Fusion and authentication method and system of identity and authority in industrial control system

An industrial control system and authentication method technology, which is applied in the field of identity and authority authentication, can solve the problems of inconvenient use and management, inconvenient confirmation of its authority, inapplicability of identity certificates and attribute certificates, etc., to achieve complete information preservation and management Convenience and large storage space

Active Publication Date: 2012-04-18
ASAT CHINA TECH
View PDF5 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] However, in the industrial field, the roles corresponding to users are limited, and the permissions corresponding to users of each role are relatively fixed. If the permissions change, usually their identities will also change, so the existing identities are not applicable. Certificates and attribute certificates, using the existing technology of identity certificates and attribute certificates makes the industrial control system must support two reliable third parties (CA and AA) at the same time, and needs to manage multiple certificates, which is more inconvenient to use and manage
[0011] Moreover, there are many types and quantities of equipment involved in the industrial field, and the types of user permissions are very complicated. Taking operators as an example, different operators may have different operation permissions for different equipment. Using the existing attribute certificate Authentication of permissions by means of authentication, cannot list all permissions well, and it is inconvenient to confirm their permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fusion and authentication method and system of identity and authority in industrial control system
  • Fusion and authentication method and system of identity and authority in industrial control system
  • Fusion and authentication method and system of identity and authority in industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present invention clearer, the following will further describe the implementation of the present invention in detail in conjunction with the accompanying drawings.

[0049] The first embodiment of the present invention relates to a fusion authentication method of identity and authority in an industrial control system. In this embodiment, CA and AA are fused together to form an authentication center, a key management institution (PKI) and a authority control institution (PMI) are fused together to form a key and authority control institution, and a An authority database, storing authority information corresponding to users with different roles.

[0050] In this embodiment, the user initiates a request to the administrator to apply for an identity certificate, and the administrator applies for the user's identity certificate through the client and sets corresponding permissions. The specific process o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fusion and authentication method and system of identity and authority in an industrial control system. The method comprises the following steps of: storing role information of a user into an identity certificate through fusing an attribute certificate and the identity certificate; setting an authority database; saving authority information corresponding to different roles of the user; first, authenticating the identity of the user while the user logs into the system; extracting the authority information of the user according to the user name information and a role information association authority database in the identity certificate after passing the authentication; and providing resources corresponding to the authority to the user by the system. Therefore, the industrial control system can finish the user identity authentication and complicated authority authentication in the industrial field only by supporting one reliable third party and using one certificate under the situation of support system security grade. The two certificates are combined into one so that the management is more convenient. The specific authorities of the user in different roles are saved in the authority database; and larger information storage space and more complete preservation of the information are obtained.

Description

technical field [0001] The invention relates to an authentication technology of identity and authority Background technique [0002] In order to provide public network user directory information services, the International Telecommunications Union (International Telecommunications Union, referred to as "ITU") formulated the X.500 Directory Access Protocol (Directory Access Protocol, referred to as "DAP") series of standards in 1988. Among them, X.500 and X.509 (public key infrastructure) are the core of the security authentication system. X.500 defines a distinguishing naming rule, which uses a naming tree to ensure the uniqueness of user names; X.509 is X. The 500 user name provides a communication entity authentication mechanism, and specifies the widely applicable certificate syntax and data interface in the entity authentication process. X.509 is called a certificate. [0003] The authentication framework given by X.509 is an authentication service key management based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 王磊梁俊
Owner ASAT CHINA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products