Information security management and control method under cloud manufacturing environment

A technology of information security and cloud manufacturing, which is applied in the direction of public key for secure communication, user identity/authority verification, electrical components, etc., and can solve problems such as not supporting certificate operation and certificate login

Inactive Publication Date: 2012-10-03
CHONGQING UNIV
View PDF4 Cites 163 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the PKI system based on the public key infrastructure is applied to the cloud manufacturing system, although many

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management and control method under cloud manufacturing environment
  • Information security management and control method under cloud manufacturing environment
  • Information security management and control method under cloud manufacturing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0064] The present invention establishes a secure tunnel VPN based on multi-layer protocols such as secure Internet protocol (IPSec), secure socket layer protocol (SSL), S / MIME, PEM, SSH, etc., and realizes the network security access of cloud manufacturing system Intranet, Extranet and Internet ; Through the issuance of X.509 digital certificates based on the public key infrastructure PKI system, and the use of digital envelope technology to protect the session key SK, two-way identity authentication, digital signatures, and technical information encryption between users and cloud servers can be realized. Guarantee the confidentiality, integrity, non-repudiation, availability and controllability of the whole process of information transmission, sharing and use, su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security management and control method under a cloud manufacturing environment. On the basis of a network security protocol, a password technology and a public key infrastructure (PKI), comprehensive security guarantee is supplied to information interaction among cloud internal networks, between one cloud and another cloud, and between a user and each cloud by using implementation technologies and methods, such as a virtual private network (VPN) based on multiple layers of protocols, a digital envelope and a password algorithm; Intranet, Extranet and Internet of a cloud manufacturing system are covered; comprehensive management and control technical information files are stored and transmitted to each used loop; a session key (SK) which is randomly produced by using a key production protocol is used for symmetrically encrypting the technical information files; and a receiver public key obtained according to a PKI digital certificate asymmetrically encrypts the SK to form the digital envelope for protecting the technical information files and the SK. The information security management and control method has the characteristics of being high in confidentiality, high inefficiency, flexible in arrangement and the like and can be widely applied to the cloud manufacturing system and other network manufacturing systems.

Description

[0001] technical field [0002] The present invention relates to an information security management and control method in a cloud manufacturing environment, and specifically refers to a method for user-oriented collaborative information security interaction and sharing under a cloud manufacturing mode established through a multi-layer security communication protocol, cryptographic technology and public key infrastructure PKI . The invention belongs to the technical field of distributed manufacturing system information integration. technical background [0003] With the rapid development of information technology and computer network technology, a batch of cross-enterprise, cross-regional and even cross-border collaborative processing and manufacturing industries have emerged, and have gradually become one of the important components of my country's manufacturing industry. However, due to the lack of an effective resource sharing service platform and collaborative support me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L9/32H04L9/30
Inventor 尹超和迪壮李孝斌郭晨王明远
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products