Zero-trust-based power Internet of Things security protection method

A power Internet of Things and security protection technology, applied in the field of electronic information, can solve problems such as immaturity, and achieve the effect of solving the problem of key management, reducing interaction steps, and reducing resource consumption

Pending Publication Date: 2021-03-16
STATE GRID HEBEI ELECTRIC POWER RES INST +1
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the zero trust security architecture is being accepted, it is still in the process of development and has not yet matured, and its security still needs further research

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Zero-trust-based power Internet of Things security protection method
  • Zero-trust-based power Internet of Things security protection method
  • Zero-trust-based power Internet of Things security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following specific embodiments may be combined with each other, and the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.

[0034] Such as figure 1 As shown, the present invention discloses a zero-trust-based power Internet of Things security protection method, including.

[0035] Specifically include the following steps:

[0036] S101: The access subject performs identity registration on the identity authentication platform. When the identity authentication platform is initialized, the secret key production center produces an elliptic curve, which is physically isolated from the key management center and the registration management center, and is stored independently in an environment with a high level of security.

[0037] In the example of the present invention, the access subject is assumed to be an employee of a power grid en...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a zero-trust-based power Internet of Things security protection method. The method comprises the steps that an access subject performs identity registration on an identity authentication platform; wherein the access main bodies are incredible main bodies and need to be authenticated through the identity authentication platform every time an access request is initiated; an identity is given to the access subject after passing the identity authentication, wherein each identity corresponds to a corresponding access authority; an access object level is judged, and if the access object level is an important level, ACL permission verification is carried out; in the access process, safety continuous evaluation is carried out in combination with multiple factors such as anaccess subject environment, an operation risk, an external threat and an access context; and the identity of the access subject is dynamically adjusted and the access permission is dynamically adjusted according to the safety continuous evaluation result. According to the invention, the problems of gradual failure of traditional boundary security protection and immature zero-trust security protection are solved.

Description

technical field [0001] The invention relates to the field of electronic information technology, in particular to a zero-trust-based power Internet of Things security protection method. Background technique [0002] With the rapid development of the Internet technology of "big cloud, thing, smart chain and edge", it focuses on connecting power users and their equipment, power grid enterprises and their equipment, power generation enterprises and their equipment, suppliers and their equipment, and people and things. Generate shared data, and provide users, power grids, power generation, suppliers, and government social services. The construction of the Internet of Things has opened up a new path for safe operation of the power grid, lean management, precise investment, and high-quality services. In this process, all aspects of the Internet are interconnected. , The types and quantity of devices connected to the network have increased significantly, and the requirements for rea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/33G06F21/45G06F21/60G16Y40/50
CPCG06F21/33G06F21/45G06F21/602G06F2221/2141G16Y40/50
Inventor 刘伟娜赵建利左晓军陈泽侯波涛董娜常杰郗波
Owner STATE GRID HEBEI ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products