Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and device

A technology for identity authentication and device identity, which is applied in the fields of network security and information security, and can solve the problems of stable operation of production control information system, delay, interruption sensitivity, etc.

Inactive Publication Date: 2021-05-28
杭州中网智慧科技有限公司 +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the industrial production network environment, more attention is paid to business continuity, data compliance, and information security. The instant feedback capability of information instruction transmission is also very sensitive to delays and interruptions. With a very strong logical interlock and linkage relationship, external interference commands and malicious attack commands will bring a fatal blow to the stable operation of the production control information system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0030] combine figure 1 and figure 2 As shown, one aspect of the present invention provides an identity authentication method, which is applied to the first device, and the method includes:

[0031] Step 101, when the intermediate device disconnects the communication connection with the second device, establish a communication connection w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device, which are applied to first equipment or intermediate equipment, and comprises the following steps: establishing communication connection with the intermediate equipment; sending the first data to an intermediate device, and instructing the intermediate device to establish a communication connection with a second device so as to send the first data to the second device to obtain second data; disconnecting the communication connection with the intermediate equipment; after the communication connection between the intermediate equipment and the second equipment is disconnected, establishing communication connection with the intermediate equipment, and receiving second data sent by the intermediate equipment; generating third data according to the second data and first equipment pre-stored data; and sending the third data to the second equipment in the same transmission mode, and verifying the identity of the first equipment by the second equipment according to the third data and the fourth data. In the transmission process, the intermediate equipment is only in communication connection with one piece of equipment, so that external interference instructions and hostile attack commands are avoided, and production services can be safely and stably operated.

Description

technical field [0001] The invention relates to the fields of information security and network security, in particular to an identity authentication method and device. Background technique [0002] There are obvious differences between the industrial production network environment and the automated office network environment, and the protection goals of each are also different. In the industrial production network environment, more attention is paid to business continuity, data compliance, and information security. The instant feedback capability of information instruction transmission is also very sensitive to delays and interruptions. With a very strong logical interlock and linkage relationship, external interference commands and malicious attack commands will bring a fatal blow to the stable operation of the production control information system. Therefore, in the design of industrial control security system and data application management, ensuring the safe and stable ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06
CPCH04L63/08H04L67/141H04L9/0631H04L67/562
Inventor 张尧青姜杜鹃徐洋
Owner 杭州中网智慧科技有限公司