Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data communication gateway credibility authentication method and system and electronic equipment

A technology of a data communication network and an authentication method, which is applied in the fields of systems, electronic equipment, and trusted authentication methods of data communication gateways, can solve problems such as hidden dangers, limited scope of security events, and no effective judgment mechanism for trusted traceability, and achieve timely The effect of safety management and control, ensuring reliability, and link credibility

Pending Publication Date: 2022-02-25
XUCHANG XJ SOFTWARE TECH
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited range of security events detected by the Agent, it is impossible to exhaust all logical combinations, and there are security risks such as logical loopholes, false negatives, and false positives. Levels are also highly correlated; finally, since Agent sniffer software can be installed in all secondary equipment of the power monitoring system without any restrictions, there is no effective judgment mechanism for Agent's own trusted traceability, which has become the biggest security risk of this security protection strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication gateway credibility authentication method and system and electronic equipment
  • Data communication gateway credibility authentication method and system and electronic equipment
  • Data communication gateway credibility authentication method and system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0052]It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present application shall have the usual meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present application do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "connect...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data communication gateway credibility authentication method and system and electronic equipment, which can perform efficient, comprehensive and timely security management and control on a digital communication gateway. The method comprises the following steps: acquiring code data of a data communication gateway, and performing system credibility authentication on the data communication gateway according to the code data; registering a plurality of program processes of the data communication gateway, and performing application credibility authentication on the data communication gateway according to registration information; and acquiring network operation data of the data communication gateway, and performing network credibility authentication on the data communication gateway according to the network operation data. The system comprises a system credibility authentication module, an application credibility authentication module and a network credibility authentication module. The electronic equipment comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, and the processor implements the data communication gateway trusted authentication method when executing the program.

Description

technical field [0001] One or more embodiments of the present application relate to the field of power system automation technology, and in particular to a trusted authentication method, system and electronic equipment for a data communication gateway. Background technique [0002] As the intermediate link of the power grid power dispatching system, the data communication gateway is one of the most important automation equipment in the substation monitoring system, and it plays a key role in linking the past and the future. Therefore, as the most widely used secondary equipment in substations, the security protection mechanism of the data communication gateway equipment itself is still extremely weak. At present, the overall security protection strategy of the power monitoring system is still traditional passive defense methods such as anti-virus, firewall, positive and negative isolation, intrusion detection, etc., but it is still difficult to deal with the current multi-di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/30H04L43/0876H04L43/16H04L12/66
CPCH04L63/083H04L63/101H04L63/0236H04L9/3247H04L9/3066H04L43/0876H04L43/16H04L63/20H04L12/66
Inventor 牛津文慕宗君袁方方李江林方伟王培源马国强王向宇董鹏涛邵春梅李瑞山尹丽楠
Owner XUCHANG XJ SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products