Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial control equipment security authentication method, server and client

A technology for industrial control equipment and security authentication, applied in the field of information security, can solve the problems of affecting system response capability, affecting system operation efficiency, and high deployment cost, achieving the effect of simple and flexible secure communication and encryption authentication process, and saving deployment cost.

Inactive Publication Date: 2018-12-21
北京幺正科技有限公司 +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In traditional IT systems, measures such as handshake protocols and encryption are often used to enhance security. In industrial control systems, adding security measures may seriously affect the responsiveness of the system. For example, if each industrial control device frequently accesses the background server to transmit Information authentication will affect the operating efficiency of the entire system, and this information security system needs to run many servers at the same time for support, and the deployment cost will be very high, so traditional information security technology cannot be directly applied to industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control equipment security authentication method, server and client
  • Industrial control equipment security authentication method, server and client
  • Industrial control equipment security authentication method, server and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The implementation of the present invention will be described in detail below with reference to the drawings and examples, so as to fully understand and implement the implementation process of how to use technical means to solve technical problems and achieve technical effects in the present invention.

[0027] figure 1 It is a security authentication method for industrial control equipment provided by the embodiment of the application, which is applicable to a key management center, and the method includes the following steps.

[0028] In step S10, a public key matrix and a private key matrix are generated using an ECC algorithm, and the public key matrix is ​​made public.

[0029] The key management center presets the ECC (Elliptic Curves Cryptography, Elliptic Curve Cryptography) algorithm, selects an elliptic curve to generate a public key matrix (PSK) and a private key matrix (SSK), which are used to generate corresponding public and private keys. Among them, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial control equipment security authentication method, a server and a client, which are applicable to a key management center. The industrial control equipment security authentication method comprises: generating a public key matrix and a private key matrix by use of an ECC algorithm and exposing the public key matrix; obtaining industrial control equipment identification and generating the private key of the industrial control equipment according to the private key matrix; and sending the private key to the industrial control equipment and saving the private key in the programmable logic controller of the industrial control equipment for communication security authentication. In the authentication and encrypted communication process, the intervention of a key management center is not required and offline authentication of the key management center is realized, and therefore, the deployment cost is greatly saved and the security communication and encrypted authentication process are enabled to be extremely simple and flexible, and the industrial control equipment security authentication method, the server and the client are suitable for the data communication characteristics in the industrial control field.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method for security authentication of industrial control equipment, a server and a client. Background technique [0002] Industrial control systems have a wide range of applications in process production, power utilities, hydraulic oil and gas, and transportation. Industrial control systems increasingly use Internet technology to realize interconnection with enterprise networks. At present, most industrial communication systems develop protocols on the basis of commercial operating systems, and there are many loopholes in communication applications. These vulnerabilities are exposed to potential attackers when industrial control systems are interconnected with the Internet or other public networks. In addition, industrial control systems are mostly used to control critical infrastructure, and attackers will actively attack them for political or economic purpose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 闵永明
Owner 北京幺正科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products