Home > News list > Data >> Blockchain

Shanghai Heshu Software Applies for Patent on "Blockchain-Based Power Data Storage Method" to Enhance Data Security and Storage Efficiency

Blockchain 2024-12-02 09:51:34 Source:

Shanghai Heshu Software Applies for Patent on "Blockchain-Based Power Data Storage Method" to Enhance Data Security and Storage EfficiencyOn December 2nd, 2024, the State Intellectual Property Office of China revealed that Shanghai Heshu Software Co., Ltd

Shanghai Heshu Software Applies for Patent on "Blockchain-Based Power Data Storage Method" to Enhance Data Security and Storage Efficiency

On December 2nd, 2024, the State Intellectual Property Office of China revealed that Shanghai Heshu Software Co., Ltd. submitted a patent application for a "Blockchain-Based Power Data Storage Method," with publication number CN119047003A and an application date of August 2024. This patent application aims to address security and efficiency issues in power data storage, proposing a novel data storage method based on blockchain technology, promising to significantly improve the data management level within the power industry.

The patent abstract details the technical specifics of this method. The method falls under the field of data storage and its core lies in leveraging blockchain technology and multiple encryption algorithms to ensure the security and integrity of power data. The entire process can be broken down into several key steps:

Step 1: Data Acquisition and Public Key Authentication

The method first acquires uploaded data from the blockchain network and the public key from the data acquisition terminal. The public key serves as a crucial element for identity verification, ensuring the reliability and authenticity of the data source. This step lays the foundation for subsequent data decryption and secure storage. Public key verification allows the system to effectively identify the data source, preventing forgery and tampering, and guaranteeing data credibility. The security of this step directly impacts the reliability of the entire data storage process.

Step 2: Data Decryption and Power Data Extraction

After obtaining the uploaded data and the public key from the data acquisition terminal, the system uses an automated contract program to decrypt the uploaded data based on the public key. The decrypted data represents the actual power data; this step is crucial for converting encrypted data into usable data. The use of an automated contract program increases efficiency, reduces the likelihood of manual intervention, and minimizes the risk of human error. The reliability and security of the program are vital for the stable operation of the entire system.

Step 3: Metadata Storage and Hash Value Calculation

To ensure data integrity and traceability, the method stores the basic information and acquisition behavior information of the acquisition device in a pre-set mechanical hard drive. Simultaneously, the system uses a fifth-generation message digest algorithm (such as SHA-256 or SHA-3) to calculate the overall hash value of this information. A hash value is the output of a one-way encryption function; it maps data of any length to a fixed-length hash value. Even a minor data change will result in a significant change in its hash value, effectively detecting data tampering.

Step 4: Symmetric Encryption and Data Storage

The method cleverly uses the calculated overall hash value as a symmetric key. Using the Advanced Encryption Standard (AES) algorithm, the system performs symmetric encryption on the electrical parameters to obtain encrypted electrical data. Symmetric encryption algorithms use the same key for encryption and decryption, offering advantages in encryption speed and efficiency. The choice of the AES algorithm reflects the method's emphasis on data security. The security of the AES algorithm is widely recognized in the industry and effectively prevents unauthorized access and data breaches.

Step 5: Encrypted Data Storage and Hash Value Verification

Finally, the AES-encrypted electrical data is stored in a pre-set encrypted solid-state drive (SSD). The fast read and write speeds of the SSD effectively improve data storage and access efficiency. Simultaneously, the method extracts the hash value from the decompressed data and uses this hash value to encrypt and store the power data, forming a complete security loop. Hash value verification ensures data integrity and consistency, preventing data tampering or corruption during storage.

Technological Advantages and Innovations

The "Blockchain-Based Power Data Storage Method" presented in this patent application boasts several technological advantages and innovations. First, it utilizes blockchain technology to ensure the trustworthiness and immutability of the data source, enhancing data reliability. Second, the method employs a multi-layered encryption mechanism, including public key encryption and symmetric encryption, effectively securing data storage and preventing data leaks and illegal access. Finally, the method has relatively low system computing power requirements, improving system efficiency and reducing operating costs.

Compared to traditional power data storage methods, this method significantly improves data security, integrity, and efficiency. Traditional storage methods often lack effective security mechanisms and are vulnerable to data breaches and tampering. This method, utilizing blockchain and multi-layered encryption technology, effectively addresses these issues, providing reliable security for power industry data.

Summary

The patent application for the "Blockchain-Based Power Data Storage Method" by Shanghai Heshu Software Co., Ltd. provides a new approach and solution for power industry data storage. The innovation lies in combining blockchain technology with multiple encryption algorithms to effectively address security and efficiency issues in power data storage. The application of this technology is expected to drive the digital transformation of the power industry, improve data management levels, and provide strong support for building a more secure and reliable power system. The successful implementation of this method will have a profound impact on data security and management in the entire power industry. In the future, with continuous technological development and improvement, this technology is expected to be more widely applied, providing data security protection for more industries.

Tag: Data Storage Shanghai Heshu Software Applies for Patent on


Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.

AdminSo

http://www.adminso.com

Copyright @ 2007~2024 All Rights Reserved.

Powered By AdminSo

Open your phone and scan the QR code on it to open the mobile version


Scan WeChat QR code

Follow us for more hot news

AdminSo Technical Support