Protection method and corresponding device for industrial control network

An industrial control network and network technology, applied in the field of network security, can solve problems such as lack of security design, and achieve the effect of protecting business data

Active Publication Date: 2021-09-03
武汉思普崚技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a protection method and corresponding device for industrial control network, solve the problem of lack of network security design in the existing industrial control network, and introduce technical means of attribute encryption to better protect the business of different users data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and corresponding device for industrial control network
  • Protection method and corresponding device for industrial control network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0033] figure 1 A general flow chart of the protection method of the industrial control network provided by this application, the method includes:

[0034] Define industrial control network resources as field device security layer, network intermediate security layer, business security layer and virtual master station;

[0035] The field device security layer includes: periodically knowing the working status of the field devices in the industrial control network, activating dormant field devices, and dormant field devices with faults, removing the dormant field devices from the field device security layer; establishing a list of permissions , to e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a protection method and a corresponding device for an industrial control network, defining intranet resources as a field device security layer, a network intermediate security layer, a business security layer, and a virtual master station, and defining a protection device as a field device security layer , the network intermediate security layer, the business security layer and the virtual master station, realize the one-to-one correspondence between the protection device and the intranet resource network layer, and can dynamically adjust the security layer in real time according to the status of the field equipment, and introduce attribute encryption Technical means, based on the attributes and attribute domains of different users, attribute encryption is performed on the transmitted data to better protect the business data of different users.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a method for protecting an industrial control network and a corresponding device. Background technique [0002] A large number of on-site terminal devices have weak protection, the environment is uncontrollable, and there are problems of being maliciously controlled and threatening the security of the master station; due to the high real-time requirements of industrial control network services, some dedicated network transmission protocols have insufficient security mechanisms; At the beginning of the system design, the main focus was on business functions, and network security was not fully considered. There was a problem that the master station was not highly aware of system network attacks. The existing network architecture layering is not divided from the perspective of network security, but more from the perspective of network transmission. [0003] There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0209H04L63/0428H04L63/0869H04L63/10H04L63/123H04L63/1416H04L63/1433H04L63/1441H04L63/1466H04L63/20
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products