Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial information security authentication system

A security authentication, industrial information technology, applied in the field of information security, can solve problems such as industrial control system threats, illegal access to equipment, and vulnerability problems

Inactive Publication Date: 2016-04-06
BEIJING HUADA ZHIBAO ELECTRONICS SYST
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, for industrial control systems, most of them cause a series of irreparable errors by creating an error scene and using normal data instructions.
[0006] The security protection technology of the existing industrial control system pays more attention to the protection of the server and the network, while ignoring the identification of the device, and there are not many protective measures for data transmission. The main problems are: illegal access of the device , protocol opening issues, data plaintext transmission issues, illegal operation issues and network vulnerability issues
Once the important control commands on the industrial site are intercepted, it will pose a great threat to the industrial control system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial information security authentication system
  • Industrial information security authentication system
  • Industrial information security authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0024] figure 1 It is a schematic structural diagram of the industrial information security authentication system described in the present invention. The 101 industrial information security authentication system of the present invention takes the national secret algorithm as the technical core, and includes a key management authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an industrial information security authentication system, comprising a key management authentication system, a security module, a network data encryption device and a double-factor access authentication terminal. The industrial information security authentication system provided by the invention is mainly used for preventing illegal access, preventing data from being illegally tampered, damaged and stolen, and prevents illegal operation. According to the industrial information security authentication system provided by the invention, registration, authentication and management of terminal equipment are achieved. The aim that the legal terminal accesses the legal network and the legal platform manages the legal device is achieved, and a support effect is provided for preventing the information from being used without authorization or misused.

Description

technical field [0001] The invention relates to the field of information security, in particular to an industrial information security certification system. Background technique [0002] With the development of informatization and the acceleration of industrialization, the degree of enterprise informatization and comprehensive automation is gradually deepening, and computer network technology is increasingly used in industrial control systems. While bringing great benefits to industrial production, it also causes a substantial increase in attacks against industrial control systems. Therefore, the demand for information security in industrial control systems becomes more urgent. [0003] In industrial infrastructure, security incidents caused by key industrial control systems will not only lead to system performance degradation, system availability reduction, tampering or loss of key control data, loss of control of the system, affecting production safety and causing serious ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/102H04L63/0442H04L63/068H04L63/08
Inventor 张一帆巩金亮蔡晨王星尹张晓武梁兵潘英雄
Owner BEIJING HUADA ZHIBAO ELECTRONICS SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products