Terminal security protection method and equipment
A technology for terminal security and protection equipment, applied in the field of information security cryptography, which can solve the problems of no isolation function and no consideration of interconnection and communication security issues.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] Such as figure 1 As shown, a terminal security protection method includes steps:
[0027] S101, using the interrupt mode to receive the industrial process data transmitted by the terminal;
[0028] S102. Check the protocol of the industrial process data transmitted by the terminal, and discard the industrial process data that does not conform to the protocol;
[0029] S103. Encrypt and sign the industrial process data after protocol inspection according to the IPSEC (Internet Protocol Security) VPN (Virtual Private Network) security policy;
[0030] S104. Send the encrypted and signed industrial process data to the master station through the VPN channel;
[0031] S105. According to the IPSEC VPN security policy, decrypt, verify the signature, and verify the integrity of the data or control commands sent by the master station through the VPN channel after analyzing the industrial process data;
[0032] S106. Perform protocol inspection on the data or control commands ...
Embodiment 2
[0036] The difference between the second embodiment and the first embodiment is that after the control command checked by the protocol is sent to the terminal, the result of the terminal executing the control command is also transmitted to the master station.
[0037] Such as figure 2 As shown, a terminal security protection method includes steps:
[0038] S201, using the interrupt mode to receive the industrial process data transmitted by the terminal;
[0039] S202. Check the protocol of the industrial process data transmitted by the terminal, and discard the industrial process data that does not conform to the protocol;
[0040] S203. Encrypt and sign the industrial process data after protocol inspection according to the IPSEC VPN security policy;
[0041] S204. Send the encrypted and signed industrial process data to the master station through the VPN channel;
[0042] S205. According to the IPSEC VPN security policy, decrypt, verify the signature, and verify the integ...
Embodiment 3
[0068] The main difference between the third embodiment and the first embodiment is that the terminal security protection device also includes a key storage module and a dialing module.
[0069] Such as Figure 5 As shown, a terminal security protection device 320, wherein the terminal security protection device 320 is connected to the terminal 310, and performs data processing and transmission between the terminal 310 and the master station 330, including:
[0070] A serial control module 321 connected to the terminal 310, the serial control module 321 adopts the interrupt mode to receive the industrial process data transmitted by the terminal 310 or send the data or control command after protocol inspection to the terminal 310;
[0071] A protocol inspection module 322 connected to the serial control module 321, the protocol inspection module 322 performs protocol inspection on the industrial process data transmitted by the terminal 310 or performs decryption, signature veri...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


