Zero-trust-based power Internet of Things security protection method
A power Internet of Things and security protection technology, applied in the field of electronic information, can solve problems such as immaturity, and achieve the effect of solving the problem of key management, reducing interaction steps, and reducing resource consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0033] The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
[0034] Such as figure 1 As shown, the present invention discloses a zero-trust-based power Internet of Things security protection method, including.
[0035] Specifically include the following steps:
[0036] S101: The access subject performs identity registration on the identity authentication platform. When the identity authentication platform is initialized, the secret key production center produces an elliptic curve, which is physically isolated from the key management center and the registration management center, and is stored independently in an environment with a high level of security.
[0037] In the example of the present invention, the access subject is assumed to be an employee of a power grid en...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com