) Wherein T is N Representing the encryption aggregation of a PA for a secondary data 2 The current time of the signature.
Three-level key verifier receives data PA 2 ||NAN||P i ||T N ||σ N When the following equation is satisfied, the validity of the message signature is then verified by judging whether the following equation is satisfied:
e(P,σ N )=e(Y N ,H2(PA 2 ||NAN||P ij ||T N ) If the above equation holds, the three-level key verifier uploads the data to the grid financial center and broadcasts it in the local area network and neighborhood network of all power financial buildings.
In this embodiment, the electric network finance center also belongs to one of the nodes of the electric network finance, and is mainly responsible for setting public parameters and management, registration and cancellation of key verifiers of three levels in a building local area network and a neighborhood network.
The foregoing description is only a preferred embodiment of the present invention, and it is not intended to limit the scope of the present invention to all embodiments, but it is intended to cover all embodiments, modifications, equivalents, and variations within the scope of the present invention.

Claims (4)

1. A key monitoring system for electrical funds security management, the system comprising:
the device monitoring module monitors most of main devices in the electric power financial operation environment, wherein the main devices comprise a server, network devices and keys, the server monitors performance indexes of a system operated by the server, and if the data indexes exceed a set threshold or data cannot be received, an alarm is given later to inform operation and maintenance personnel to process the performance indexes; the network equipment monitors whether the network load is excessive or the network cannot be communicated; monitoring the secret key mainly pays attention to whether the secret key works normally or not;
the financial key monitoring module marks three different electric power fund management keys, which are respectively defined as a primary key, a secondary key and a tertiary key, records position data, time data, temperature data and humidity data of each key, records the starting position K1 and the current time K2 of each electric power fund management key through Beidou navigation when the electric power fund management keys are used, and acquires and calculates the temperature value K3 and the humidity value K4 of each key through a temperature and humidity sensor during the starting of the electric power fund management keys to obtain index spaces K, K= { K1, K2, K3 and K4};
the three-level financial key verification module sets a certain fixed time period, takes the first-level key acquisition index space K as a message, and then a first-level key verifier selects one follow-up keyNumber of machinesThen the collected monitoring data is encrypted to generate electric power financial data ciphertext A ij
While signing the encrypted power financial data using the tamper resistant device TPD:
wherein T is ij Representing the electric power financial ciphertext A ij The previous time;
next, the primary key verifier verifies data A ij ||B i ||P ij ||K ij ||T bi ||σ Bi Transmitting to local area network, making the current time of receiving message be T' ij When receiving the information sent by the key, the local area network firstly judges the inequality |T '' ij -T ij Whether deltat holds true or not to verify the validity of the message:
if the inequality is not true, the local server may choose to reject or discard the message, assuming the message has failed; if so, continuing to verify the validity of the message signature, and before verifying the validity of the message, executing the following steps:
wherein H is 1 ,H 2 P is a secure hash function ij For three keys, B j Is the local area network of the ith electric power financial building, K ij For a random number, then verify if the following equation holds:
e(σ ij ,p)=e(K ij ,h i,2 )e(h i,1 P pub ,h i,2 ) Wherein σ is ij Signing the encrypted financial data for the tamper resistant device TPD using its own key;
if the equation is satisfied, the data sent by the key is legal, otherwise the local server chooses to reject or discard the electric financial data message, and the encrypted data PA is aggregated through primary data encryption after the validity of the message is verified 1 Uploading to a neighborhood network and sending to a secondary key verifier;
when the secondary key verifier receives the data PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi At this time, the message is verified, and then the following equation is calculated and verified as being satisfied:
e(P,σ Bi )=e(Y bi ,H2(PA i ||NAN||B i ||P ij ||T bi ||σ Bi )),
if the equation is true, the data sent by the secondary key verifier is considered to be legal; otherwise rejecting or discarding the message;
after verifying the validity of the message, the encrypted data PA is aggregated through secondary data encryption 2 Uploading to a grid financial center and sending to a third-level key verifier.
2. A key monitoring system for secure management of electric funds according to claim 1, characterized in that the protection measure of the primary data encryption aggregation is as follows:
s1, calculating financial data C of a user i1 ,C i2 ,C i3 ,...,C Above encrypted aggregated data PA 1
S2, using private key X Bi Signature:
σBi=x bi H 2 (PA 1 ||NAN||B i ||P ij ||T bi ) Wherein T is bi Representing encryption of aggregated data PA for primary data 1 The current time of signature, NAN is the neighborhood network of the adjacent electric financial building;
finally, the encrypted data PA 1 ||NAN||B i ||P ij ||T bi ||σ Bi Uploading to a neighborhood network and transmitting to a secondary key verifier.
3. A key monitoring system for electric funds security management as defined in claim 1, wherein the secondary data encryption aggregate PA 2 The protection measures of (2) are as follows:
s1, calculating
S2, using private key X N Signature:
σN=x N H 2 (SA i ||NAN||P ij ||T N ) Wherein T is N Representing the encryption aggregation of a PA for a secondary data 2 The current time of the signature.
4. A key monitoring system for secure management of electric funds according to claim 1, wherein the local server performs a batch authentication operation as follows:
wherein P is pub If the equation is satisfied, the batch message is valid and sent to the next-stage key verifier, otherwise the local server chooses to reject or discard the electric financial data message.
CN202211010673.6A 2022-08-23 2022-08-23 Key monitoring system for electric power fund safety control Active CN115396173B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211010673.6A CN115396173B (en) 2022-08-23 2022-08-23 Key monitoring system for electric power fund safety control

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211010673.6A CN115396173B (en) 2022-08-23 2022-08-23 Key monitoring system for electric power fund safety control

Publications (2)

Publication Number Publication Date
CN115396173A CN115396173A (en) 2022-11-25
CN115396173B true CN115396173B (en) 2024-03-12

Family

ID=84121253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211010673.6A Active CN115396173B (en) 2022-08-23 2022-08-23 Key monitoring system for electric power fund safety control

Country Status (1)

Country Link
CN (1) CN115396173B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303717A (en) * 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
DE102016221959A1 (en) * 2016-11-09 2018-05-09 Bundesdruckerei Gmbh System with certificate-based access control
CN111372243A (en) * 2020-03-18 2020-07-03 南京邮电大学 Safe distributed aggregation and access system and method based on fog alliance chain
US10952069B1 (en) * 2017-11-07 2021-03-16 Imam Abdulrahman Bin Faisal University IoT cryptosystem device, system, method and computer program product
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures
CN114169888A (en) * 2021-12-07 2022-03-11 北京众信星空网络技术有限公司 Universal type multi-signature supporting encryption currency custody method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101303717A (en) * 1995-02-13 2008-11-12 英特特拉斯特技术公司 Systems and methods for secure transaction management and electronic rights protection
DE102016221959A1 (en) * 2016-11-09 2018-05-09 Bundesdruckerei Gmbh System with certificate-based access control
US10952069B1 (en) * 2017-11-07 2021-03-16 Imam Abdulrahman Bin Faisal University IoT cryptosystem device, system, method and computer program product
CN111372243A (en) * 2020-03-18 2020-07-03 南京邮电大学 Safe distributed aggregation and access system and method based on fog alliance chain
CN113556237A (en) * 2021-09-17 2021-10-26 杭州链网科技有限公司 Threshold signature method, system, device and storage medium based on aggregation of multiple signatures
CN114169888A (en) * 2021-12-07 2022-03-11 北京众信星空网络技术有限公司 Universal type multi-signature supporting encryption currency custody method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Amit R. KulkarniMakarand S. Ballal."Synergism of synchrophasor measurements and data analytics for enhancing situational awareness of power grid".《Computers & Electrical Engineering》.2021,全文. *
李丽."搭建资金监控平台 全面提升资金集约化管控水平".《中国管理信息化》.2016,全文. *
苏育聪."'3N+1'新型企业网上银行模式应用与研究".《现代经济信息》.2019,全文. *

Also Published As

Publication number Publication date
CN115396173A (en) 2022-11-25

Similar Documents

Publication Publication Date Title
CN109922162B (en) Flat building equipment Internet of things monitoring system and method based on block chain
CN108632381B (en) Block chain-based environment supervision method and system
CN104219056B (en) Privacy protection type real-time electric charge collecting method for intelligent power grid
CN108446992A (en) A kind of net connection accurate Accident Handling Method of automobile based on block chain
CN109451467A (en) A kind of vehicular ad hoc network data safety based on block chain technology is shared and storage system
CN110120868B (en) Smart power grid safety data aggregation method and system based on block chain technology
CN104639311B (en) The polymerization and system of electricity consumption privacy and integrity protection in a kind of intelligent grid
Wang et al. Blockchain-based secure and cooperative private charging pile sharing services for vehicular networks
Bhattacharjee et al. Statistical security incident forensics against data falsification in smart grid advanced metering infrastructure
CN111157682A (en) Air quality monitoring and predicting system and method
CN108632362A (en) A kind of method that privately owned block chain builds the election of block node
CN113660092A (en) Zero-knowledge-proof-based electric power data uploading system and method
Zhang et al. Blockchain-based secure equipment diagnosis mechanism of smart grid
CN110474892A (en) A kind of false data injection attacks defence method based on block chain technology
CN112214544A (en) Ubiquitous power Internet of things edge data safe storage method based on permission block chain
CN112069520A (en) Electric power tower monitoring data encryption method and device based on alliance block chain and Beidou
CN114978530B (en) Distance calculation and privacy protection method for distributed space crowdsourcing in space information network
CN115396173B (en) Key monitoring system for electric power fund safety control
CN113645190A (en) Byzantine fault-tolerant consensus method considering node reputation and block chain
WO2023108396A1 (en) Intelligent measurement method for power grid
CN112804207B (en) Alliance chain node security admission method applied to electronic government affair scene
CN115225402A (en) New energy information security risk management system and method based on ISMS model
CN110912915B (en) Communication safety early warning system based on data acquisition
Wang et al. Asia: accelerated secure in-network aggregation in vehicular sensing networks
Ma et al. A multi-stage information protection scheme for CDA-based energy trading market in smart grids

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant