Unlock instant, AI-driven research and patent intelligence for your innovation.

A security authentication method and system

A technology of security authentication and authentication device, applied in the field of control system security in the heating industry, can solve the problems of data transmission without encryption, inability to effectively prevent non-compliance with security requirements, inability to achieve two-way identity authentication, etc., to achieve the effect of improving security

Active Publication Date: 2019-10-25
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problems in the prior art that there is no encryption for data transmission, and the two-way identity authentication between entities cannot be realized, and the problems that terminals that do not meet the security requirements cannot be effectively prevented from accessing the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A security authentication method and system
  • A security authentication method and system
  • A security authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 4

[0115] The present invention provides an embodiment 4 of a security authentication system suitable for the security authentication method described in embodiments 1 and 2, and the system may include:

[0116] an application server, an acquisition device and an authentication device,

[0117] The application server is used to send data instructions to the authentication device for encryption, receive the encrypted data instructions from the authentication device and send the encrypted data instructions to the acquisition device, and receive the encrypted data instructions from the authentication device. The encrypted execution result of the data instruction returned by the acquisition device, and sending the encrypted execution result of the data instruction to the authentication device for decryption, receiving the decrypted execution result of the data instruction by the authentication device,

[0118] The acquisition device is used to receive and decrypt the data instruction...

Embodiment 5

[0123] For the security authentication method described in Embodiment 3, the present invention also provides Embodiment 5 of a security authentication system applied to the security authentication method. The system may include:

[0124] an application server, an acquisition device and an authentication device,

[0125] The application server is used to receive the encrypted data command sent by the collection device and send it to the authentication device, receive the decrypted data command from the authentication device and execute the data command and return the data command for execution The result is decrypted by the authentication device, and is also used to receive the encrypted data instruction execution result sent by the authentication device and send it to the collection device,

[0126] The acquisition device is used to send the encrypted data instruction to the application server, and is also used to receive the encrypted data instruction execution result of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety authentication method, and is used for the heat supply industry control system safety field. The safety authentication method is characterized in that an application server is used to transmit a data instruction to an authentication device for encryption; the authentication device is used for the encryption of the data instruction, and then is used to transmit the encrypted data instruction to the application server; the application server is used to transmit the data instruction to an acquisition device; the acquisition device is used to decrypt the above mentioned data instruction, and is used to execute the data instruction, and then is used to return the encrypted data instruction execution result to the application server; the application server is used to transmit the encrypted data instruction execution result to the authentication device for the decryption; the authentication device is used to receive and decrypt the encrypted data instruction execution result, and then is used to transmit the decrypted data instruction execution result to the application server; and the application server is used to receive the decrypted data instruction execution result. By adopting the safety authentication method, the key exchange problem before the communication can be solved effectively.

Description

technical field [0001] The invention relates to the security field of control systems in the heating industry, in particular to a security authentication method and system. Background technique [0002] The state proposes to ensure the safety of industrial control systems, strengthen industrial control systems in important areas such as nuclear facilities, aerospace, advanced manufacturing, petroleum and petrochemicals, oil and gas pipeline networks, power systems, transportation, water conservancy hubs, and urban facilities, as well as Internet of Things applications, digital cities, etc. Safety protection and management during construction, focusing on strengthening supervision of industrial control systems that may endanger life and public property safety. [0003] At present, most of the control systems in the heating industry adopt public protocols for plain text transmission, and large-scale industrial control equipment is occupied by foreign manufacturers. Once the fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 张一帆巩金亮李明张晓武王星尹
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More