Security operation and maintenance architecture of industrial control system

An industrial control system and security technology, which is applied in the framework of the cloud platform of security operation and maintenance services, can solve problems such as the limitation of storage session computing resources, and achieve the effect of enhancing information security

Active Publication Date: 2018-06-26
NANJING LIANCHENG TECH DEV
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing server-based security solutions are not suitable for application in the industrial control system environment with limited computing resources of edge devices, for example, the storage of session data on edge devices may be limited by computing resources, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security operation and maintenance architecture of industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Below is further detailed description of the present invention according to accompanying drawing and example:

[0023] figure 1 It is a schematic structural diagram of a security operation and maintenance architecture of an industrial control system according to the present invention. The architecture includes an authentication server and a BROKER server.

[0024] Further, the main functions of the authentication server are as follows:

[0025] (1) Responsible for user authentication, when the user needs to access the security operation and maintenance service cloud platform, first access the authentication server to perform user authentication, and if the authentication is successful, then feed back the token of the IoT device.

[0026] (2) Responsible for the certification of edge devices (sensors / actuators) newly deployed in industrial control systems. The edge device will report the ID number created by using blockchain technology to the authentication server. If...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses security operation and maintenance architecture of an industrial control system. With introduction of an authentication server and a BROKER server as well as a block chain technology and a stateless authentication technology, the real-time safety management system for field edge equipment like a sensor or an execution mechanism can be realized, so that the edge equipment and a client are in a loose coupling relationship. The BROKER server has functions of data forwarding, analysis and decision making. The traditional server-based security operation and maintenance architecture is no longer suitable for the current industrial control system environment. The security operation and maintenance architecture disclosed by the invention has advantages of high extendibility, flexibility, and reliability enables the information security of the industrial control system to be enhanced.

Description

technical field [0001] The invention relates to the technical fields of information security and industrial control systems, in particular to a framework for building an intelligent, fast and efficient safe operation and maintenance service cloud platform. Background technique [0002] The English abbreviation included in the present invention is as follows: [0003] MQTT: MQ Telemetry Transport MQ telemetry transmission [0004] SOC: Security Operation Center Security Management Center [0005] ID: unique identification number of identifier [0006] IDS: Intrusion Detection Systems intrusion detection system [0007] SNMP: Simple Network Management Protocol Simple Network Management Protocol [0008] Safe production has always been the prerequisite for ensuring the orderly development of various tasks, and it is also a veto indicator for evaluating leading cadres at all levels. The industrial network and information security operation and maintenance system is an impor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
CPCH04L41/00H04L41/04H04L41/28H04L63/0823H04L9/3263H04L9/3239H04L2209/805H04L9/50
Inventor 李木金凌飞
Owner NANJING LIANCHENG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products