A chip-based control protection device embedded safety protection system and method

A technology of control protection and security protection, applied in computer security devices, platform integrity maintenance, data processing applications, etc., can solve problems such as network security risks, low network security, attack damage, etc., and achieve the effect of improving network security

Active Publication Date: 2021-09-24
CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the power system traditionally mainly relies on boundary isolation and dedicated system private protocols to ensure network security, power terminals generally developed based on general-purpose software and hardware platforms are easy to break through the security barrier and cause serious attacks and damages, and there are serious network security risks. low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A chip-based control protection device embedded safety protection system and method
  • A chip-based control protection device embedded safety protection system and method
  • A chip-based control protection device embedded safety protection system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0022] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to which this application belongs. The terms used herein in the specification of the application are only for the purpose of describing specific embodiments, and are not intended to limit the application.

[0023] It can be understood that the "connection" in the following embodiments should be understood as "electrical connection", "communication connection", etc. if the connected circuits, modules, un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This application relates to a security protection system and method embedded in a chip-based control protection device. The system includes a secure boot module, a password service module, a secure boot secret key module, and a firmware certificate module. The password service module is used to store cryptographic algorithms, secure boot The secret key module is used to store the asymmetric key of the signed device firmware, the firmware certificate module is used to store the firmware certificate proving the legitimacy of the firmware; the secure boot module is used to use the cryptographic service module as the The stored asymmetric key and the firmware certificate stored in the firmware certificate module perform security measurement on the component to be loaded, and start the chip operating system after the security measurement passes. By using the cryptographic service module as the root of trust and securely starting the chip operating system, it can actively protect the information security of the power grid protection terminal and improve the network security of the power grid protection terminal.

Description

technical field [0001] The present application relates to the technical field of power grid equipment, in particular to a chip-based control and protection device embedded safety protection system and method. Background technique [0002] With a large number of terminal equipment and multiple users connected to the power grid, an open and interactive network environment has gradually been built. Under the open environment, multiple power end users interact with each other in terms of supply and demand, which will soon break the existing hierarchical and partitioned information security protection pattern of vertical encryption and horizontal isolation of the power grid. [0003] Because the power system traditionally mainly relies on boundary isolation and dedicated system private protocols to ensure network security, power terminals generally developed based on general-purpose software and hardware platforms are easy to break through security barriers and cause serious attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06Q50/06
CPCG06F21/575G06Q50/06
Inventor 李鹏习伟李肖博姚浩于杨陈军健蔡田田邓清唐陶伟
Owner CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products