Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

V2G network cross-domain authentication method based on alliance block chain and information data processing terminal

An authentication method and blockchain technology, applied in the cross-domain authentication method of V2G network based on consortium blockchain, and the field of information data processing terminal, which can solve the problems of inability to meet V2G fast authentication, signaling data storm, and increased authentication delay.

Active Publication Date: 2019-05-10
ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY
View PDF5 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

All of the above solutions adopt the centralized mode of the control center. With the increase of the number of devices, the aggregation effect when a large number of devices are connected will cause congestion of the authentication server, forming a signaling data storm, resulting in a sharp increase in authentication delay.
[0003] To sum up, the problems existing in the existing technology are: the existing V2G has privacy protection and adopts the centralized mode of the control center. With the increase of the number of devices, the aggregation effect when a large number of devices are connected will cause the authentication server to congest, forming Signaling data storms lead to a sharp increase in authentication delays, which cannot meet the needs of V2G fast authentication
With the increase of certified vehicles, it will not be possible to achieve effective rapid certification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • V2G network cross-domain authentication method based on alliance block chain and information data processing terminal
  • V2G network cross-domain authentication method based on alliance block chain and information data processing terminal
  • V2G network cross-domain authentication method based on alliance block chain and information data processing terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0057] Aiming at the security threat of electric vehicles joining the grid (Vehicle-to-Grid, V2G) network, the present invention proposes a V2G network cross-domain authentication scheme based on alliance blockchain; designs a V2G network trust model and system architecture, and describes the specific scheme in detail. The signature and authentication of the present invention all adopt the latest national secret standard SM9 cryptographic algorithm; utilize the characteristics of block chain technology that is not easy to tamper, use the hash algorithm to verify the certificate, reduce the number of public key algorithm sign...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of confidential or secure communication, and discloses a V2G network cross-domain authentication method based on an alliance block chain and an informationdata processing terminal. For the security threat that the electric vehicle joins a power grid V2G network, a V2G network cross-domain authentication scheme based on an alliance block chain is provided; A V2G network trust model and a system architecture are designed, and a specific scheme is described in detail. Signature and authentication of the method both adopt the latest national password standard SM9 cryptographic algorithm; The characteristic that the block chain technology is not easy to tamper is utilized, the Hash algorithm is used for verifying the certificate, and the signature and verification times of the public key algorithm are reduced, so that the efficiency is high, and the expandability is high. The introduction of the block chain technology provides a new idea and method for solving the security problem of the smart power grid. The invention provides a high-performance cross-domain authentication scheme in a V2G network by utilizing a block chain technology and anSM9 digital signature algorithm.

Description

technical field [0001] The invention belongs to the technical field of confidential or secure communication, and in particular relates to a cross-domain authentication method and an information data processing terminal based on an alliance block chain V2G network. Background technique [0002] At present, the commonly used existing technologies in the industry are as follows: As an important part of the smart grid, electric vehicle access to the grid (Vehicle-to-Grid, V2G) has become a hot research issue. The technology of connecting electric vehicles to the grid (V2G) not only solves the problem of charging pressure caused by the large-scale development of electric vehicles, but also connects electric vehicles to the grid as mobile and distributed energy storage units for peak shaving and valley filling, emergency Security, spinning reserve, etc., while improving the flexibility, reliability and energy efficiency of power grid power supply, delay the investment in grid cons...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 刘冬兰刘新李冬马雷王文婷于灏常英贤陈剑飞赵晓红赵洋张昊
Owner ELECTRIC POWER RESEARCH INSTITUTE OF STATE GRID SHANDONG ELECTRIC POWER COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products