Digital certificate issuing management method for industrial control system and encryption communication method for industrial control system

An industrial control system and digital certificate technology, applied in key distribution, can solve the problems that the controller configuration and business data are easily tampered with, hijacked and forged, unable to effectively verify the identity of the communication party, and the security strength of the password is limited, etc., to achieve Improving communication security, reducing the risk of hijacking or malicious tampering, and improving communication security

Inactive Publication Date: 2021-02-09
ZHEJIANG SUPCON TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing industrial control systems widely use password technology to verify device identities for communication. However, the security strength of passwords is relatively limited, the division of responsibilities and authorities is not clear enough, and there is a lack of unified management and one-to-one pairing of devices and systems, which is prone to management loopholes. easily cracked
When the existing industrial control system conducts business communication, the business data is usually transmitted in plain text, fixed transmission, common protocol, etc., which cannot effectively verify the identity of the communicating party. Larger security risks; or the existing industrial control system has long used 3DES, SHA-1, RSA and other international general encryption algorithm systems and related standards for encrypted transmission. However, with the introduction of computer computing power, various high-quality algorithms, quantum computers With the emergence of emerging technologies, foreign mainstream algorithms are no longer unbreakable. For example, quantum computers based on Shor’s algorithm can quickly decompose common divisors by using the parallelism of quantum computing, which breaks the security foundation of RSA algorithm in principle.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital certificate issuing management method for industrial control system and encryption communication method for industrial control system
  • Digital certificate issuing management method for industrial control system and encryption communication method for industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] In order to better explain the present invention and facilitate understanding, the present invention will be described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0048] Public Key Infrastructure (PKI) is a set of infrastructure consisting of hardware, software, participants, management policies and processes, the purpose of which is to create, manage, distribute, use, store and revoke digital certificates uniformly . Digital certificate is the core of PKI architecture, and its data signature is similar to the encryption process. After the data is encrypted, only the receiver can open or change the data information, add his own signature and then transmit it to the sender, while the receiver's private The key is unique and private, which also ensures the authenticity and reliability of the signature, thereby ensuring the security of the information. Therefore, the digital certificate has the characteristics of unforgeabi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital certificate issuing management method for an industrial control system, which realizes digital certificate issuing and management of an engineer station, a controllerand an operator station in the industrial control system on the basis of a certificate management system of public key infrastructure (PKI) in combination with network environment characteristics of the industrial control system. The invention also provides an encryption communication method for the industrial control system and the method comprises the steps: carrying out identity authenticationand dynamic secret key negotiation between first client equipment and second client equipment based on the digital certificates of the two communication sides, a root certificate of a CA server and acryptographic algorithm when each communication between first client equipment and second client equipment starts; and if identity authentication is passed, performing encrypted communication betweenthe first client equipment and the second client equipment according to the session key obtained after the national cryptographic algorithm and the key negotiation. The communication security of the whole industrial control system is improved, and the risk that the communication is hijacked or maliciously tampered is effectively reduced.

Description

technical field [0001] The invention relates to the technical field of industrial control system security, in particular to a method for issuing and managing digital certificates of an industrial control system and an encrypted communication method. Background technique [0002] As the core of industrial production, the industrial control system has a complex network environment. Traditional industrial communication protocols did not consider security at the beginning of design. There are many security risks such as clear text transmission and identity verification between devices. [0003] With the continuous advancement of Industry 4.0 and digital factories, the network security protection of industrial control systems cannot be ignored more and more. Existing industrial control systems widely use password technology to verify device identities for communication. However, the security strength of passwords is relatively limited, the division of responsibilities and authori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0825H04L9/0838H04L9/088H04L9/3268H04L9/3273H04L63/045H04L63/06H04L63/0823H04L63/0869
Inventor 褚健章维马纳张高达陈银桃
Owner ZHEJIANG SUPCON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products