Industrial internet field identity access control method based on zero-trust model

An industrial Internet and access control technology, applied in the field of identity access control in the field of industrial Internet based on the zero trust model, can solve problems such as the lack of effective and complete solutions

Pending Publication Date: 2022-02-18
上海电气集团数字科技有限公司
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The identity authentication method in the traditional industrial Internet field is usually a single method of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial internet field identity access control method based on zero-trust model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described below in conjunction with accompanying drawing.

[0054] see figure 1 , the present invention is a zero-trust model-based identity access control method in the field of industrial Internet, the method comprising the following steps:

[0055] S1. Institutional members of the Industrial Internet platform register through the Zero Trust platform and submit corporate information to apply for tenant administrators.

[0056] S2. The administrator of the industrial Internet platform reviews the materials submitted by the organization members, creates tenant information after passing the review, and notifies the organization members of the review results.

[0057] S3. The tenant administrator manages organization and view information, user and user group information, role and role group information, and the association relationship between user groups and role groups. The association relationship is as follows: 1) An organizatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an industrial internet field identity access control method based on a zero-trust model. The method comprises the steps of registration, auditing, management, application publishing, subscription and management, management strategy and centralized authorization, user identity authentication, request access proxy, trust calculation, strategy execution, judgment and application gateway processing. According to the invention, a zero-trust model in the technical field of network security is applied to the field of the industrial internet industry, so that the defects of identity verification, authority control and data protection during data access among clients, industrial equipment, application systems and services are overcome, and a set of efficient and complete user access control system is formed.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an identity access control method in the industrial Internet field based on a zero trust model. [0002] technical background [0003] Network security technology refers to the information security technology adopted to ensure the security of network system hardware, software, data and its services. [0004] At present, border-based security protection (such as: network segment isolation) and static security policies (such as: authority control) are not enough to deal with the increasingly complex modern network security risks. So the concept of zero trust was put forward, and its core idea is "never trust, keep checking". That is, it is no longer a clear boundary to divide trusted or untrusted networks and users, but when a user or device wants to access a resource, it needs to prove its identity and obtain corresponding trust and permissions before accessing This reso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40
CPCH04L63/10H04L63/105H04L63/0823H04L63/20
Inventor 江国宝何成伟陆毅
Owner 上海电气集团数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products