CN114399317A - On-chain anti-electricity-stealing management method and device - Google Patents

On-chain anti-electricity-stealing management method and device Download PDF

Info

Publication number
CN114399317A
CN114399317A CN202210050550.9A CN202210050550A CN114399317A CN 114399317 A CN114399317 A CN 114399317A CN 202210050550 A CN202210050550 A CN 202210050550A CN 114399317 A CN114399317 A CN 114399317A
Authority
CN
China
Prior art keywords
electricity
data
stealing
evidence
power
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210050550.9A
Other languages
Chinese (zh)
Inventor
杨成
李燕平
伏跃红
卢峰
郭佳
杨珂
王合建
赵丽花
于晓昆
周磊
李国民
吕佳宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowang Xiongan Finance Technology Group Co ltd
State Grid Blockchain Technology Beijing Co ltd
State Grid E Commerce Co Ltd
Original Assignee
Guowang Xiongan Finance Technology Group Co ltd
State Grid Blockchain Technology Beijing Co ltd
State Grid E Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guowang Xiongan Finance Technology Group Co ltd, State Grid Blockchain Technology Beijing Co ltd, State Grid E Commerce Co Ltd filed Critical Guowang Xiongan Finance Technology Group Co ltd
Priority to CN202210050550.9A priority Critical patent/CN114399317A/en
Publication of CN114399317A publication Critical patent/CN114399317A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Tourism & Hospitality (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a device for managing on-chain electricity stealing prevention, which are used for receiving electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.

Description

On-chain anti-electricity-stealing management method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a device for managing on-chain electricity stealing prevention.
Background
With the attention of national grid companies to the problem of electricity stealing prevention in recent years, electricity stealing cases searched by various power supply companies are increased year by year, and the number of involved judicial cases is gradually increased.
However, since the service data in the current scene of on-site evidence collection is stored by each provincial company, the data is easily questioned by the other parties in dispute or court trial processes, and the data is not beneficial to the whole case processing and evidence collection work.
Disclosure of Invention
In view of the above, the invention provides a method and a device for managing anti-electricity-stealing on a chain, which are used for solving the problems that service data in the current scene of on-site evidence-obtaining is stored by companies of various provinces, and is easily questioned by the other party in dispute or court trial processes, and is not beneficial to the whole case processing and evidence-obtaining work. The specific scheme is as follows:
an on-chain anti-electricity-stealing management method, comprising:
receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete;
uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
verifying whether the power consumption data are tampered based on a consensus algorithm, and if not, verifying whether the power consumption users corresponding to the power consumption data are electricity stealing users according to an intelligent contract;
and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to make a litigation request based on the electronic litigation data evidence package.
Optionally, the method for determining whether the electricity consumption data meets a preset element evidence storing rule and is complete includes:
judging whether the electricity consumption data contains a data original text, a hash value and data time;
and comparing the original electricity consumption data stored at the sending end with the hash value of the electricity consumption data.
Optionally, the method for verifying whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user according to the intelligent contract includes:
performing cross comparison on the electricity utilization data;
under the condition that the comparison is passed, calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data;
acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
if the ratio is larger than a preset ratio threshold value, the power utilization user is judged to be a power stealing user, otherwise, the power utilization user is a non-power stealing user.
Optionally, the method for calculating the theoretical line loss rate of the electricity consumer corresponding to the electricity consumption data includes:
calculating the line loss capacity based on a preset formula, wherein the preset formula is as follows:
Figure BDA0003474173070000021
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and taking the ratio of the line loss electric quantity to the daily active electric quantity of the summary table as a theoretical line loss rate.
The method optionally, wherein generating an evidence package of electronic litigation data based on the electricity consumption data comprises:
judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
if the electricity stealing number exists, the association between the electricity information and the work order information and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user, and target electricity utilization data are obtained;
and generating an electronic litigation data evidence package based on the target electricity utilization data.
An on-chain anti-electricity-stealing management device, comprising:
the judging module is used for receiving the electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not;
the uploading module is used for uploading the electricity utilization data to the block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
the verification module is used for verifying whether the power consumption data are tampered based on a consensus algorithm, and if the power consumption data are not tampered, verifying whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
and the generation module is used for generating an electronic litigation data evidence package based on the electricity utilization data if the electricity stealing user is the electricity stealing user, so that the power company can make a litigation request based on the electronic litigation data evidence package.
The above apparatus, optionally, the determining module includes:
the first judgment unit is used for judging whether the electricity consumption data contains a data original text, a hash value and data time;
and the comparison unit is used for comparing the original electricity consumption data stored by the sending end with the hash value of the electricity consumption data.
The above apparatus, optionally, the verification module includes:
the comparison unit is used for performing cross comparison on the electricity utilization data;
the calculation unit is used for calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data under the condition that the comparison is passed;
the calculation and comparison unit is used for acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
and the judging unit is used for judging that the power utilization user is a power stealing user if the ratio is larger than a preset ratio threshold value, otherwise, the power utilization user is a non-power stealing user.
The above apparatus, optionally, the calculating unit includes:
the first calculating subunit is configured to calculate a line loss capacity based on a preset formula, where the preset formula is:
Figure BDA0003474173070000031
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and the second calculating subunit is used for taking the ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
The above apparatus, optionally, the generating module includes:
the second judgment unit is used for judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
the association unit is used for completing association with the electricity utilization data based on the electricity utilization number of the electricity stealing user, the electricity utilization information and the work order information to obtain target electricity utilization data if the electricity stealing user exists;
and the generating unit is used for generating an electronic litigation data evidence package based on the target electricity utilization data.
Compared with the prior art, the invention has the following advantages:
the invention discloses a method and a device for managing on-chain electricity stealing prevention, which comprise the following steps: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of a method for managing anti-electricity-stealing on-chain according to an embodiment of the present disclosure;
FIG. 2 is another flowchart of a method for managing anti-electricity-stealing on-chain according to an embodiment of the present disclosure;
FIG. 3 is a block diagram of an embodiment of the present application, illustrating an embodiment of an on-chain anti-electricity-stealing scheme and system;
fig. 4 is a block diagram of an on-chain anti-electricity-stealing management structure disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The embodiment of the invention discloses a chain anti-electricity-stealing management method and a chain anti-electricity-stealing management device, which are applied to the process of obtaining evidence of an electricity-stealing phenomenon, wherein electricity-stealing means the behavior of not metering or less metering electricity by adopting an illegal means with the purposes of illegally occupying electric energy and not paying or less paying electricity. Electricity stealing prevention: the method is characterized in that an electric company automatically detects whether an electricity stealing phenomenon exists in a line by using some intelligent devices or system algorithms. In the prior art, with the attention of national grid companies to the problem of electricity stealing prevention in recent years, electricity stealing cases found by various power supply companies are increased year by year, and the number of involved judicial cases is increased gradually. However, since the service data in the current scene of on-site evidence collection is stored by each provincial company, the data is easily questioned by the other parties in dispute or court trial processes, and the data is not beneficial to the whole case processing and evidence collection work. Therefore, the above problem is solved by implementing solidification of electronic evidence by utilizing the characteristics of natural non-tampering, openness and transparency among nodes on a chain and the like of a block chain technology, wherein the block chain is a term in the field of information technology. In essence, the distributed shared database is a distributed shared database, and the data or information stored in the distributed shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on these characteristics, blockchain technology lays a solid "trust" foundation. Curing the electronic evidence: the evidence obtaining platform stores evidence based on the block chain, and files such as pictures, manuscripts, audios and videos, code packages and the like are encrypted and stored, so that the electronic data cannot be tampered or lost after being chained. And the evidence solidification and permanent storage are realized by utilizing the block chain decentralization characteristic.
The execution flow of the management method is shown in fig. 1, and includes the steps of:
s101, receiving power utilization data, and judging whether the power utilization data meet a preset element evidence storage rule and whether the power utilization data are complete;
in the embodiment of the invention, the power consumption data uploaded by a user based on an electronic data evidence storage platform is received, wherein the power consumption data is butted with a service system to realize real-time acquisition of meter reading abnormal information. The method includes the following steps that line loss abnormal information and structured and unstructured data generated by dispatching and evidence obtaining on an electricity stealing site are further required to be judged, whether the electricity utilization data meet preset element evidence storing rules or not is further required to be judged, wherein the preset element evidence storing rules can be set based on experience or specific conditions, the embodiment of the invention is not specifically limited, the preset element evidence storing rules are exemplified, and the specific judging process comprises the following steps: judging whether the electricity consumption data contain true and reliable contents of supporting data such as data texts, hash values, data time and the like, if the electricity consumption data do not meet the preset element evidence storage rule, feeding back the electricity consumption data to a service system, and if the electricity consumption data meet the preset element evidence storage rule, further judging whether the electricity consumption data are complete, wherein the specific judging process is as follows: the method comprises the steps that Hash is carried out on integrally uploaded original user data as a basic value by convention with an opposite terminal system, the uploaded electricity utilization data are compared after Hash is carried out again, whether the uploaded electricity utilization data are the same or not is judged, it is guaranteed that the data are not tampered and lost in the transmission process, if the uploaded electricity utilization data are different, the electricity utilization data are incomplete, feedback is carried out on a service system, and if the uploaded electricity utilization data are the same, the electricity utilization data are complete.
Further, for the purpose of judging whether the electricity consumption data meets a preset element evidence storage rule and judging whether the electricity consumption data is complete, the execution sequence of the electricity consumption data and the execution sequence of the electricity consumption data are not limited, and the execution sequence can be adjusted.
S102, uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
in the embodiment of the invention, under the condition that the electricity utilization data meet the preset element evidence storage rule and the data is complete, the electricity utilization data are converted into an uplink format required by a target block chain, and then the electricity utilization data are uploaded to the target block chain for storage.
S103, verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether a power utilization user corresponding to the power utilization data is a power stealing user according to an intelligent contract;
in embodiments of the present invention, an intelligent contract refers to a computer protocol that is intended to propagate, verify, or execute contracts in an informational manner. The intelligent contract allows credible transactions to be conducted without a third party, the transactions can be tracked and can not be reversed, and cheating behaviors which can be caused in the process of execution can be effectively avoided. The intelligent contract can be used as a system participant to respond to the received information, can receive and store the value, and can also send the information and the value outwards.
After the electricity consumption data are uploaded to the block chain, whether the electricity consumption data are tampered or not needs to be verified based on a common identification algorithm, the specific verification process is as follows, a hash value of the electricity consumption data before winding and a hash value of the electricity consumption data after power-on are respectively calculated, if the two hash values are different, the electricity consumption data are tampered, the electricity consumption data are uploaded again, if the two hash values indicate that the electricity consumption data are not tampered, whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user or not is further verified according to an intelligent contract, and the specific verification process is as follows:
the intelligent contract on the block chain determines whether the two parties are consistent or not by performing cross comparison on line loss abnormal information and user abnormal information transmitted by a service system, informs the service system to adjust under the condition that the two parties are inconsistent, and acquires user electricity utilization scheme information of a user under the condition that the two parties are consistent, wherein the user electricity utilization scheme information can be acquired at a preset port or position, and the user electricity utilization scheme information comprises: calculating all data information required by the theoretical line loss rate, and calculating the theoretical line loss rate based on the user power utilization scheme information, wherein the specific calculation process is as follows:
firstly, the calculation formula of the line loss rate is as follows:
Figure BDA0003474173070000071
the theoretical line loss electric quantity correlation calculation formula is as follows:
the line loss is Δ W (num, type, voltage, area), where num is the number of elements, type loss, voltage level of voltage element, and area is located.
The line loss electric quantity can be calculated by utilizing the four attributes, and further, the theoretical line loss rate calculation formula is as follows:
Figure BDA0003474173070000081
wherein the content of the first and second substances,
1) u2 is the voltage at the endmost meter box, the lowest value of the single phase voltage of the user meter or the three phase voltage of the three phase meter.
2) U1 is head end voltage, and the other check summary table voltage value of U2.
3) X is the conductor reactance.
4) And R is the wire resistance.
5) And q1 is the monthly loss electric quantity of the single-phase electric energy meter, and is calculated according to 1 kWh.
6) m1 is the number of single-phase electric energy meters.
7) And q2 is the monthly loss electric quantity of the three-phase electric energy meter, and is calculated according to 2 kWh.
8) m2 is the number of three-phase electric energy meters.
9) And E is total daily active electric quantity, namely the total daily frozen forward active total-the last daily frozen forward active total) and the comprehensive multiplying power.
10) And Q is total daily reactive power quantity, namely total frozen reverse reactive power total of the day-total frozen reverse reactive power total of the last day).
Further, an actual line loss rate is obtained at a preset port or a specified position, a proportion that the actual line loss rate exceeds the theoretical line loss rate is calculated, the proportion is compared with a preset proportion threshold value, whether the ratio is larger than the preset proportion threshold value or not is judged, if the ratio is larger than the preset proportion threshold value, the electricity utilization user is judged to be an electricity stealing user, information can be automatically fed back to a service system through a block chain evidence platform, wherein the block chain evidence platform stores electricity utilization data on a private chain, a alliance chain or a DPOS public chain through block chain related technical means such as a trusted timestamp and a hash value check or stores the electricity utilization data on the private chain, the alliance chain or the DPOS public chain through an electronic evidence obtaining platform and depends on core technologies such as distributed data storage and a consensus mechanism to perform solidification storage. Otherwise, the electricity user is a non-electricity stealing user. The preset proportion threshold may be set based on experience or specific conditions, and is not specifically limited in the embodiment of the present invention, where the preset proportion threshold is written in by an intelligent contract. The calculation method of the ratio is as follows:
Figure BDA0003474173070000091
and S104, generating an electronic litigation data evidence package based on the electricity utilization data, so that the power company can make a litigation request based on the electronic litigation data evidence package.
In the embodiment of the invention, under the condition that the electricity user is an electricity stealing user, whether field evidence obtaining information matched with the electricity stealing user exists in the electricity utilization data is judged, if the field evidence obtaining information matched with the electricity stealing user does not exist, a marketing system is informed to carry out field evidence obtaining and order distributing in a notification mode, if the field evidence obtaining information matched with the electricity stealing user exists, the association between the electricity utilization data and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user to obtain target electricity utilization data, the target electricity utilization data are packaged into a compression packet through a system background code, the compression packet is an electronic lawsuit data evidence packet, wherein the complete txt file formed by various data stored in a business system in the compression packet, the txt file related to the main body information content, and the evidence containing uplink data for verification of an internet court, The format of the contents such as the hash algorithm, the time and the like is a bc file. The electric power company extracts litigation requests based on the electronic litigation data evidence packages.
The invention discloses a chain anti-electricity-stealing management method, which comprises the following steps: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
In the invention, based on the electricity-stealing prevention management method, a specific application process in an actual working scene is shown in fig. 2, firstly, line loss data of a customer with abnormal electric quantity is obtained, theoretical line loss is calculated, whether line loss abnormality of a platform area exceeds a threshold value is judged based on the theoretical line loss, if the line loss abnormality does not exceed the threshold value, the platform is a non-electricity-stealing user, if the line loss abnormality exceeds the threshold value, the platform is an electricity-stealing user, if the electricity-stealing user is the electricity-stealing user, whether on-site evidence obtaining is needed is judged, if the on-site evidence obtaining is not needed, a evidence-storing platform feeds back related evidence to an electric power company, if the on-site evidence obtaining is needed, the electric power company can automatically initiate a supplementary procedure, the electric quantity, the line loss and the on-site data can be automatically associated to generate an electronic litigation data evidence package, and if the electric power company makes a litigation request, the single litigation evidence package is uploaded to a court-setting platform, if the electric power company does not make a litigation request, the electric power company can also initiate a subsidy process.
In the embodiment of the present invention, a structural block diagram of an on-chain electricity stealing prevention management scheme and system constructed based on the above electricity stealing prevention management method is shown in fig. 3, and includes: the system is based on an electronic data storage platform, cross verification, comparison and association of data are achieved through a consensus algorithm, a contract engine, an encryption algorithm and a block chain storage algorithm in a block chain, the data are used as nodes on the chain for consensus through cooperation with mechanisms such as power companies and judicial authorities, reliability of the data is effectively improved, the system is integrated with an electronic litigation platform of the judicial authorities, litigation evidence and user identity information can be directly uploaded, and litigation is directly lifted. Wherein, aim at service layer, electric power management marketing system acquire electricity-stealing on-the-spot information, and electric power information collection system acquires the information that exceeds standard and carries out unusual power consumption analysis, and integration electric quantity and line loss system acquire line loss abnormal information, based on the API interface, send to the electronic data of application layer deposit the evidence platform, the electronic data platform is based on above-mentioned data generation electronic data package, and under the condition that electric power company put forward litigation request, the judicial organ in the core node is given with litigation evidence package transfer, the electronic data deposit the evidence platform include: the system comprises electric quantity abnormal information, field investigation evidence obtaining information and transformer area line loss information. The core layer is a full interconnection network, which comprises: the system comprises a consensus algorithm, a contract engine, a block chain storage and an encryption algorithm, wherein aiming at the consensus algorithm, the propagation and data verification among nodes are carried out on the basis of PBFT, aiming at the contract engine, the cross verification and data association are completed on the basis of a service contract, aiming at the block chain storage, the node data chain solidification is realized on the basis of the data storage, and aiming at the encryption algorithm, the price-asking Hash encryption storage is realized on the basis of the secret storage. The core node comprises the difference between the power company node and the judicial plane embodiments, and the same and similar parts among the various embodiments can be referred to each other. For off, wherein the judicial authority comprises: notarization department node, law firm node and court node.
In the embodiment of the invention, the electricity stealing management method uploads the electricity consumption data, the line loss information and the on-site evidence obtaining data of a user to an alliance chain in a block chain mode for storage, calculates the theoretical line loss rate through an intelligent contract on the chain, and judges the line loss difference threshold value to realize data cross verification and information feedback. And the whole package of the associated data is uploaded to an internet court litigation platform through an electronic data evidence storage platform, so that the work of anti-electricity-stealing dispute resolution is supported efficiently. The theoretical line loss of the transformer area is calculated, the electricity stealing prevention behavior of electricity customers is verified through cross verification of a verification difference threshold value after the theoretical line loss is compared with the actual line loss, data and multimedia information generated in the business process are stored and solidified through a block chain technology, and a judicial authority is introduced for endorsement, so that the expectation that the file is solidified and can not be falsified can be achieved, and the credibility of electronic evidence required for case setting is improved under the condition of effectively supporting the safety of data produced by a power company.
Based on the above-mentioned on-chain electricity stealing prevention management method, an embodiment of the present invention further provides an on-chain electricity stealing prevention management apparatus, a structural block diagram of the management apparatus is shown in fig. 4, and the management apparatus includes:
a judging module 201, an uploading module 202, a verifying module 203 and a generating module 204.
Wherein the content of the first and second substances,
the judging module 201 is configured to receive power consumption data, and judge whether the power consumption data meets a preset element evidence storing rule and is complete;
the uploading module 202 is configured to upload the electricity consumption data to a block chain when the electricity consumption data meets a preset element evidence storage rule and the data is complete;
the verification module 203 is configured to verify whether the power consumption data is tampered based on a consensus algorithm, and if not, verify whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
the generating module 204 is configured to generate an electronic litigation data evidence package based on the power consumption data if the power stealing user is a power stealing user, so that the power company makes a litigation request based on the electronic litigation data evidence package.
The invention discloses an on-chain anti-electricity-stealing management device, which comprises: receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete; uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete; verifying whether the power utilization data are tampered based on a consensus algorithm, and if not, verifying whether the power utilization users corresponding to the power utilization data are electricity stealing users according to an intelligent contract; and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to put forward a litigation request based on the electronic litigation data evidence package. According to the process, the electricity utilization data are stored based on the block chain, the corresponding electronic litigation kit is finally generated based on the electricity utilization data, the whole process is carried out based on the block chain, and the block chain has the characteristics of being not falsifiable, open and transparent, so that the problems that the block chain is easily questioned by the other party in dispute or court trial processes and is not beneficial to whole case processing and evidence-lifting work are solved.
In this embodiment of the present invention, the determining module 201 includes:
a first judgment unit 205 and a comparison unit 206.
Wherein the content of the first and second substances,
the first determining unit 205 is configured to determine whether the power consumption data includes a data original, a hash value, and data time;
the comparing unit 206 is configured to compare the original power consumption data stored at the sending end with the hash value of the power consumption data.
In this embodiment of the present invention, the verification module 203 includes:
comparison section 207, calculation section 208, calculation and comparison section 209, and determination section 210.
Wherein the content of the first and second substances,
the comparison unit 207 is configured to perform cross comparison on the electricity consumption data;
the calculating unit 208 is configured to calculate a theoretical line loss rate of the electricity consumption user corresponding to the electricity consumption data when the comparison is passed;
the calculating and comparing unit 209 is configured to obtain an actual line loss rate of the power consumer, calculate a ratio of the actual line loss rate exceeding a theoretical line loss rate, and compare the ratio with a preset ratio threshold;
the determining unit 210 is configured to determine that the power consumption user is a power stealing user if the ratio is greater than a preset ratio threshold, and otherwise, that the power consumption user is a non-power stealing user.
In this embodiment of the present invention, the calculating unit 208 includes:
a first calculation subunit 211 and a second calculation subunit 212.
Wherein the content of the first and second substances,
the first calculating subunit 211 is configured to calculate a line loss electric quantity based on a preset formula, where the preset formula is:
Figure BDA0003474173070000131
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
the second calculating subunit 212 is configured to use a ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
In this embodiment of the present invention, the generating module 204 includes:
second determining section 213, associating section 214, and generating section 215.
Wherein the content of the first and second substances,
the second judging unit 213 is configured to judge whether field evidence obtaining information matched with the electricity stealing user exists in the electricity consumption data, and if not, prompt the marketing system to perform field evidence obtaining;
the association unit 214 is configured to complete association between the electricity consumption information and the work order information based on the electricity consumption number of the electricity stealing user if the electricity stealing user exists, so as to obtain target electricity consumption data;
the generating unit 215 is configured to generate an electronic litigation data evidence package based on the target electricity consumption data.
It should be noted that, the embodiments in this specification are all described in a progressive manner, and each embodiment is mainly described in terms of its apparatus type embodiment, because it is basically similar to the method embodiment, the description is relatively simple, and related points can be referred to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in a plurality of software and/or hardware when implementing the invention.
From the above description of the embodiments, it is clear to those skilled in the art that the present invention can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
The method and the device for managing anti-electricity-stealing on the chain provided by the invention are described in detail, the principle and the implementation mode of the invention are explained by applying specific examples, and the description of the examples is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. An on-chain electricity stealing prevention management method is characterized by comprising the following steps:
receiving power consumption data, and judging whether the power consumption data meets a preset element evidence storage rule and is complete;
uploading the electricity utilization data to a block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
verifying whether the power consumption data are tampered based on a consensus algorithm, and if not, verifying whether the power consumption users corresponding to the power consumption data are electricity stealing users according to an intelligent contract;
and if the electricity stealing users are electricity stealing users, generating an electronic litigation data evidence package based on the electricity utilization data so as to enable the power company to make a litigation request based on the electronic litigation data evidence package.
2. The method of claim 1, wherein determining whether the electricity consumption data meets a predetermined element evidence rule and is complete comprises:
judging whether the electricity consumption data contains a data original text, a hash value and data time;
and comparing the original electricity consumption data stored at the sending end with the hash value of the electricity consumption data.
3. The method of claim 1, wherein verifying whether the electricity consumption user corresponding to the electricity consumption data is an electricity stealing user according to an intelligent contract comprises:
performing cross comparison on the electricity utilization data;
under the condition that the comparison is passed, calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data;
acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
if the ratio is larger than a preset ratio threshold value, the power utilization user is judged to be a power stealing user, otherwise, the power utilization user is a non-power stealing user.
4. The method of claim 3, wherein calculating a theoretical line loss rate of the electricity consumer corresponding to the electricity data comprises:
calculating the line loss capacity based on a preset formula, wherein the preset formula is as follows:
Figure FDA0003474173060000011
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and taking the ratio of the line loss electric quantity to the daily active electric quantity of the summary table as a theoretical line loss rate.
5. The method of claim 1, wherein generating an electronic litigation-data evidence package based on the electricity usage data comprises:
judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
if the electricity stealing number exists, the association between the electricity information and the work order information and the electricity utilization data is completed based on the electricity utilization number of the electricity stealing user, and target electricity utilization data are obtained;
and generating an electronic litigation data evidence package based on the target electricity utilization data.
6. An on-chain anti-electricity-stealing management device, comprising:
the judging module is used for receiving the electricity utilization data and judging whether the electricity utilization data meet a preset element evidence storage rule and whether the electricity utilization data are complete or not;
the uploading module is used for uploading the electricity utilization data to the block chain under the condition that the electricity utilization data meet a preset element evidence storage rule and the data are complete;
the verification module is used for verifying whether the power consumption data are tampered based on a consensus algorithm, and if the power consumption data are not tampered, verifying whether a power consumption user corresponding to the power consumption data is a power stealing user according to an intelligent contract;
and the generation module is used for generating an electronic litigation data evidence package based on the electricity utilization data if the electricity stealing user is the electricity stealing user, so that the power company can make a litigation request based on the electronic litigation data evidence package.
7. The apparatus of claim 6, wherein the determining module comprises:
the first judgment unit is used for judging whether the electricity consumption data contains a data original text, a hash value and data time;
and the comparison unit is used for comparing the original electricity consumption data stored by the sending end with the hash value of the electricity consumption data.
8. The apparatus of claim 6, wherein the verification module comprises:
the comparison unit is used for performing cross comparison on the electricity utilization data;
the calculation unit is used for calculating the theoretical line loss rate of the electricity utilization user corresponding to the electricity utilization data under the condition that the comparison is passed;
the calculation and comparison unit is used for acquiring the actual line loss rate of the electricity user, calculating the proportion of the actual line loss rate exceeding the theoretical line loss rate, and comparing the proportion with a preset proportion threshold;
and the judging unit is used for judging that the power utilization user is a power stealing user if the ratio is larger than a preset ratio threshold value, otherwise, the power utilization user is a non-power stealing user.
9. The apparatus of claim 8, wherein the computing unit comprises:
the first calculating subunit is configured to calculate a line loss capacity based on a preset formula, where the preset formula is:
Figure FDA0003474173060000031
wherein Q represents the daily non-working electricity quantity of the general meter, E represents the daily active electricity quantity of the general meter, X represents the reactance of the lead, R represents the resistance of the lead, U1Indicating head end voltage, U2Representing the voltage at the endmost meter box, q1Represents monthly power loss q of the unidirectional electric energy meter2Represents monthly loss electric quantity m of the three-phase electric energy meter1Representing the number m of unidirectional electric energy meters2Representing the number of the three-phase electric energy meters;
and the second calculating subunit is used for taking the ratio of the line loss electric quantity to the total daily active electric quantity as a theoretical line loss rate.
10. The apparatus of claim 6, wherein the generating module comprises:
the second judgment unit is used for judging whether field evidence obtaining information matched with the electricity stealing users exists in the electricity utilization data or not, and prompting a marketing system to carry out field evidence obtaining if the field evidence obtaining information does not exist;
the association unit is used for completing association with the electricity utilization data based on the electricity utilization number of the electricity stealing user, the electricity utilization information and the work order information to obtain target electricity utilization data if the electricity stealing user exists;
and the generating unit is used for generating an electronic litigation data evidence package based on the target electricity utilization data.
CN202210050550.9A 2022-01-17 2022-01-17 On-chain anti-electricity-stealing management method and device Pending CN114399317A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210050550.9A CN114399317A (en) 2022-01-17 2022-01-17 On-chain anti-electricity-stealing management method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210050550.9A CN114399317A (en) 2022-01-17 2022-01-17 On-chain anti-electricity-stealing management method and device

Publications (1)

Publication Number Publication Date
CN114399317A true CN114399317A (en) 2022-04-26

Family

ID=81229976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210050550.9A Pending CN114399317A (en) 2022-01-17 2022-01-17 On-chain anti-electricity-stealing management method and device

Country Status (1)

Country Link
CN (1) CN114399317A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114648255A (en) * 2022-05-18 2022-06-21 国网浙江省电力有限公司 Inspection method and platform based on marketing business risk digital internal control system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114648255A (en) * 2022-05-18 2022-06-21 国网浙江省电力有限公司 Inspection method and platform based on marketing business risk digital internal control system

Similar Documents

Publication Publication Date Title
CN111259070B (en) Method and related device for storing and acquiring service data
CN107909358B (en) Energy settlement method, device and system
US10564661B2 (en) Power control device, power management device and power management system
JP6719561B2 (en) Supply medium (eg, electricity) trading contract system
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN110348643B (en) Distributed power transaction contract consensus method based on energy block chain
CN109472164A (en) The verification method and its network and electronic equipment of contract dataset
JP6379538B2 (en) Method and system for sharing energy usage data
CN109636610B (en) Decentralized data transaction system and method
CN110795767A (en) Electric power transaction method, device and system and trusted cloud platform
CN113010605A (en) Green power source tracing method and device based on block chain
CN114399317A (en) On-chain anti-electricity-stealing management method and device
CN114218591A (en) Digital asset management method capable of realizing anonymous transaction
Rajasekar et al. Blockchain utility in renewable energy
Yip et al. A privacy-preserving and cheat-resilient electricity consumption reporting scheme for smart grids
CN116385028A (en) Carbon asset data management method, device and server
Perekalskiy et al. Setup of a local P2P electric energy market based on a smart contract blockchain technology
Wang et al. Privacy‐Preserving Meter Report Protocol of Isolated Smart Grid Devices
CN114726548A (en) Cross-chain-supported green electricity tracing method and system
KR102495474B1 (en) Apparatus and method for authenticating power consumption details based on blockchain
EP3859652A1 (en) Technique for trustless cryptographic verification of energy allocations
TWI721930B (en) Allocation document transmission system with multiple processing nodes
Taylor An analysis of bitcoin and the proof of work protocols energy consumption, growth, impact and sustainability
CN113554322A (en) Control method of demand response management platform based on block chain technology
CN113032828A (en) Improved binary system interaction information encryption method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination