Supercharge Your Innovation With Domain-Expert AI Agents!

An Industrial Computer System with Security Encryption Function

A security encryption and industrial computer technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of low safety factor, affecting the data security in the security chip, and the industrial control system does not have enough perfect solutions, so as to ensure security protection against damage and accidental loss

Active Publication Date: 2021-09-24
天津中环恒达科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing industrial computers generally implement security encryption through an external security chip. For example, the application document with the patent application number 201510214938.8 discloses a PIN encryption device and encryption method for touch screen key input, wherein the security chip passes The communication interface is connected with the industrial computer, and the industrial computer and the security protection area are independent of each other. In such a system configuration, the software security encryption part needs to rely on the external security chip, and the failure of the communication interface is likely to affect the security chip. The security of internal data is relatively low; and the security chip is used to configure the data encryption algorithm, and the existing industrial control system does not have a sufficiently perfect solution.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Industrial Computer System with Security Encryption Function
  • An Industrial Computer System with Security Encryption Function
  • An Industrial Computer System with Security Encryption Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] Such as figure 1 As shown, the first embodiment of an industrial computer system with security encryption function provided by the present invention is an industrial computer system with security encryption function, which includes the motherboard of the industrial computer and the operating system carried by the industrial computer. The operating system is also equipped with industrial control encryption software. The main board of the industrial compu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an industrial computer system with a security encryption function, which includes a main board of the industrial computer and an operating system carried by the industrial computer. The operating system is also equipped with industrial control encryption software. The main board of the industrial computer includes a processor, A bridge chip and a security chip, the processor is electrically connected to the bridge chip, the bridge chip is electrically connected to the security chip using a USB2.0 protocol, and the operating system is configured with a security login verification algorithm for The login of the operating system is checked for security, and the industrial control encryption software is configured with a data encryption algorithm. The present invention realizes the safe login function of the operating system and the file data encryption function of the industrial control encryption software by setting the security login verification algorithm and the data encryption algorithm; and by setting the double login authentication of the operating system and the industrial control encryption software and the industrial control encryption software The configured security encryption policy fully guarantees the security of operating system files.

Description

technical field [0001] The invention relates to the technical field of industrial computer encryption, in particular to an industrial computer system with a security encryption function. Background technique [0002] With the development of AI technology and big data, information security is becoming more and more important, and the independent and controllable trend of localization in the field of industrial computer is developing rapidly. At present, industrial computers are widely used in many fields such as industrial production, financial equipment, transportation rails, and Internet of Things, which has certain requirements for the safety performance of software and hardware of industrial computers. The future development of industrial computer with security performance based on the domestic processor platform will become a trend. However, the existing industrial computers generally implement security encryption through an external security chip. For example, the appl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/14H04L29/06
CPCH04L9/14H04L9/3226H04L63/045H04L63/083H04L63/20
Inventor 张文博董佳利胡天翔王兴华马佳静丁飒李美霞李显鹏
Owner 天津中环恒达科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More