Numerical control machine communication interface security protection method and device

A technology of safety protection device and numerical control machine tool, which is applied to electrical components, transmission systems, etc., can solve the problems of DNC network security with potential safety hazards, potential safety hazards, and the lack of supervision and auditing of internal communication of DNC processing network, so as to ensure normal and safe operation. , The effect of protecting the security of communication data and preventing abnormal data from flowing into the CNC system

Inactive Publication Date: 2018-08-21
CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the DNC system lacks control means for file transfer, and there are potential safety hazards that confidential documents and materials can be directly transferred to CNC machine tools through the DNC system;
[0007] There is no supervision and auditing of the internal communication of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Numerical control machine communication interface security protection method and device
  • Numerical control machine communication interface security protection method and device

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0027] A security protection method for a communication interface of a numerical control machine tool, the specific method is as follows: monitoring the access of peripheral interfaces in the numerical control machine tool that require access control; devices that need to access the numerical control machine tool are accessed through the access monitoring; The specific control methods include: verifying the identity of the access device, and only allowing access after passing the identity verification; uploading files are provided to CNC machine tools through the cache of access monitoring; downloading files is obtained through the WEB page of access monitoring; all operations on access devices Record and support the audit of USB operation records.

[0028] Any device or host that interacts with the CNC machine tool needs to complete the identity authentication before it can operate the data within the scope of authority, and the identity authentication is based on the domestic...

specific Embodiment 2

[0030] On the basis of specific embodiment 1, the control method also includes the following one, a combination of two or more and any combination sequence:

[0031] Identify the access operation authority of the access device; verify the access time limit of the access device; identify the access file keyword blacklist of the access device; identify the file type authority of the access operation; the access time limit refers to allowing the identity The age of the user's access, and / or the age of certain access rights.

[0032] like figure 1 Shown is a schematic flow chart of an aspect of one embodiment of the present invention.

[0033] Permissions are divided according to users, and user permissions are invalid; it supports the control of file types, the control of file upload, download and deletion, and the control of file content keywords.

specific Embodiment 3

[0034] On the basis of the specific embodiment 1 or 2, the specific method for authenticating the access device is as follows: performing identity authentication by logging into the WEB authentication page of access control, and performing identity authentication using a specified identity authentication medium.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a numerical control machine communication interface security protection method and device. The method comprises the steps that access monitoring is conducted on a peripheral interface needing access control in a numerical control machine; equipment to be accessing the numerical control machine all conduct access through access monitoring, wherein the specific control methodof access monitoring comprises the steps that identities of the access equipment are authenticated, and access is allowed only when the identities pass authentication; upload files are supplied to thenumerical control machine for use by means of caching of access monitoring; download files are acquired through a WEB page of access monitoring; and all operations of the access equipment are recorded. Accordingly, the communication data security of a numerical control system is effectively protected, abnormal data streams are prevented from flowing into the numerical control system, all networkattacks and illegal data theft behaviors which are conducted by means of the numerical control system are blocked, and normal and secure operation of the numerical control system and a numerical control machining network is guaranteed.

Description

technical field [0001] The invention relates to a safety protection device and method for a communication interface of a numerical control machine tool in the field of communication safety. Background technique [0002] With the continuous advancement of "integration of industrialization and industrialization", more and more network technologies and control technologies are applied to intelligent manufacturing, and industrial control systems have been widely used in intelligent manufacturing. Manufacturing capacity plays a very important role. However, most of the domestic industrial control systems currently use foreign products and technologies, and adopt closed measures for domestic users, resulting in the security of key infrastructure being controlled by others; on the other hand, industrial network attacks and intrusions represented by "Stuxnet" are not uncommon. , Bringing huge losses, it also sounded the alarm for the intelligent manufacturing industry. Therefore, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/02H04L67/06H04L67/12
Inventor 邹大均杨科幸享宏
Owner CHINA ELECTRONICS TECH CYBER SECURITY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products