Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security control method and device for industrial control system

An industrial control system and network security technology, which is applied in the field of network security control methods and devices of industrial control systems, can solve the problems of too strict network security protection of industrial control terminals, failure to meet security protection requirements, and reduced network security protection efficiency.

Pending Publication Date: 2022-02-08
CHINA TOBACCO HENAN IND
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the different control functions implemented by each industrial control terminal, the verification standard of the industrial control host cannot meet the security protection requirements of industrial control terminals with different control functions for data with different security features, resulting in too strict or too loose network security protection for industrial control terminals. , reducing the efficiency of network security protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security control method and device for industrial control system
  • Network security control method and device for industrial control system
  • Network security control method and device for industrial control system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] Such as figure 1 As shown, the network security control method of the industrial control system provided by the present application includes the following steps:

[0047] S110: The industrial control server receives network connection requests from a plurality of first industrial control terminals and corresponding functional characteristic parameters.

[0048] In this application, the network security control device of the industrial control system includes an industrial control server and at least one industrial control terminal. The industrial control server performs configuration, maintenance and other operations based on the industrial control host connected to it. Each industrial control terminal is a terminal device with processor function.

[0049] The control object is the target object that needs to be controlled by the industrial control terminal, including but not limited to steel industry, petroleum, chemical industry and other industrial control objects, ...

Embodiment 2

[0095] Such as image 3 As shown, the network security control device of the industrial control system provided by this application includes an industrial control server 310 and a plurality of virtual protection networks (such as image 3 320-330 in ), the industrial control server 310 is connected to multiple virtual protection networks respectively.

[0096] Each virtual protection network includes a node terminal (such as image 3 3201, 3301 in ) and at least one second industrial control terminal (such as image 3 3202, 3302-3303), the node terminals are respectively connected to at least one second industrial control terminal network.

[0097] The node terminal includes a protection strategy, and the node terminal performs security verification on the message data transmitted by the industrial control server according to the protection strategy, and transmits the verified message data to the second industrial control terminal in the same virtual protection network.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security control method and device for an industrial control system. The network security control method comprises the following steps of: receiving network connection requests of a plurality of first industrial control terminals and corresponding functional characteristic parameters; establishing a virtual protection network according to the function characteristic parameters and determining node terminals in the virtual protection network; and sending a protection strategy to the node terminals, and starting network connection between an industrial control server and the node terminals and network connection between the node terminals and a second industrial control terminal in the virtual protection network. According to the network security control method and device, the industrial control terminals with the same or similar functional characteristic parameters are classified into the same virtual protection network, and the unified security verification standard is adopted to perform security verification on the message data in the virtual protection network, so that improper network security protection on the industrial control terminals is avoided, and the network security protection efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, to a network security control method and device for an industrial control system. Background technique [0002] The industrial control system is a business process management and control system that ensures the automatic operation of industrial infrastructure and performs process control and monitoring. It is composed of various automation control components and process control components. The process control components are used to collect and monitor real-time data. Control components are used to automate the control of industrial infrastructure. The terminal that realizes the automatic operation in the industrial control system is called the industrial automation control terminal, referred to as the industrial control terminal. With the rapid development of the network environment, the network security of industrial control terminals has been gradually...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B19/418
CPCG05B19/4185G05B2219/33139Y02P90/02
Inventor 徐晓光贾郑雷赵旭东李准峰韩彦福李松张胜利
Owner CHINA TOBACCO HENAN IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products