Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method and Device for Industrial Control Identity Authentication Using National Secret Algorithm

A technology of identity authentication and industrial control, applied in user identity/authority verification, general control system, program control, etc., can solve national information security threats and other issues

Inactive Publication Date: 2016-09-14
北京时简科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although TCG is a non-profit organization and the technology of TPM is also open, international giants such as Microsoft, Intel, and IBM still master the core technology, so security equipment using TPM standards will pose a huge threat to national information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method and Device for Industrial Control Identity Authentication Using National Secret Algorithm
  • A Method and Device for Industrial Control Identity Authentication Using National Secret Algorithm
  • A Method and Device for Industrial Control Identity Authentication Using National Secret Algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] see Figure 1 to Figure 2 6. An industrial control identity authentication method and device using a national secret algorithm to realize the present invention is composed of two parts: an identity authentication authorization management server A and a national secret serial port identity authentication terminal B. An identity authentication and authorization management server A is composed of a TCM security chip 4, an operating system 3, an identity authentication and authorization management system 2, an industrial firewall 1, an external network interface 9, an internal network interface 10, and BIOS8; it consists of an SM1 algorithm engine 510 and an SM2 algorithm engine 520, the CPU 5 of the SM3 algorithm engine 530, the secure memory 6, and the chip operating system 7 form the national secret serial port identity authentication terminal B. The TCM security chip 4 is composed of a cryptographic algorithm module 410, a data security storage module 420, an integrity ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An industrial control identity authentication method and device applying a national secret algorithm, relating to the field of industrial control security. The present invention consists of an identity authentication and authorization management server including a TCM security chip, an operating system, an identity authentication and authorization management system, an industrial firewall, an external network interface, an internal network interface and BIOS, and a national secret serial port identity including a CPU, a secure memory, and a chip operating system. Authentication terminal composition. The present invention realizes the credible operation of the identity authentication and authorization management server, the read-only access terminal, the configuration modification terminal, the different authority authorization of the security management terminal and three kinds of national secret serial port identity authentication terminals through the combined application of the national secret algorithm SM1, SM2 and SM3 The implementation method of accessing the authority of the industrial control system through the extranet. The present invention can effectively and strictly manage the boundary between the industrial control system and the external network to meet the safety needs of the industrial control system in my country. The present invention has the characteristics of safety, reliability, rapid promotion, easy maintenance, low operating cost and universal application.

Description

technical field [0001] The invention relates to the field of industrial control security, in particular to solve the border security problem of connecting an industrial control system integrated with high-speed industrial Ethernet ring network and automation platform software with external networks and other systems. Background technique [0002] The Ministry of Industry and Information Technology of the People's Republic of China issued the "Notice on Strengthening Information Security Management of Industrial Control Systems" in October 2011. The "Notice" pointed out that data acquisition and monitoring SCADA, distributed control system DCS, process control system PCS, and Industrial control systems such as programmable logic controller PLC and remote terminal RTU are widely used in the fields of industry, energy, transportation, water conservancy and municipal administration to control the operation of production equipment. Once there is a loophole in the information secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
CPCG06F21/44G05B19/00G06F21/57H04L63/02H04L63/123
Inventor 李岩李神兵宋进阳江仟仪
Owner 北京时简科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products