Control method for performing management on U disk after access into industrial control system network

An industrial control system and control method technology, applied in the field of network information, can solve the problems of uncommon chips, high cost, low security and inability to prevent viruses, etc., achieve strong practical value and practical significance, low cost, and prevent confidential information from leaking. Effect

Inactive Publication Date: 2015-06-03
北京威努特技术有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The disadvantage of this solution is: low security and no anti-virus
[0017] The disadvantages of this solution are: high cost, and the chip is not universal, because the manufacturer provides a secondary development interface
[0018] In summary, the shortcoming of above-mentioned prior art is: 1, common U-disk makes safe U-disk, and security is low and can not anti-virus
2. Manufacturers provide tools and chips to make secure U disks, which is costly and the chips are not universal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Embodiments of the present invention will be described in detail below. A control method for accepting management after a U disk is connected to an industrial control system network of the present invention adopts a policy server, a client terminal and a safe U disk; the policy server is used to issue policies to the client terminal; the safe U disk The disk is connected to the industrial control system network, and the client terminal controls the secure U disk according to the policy issued by the policy server to the client terminal. The policy issued by the policy server to the client terminal includes: a secure USB disk ID and ID mapping security USB disk control mode, the security USB disk control mode consists of a read-only mode, a write-only mode, a read-write mode, and a disabled mode. The client terminal is defined as a computer equipped with industrial control security system software. The definition of the safe U disk is: it has its own private file system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a control method for performing management on a U disk after access into an industrial control system network. The control method is characterized in that a strategy server, a client terminal and a secure U disk are adopted; the strategy server is used for issuing a strategy to the customer terminal; the secure U disk accesses the industrial control system network; the client terminal controls the secure U disk according to the strategy issued to the client terminal by the strategy server. The control method has the advantages that viruses are prevented from invading an industrial control network; the confidential information of the industrial control network is prevented from leaking; the secure U disk can be used for safely sharing data between client terminals in the industrial control network; when the secure U disk is separated from the industrial control system network, a user cannot open or use the U disk, so that the invasion of viruses is avoided; any U disk can be made into the secure U disk via processing with the method, the cost is low, and operation is easy.

Description

technical field [0001] The invention relates to a control method for receiving management after a U disk is connected to an industrial control system network, and belongs to the field of network information technology. Background technique [0002] At present, the internal network where the industrial control system network is located is physically / logically isolated from the Internet. In order to penetrate into the internal network, the Stuxnet virus has designed a relatively complete set of propagation strategies and attack procedures, which can be "ferried" to internal network for dissemination. Stuxnet exploits software vulnerabilities in industrial control systems to attack specific PLC (Programmable Logic Controller) devices, and its ultimate attack target is PLC. The Stuxnet virus has sounded the alarm for the network information security of the industrial control system, and the U disk is one of the main ways for the network virus intrusion of the industrial control...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/34G06F21/79
Inventor 程灿涛黄敏
Owner 北京威努特技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products