Unlock instant, AI-driven research and patent intelligence for your innovation.

Security access control method, device and system

A security access control and access control technology, applied in transmission systems, electrical components, etc., can solve problems such as lack of security access control mechanism, failure to consider information security requirements, etc., to achieve the effect of solving security threats

Active Publication Date: 2020-08-25
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the biggest threat is that the existing industrial control communication protocol does not consider the requirements of information security at the beginning of design, resulting in the lack of safe access control when the upper computer in the industrial control system accesses the field control equipment through the industrial control protocol mechanism, so that attacks such as eavesdropping, tampering, replay, and insertion can be applied to key industrial control network communications, resulting in serious consequences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security access control method, device and system
  • Security access control method, device and system
  • Security access control method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] The technical solutions of the embodiments of the present invention are applied to industrial control systems, figure 1 A schematic structural view of the industrial control system provided by the present invention, such as figure 1 As shown, the industrial control system includes an access control gateway, a host computer, and a control u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security access control method and system and devices. The method comprises the following steps: setting an access control gateway on a communication channel of an upper computer and a control unit, receiving an access request message sent by the upper computer and analyzing the access request message by the access control gateway, obtaining application layer information in the access request message, judging whether a corresponding relation between an upper computer identifier and a to-be-accessed control unit identifier is searched in a security strategy library and whether operation information of the upper computer on the to-be-accessed control unit satisfies the operation authority of the upper computer by the access control gateway according to the application layer information, and if so, sending the operation information to the to-be-accessed control unit. By adoption of the security access control method and system and the devices provided by the invention, security monitoring of the access request message sent by the upper computer is realized, and the security threats faced by an industrial control system are solved.

Description

technical field [0001] The invention relates to the field of industrial control, in particular to a security access control method, device and system. Background technique [0002] Modern industrial infrastructure includes key industries such as electric power, oil and natural gas, chemical industry, water conservancy, industrial manufacturing, and traffic control, which constitute an important foundation for my country's national economy, modern society, and national security. Among them, the industrial control system (Industrial Control System, ICS) constitutes the nervous system of modern industrial infrastructure. Most of the traditional industrial control systems are closed networks using special technology, and there is no interconnection with the outside world, and the information security threats they face are not prominent. Correspondingly, various industrial control equipment, applications, systems, and communication protocols are mainly designed for proprietary c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/102H04L67/025
Inventor 李燕伟黄元飞王博张家旺王鹏翩杨鹏高强陈亮林星辰应志军吴倩杜薇陈禹张淼
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT