Check patentability & draft patents in minutes with Patsnap Eureka AI!

Industrial personal computer system with security encryption function

A security encryption and industrial computer technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as low safety factor, affecting data security in security chips, and insufficient solutions for industrial control systems, so as to ensure security The effect of stability, avoiding damage and accidental loss

Active Publication Date: 2021-08-13
TIANJIN ZHONGHUAN ELECTRONICS COMP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing industrial computers generally implement security encryption through an external security chip. For example, the application document with the patent application number 201510214938.8 discloses a PIN encryption device and encryption method for touch screen key input, wherein the security chip passes The communication interface is connected with the industrial computer, and the industrial computer and the security protection area are independent of each other. In such a system configuration, the software security encryption part needs to rely on the external security chip, and the failure of the communication interface is likely to affect the security chip. The security of internal data is relatively low; and the security chip is used to configure the data encryption algorithm, and the existing industrial control system does not have a sufficiently perfect solution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial personal computer system with security encryption function
  • Industrial personal computer system with security encryption function
  • Industrial personal computer system with security encryption function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Such as figure 1 As shown, the first embodiment of an industrial computer system with security encryption function provided by the present invention is an industrial computer system with security encryption function, which includes the motherboard of the industrial computer and the operating system carried by the industrial computer. The operating system is also equipped with industrial control encryption software. The main board of the industrial compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial personal computer system with a security encryption function, which comprises an industrial personal computer mainboard and an operating system carried by an industrial personal computer, wherein industrial control encryption software is configured on the operating system; the industrial personal computer mainboard comprises a processor, a bridge chip and a security chip; the processor is electrically connected with the bridge chip; the bridge chip is electrically connected with the security chip by using a USB2.0 protocol; the operating system is configured with a security login verification algorithm and is used for performing security verification on login of the operating system; and the industrial control encryption software is configured with a data encryption algorithm. According to the method, a secure login verification algorithm and a data encryption algorithm are set, so that a secure login function of the operating system and a file data encryption function of the industrial control encryption software are realized; and by setting dual login authentication of the operating system and the industrial control encryption software and a security encryption strategy configured by the industrial control encryption software, the security of operating system files is comprehensively guaranteed.

Description

technical field [0001] The invention relates to the technical field of industrial computer encryption, in particular to an industrial computer system with a security encryption function. Background technique [0002] With the development of AI technology and big data, information security is becoming more and more important, and the independent and controllable trend of localization in the field of industrial computer is developing rapidly. At present, industrial computers are widely used in many fields such as industrial production, financial equipment, transportation rails, and Internet of Things, which has certain requirements for the safety performance of software and hardware of industrial computers. The future development of industrial computer with security performance based on the domestic processor platform will become a trend. However, the existing industrial computers generally implement security encryption through an external security chip. For example, the appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14H04L29/06
CPCH04L9/14H04L9/3226H04L63/045H04L63/083H04L63/20
Inventor 张文博董佳利胡天翔王兴华马佳静丁飒李美霞李显鹏
Owner TIANJIN ZHONGHUAN ELECTRONICS COMP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More