Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety exchange method for MMS specification application layer

An interaction method and application layer technology, applied in the field of power information communication security, can solve the problems of not paying attention to safety, no protection measures in substations, and only focusing on IED shared communication.

Inactive Publication Date: 2015-06-10
CHINA SOUTHERN POWER GRID COMPANY
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, when the DL / T 860 standard was proposed, it only paid attention to the shared communication between IEDs, but did not pay attention to the security in the communication process. As a result, once the substation is invaded, and there are no protective measures inside the substation, the consequences will be very difficult. to imagine

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety exchange method for MMS specification application layer
  • Safety exchange method for MMS specification application layer
  • Safety exchange method for MMS specification application layer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] An interactive method for MMS application layer security reinforcement, by extending the MMS protocol, adding identity authentication and access control technology in the MMS application layer, so that unauthorized users cannot associate with the MMS server and corresponding MMS services.

[0023] Such as figure 1 As shown, this method occurs between the MMS client and the MMS server, and the specific steps are as follows:

[0024] Step 1: Enable the authentication function and expand the authentication data structure.

[0025] Such as figure 2 As shown, enable the association authentication function unit of ACSE (Association Control Service Element, association authentication service unit) on the MMS application layer, and expand the authentication data structure, as follows,

[0026]

[0027] The extended authentication data structure includes the certificate C, the current system time T and the signature value SV of the time using the private key.

[0028] Step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety exchange method for an MMS specification application layer. When an intelligent substation device uses MMS message communication, the MMS application layer safety reinforcing exchange method enables both MMS protocol communication sides to perform identity authentication at the application through carrying out safety improvement on the MMS application layer and controls the access authority of an MMS client through using role-based access based on the authentication. The safety exchange method for the MMS specification application layer includes steps that 1) starting an MMS association authorization function, and extending authorization data structure; 2) through extending the authorization data structure, using a public encryption algorithm to carry out identity authorization on the association process of the MMS application layer, and at the same time, performing relay attack protection; 3) using a role-based access control technology to construct the access control relationship between the MMS client and MMS service, after passing the association authentication, allowing an MMS server to use a configured access control relation table to carry out fine-grained access control on the MMS client, if the MMS client meets the demand, allowing the MMS client to access the corresponding service, otherwise, refusing to provide service.

Description

technical field [0001] The invention relates to the field of power information communication security, in particular to an MMS application layer reinforcement security interaction method based on the MMS protocol. Background technique [0002] MMS (Manufacturing Message Specification) is a communication message specification for industrial control systems defined by the ISO / IEC9506 standard. MMS regulates the communication behavior of smart sensors, smart electronic devices, and smart control devices with communication capabilities in the industrial field, enabling interoperability between devices from different manufacturers, and making system integration simple and convenient. [0003] DL / T 860 (equivalent to the international standard IEC 61850) is the national standard for intelligent substation communication protocols, which proposes a set of public communication standards for substations. Through a series of standardization of equipment, IEDs (Intelligent Electronic De...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/168H04L63/08H04L63/10
Inventor 陶文伟李金张喜铭梁寿愚胡荣
Owner CHINA SOUTHERN POWER GRID COMPANY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products