CN115587129A - Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry - Google Patents

Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry Download PDF

Info

Publication number
CN115587129A
CN115587129A CN202211233913.9A CN202211233913A CN115587129A CN 115587129 A CN115587129 A CN 115587129A CN 202211233913 A CN202211233913 A CN 202211233913A CN 115587129 A CN115587129 A CN 115587129A
Authority
CN
China
Prior art keywords
data
storing
electricity
chain
electric power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211233913.9A
Other languages
Chinese (zh)
Inventor
丁忠安
陈杰
赖国书
夏桃芳
李建新
高琛
叶坤荣
申康玉
林峰
王雅平
陈前
詹世安
鄢盛腾
陈琳
涂灵
阮林彬
卢致远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Fujian Electric Power Co Ltd
Marketing Service Center of State Grid Fujian Electric Power Co Ltd
Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Fujian Electric Power Co Ltd
Marketing Service Center of State Grid Fujian Electric Power Co Ltd
Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Fujian Electric Power Co Ltd, Marketing Service Center of State Grid Fujian Electric Power Co Ltd, Great Power Science and Technology Co of State Grid Information and Telecommunication Co Ltd filed Critical State Grid Fujian Electric Power Co Ltd
Priority to CN202211233913.9A priority Critical patent/CN115587129A/en
Publication of CN115587129A publication Critical patent/CN115587129A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2308Concurrency control
    • G06F16/2315Optimistic concurrency control
    • G06F16/2322Optimistic concurrency control using timestamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Primary Health Care (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Fuzzy Systems (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computing Systems (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an anti-electricity-stealing electronic evidence storing and anti-counterfeiting method in the power industry, which comprises the following steps: s1, depending on various information systems, electric power operation data related to users are collected from a power distribution network database; s2, performing data cleaning on the electric power operation data obtained in the step S1 to construct a data set; s3, constructing a distributed archiving system by the data in the data set constructed in the step S2 through an IPFS technology, and storing the data in a blocking and distributed manner; s4, performing timed incremental data copying on the data which are stored in a blocking and distributed mode, processing the data by using an SHA 256 hash algorithm to generate unique hash values, and storing and permanently storing the hash values in a national network link; and S5, establishing butt joint between the national network chain and the third-party judicial chain, and synchronously storing the hash value to finish authentication of the third-party judicial chain. By the method, the effectiveness of the electricity stealing electronic evidence is improved, and the quality and the efficiency are improved for the work of fighting against electricity stealing, default electricity utilization and the like.

Description

Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry
Technical Field
The invention particularly relates to an anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in the power industry, and belongs to the technical field of electric energy metering and acquisition.
Background
In the trial of the electricity stealing judicial case, data (including but not limited to the amount of electricity) reflecting the electricity utilization habits of the user are usually proved as electronic evidence. However, electronic data is easily tampered with, deleted and often certified by the grid enterprise, resulting in its legal effectiveness often being questioned by courts and users. At present, the main methods for proving the legal effectiveness of electronic evidence for preventing electricity stealing are: the on-site gathering, recording and storing method comprises the following steps: part of electronic evidence is stored in the equipment operated on site, so that the data stored in the equipment operated on site (including a terminal, an electric energy meter and the like) can be extracted in a manual recording mode, and the whole recording process is shot and recorded, so that the method has the problems that the operation of personnel is not standard and the public confidence of the data is influenced; third party organization authentication method: the method comprises the steps of sealing and storing field operation equipment (including a terminal, an electric energy meter and the like), sending the equipment to a qualified third-party identification mechanism for data extraction and technical identification, and issuing an identification report (including uncapping records, starting time, errors, less electric quantity metering and the like).
Although the existing method can prove the effectiveness of the anti-electricity-stealing electronic evidence through the modes of field acquisition, third party mechanism identification and the like, the existing method has limitations in engineering application and specifically has the following problems:
(1) The on-site collection, recording and storage certificate method has the problems that the operation of personnel is not standard, and the data public trust is influenced;
(2) The third-party organization identification method depends on the identification of the third-party organization, has high requirements on the qualification of the identification organization, the legality of the identification material and the scientificity of the identification method, and meanwhile, reports of the third-party organization possibly have the problems that mutual proofs cannot be formed between the third-party organization and the existing evidence, a complete evidence chain cannot be formed, contradictions exist between the evidence and the like, and the trust level of a judicial authority is greatly reduced.
The blockchain technology is a technical scheme for decentralized and collective maintenance of a distributed account book, and is essentially a distributed database system with a plurality of nodes participating together, the blockchain is not a single technology, but a result of multi-technology integration, a reliable and difficult-to-tamper account book record is maintained by using the blockchain, trust risk can be reduced, and maintenance cost of many participants is effectively reduced. Chinese patent No. CN111445238A discloses "a judicial data evidence storing method based on a blockchain", which specifically discloses the characteristics of non-falsification, decentralization, data encryption and trust transfer based on a blockchain technology, and realizes an electronic evidence storing application service platform with high efficiency based on a blockchain consensus protocol and in combination with an intelligent contract technology; chinese patent No. CN111079171A, "a method for protecting privacy of medical data based on blockchain and storage medium", specifically discloses that by using the characteristic that an ipfs system can ensure data security, a file occupying a large memory becomes a searchable hash string, and when using blockchain technology, security of information transmission is further improved
Disclosure of Invention
The invention provides an anti-electricity-stealing electronic evidence storing and anti-counterfeiting method for the power industry, which aims at the characteristics of large data volume, multiple data types, abundant unstructured data and the like required by the anti-electricity-stealing of the power industry, and constructs an objective, fair, real, anti-counterfeiting and non-tampering data storage mechanism based on a block chain, hash encryption, hash verification, a trusted timestamp, IPFS storage and a third-party block chain platform, improves the validity of an electricity-stealing electronic evidence, forms an 'evidence chain' scheme for obtaining evidence of the electricity-stealing of a state network, and improves the quality and efficiency of work such as fighting against electricity stealing, illegal electricity utilization and the like.
The technical scheme of the invention is as follows:
one of the purposes of the invention is to provide an anti-electricity-stealing electronic evidence storing and anti-counterfeiting method in the power industry, which comprises the following steps:
s1, depending on various information systems, electric power operation data related to users are collected from a power distribution network database;
s2, performing data cleaning on the electric power operation data obtained in the step S1 to construct a data set;
s3, constructing a distributed archiving system by the data in the data set constructed in the step S2 through an IPFS technology, and storing the data in a blocking and distributed manner;
s4, performing timed incremental data copying on the data which are stored in a blocking and distributed mode, processing the data by using an SHA 256 hash algorithm to generate unique hash values, and storing and permanently storing the hash values in a national network link;
and S5, establishing butt joint between the national network chain and the third-party judicial chain, and synchronously storing the hash value to finish authentication of the third-party judicial chain.
Further, the power operation data in the step S1 includes curve data, event data and real-time data; the curve data comprises 1 point freezing data of voltage, current, power factor and electric energy indicating value every 15 minutes; the event data comprises an uncapping event and power-on stopping time; the real-time data comprises real-time data such as voltage, current, power factor, electric energy indicating value and the like.
Further, the timing increment in the step S4 is frequent in hours.
Further, a trusted timestamp is added in the step S4, and the accurate time when the data is processed is embedded into the file code by using a hash algorithm, so as to form a time record that cannot be changed.
Further, the third-party judicial chain in the step S5 is a data storage platform approved by the court, and includes a balance chain.
The invention also provides an anti-electricity-stealing electronic evidence storing and anti-counterfeiting system in the power industry, which comprises:
the data collection module is in communication connection with the power distribution network database and is used for collecting power operation data related to users from the power distribution network database;
the data cleaning module is used for cleaning the collected power operation data to construct a data set;
the data archiving module is used for archiving the data files in the data set in a distributed manner for storage;
the data processing module is in communication connection with the data cleaning module and is used for performing incremental data copying on the data in the data set by taking hours as frequency, applying SHA 256 hash algorithm processing to generate unique hash values and storing the hash values to a national network link;
and the block chain docking module is used for docking the national network chain and the third-party judicial chain and synchronously storing the data stored in the national network chain to the third-party judicial chain.
The invention also provides an electronic device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the anti-electricity-stealing electronic evidence storage and anti-counterfeiting method in the power industry.
It is a fourth object of the present invention to provide a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method as described above.
Compared with the prior art, the invention has the beneficial effects that:
1. the invention provides an anti-electricity-stealing electronic evidence storing and anti-counterfeiting method applied to the power industry, which is a series of methods provided by aiming at the characteristics of large data volume (daily data volume is more than hundred GB), multiple data types (curve data, event data, real-time data and the like) and abundant unstructured data (sound, video and the like) required by the anti-electricity-stealing in the power industry, and based on trusted technologies such as a block chain, hash check, trusted timestamp and the like, an objective, fair, real, anti-counterfeiting and non-tampering data storage mechanism is constructed, so that the 'instant acquisition and storage and evidence' of the anti-electricity-stealing electronic evidence can be realized, the limitation of the evidence of a third party mechanism is broken away, the data is guaranteed to be real and reliable, is not tampered, is not easy to lose and leak, and the legal effectiveness of the anti-electricity-stealing electronic evidence is improved;
2. the block chain used by the invention is a combination of a private chain and a public chain, wherein the private chain is a national network chain, the public chain is a data storage platform approved by a court, such as a balance chain, the online collected data is subjected to timed incremental copy, and the incremental data is subjected to hash processing to generate a unique hash value. Establishing butt joint of the hash value data and a third-party judicial chain after the uploading of the data to a national network chain, synchronously storing the hash value in the third-party judicial chain, finishing the authentication of the third-party judicial chain, ensuring that the hash value cannot be lost or tampered, and enhancing the credibility and reliability of the electronic evidence; through cross-chain butt joint of a judge system of a judicial institution and a national network evidence storage block chain, a high mutual trust mechanism is established among a national network, a court and an arbitration committee, information is automatically verified, and evidence verification cost and resource consumption are reduced; when the certificate is raised in a court, in order to prove the authenticity of the original data, the hash value of the original data can be compared with the hash value of the chain in advance, and if the hash value of the original data is consistent with the hash value of the chain, the authenticity of the submitted data is proved;
3. in the invention, in order to ensure the existence safety of original data, an IPFS system is introduced, the data is stored in multiple nodes, and the data cannot be tampered; the electric power data is encrypted through an asymmetric technology, so that privacy protection is good, safety is high, permanent storage of the electric power data is realized, data safety and privacy are guaranteed, and electronic evidence public trust is improved;
4. the method applies the credible timestamp, and utilizes a Hash algorithm to embed the accurate time when the electronic file is processed into the file code, so as to form an unchangeable time record, thereby proving the real state of the data telegraph text at a certain moment and solving the problems that the electronic data is easy to be falsified and forged and the time is uncertain;
drawings
FIG. 1 is a flow chart of a method according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
It should be understood that the step numbers used herein are only for convenience of description and are not used as limitations on the order in which the steps are performed.
It is to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises" and "comprising" indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The term "and/or" refers to and includes any and all possible combinations of one or more of the associated listed items.
Example 1
As shown in fig. 1, the present embodiment provides an electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method, which includes the following steps:
s1, depending on various information systems, electric power operation data related to users are collected from a power distribution network database; the power operation data comprises curve data, event data and real-time data; the curve data comprises 1 point freezing data of voltage, current, power factor and electric energy indicating value every 15 minutes; the event data comprises a cover opening event and power-on stopping time; the real-time data comprises real-time data such as voltage, current, power factor, electric energy indicating value and the like;
s2, performing data cleaning on the electric power operation data obtained in the step S1 to construct a data set, and performing data elimination after combination of metering abnormalities such as indication value reversing, flying and the like in the data cleaning;
s3, constructing a distributed archiving system by the original data file obtained in the step S1 through an IPFS technology, and storing the original data file in a blocking and distributed manner;
s4, performing timed incremental data copying on the data set obtained in the step S2 by taking hours as frequency, processing the data by using an SHA 256 hash algorithm, embedding the accurate time when the data is processed into a file code to form a time record which cannot be changed, generating a unique hash value at the same time, and storing and permanently storing the hash values in a national network chain;
s5, establishing butt joint between the national network link and the third-party judicial link, and synchronously storing the hash value to finish authentication of the third-party judicial link; the third party judicial chain is a data storage platform approved by the court, and in this embodiment, is a balance chain.
After the authentication of the third-party judicial chain is completed, when evidence is required to be obtained in a subsequent judicial process, obtaining a hash value from a national network chain and the third-party judicial chain, taking the hash value as a key to extract original data from an IPFS database, and displaying the generation and circulation links, storage time and uplink time of the data; when judicial evidence is required, if data meets dialectical questions, data tracing can be carried out, hash calculation is carried out on the required data again, the hash value is compared with the original hash value on the chain, and if the hash value is consistent with the original hash value, the authenticity of the data is proved, and the judicial reliability is improved.
As a preferred embodiment, the third-party judicial chain in step S5 is a skyhook chain.
Example 2
This embodiment provides an electric power industry anti-electricity-stealing electron evidence deposits certificate and anti-fake system, includes:
the data collection module is in communication connection with the power distribution network database and is used for collecting power operation data related to users from the power distribution network database;
the data cleaning module is used for cleaning the collected power operation data to construct a data set;
the data archiving module is used for archiving the data files in the data set in a distributed manner for storage;
the data processing module is in communication connection with the data cleaning module and is used for performing incremental data copying on the data in the data set by taking hours as frequency, applying SHA 256 hash algorithm processing to generate unique hash values and storing the unique hash values to a national network link;
and the block chain docking module is used for docking the national network chain and the third-party judicial chain and synchronously storing the data stored in the national network chain to the third-party judicial chain.
Example 3
The embodiment provides an electronic device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the program to realize the electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method according to embodiment 1 of the invention.
Example 4
The embodiment provides a computer-readable storage medium, on which a computer program is stored, and when the program is executed by a processor, the method for storing and preventing the electronic evidence for preventing electricity stealing in the power industry according to the embodiment of the invention is realized.
Those of ordinary skill in the art will appreciate that the various elements and algorithm steps described in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, any function, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. An electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method is characterized by comprising the following steps:
s1, depending on various information systems, electric power operation data related to users are collected from a power distribution network database;
s2, performing data cleaning on the electric power operation data obtained in the step S1 to construct a data set;
s3, constructing a distributed archiving system by the data in the data set constructed in the step S2 through an IPFS technology, and storing the data in a blocking and distributed manner;
s4, performing timed incremental data copying on the data which are stored in a blocking and distributed mode, processing the data by using an SHA 256 hash algorithm to generate unique hash values, and storing and permanently storing the hash values in a national network link;
and S5, establishing butt joint between the national network chain and the third-party judicial chain, and synchronously storing the hash value to finish authentication of the third-party judicial chain.
2. The electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method according to claim 1, wherein the electric power operation data in the step S1 comprises curve data, event data and real-time data; the curve data comprises 1 point freezing data of voltage, current, power factor and electric energy indicating value every 15 minutes; the event data comprises an uncapping event and power-on stopping time; the real-time data comprises real-time data such as voltage, current, power factor, electric energy indicating value and the like.
3. The electric power industry electricity stealing prevention electronic evidence storing and anti-counterfeiting method according to claim 1, wherein the timing increment in the step S4 is frequent in hours.
4. The electric power industry electricity stealing prevention electronic evidence storing and anti-counterfeiting method according to claim 1, wherein a credible time stamp is added in the step S4, and the accurate time during data processing is embedded into a file code by using a hash algorithm to form an unchangeable time record.
5. The electric power industry anti-electricity-stealing electronic evidence storing and anti-counterfeiting method as claimed in claim 1, wherein: and in the step S5, the third-party judicial chain is a data storage platform approved by the court, and comprises a balance chain.
6. The utility model provides an electric power industry anti-electricity-stealing electron evidence deposits card and anti-fake system which characterized in that includes:
the data collection module is in communication connection with the power distribution network database and is used for collecting power operation data related to users from the power distribution network database;
the data cleaning module is used for cleaning the collected power operation data to construct a data set;
the data archiving module is used for distributively archiving the data files in the data set for storage;
the data processing module is in communication connection with the data cleaning module and is used for performing incremental data copying on the data in the data set by taking hours as frequency, applying SHA 256 hash algorithm processing to generate unique hash values and storing the unique hash values to a national network link;
and the block chain docking module is used for docking the national network chain and the third-party judicial chain and synchronously storing the data stored in the national network chain to the third-party judicial chain.
7. An electronic device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for electronic evidence preservation and anti-counterfeiting for power industry anti-electricity-stealing according to any one of claims 1 to 5 when executing the program.
8. A computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the electric power industry electronic evidence storing and anti-counterfeiting method according to any one of claims 1 to 5.
CN202211233913.9A 2022-10-10 2022-10-10 Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry Pending CN115587129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211233913.9A CN115587129A (en) 2022-10-10 2022-10-10 Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211233913.9A CN115587129A (en) 2022-10-10 2022-10-10 Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry

Publications (1)

Publication Number Publication Date
CN115587129A true CN115587129A (en) 2023-01-10

Family

ID=84780476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211233913.9A Pending CN115587129A (en) 2022-10-10 2022-10-10 Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry

Country Status (1)

Country Link
CN (1) CN115587129A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116257538A (en) * 2023-03-14 2023-06-13 普华讯光(北京)科技有限公司 Block chain-based electricity stealing data trusted verification method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116257538A (en) * 2023-03-14 2023-06-13 普华讯光(北京)科技有限公司 Block chain-based electricity stealing data trusted verification method and system

Similar Documents

Publication Publication Date Title
CN110868300B (en) Block chain evidence-storing method and system
CN106407481A (en) Block chain architecture-based ecological environment monitoring system and implementation method thereof
CN101753304B (en) Method for binding biological specificity and key
CN113472547B (en) Safety monitoring system based on block chain
CN112054897B (en) Outsourcing Internet of things data for protecting privacy based on block chain and integrity verification method for backup of outsourcing Internet of things data
CN105631248A (en) Signing method, forging judgment method and tampering judgment method of electronic contract
CN112738035B (en) Block chain technology-based vertical federal model stealing defense method
CN105554018A (en) Network real name verification method
Yilmaz et al. Privacy protection of grid users data with blockchain and adversarial machine learning
CN110874493A (en) Block chain-based enterprise data tamper-proofing method
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
CN111585995B (en) Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN110807187B (en) Block chain-based network market illegal information evidence storing method and platform terminal
CN115021942B (en) Tamper-resistant network data secure transmission method
CN115587129A (en) Anti-electricity-stealing electronic evidence storing and anti-counterfeiting method and system in power industry
CN113935065A (en) Ring signature-based federation chain identity privacy protection and supervision method
CN116151826A (en) Efficient and reliable block chain-based power transaction terminal trust management method
CN108959883A (en) A kind of network identity real name identification method based on quick response matrix code
CN117395474B (en) Locally stored tamper-resistant video evidence obtaining and storing method and system
KR102013415B1 (en) System and method for verifying integrity of personal information
CN108023884A (en) A kind of encryption method of Networks and information security
CN116318901A (en) Privacy and verifiable internet of things data aggregation method integrating blockchain
CN113536372B (en) Data processing method and device and electronic equipment
CN114169888B (en) Universal type cryptocurrency custody method supporting multiple signatures
CN115913526A (en) Anonymous reporting method based on block chain data hidden transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination