Method and system for identity authentication and encryption of industrial user

A technology for identity authentication and industrial users, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as the inability to guarantee the authenticity of data packets and low security of data transmission, to ensure operation rights, solve low security, The effect of ensuring safety

Active Publication Date: 2016-11-09
SEATECH TIANYU TECH BEIJING
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and system for industrial user identity authentication and encryption to solve the problem that the data transmission security of the current industrial information system is low and the authenticity of the data packets cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identity authentication and encryption of industrial user
  • Method and system for identity authentication and encryption of industrial user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] The system for implementing industrial user identity authentication and encryption in Embodiment 1 includes hardware devices and related software. Hardware devices include: encryption gateway, electronic key, user terminal equipment, authentication server; related software includes: client software and gateway software.

[0056] The client software is installed on the user terminal device. When using the client software, the user needs to insert an electronic key. Each electronic key can only be bound to one terminal device. The user terminal device can read data from the electronic key; the gateway device Two-way information exchange with user terminal equipment; two-way information exchange between user terminal equipment and authentication server.

[0057] The electronic key is uniformly managed by the certificate authority center. Each electronic key contains a user certificate and integrates the relevant encryption algorithm approved by the State Cryptography Admin...

Embodiment 2

[0071] The structure of the system for realizing industrial user identity authentication and encryption in Embodiment 2 is the same as that in Embodiment 1, the only difference is that the authentication server is an OCSP authentication server, and the user certificate adopts an online authentication method.

[0072] The flow of information transmission using the industrial user identity authentication and encryption system is as follows: figure 2 As shown, specifically:

[0073] Step 1: The user terminal device sends an industrial control command;

[0074] Step 2: The client software obtains the industrial control instruction information by using the industrial control protocol engine integrated in the client software;

[0075] Step 3: The client software calculates the hardware code of the user terminal device, and then reads the bound hardware code in the electronic key for comparison. If they are consistent, perform step 4; otherwise, terminate the current operation;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of industrial information security technologies, in particular to a method and a system for identity authentication and encryption of an industrial user. The method comprises the following steps that an electronic key is connected to user terminal equipment through a USB interface and login of a client is realized through the user terminal equipment; a client compares a hardware feature code of the user terminal equipment and a hardware feature code bound with the electronic key, if the hardware feature code of the user terminal equipment and the hardware feature code bound with the electronic key are consistent and an authentication server verifies that a user certificate has legality, the client obtains industrial control command information and carries out encryption and packaging processing to obtain an encrypted data packet; the client transmits the data packet to an encryption gateway; and the encryption gateway carries out unpacking and decryption processing on the data packet to obtain decrypted industrial control command information and transmits the industrial control command information to an OPC server. According to the method and the system, a problem that the truth of the data packet cannot be guaranteed due to the low data transmission security of the industrial information system at the present stage is solved.

Description

technical field [0001] The invention relates to the technical field of industrial information security, in particular to a method and system for industrial user identity authentication and encryption. Background technique [0002] With the popularization of information technology and network technology in industrial systems, openness, interconnection and standardization have become an inevitable trend in the development of industrial information systems, and the dependence of industrial systems on information systems is becoming stronger and stronger. Therefore, the development of industrial information systems Security issues are attracting more and more people's attention. The existing computer systems, information networks, business systems and people's security awareness already have a certain security foundation. However, the industrial information system network is still in the stage of rapid development. The existing Security products such as firewalls and VPNs (Virtu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L63/0876
Inventor 晏培
Owner SEATECH TIANYU TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products