Industrial control identity authentication method and device with state cryptographic algorithms
A technology of identity authentication and industrial control, applied in user identity/authority verification, digital data authentication, public key for secure communication, etc., can solve national information security threats and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0071] See Figure 1 to Figure 26 , To realize the present invention, an industrial control identity authentication method and device using national secret algorithm are composed of identity authentication authorization management server A and national secret serial port identity authentication terminal B. The identity authentication and authorization management server A is composed of TCM security chip 4, operating system 3, identity authentication and authorization management system 2, industrial firewall 1, external network interface 9, internal network interface 10 and BIOS8; consists of SM1 algorithm engine 510, SM2 algorithm engine 520. The CPU5 of the SM3 algorithm engine 530, the secure memory 6, and the chip operating system 7 form the national secret serial port identity authentication terminal B. The TCM security chip 4 is composed of a cryptographic algorithm module 410, a data security storage module 420, an integrity measurement module 430, an integrity report mod...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap