CN114399317A - On-chain anti-electricity-stealing management method and device - Google Patents
On-chain anti-electricity-stealing management method and device Download PDFInfo
- Publication number
- CN114399317A CN114399317A CN202210050550.9A CN202210050550A CN114399317A CN 114399317 A CN114399317 A CN 114399317A CN 202210050550 A CN202210050550 A CN 202210050550A CN 114399317 A CN114399317 A CN 114399317A
- Authority
- CN
- China
- Prior art keywords
- electricity
- data
- stealing
- evidence
- power
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims description 21
- 230000005611 electricity Effects 0.000 claims abstract description 238
- 238000000034 method Methods 0.000 claims abstract description 54
- 230000002265 prevention Effects 0.000 claims abstract description 13
- 238000012795 verification Methods 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 13
- 230000008569 process Effects 0.000 abstract description 28
- 230000009286 beneficial effect Effects 0.000 abstract description 7
- 238000012545 processing Methods 0.000 abstract description 7
- 230000002159 abnormal effect Effects 0.000 description 7
- 239000000126 substance Substances 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000007711 solidification Methods 0.000 description 4
- 230000008023 solidification Effects 0.000 description 4
- 230000005856 abnormality Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 239000010410 layer Substances 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000004020 conductor Substances 0.000 description 1
- 239000012792 core layer Substances 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 210000000056 organ Anatomy 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000004804 winding Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/06—Energy or water supply
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Marketing (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Public Health (AREA)
- Water Supply & Treatment (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method and a device for managing on-chain electricity stealing prevention, which are used for receiving electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a device for managing on-chain electricity stealing prevention.
Background
With the attention of national grid companies to the problem of electricity stealing prevention in recent years, electricity stealing cases searched by various power supply companies are increased year by year, and the number of involved judicial cases is gradually increased.
However, since the service data in the current scene of on-site evidence collection is stored by each provincial company, the data is easily questioned by the other parties in dispute or court trial processes, and the data is not beneficial to the whole case processing and evidence collection work.
Disclosure of Invention
In view of the above, the invention provides a method and a device for managing anti-electricity-stealing on a chain, which are used for solving the problems that service data in the current scene of on-site evidence-obtaining is stored by companies of various provinces, and is easily questioned by the other party in dispute or court trial processes, and is not beneficial to the whole case processing and evidence-obtaining work. The specific scheme is as follows:
an on-chain anti-electricity-stealing management method, comprising:
receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete;
uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
verifying whether the power consumption data are tampered based on a consensus algorithm, and if not, verifying whether the power consumption users corresponding to the power consumption data are electricity stealing users according to an intelligent contract;
and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to make a litigation request based on the electronic litigation data evidence package.
Optionally, the method for determining whether the electricity consumption data meets a preset element evidence storing rule and is complete includes:
judging whether the electricity consumption data contains a data original text, a hash value and data time;
and comparing the original electricity consumption data stored at the sending end with the hash value of the electricity consumption data.
Optionally, the method for verifying whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user according to the intelligent contract includes:
performing cross comparison on the electricity utilization data;
under the condition that the comparison is passed, calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data;
acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
if the ratio is larger than a preset ratio threshold value, the power utilization user is judged to be a power stealing user, otherwise, the power utilization user is a non-power stealing user.
Optionally, the method for calculating the theoretical line loss rate of the electricity consumer corresponding to the electricity consumption data includes:
calculating the line loss capacity based on a preset formula, wherein the preset formula is as follows:
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and taking the ratio of the line loss electric quantity to the daily active electric quantity of the summary table as a theoretical line loss rate.
The method optionally, wherein generating an evidence package of electronic litigation data based on the electricity consumption data comprises:
judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
if the electricity stealing number exists, the association between the electricity information and the work order information and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user, and target electricity utilization data are obtained;
and generating an electronic litigation data evidence package based on the target electricity utilization data.
An on-chain anti-electricity-stealing management device, comprising:
the judging module is used for receiving the electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not;
the uploading module is used for uploading the electricity utilization data to the block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
the verification module is used for verifying whether the power consumption data are tampered based on a consensus algorithm, and if the power consumption data are not tampered, verifying whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
and the generation module is used for generating an electronic litigation data evidence package based on the electricity utilization data if the electricity stealing user is the electricity stealing user, so that the power company can make a litigation request based on the electronic litigation data evidence package.
The above apparatus, optionally, the determining module includes:
the first judgment unit is used for judging whether the electricity consumption data contains a data original text, a hash value and data time;
and the comparison unit is used for comparing the original electricity consumption data stored by the sending end with the hash value of the electricity consumption data.
The above apparatus, optionally, the verification module includes:
the comparison unit is used for performing cross comparison on the electricity utilization data;
the calculation unit is used for calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data under the condition that the comparison is passed;
the calculation and comparison unit is used for acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
and the judging unit is used for judging that the power utilization user is a power stealing user if the ratio is larger than a preset ratio threshold value, otherwise, the power utilization user is a non-power stealing user.
The above apparatus, optionally, the calculating unit includes:
the first calculating subunit is configured to calculate a line loss capacity based on a preset formula, where the preset formula is:
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and the second calculating subunit is used for taking the ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
The above apparatus, optionally, the generating module includes:
the second judgment unit is used for judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
the association unit is used for completing association with the electricity utilization data based on the electricity utilization number of the electricity stealing user, the electricity utilization information and the work order information to obtain target electricity utilization data if the electricity stealing user exists;
and the generating unit is used for generating an electronic litigation data evidence package based on the target electricity utilization data.
Compared with the prior art, the invention has the following advantages:
the invention discloses a method and a device for managing on-chain electricity stealing prevention, which comprise the following steps: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method for managing anti-electricity-stealing on-chain according to an embodiment of the present disclosure;
FIG. 2 is another flowchart of a method for managing anti-electricity-stealing on-chain according to an embodiment of the present disclosure;
FIG. 3 is a block diagram of an embodiment of the present application, illustrating an embodiment of an on-chain anti-electricity-stealing scheme and system;
fig. 4 is a block diagram of an on-chain anti-electricity-stealing management structure disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The embodiment of the invention discloses a chain anti-electricity-stealing management method and a chain anti-electricity-stealing management device, which are applied to the process of obtaining evidence of an electricity-stealing phenomenon, wherein electricity-stealing means the behavior of not metering or less metering electricity by adopting an illegal means with the purposes of illegally occupying electric energy and not paying or less paying electricity. Electricity stealing prevention: the method is characterized in that an electric company automatically detects whether an electricity stealing phenomenon exists in a line by using some intelligent devices or system algorithms. In the prior art, with the attention of national grid companies to the problem of electricity stealing prevention in recent years, electricity stealing cases found by various power supply companies are increased year by year, and the number of involved judicial cases is increased gradually. However, since the service data in the current scene of on-site evidence collection is stored by each provincial company, the data is easily questioned by the other parties in dispute or court trial processes, and the data is not beneficial to the whole case processing and evidence collection work. Therefore, the above problem is solved by implementing solidification of electronic evidence by utilizing the characteristics of natural non-tampering, openness and transparency among nodes on a chain and the like of a block chain technology, wherein the block chain is a term in the field of information technology. In essence, the distributed shared database is a distributed shared database, and the data or information stored in the distributed shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on these characteristics, blockchain technology lays a solid "trust" foundation. Curing the electronic evidence: the evidence obtaining platform stores evidence based on the block chain, and files such as pictures, manuscripts, audios and videos, code packages and the like are encrypted and stored, so that the electronic data cannot be tampered or lost after being chained. And the evidence solidification and permanent storage are realized by utilizing the block chain decentralization characteristic.
The execution flow of the management method is shown in fig. 1, and includes the steps of:
s101, receiving power utilization data, and judging whether the power utilization data meet a preset element evidence storage rule and whether the power utilization data are complete;
in the embodiment of the invention, the power consumption data uploaded by a user based on an electronic data evidence storage platform is received, wherein the power consumption data is butted with a service system to realize real-time acquisition of meter reading abnormal information. The method includes the following steps that line loss abnormal information and structured and unstructured data generated by dispatching and evidence obtaining on an electricity stealing site are further required to be judged, whether the electricity utilization data meet preset element evidence storing rules or not is further required to be judged, wherein the preset element evidence storing rules can be set based on experience or specific conditions, the embodiment of the invention is not specifically limited, the preset element evidence storing rules are exemplified, and the specific judging process comprises the following steps: judging whether the electricity consumption data contain true and reliable contents of supporting data such as data texts, hash values, data time and the like, if the electricity consumption data do not meet the preset element evidence storage rule, feeding back the electricity consumption data to a service system, and if the electricity consumption data meet the preset element evidence storage rule, further judging whether the electricity consumption data are complete, wherein the specific judging process is as follows: the method comprises the steps that Hash is carried out on integrally uploaded original user data as a basic value by convention with an opposite terminal system, the uploaded electricity utilization data are compared after Hash is carried out again, whether the uploaded electricity utilization data are the same or not is judged, it is guaranteed that the data are not tampered and lost in the transmission process, if the uploaded electricity utilization data are different, the electricity utilization data are incomplete, feedback is carried out on a service system, and if the uploaded electricity utilization data are the same, the electricity utilization data are complete.
Further, for the purpose of judging whether the electricity consumption data meets a preset element evidence storage rule and judging whether the electricity consumption data is complete, the execution sequence of the electricity consumption data and the execution sequence of the electricity consumption data are not limited, and the execution sequence can be adjusted.
S102, uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
in the embodiment of the invention, under the condition that the electricity utilization data meet the preset element evidence storage rule and the data is complete, the electricity utilization data are converted into an uplink format required by a target block chain, and then the electricity utilization data are uploaded to the target block chain for storage.
S103, verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether a power utilization user corresponding to the power utilization data is a power stealing user according to an intelligent contract;
in embodiments of the present invention, an intelligent contract refers to a computer protocol that is intended to propagate, verify, or execute contracts in an informational manner. The intelligent contract allows credible transactions to be conducted without a third party, the transactions can be tracked and can not be reversed, and cheating behaviors which can be caused in the process of execution can be effectively avoided. The intelligent contract can be used as a system participant to respond to the received information, can receive and store the value, and can also send the information and the value outwards.
After the electricity consumption data are uploaded to the block chain, whether the electricity consumption data are tampered or not needs to be verified based on a common identification algorithm, the specific verification process is as follows, a hash value of the electricity consumption data before winding and a hash value of the electricity consumption data after power-on are respectively calculated, if the two hash values are different, the electricity consumption data are tampered, the electricity consumption data are uploaded again, if the two hash values indicate that the electricity consumption data are not tampered, whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user or not is further verified according to an intelligent contract, and the specific verification process is as follows:
the intelligent contract on the block chain determines whether the two parties are consistent or not by performing cross comparison on line loss abnormal information and user abnormal information transmitted by a service system, informs the service system to adjust under the condition that the two parties are inconsistent, and acquires user electricity utilization scheme information of a user under the condition that the two parties are consistent, wherein the user electricity utilization scheme information can be acquired at a preset port or position, and the user electricity utilization scheme information comprises: calculating all data information required by the theoretical line loss rate, and calculating the theoretical line loss rate based on the user power utilization scheme information, wherein the specific calculation process is as follows:
firstly, the calculation formula of the line loss rate is as follows:
the theoretical line loss electric quantity correlation calculation formula is as follows:
the line loss is Δ W (num, type, voltage, area), where num is the number of elements, type loss, voltage level of voltage element, and area is located.
The line loss electric quantity can be calculated by utilizing the four attributes, and further, the theoretical line loss rate calculation formula is as follows:
wherein the content of the first and second substances,
1) u2 is the voltage at the endmost meter box, the lowest value of the single phase voltage of the user meter or the three phase voltage of the three phase meter.
2) U1 is head end voltage, and the other check summary table voltage value of U2.
3) X is the conductor reactance.
4) And R is the wire resistance.
5) And q1 is the monthly loss electric quantity of the single-phase electric energy meter, and is calculated according to 1 kWh.
6) m1 is the number of single-phase electric energy meters.
7) And q2 is the monthly loss electric quantity of the three-phase electric energy meter, and is calculated according to 2 kWh.
8) m2 is the number of three-phase electric energy meters.
9) And E is total daily active electric quantity, namely the total daily frozen forward active total-the last daily frozen forward active total) and the comprehensive multiplying power.
10) And Q is total daily reactive power quantity, namely total frozen reverse reactive power total of the day-total frozen reverse reactive power total of the last day).
Further, an actual line loss rate is obtained at a preset port or a specified position, a proportion that the actual line loss rate exceeds the theoretical line loss rate is calculated, the proportion is compared with a preset proportion threshold value, whether the ratio is larger than the preset proportion threshold value or not is judged, if the ratio is larger than the preset proportion threshold value, the electricity utilization user is judged to be an electricity stealing user, information can be automatically fed back to a service system through a block chain evidence platform, wherein the block chain evidence platform stores electricity utilization data on a private chain, a alliance chain or a DPOS public chain through block chain related technical means such as a trusted timestamp and a hash value check or stores the electricity utilization data on the private chain, the alliance chain or the DPOS public chain through an electronic evidence obtaining platform and depends on core technologies such as distributed data storage and a consensus mechanism to perform solidification storage. Otherwise, the electricity user is a non-electricity stealing user. The preset proportion threshold may be set based on experience or specific conditions, and is not specifically limited in the embodiment of the present invention, where the preset proportion threshold is written in by an intelligent contract. The calculation method of the ratio is as follows:
and S104, generating an electronic litigation data evidence package based on the electricity utilization data, so that the power company can make a litigation request based on the electronic litigation data evidence package.
In the embodiment of the invention, under the condition that the electricity user is an electricity stealing user, whether field evidence obtaining information matched with the electricity stealing user exists in the electricity utilization data is judged, if the field evidence obtaining information matched with the electricity stealing user does not exist, a marketing system is informed to carry out field evidence obtaining and order distributing in a notification mode, if the field evidence obtaining information matched with the electricity stealing user exists, the association between the electricity utilization data and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user to obtain target electricity utilization data, the target electricity utilization data are packaged into a compression packet through a system background code, the compression packet is an electronic lawsuit data evidence packet, wherein the complete txt file formed by various data stored in a business system in the compression packet, the txt file related to the main body information content, and the evidence containing uplink data for verification of an internet court, The format of the contents such as the hash algorithm, the time and the like is a bc file. The electric power company extracts litigation requests based on the electronic litigation data evidence packages.
The invention discloses a chain anti-electricity-stealing management method, which comprises the following steps: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
In the invention, based on the electricity-stealing prevention management method, a specific application process in an actual working scene is shown in fig. 2, firstly, line loss data of a customer with abnormal electric quantity is obtained, theoretical line loss is calculated, whether line loss abnormality of a platform area exceeds a threshold value is judged based on the theoretical line loss, if the line loss abnormality does not exceed the threshold value, the platform is a non-electricity-stealing user, if the line loss abnormality exceeds the threshold value, the platform is an electricity-stealing user, if the electricity-stealing user is the electricity-stealing user, whether on-site evidence obtaining is needed is judged, if the on-site evidence obtaining is not needed, a evidence-storing platform feeds back related evidence to an electric power company, if the on-site evidence obtaining is needed, the electric power company can automatically initiate a supplementary procedure, the electric quantity, the line loss and the on-site data can be automatically associated to generate an electronic litigation data evidence package, and if the electric power company makes a litigation request, the single litigation evidence package is uploaded to a court-setting platform, if the electric power company does not make a litigation request, the electric power company can also initiate a subsidy process.
In the embodiment of the present invention, a structural block diagram of an on-chain electricity stealing prevention management scheme and system constructed based on the above electricity stealing prevention management method is shown in fig. 3, and includes: the system is based on an electronic data storage platform, cross verification, comparison and association of data are achieved through a consensus algorithm, a contract engine, an encryption algorithm and a block chain storage algorithm in a block chain, the data are used as nodes on the chain for consensus through cooperation with mechanisms such as power companies and judicial authorities, reliability of the data is effectively improved, the system is integrated with an electronic litigation platform of the judicial authorities, litigation evidence and user identity information can be directly uploaded, and litigation is directly lifted. Wherein, aim at service layer, electric power management marketing system acquire electricity-stealing on-the-spot information, and electric power information collection system acquires the information that exceeds standard and carries out unusual power consumption analysis, and integration electric quantity and line loss system acquire line loss abnormal information, based on the API interface, send to the electronic data of application layer deposit the evidence platform, the electronic data platform is based on above-mentioned data generation electronic data package, and under the condition that electric power company put forward litigation request, the judicial organ in the core node is given with litigation evidence package transfer, the electronic data deposit the evidence platform include: the system comprises electric quantity abnormal information, field investigation evidence obtaining information and transformer area line loss information. The core layer is a full interconnection network, which comprises: the system comprises a consensus algorithm, a contract engine, a block chain storage and an encryption algorithm, wherein aiming at the consensus algorithm, the propagation and data verification among nodes are carried out on the basis of PBFT, aiming at the contract engine, the cross verification and data association are completed on the basis of a service contract, aiming at the block chain storage, the node data chain solidification is realized on the basis of the data storage, and aiming at the encryption algorithm, the price-asking Hash encryption storage is realized on the basis of the secret storage. The core node comprises the difference between the power company node and the judicial plane embodiments, and the same and similar parts among the various embodiments can be referred to each other. For off, wherein the judicial authority comprises: notarization department node, law firm node and court node.
In the embodiment of the invention, the electricity stealing management method uploads the electricity consumption data, the line loss information and the on-site evidence obtaining data of a user to an alliance chain in a block chain mode for storage, calculates the theoretical line loss rate through an intelligent contract on the chain, and judges the line loss difference threshold value to realize data cross verification and information feedback. And the whole package of the associated data is uploaded to an internet court litigation platform through an electronic data evidence storage platform, so that the work of anti-electricity-stealing dispute resolution is supported efficiently. The theoretical line loss of the transformer area is calculated, the electricity stealing prevention behavior of electricity customers is verified through cross verification of a verification difference threshold value after the theoretical line loss is compared with the actual line loss, data and multimedia information generated in the business process are stored and solidified through a block chain technology, and a judicial authority is introduced for endorsement, so that the expectation that the file is solidified and can not be falsified can be achieved, and the credibility of electronic evidence required for case setting is improved under the condition of effectively supporting the safety of data produced by a power company.
Based on the above-mentioned on-chain electricity stealing prevention management method, an embodiment of the present invention further provides an on-chain electricity stealing prevention management apparatus, a structural block diagram of the management apparatus is shown in fig. 4, and the management apparatus includes:
a judging module 201, an uploading module 202, a verifying module 203 and a generating module 204.
Wherein the content of the first and second substances,
the judging module 201 is configured to receive power consumption data, and judge whether the power consumption data meets a preset element evidence storing rule and is complete;
the uploading module 202 is configured to upload the electricity consumption data to a block chain when the electricity consumption data meets a preset element evidence storage rule and the data is complete;
the verification module 203 is configured to verify whether the power consumption data is tampered based on a consensus algorithm, and if not, verify whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
the generating module 204 is configured to generate an electronic litigation data evidence package based on the power consumption data if the power stealing user is a power stealing user, so that the power company makes a litigation request based on the electronic litigation data evidence package.
The invention discloses an on-chain anti-electricity-stealing management device, which comprises: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
In this embodiment of the present invention, the determining module 201 includes:
a first judgment unit 205 and a comparison unit 206.
Wherein the content of the first and second substances,
the first determining unit 205 is configured to determine whether the power consumption data includes a data original, a hash value, and data time;
the comparing unit 206 is configured to compare the original power consumption data stored at the sending end with the hash value of the power consumption data.
In this embodiment of the present invention, the verification module 203 includes:
comparison section 207, calculation section 208, calculation and comparison section 209, and determination section 210.
Wherein the content of the first and second substances,
the comparison unit 207 is configured to perform cross comparison on the electricity consumption data;
the calculating unit 208 is configured to calculate a theoretical line loss rate of the electricity consumption user corresponding to the electricity consumption data when the comparison is passed;
the calculating and comparing unit 209 is configured to obtain an actual line loss rate of the power consumer, calculate a ratio of the actual line loss rate exceeding a theoretical line loss rate, and compare the ratio with a preset ratio threshold;
the determining unit 210 is configured to determine that the power consumption user is a power stealing user if the ratio is greater than a preset ratio threshold, and otherwise, that the power consumption user is a non-power stealing user.
In this embodiment of the present invention, the calculating unit 208 includes:
a first calculation subunit 211 and a second calculation subunit 212.
Wherein the content of the first and second substances,
the first calculating subunit 211 is configured to calculate a line loss electric quantity based on a preset formula, where the preset formula is:
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
the second calculating subunit 212 is configured to use a ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
In this embodiment of the present invention, the generating module 204 includes:
second determining section 213, associating section 214, and generating section 215.
Wherein the content of the first and second substances,
the second judging unit 213 is configured to judge whether field evidence obtaining information matched with the electricity stealing user exists in the electricity consumption data, and if not, prompt the marketing system to perform field evidence obtaining;
the association unit 214 is configured to complete association between the electricity consumption information and the work order information based on the electricity consumption number of the electricity stealing user if the electricity stealing user exists, so as to obtain target electricity consumption data;
the generating unit 215 is configured to generate an electronic litigation data evidence package based on the target electricity consumption data.
It should be noted that, the embodiments in this specification are all described in a progressive manner, and each embodiment is mainly described in terms of its apparatus type embodiment, because it is basically similar to the method embodiment, the description is relatively simple, and related points can be referred to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in a plurality of software and/or hardware when implementing the invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The method and the device for managing anti-electricity-stealing on the chain provided by the invention are described in detail, the principle and the implementation mode of the invention are explained by applying specific examples, and the description of the examples is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (10)
1. An on-chain electricity stealing prevention management method is characterized by comprising the following steps:
receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete;
uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
verifying whether the power consumption data are tampered based on a consensus algorithm, and if not, verifying whether the power consumption users corresponding to the power consumption data are electricity stealing users according to an intelligent contract;
and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to make a litigation request based on the electronic litigation data evidence package.
2. The method of claim 1, wherein determining whether the electricity consumption data meets a predetermined element evidence rule and is complete comprises:
judging whether the electricity consumption data contains a data original text, a hash value and data time;
and comparing the original electricity consumption data stored at the sending end with the hash value of the electricity consumption data.
3. The method of claim 1, wherein verifying whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user according to an intelligent contract comprises:
performing cross comparison on the electricity utilization data;
under the condition that the comparison is passed, calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data;
acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
if the ratio is larger than a preset ratio threshold value, the power utilization user is judged to be a power stealing user, otherwise, the power utilization user is a non-power stealing user.
4. The method of claim 3, wherein calculating a theoretical line loss rate of the electricity consumer corresponding to the electricity data comprises:
calculating the line loss capacity based on a preset formula, wherein the preset formula is as follows:
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and taking the ratio of the line loss electric quantity to the daily active electric quantity of the summary table as a theoretical line loss rate.
5. The method of claim 1, wherein generating an electronic litigation-data evidence package based on the electricity usage data comprises:
judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
if the electricity stealing number exists, the association between the electricity information and the work order information and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user, and target electricity utilization data are obtained;
and generating an electronic litigation data evidence package based on the target electricity utilization data.
6. An on-chain anti-electricity-stealing management device, comprising:
the judging module is used for receiving the electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not;
the uploading module is used for uploading the electricity utilization data to the block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
the verification module is used for verifying whether the power consumption data are tampered based on a consensus algorithm, and if the power consumption data are not tampered, verifying whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
and the generation module is used for generating an electronic litigation data evidence package based on the electricity utilization data if the electricity stealing user is the electricity stealing user, so that the power company can make a litigation request based on the electronic litigation data evidence package.
7. The apparatus of claim 6, wherein the determining module comprises:
the first judgment unit is used for judging whether the electricity consumption data contains a data original text, a hash value and data time;
and the comparison unit is used for comparing the original electricity consumption data stored by the sending end with the hash value of the electricity consumption data.
8. The apparatus of claim 6, wherein the verification module comprises:
the comparison unit is used for performing cross comparison on the electricity utilization data;
the calculation unit is used for calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data under the condition that the comparison is passed;
the calculation and comparison unit is used for acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
and the judging unit is used for judging that the power utilization user is a power stealing user if the ratio is larger than a preset ratio threshold value, otherwise, the power utilization user is a non-power stealing user.
9. The apparatus of claim 8, wherein the computing unit comprises:
the first calculating subunit is configured to calculate a line loss capacity based on a preset formula, where the preset formula is:
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and the second calculating subunit is used for taking the ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
10. The apparatus of claim 6, wherein the generating module comprises:
the second judgment unit is used for judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
the association unit is used for completing association with the electricity utilization data based on the electricity utilization number of the electricity stealing user, the electricity utilization information and the work order information to obtain target electricity utilization data if the electricity stealing user exists;
and the generating unit is used for generating an electronic litigation data evidence package based on the target electricity utilization data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210050550.9A CN114399317A (en) | 2022-01-17 | 2022-01-17 | On-chain anti-electricity-stealing management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210050550.9A CN114399317A (en) | 2022-01-17 | 2022-01-17 | On-chain anti-electricity-stealing management method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114399317A true CN114399317A (en) | 2022-04-26 |
Family
ID=81229976
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210050550.9A Pending CN114399317A (en) | 2022-01-17 | 2022-01-17 | On-chain anti-electricity-stealing management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114399317A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114648255A (en) * | 2022-05-18 | 2022-06-21 | 国网浙江省电力有限公司 | Inspection method and platform based on marketing business risk digital internal control system |
-
2022
- 2022-01-17 CN CN202210050550.9A patent/CN114399317A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114648255A (en) * | 2022-05-18 | 2022-06-21 | 国网浙江省电力有限公司 | Inspection method and platform based on marketing business risk digital internal control system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111259070B (en) | Method and related device for storing and acquiring service data | |
CN107909358B (en) | Energy settlement method, device and system | |
US10564661B2 (en) | Power control device, power management device and power management system | |
JP6719561B2 (en) | Supply medium (eg, electricity) trading contract system | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN110348643B (en) | Distributed power transaction contract consensus method based on energy block chain | |
CN109472164A (en) | The verification method and its network and electronic equipment of contract dataset | |
JP6379538B2 (en) | Method and system for sharing energy usage data | |
CN109636610B (en) | Decentralized data transaction system and method | |
CN110795767A (en) | Electric power transaction method, device and system and trusted cloud platform | |
CN113010605A (en) | Green power source tracing method and device based on block chain | |
CN114399317A (en) | On-chain anti-electricity-stealing management method and device | |
CN114218591A (en) | Digital asset management method capable of realizing anonymous transaction | |
Rajasekar et al. | Blockchain utility in renewable energy | |
Yip et al. | A privacy-preserving and cheat-resilient electricity consumption reporting scheme for smart grids | |
CN116385028A (en) | Carbon asset data management method, device and server | |
Perekalskiy et al. | Setup of a local P2P electric energy market based on a smart contract blockchain technology | |
Wang et al. | Privacy‐Preserving Meter Report Protocol of Isolated Smart Grid Devices | |
CN114726548A (en) | Cross-chain-supported green electricity tracing method and system | |
KR102495474B1 (en) | Apparatus and method for authenticating power consumption details based on blockchain | |
EP3859652A1 (en) | Technique for trustless cryptographic verification of energy allocations | |
TWI721930B (en) | Allocation document transmission system with multiple processing nodes | |
Taylor | An analysis of bitcoin and the proof of work protocols energy consumption, growth, impact and sustainability | |
CN113554322A (en) | Control method of demand response management platform based on block chain technology | |
CN113032828A (en) | Improved binary system interaction information encryption method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |