CN112995140B - Safety management system and method - Google Patents

Safety management system and method Download PDF

Info

Publication number
CN112995140B
CN112995140B CN202110155754.4A CN202110155754A CN112995140B CN 112995140 B CN112995140 B CN 112995140B CN 202110155754 A CN202110155754 A CN 202110155754A CN 112995140 B CN112995140 B CN 112995140B
Authority
CN
China
Prior art keywords
security
public key
security management
management device
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110155754.4A
Other languages
Chinese (zh)
Other versions
CN112995140A (en
Inventor
贺峰
李凤军
鲁鹏飞
杨忠飞
白伟
路娟
李广清
李鸿伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Guohua Jinjie Energy Co Ltd
Guohua Power Branch of China Shenhua Energy Co Ltd
Original Assignee
Shaanxi Guohua Jinjie Energy Co Ltd
Guohua Power Branch of China Shenhua Energy Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Guohua Jinjie Energy Co Ltd, Guohua Power Branch of China Shenhua Energy Co Ltd filed Critical Shaanxi Guohua Jinjie Energy Co Ltd
Priority to CN202110155754.4A priority Critical patent/CN112995140B/en
Publication of CN112995140A publication Critical patent/CN112995140A/en
Application granted granted Critical
Publication of CN112995140B publication Critical patent/CN112995140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The application discloses a safety management system and a method, wherein the method executed by safety equipment comprises the following steps: exchanging a first public key of the security device and a second public key of the security management device with a security management device; sending an authentication request to the security management device; receiving first identity verification information sent by the security management equipment according to the authentication request, and performing identity verification on the security management equipment according to the second public key and the first identity verification information; after the security management equipment passes the verification, sending second identity verification information to the security management equipment to obtain a verification result of the security management equipment for performing identity verification on the security equipment; and if the verification result is that the verification is passed, establishing communication with the safety management equipment. The application can improve the safety of the safety management platform in the industrial control system.

Description

Safety management system and method
Technical Field
The present application relates to the field of industrial control system security, and in particular, to a security management system and method.
Background
With the rapid advance of the industrial informatization process, the information, network and internet of things technology is widely applied to the industrial control fields of intelligent power grids, intelligent transportation, industrial production systems and the like, and the comprehensive benefits of enterprises are greatly improved. In order to realize the cooperation and information sharing among systems, the industrial control system gradually breaks the previous closure: even some industrial control systems can be connected to public networks such as the internet in some manner using standard, common communication protocols and hard-software systems. Therefore, the industrial control system is bound to face traditional information security threats such as virus, trojan, hacker intrusion and denial of service, and because the industrial control system is mostly applied to national important industries such as electric power, traffic, petrochemical industry and nuclear industry, social impact and economic loss caused by security accidents are more serious.
In order to ensure the safety of the industrial control system network, the safety management platform realizes monitoring, real-time alarming, flow analysis and the like of each safety device in the whole network. The security management platform is used for uniformly managing the security equipment and is realized based on a network communication technology and an interface technology. However, the existing security management platform cannot guarantee that both the management device and the managed device are secure, and the insecurity of a certain device may cause the risk of the whole security management platform being attacked.
Therefore, how to ensure that the security management device and the managed device are mutually secure is a technical problem to be solved by the application.
Disclosure of Invention
An embodiment of the present application provides a security management system and a security management method, so as to solve the problem of low security of an existing security management platform.
In order to solve the above technical problem, the present specification is implemented as follows:
in a first aspect, there is provided a security management system, comprising a security device and a security management device,
the security device exchanges a first public key of the security device and a second public key of the security management device with the security management device; sending an authentication request to the security management device; receiving first identity verification information sent by the security management equipment according to the authentication request; performing identity authentication on the security management equipment according to the second public key and the first identity authentication information; after the security management equipment passes the verification, sending second identity verification information to the security management equipment to obtain a verification result of the security management equipment for performing identity verification on the security equipment; if the verification result is that the verification is passed, establishing communication with the safety management equipment;
the security management device exchanges a second public key of the security management device and a first public key of the security device with the security device; receiving and sending the first identity verification information to the security device according to the authentication request; receiving the second authentication information; performing identity authentication on the security device according to the first public key and the second identity authentication information; and returning the verification result to the safety device.
Optionally, exchanging, by the security device and the security management device, the first public key of the security device and the second public key of the security management device includes:
generating a first key pair according to the device identification of the security device, wherein the first key pair comprises the first public key and a first private key;
sending the first public key to the security management device;
and receiving and storing the second public key returned by the security management equipment.
Optionally, the exchanging, by the security management device and the security device, the second public key of the security management device and the first public key of the security device specifically includes:
receiving and storing the first public key sent by the security device;
generating a second key pair according to a random number, wherein the second key pair comprises the second public key and a second private key;
returning the second public key to the secure device.
Optionally, exchanging, by the security device and the security management device, the first public key of the security device and the second public key of the security management device includes:
generating a first key pair according to the device identification of the security device, wherein the first key pair comprises the first public key and a first private key;
sending the first public key, the device identifier of the security device and a first signature code to the security management device, wherein the first signature code is generated by encrypting the device identifier by using the first public key;
and receiving and storing the second public key returned by the security management device after the first signature code passes the signature verification.
Optionally, the exchanging, by the security management device and the security device, the second public key of the security management device and the first public key of the security device specifically includes:
receiving the first public key, the device identifier and the first signature code sent by the security device;
checking the first signature code according to the first public key;
after the first signature code passes the signature verification, generating a second key pair according to a random number, wherein the second key pair comprises the second public key and a second private key;
returning the second public key to the secure device.
Optionally, the authentication request includes the device identifier and a first ciphertext, and the secure device is further configured to: before sending an authentication request to the security management device, encrypting a first random number by using the second public key to generate the first ciphertext;
the first authentication information includes a second ciphertext and a second signature code, and the security management device is further configured to: encrypting a second random number using the first public key to generate the second ciphertext before sending the first authentication information to the security device; decrypting the first ciphertext by using the second private key to obtain the first random number; encrypting the first random number and the second random number using the second private key to generate the second signature code.
Optionally, the authenticating, by the security device, the security management device according to the second public key and the first authentication information specifically includes:
decrypting the second ciphertext by using the first private key to obtain the second random number;
verifying the second signature code by using the first random number, the second random number and the second public key;
and if the signature verification is successful, the identity verification of the safety management equipment is completed.
Optionally, the second authentication information includes a third signature code, and the security device is further configured to: before sending the second authentication information to the security management device, encrypting the first random number and the second random number using the first private key to generate the third signature code;
the authenticating, by the security management device, the security device according to the first public key and the second authentication information specifically includes: verifying the third signature code by using the first random number, the second random number and the first public key; and if the signature verification is successful, the identity verification of the safety equipment is completed.
In a second aspect, a security management method is provided, which is performed by a security device, and includes:
exchanging a first public key of the security device and a second public key of the security management device with a security management device;
sending an authentication request to the security management device;
receiving first identity verification information sent by the security management equipment according to the authentication request, and performing identity verification on the security management equipment according to the second public key and the first identity verification information;
after the security management equipment passes the verification, sending second identity verification information to the security management equipment to obtain a verification result of the security management equipment for performing identity verification on the security equipment;
and if the verification result is that the verification is passed, establishing communication with the safety management equipment.
In a third aspect, a security management method performed by a security management device is provided, the method including:
exchanging a second public key of the security management device with a first public key of the security device with the security device;
receiving an authentication request sent by the safety equipment, and sending the first identity verification information to the safety equipment according to the authentication request;
receiving second identity verification information sent by the security device after the security management device passes the identity verification according to the second public key and the first identity verification information, and performing identity verification on the security device according to the first public key and the second identity verification information;
and sending a verification result of the identity verification of the safety equipment to the safety equipment.
In the embodiment of the application, the security device and the security management device exchange a first public key of the security device and a second public key of the security management device, the security device sends an authentication request to the security management device, receives first identity verification information sent by the security management device according to the authentication request, performs identity verification on the security management device according to the second public key and the first identity verification information, sends second identity verification information to the security management device after the security management device passes the verification, and performs identity verification on the security device according to the first public key and the received second identity verification information and returns a verification result. If the verification result is that the verification is passed, the safety device establishes communication with the safety management device, so that the safety management device and the managed device are ensured to be mutually safe before the communication, the safety of the safety management platform can be improved, and the safety of the industrial control system network is ensured.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic architecture diagram of a security management system according to an embodiment of the present application.
Fig. 2 is a flowchart illustrating a security management method according to a first embodiment of the present application.
Fig. 3 is a flowchart illustrating a security management method according to a second embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. The reference numbers in the present application are only used for distinguishing the steps in the scheme and are not used for limiting the execution sequence of the steps, and the specific execution sequence is described in the specification.
In order to solve the problems in the prior art, an embodiment of the present application provides a security management system, and fig. 1 is a schematic structural diagram of the security management system according to the embodiment of the present application.
As shown in fig. 1, the security management system includes a security management device 2000 and a security device 1000, and the security management device 2000 is configured to perform unified management on the security device 1000. The safety equipment comprises an industrial firewall, monitoring and auditing equipment and the like which are accessed into an industrial control system network, and the safety equipment supports a national commercial cryptographic algorithm SM2/3/4 algorithm.
The secure device 1000 first exchanges the first public key of the secure device 1000 and the second public key of the secure management device 2000 with the secure management device 2000.
In one embodiment, the secure device 1000 exchanges a public key with the security management device 2000, which specifically includes:
the secure device 1000 generates a first key pair from its device identification, wherein the first key pair comprises a first public key and a first private key. The device identification of the security device is a unique identification of the device, such as a device serial number. The security device 1000 supports the national commercial cryptographic algorithm SM2/3/4 algorithm, for example using the SM2 cryptographic algorithm to generate the first key pair.
The security device 1000 sends the first public key in the first key pair to the security management device 2000, and may send the request message in a form of carrying the first public key.
The security management device 2000 receives and stores the first public key transmitted by the security device 1000. A second key pair is then generated from the random number, where the second key pair includes a second public key and a second private key.
The security management device 2000 returns the second public key to the security device 1000, and the security device 1000 receives and stores the second public key returned by the security management device 2000, thereby completing the exchange of the first public key of the security device 1000 and the second public key of the security management device 2000.
In another embodiment, the exchanging the public key between the security device 1000 and the security management device 2000 specifically includes:
the secure device 1000 generates a first key pair from its device identification, wherein the first key pair comprises a first public key and a first private key. The secure device 1000 transmits the first public key of the first key pair, the device identifier of the secure device 1000, and a first signature code to the security management device 2000, where the first signature code is generated by encrypting the device identifier of the secure device 1000 using the first public key. At this time, the security device 1000 may assemble the first public key, the device identifier, and the first signature code into a request message and transmit the request message to the security management device 2000.
The security management device 2000 receives and stores the first public key, the device identifier, and the first signature code transmitted by the security device 1000. And then, checking the first signature code according to the first public key, and generating a second key pair comprising a second public key and a second private key according to the random number after the first signature code passes the checking. Finally, the second public key is returned to the secure device 1000.
In one embodiment, the authentication request sent by the security device 1000 includes the device identification and a first ciphertext, where the first ciphertext is generated by the security device 1000 encrypting a first random number using a second public key exchanged with the security management device 2000 before sending the authentication request to the security management device 2000.
The first authentication information transmitted by the security management device 2000 to the security device 1000 includes a second ciphertext generated by the security management device 2000 encrypting the second random number using the first public key exchanged with the security device 1000 before transmitting the first authentication information to the security device 1000, and a second signature code. Then, the first ciphertext from the security device 1000 is decrypted by using the own second private key, and since the first ciphertext is generated by the security device 1000 by using the second public key for encryption, the first random number may be obtained by decrypting the first ciphertext by using the second private key of the second key pair. Finally, the security management device 2000 decrypts the second random number and the first ciphertext using its own second private key to obtain the first random number, and encrypts the first random number to generate the second signature code.
After receiving the first authentication information sent by the security management device 2000, the security device 1000 performs authentication on the security management device 2000 according to the second public key and the first authentication information, and specifically includes:
the security device 1000 decrypts the second ciphertext using its own first private key to obtain a second random number. Since the second ciphertext is generated by the security management apparatus 2000 through encryption using the first public key, the second random number may be obtained by decrypting the second ciphertext with the first private key of the first key pair. Then, the second signature code is verified using the first random number, the second random number, and the second public key. Similarly, since the second signature is generated by the security management device 2000 encrypting the first random number and the second random number using the second private key, if the second signature is secure, the security device 1000 decrypts the second signature using the second public key, and can obtain the first random number and the second random number, the signature verification is successful, the authentication of the security management device 2000 is completed, and it indicates that the current security management device 2000 is secure. Otherwise, the signature verification fails, and the authentication of the security management device 2000 fails, indicating that the current security management device 2000 is not secure.
In one embodiment, after the security device 1000 passes the authentication of the security management device 2000, the second authentication information including the third signature is transmitted to the security management device 2000. The third signature code is generated by the security device 1000 encrypting the first random number and the second random number using the first private key before transmitting the second authentication information to the security management device 2000.
After receiving the second authentication information, the security management device 2000 performs authentication on the security device 1000 according to the exchanged first public key and the second authentication information, and the method specifically includes:
the security management device 2000 verifies the third signature code using the first random number, the second random number, and the first public key; if the signature verification is successful, the authentication of the security device 1000 is completed, which indicates that the current security device 1000 is secure. Otherwise, the signature verification fails, and the authentication of the security device 1000 fails, indicating that the current security device 1000 is not secure.
The security management device 2000 returns a verification result of authenticating the security device 1000 to the security device 1000, and if the verification result is that the verification is passed, the security device 1000 establishes communication with the security management device 2000 and performs a normal operating state. Otherwise, the security device and the security management device 2000 are insecure with each other, and do not establish any communication.
In an embodiment, after the security management device 2000 successfully verifies the identity of the security device 1000, the security management device 2000 may further issue an authentication token for the authentication of the security device this time. The authentication token may include a device identifier of the security device 1000, a timestamp indicating a time when the authentication token was issued, and a fourth signature code obtained by encrypting the device identifier and the timestamp by the security management device 2000 using the first public key interacting with the security device 1000. After receiving the authentication token, the security device 1000 checks the fourth signature by using the second public key interacting with the security management device 2000 to obtain a corresponding device identifier and a timestamp, and determines whether the authentication token is valid by determining the device identifier and the timestamp for checking the signature.
After the security device 1000 verifies that the authentication token is valid, the bidirectional identity authentication procedure between the security device 1000 and the security management device 2000 is completed, and the security device 1000 enters a normal operating state.
The safety management system of the embodiment of the application can ensure that the safety management equipment and the managed equipment are safe to each other by adding public key exchange and bidirectional identity authentication before the safety management equipment is communicated with the safety equipment, thereby effectively improving the safety of a safety management platform and ensuring the safety of an industrial control system network.
In one embodiment, to further increase the security of the security management platform, the cryptographic operations and key management functions of key pair generation, cipher text for random number encryption and decryption, digital signature code verification, and the like, which are involved in the security device and the security management device, may be provided by a separate cryptographic service device. The security device and the security management device obtain the corresponding key pair, the ciphertext and/or the signature code from the password service device and use the key pair, the ciphertext and/or the signature code for identity verification. The communication between the security management device and the security equipment and the password service equipment can be carried out by adopting an HTTPS protocol.
In an embodiment, the present application further provides a security management method, and fig. 2 is a schematic flow chart of the security management method according to the first embodiment of the present application.
In this embodiment, a security management method is performed by a security device, the method comprising the steps of:
step 102, exchanging a first public key of the security device and a second public key of the security management device with a security management device;
step 104, sending an authentication request to the security management device;
step 106, receiving first identity verification information sent by the security management device according to the authentication request, and performing identity verification on the security management device according to the second public key and the first identity verification information;
step 108, after the security management device passes the verification, sending second identity verification information to the security management device to obtain a verification result of the security management device performing identity verification on the security device;
and step 110, if the verification result is that the verification is passed, establishing communication with the safety management equipment.
In an embodiment, the present application further provides a security management method, and fig. 3 is a flowchart illustrating a security management method according to a second embodiment of the present application.
In this embodiment, a security management method is performed by a security management apparatus, the method including the steps of:
step 202, exchanging the second public key of the security management device and the first public key of the security device with the security device;
step 204, receiving an authentication request sent by the security device, and sending the first identity verification information to the security device according to the authentication request;
step 206, receiving second authentication information sent by the security device after the security management device passes the authentication according to the second public key and the first authentication information, and performing authentication on the security device according to the first public key and the second authentication information;
step 208, sending a verification result of the authentication of the security device to the security device.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of any one of the above embodiments of the security management method, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A security management system is characterized by comprising a security device and a security management device,
the security device exchanges a first public key of the security device and a second public key of the security management device with the security management device; encrypting a first random number by using the second public key to generate a first ciphertext; sending an authentication request comprising a device identification of the security device and the first ciphertext to the security management device; receiving first identity verification information sent by the security management equipment according to the authentication request; performing identity verification on the security management equipment according to the second public key and the first identity verification information; after the security management equipment passes the verification, sending second identity verification information to the security management equipment to obtain a verification result of the security management equipment for performing identity verification on the security equipment; if the verification result is that the verification is passed, establishing communication with the safety management equipment;
the security management device exchanges a second public key of the security management device and a first public key of the security device with the security device; receiving the authentication request; encrypting a second random number by using the first public key to generate a second ciphertext, decrypting the first ciphertext in the authentication request by using a second private key to obtain the first random number, encrypting the first random number and the second random number by using the second private key to generate a second signature code, wherein the second private key and the second public key belong to the same key pair; sending the first authentication information including the second ciphertext and a second signature code to the security device; receiving the second authentication information; performing identity authentication on the security device according to the first public key and the second identity authentication information; and returning the verification result to the safety device.
2. The system according to claim 1, wherein the security device exchanges the first public key of the security device and the second public key of the security management device with the security management device, and specifically includes:
generating a first key pair according to the device identification of the security device, wherein the first key pair comprises the first public key and a first private key;
sending the first public key to the security management device;
and receiving and storing the second public key returned by the security management equipment.
3. The system according to claim 2, wherein the exchanging, by the security management device and the security device, the second public key of the security management device and the first public key of the security device includes:
receiving and storing the first public key sent by the security device;
generating a second key pair according to a random number, wherein the second key pair comprises the second public key and a second private key;
returning the second public key to the secure device.
4. The system according to claim 1, wherein the security device exchanges the first public key of the security device and the second public key of the security management device with the security management device, and specifically includes:
generating a first key pair according to the device identification of the security device, wherein the first key pair comprises the first public key and a first private key;
sending the first public key, the device identifier of the security device and a first signature code to the security management device, wherein the first signature code is generated by encrypting the device identifier by using the first public key;
and receiving and storing the second public key returned by the security management device after the first signature code passes the signature verification.
5. The system according to claim 4, wherein the exchanging, by the security management device and the security device, the second public key of the security management device and the first public key of the security device includes:
receiving the first public key, the device identifier and the first signature code sent by the security device;
checking the first signature code according to the first public key;
after the first signature code passes the signature verification, generating a second key pair according to a random number, wherein the second key pair comprises the second public key and a second private key;
returning the second public key to the secure device.
6. The system according to claim 3 or 5, wherein the authenticating, by the security device, the security management device according to the second public key and the first authentication information specifically includes:
decrypting the second ciphertext by using the first private key to obtain the second random number;
verifying the second signature code by using the first random number, the second random number and the second public key;
and if the signature verification is successful, the identity verification of the safety management equipment is completed.
7. The system of claim 6,
the second authentication information includes a third signature code, and the security device is further configured to: before sending the second authentication information to the security management device, encrypting the first random number and the second random number using the first private key to generate the third signature code;
the authenticating, by the security management device, the security device according to the first public key and the second authentication information specifically includes: verifying the third signature code by using the first random number, the second random number and the first public key; and if the signature verification is successful, the identity verification of the safety equipment is completed.
8. A security management method, comprising:
exchanging a first public key of the security device and a second public key of the security management device with the security management device through the security device; encrypting a first random number by using the second public key to generate a first ciphertext; and sending an authentication request to the security management device;
exchanging, by the security management device and the security device, a second public key of the security management device and a first public key of the security device; receiving the authentication request; encrypting a second random number by using the first public key to generate a second ciphertext, decrypting the first ciphertext in the authentication request by using a second private key to obtain the first random number, encrypting the first random number and the second random number by using the second private key to generate a second signature code, wherein the second private key and the second public key belong to the same key pair; sending first identity verification information comprising the second ciphertext and a second signature code to the security device;
receiving, by the security device, first authentication information sent by the security management device according to the authentication request, and performing authentication on the security management device according to the second public key and the first authentication information; after the security management equipment passes the verification, sending second identity verification information to the security management equipment to obtain a verification result of the security management equipment for performing identity verification on the security equipment; and if the verification result is that the verification is passed, establishing the communication between the safety equipment and the safety management equipment.
CN202110155754.4A 2021-02-04 2021-02-04 Safety management system and method Active CN112995140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110155754.4A CN112995140B (en) 2021-02-04 2021-02-04 Safety management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110155754.4A CN112995140B (en) 2021-02-04 2021-02-04 Safety management system and method

Publications (2)

Publication Number Publication Date
CN112995140A CN112995140A (en) 2021-06-18
CN112995140B true CN112995140B (en) 2023-03-24

Family

ID=76347126

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110155754.4A Active CN112995140B (en) 2021-02-04 2021-02-04 Safety management system and method

Country Status (1)

Country Link
CN (1) CN112995140B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114615012A (en) * 2022-01-28 2022-06-10 北京威尔文教科技有限责任公司 Device connection method and device, electronic device and readable storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453330A (en) * 2016-10-18 2017-02-22 深圳市金立通信设备有限公司 Identity authentication method and system
CN108366069A (en) * 2018-02-26 2018-08-03 北京赛博兴安科技有限公司 A kind of mutual authentication method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090000624A (en) * 2007-03-09 2009-01-08 삼성전자주식회사 Method for mutual authenticating with host device and system thereof
CN100488099C (en) * 2007-11-08 2009-05-13 西安西电捷通无线网络通信有限公司 Bidirectional access authentication method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453330A (en) * 2016-10-18 2017-02-22 深圳市金立通信设备有限公司 Identity authentication method and system
CN108366069A (en) * 2018-02-26 2018-08-03 北京赛博兴安科技有限公司 A kind of mutual authentication method and system

Also Published As

Publication number Publication date
CN112995140A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN111049660B (en) Certificate distribution method, system, device and equipment, and storage medium
CN111371549B (en) Message data transmission method, device and system
CN107046531B (en) Data processing method and system for accessing data of monitoring terminal to power information network
CN103079200A (en) Wireless access authentication method, system and wireless router
CN113806772A (en) Information encryption transmission method and device based on block chain
CN112235235A (en) SDP authentication protocol implementation method based on state cryptographic algorithm
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN113225352B (en) Data transmission method and device, electronic equipment and storage medium
CN109729000B (en) Instant messaging method and device
CN110855695A (en) Improved SDN network security authentication method and system
WO2023151479A1 (en) Data processing method, and device
CN111756528A (en) Quantum session key distribution method and device and communication architecture
CN104243452A (en) Method and system for cloud computing access control
CN110839036B (en) Attack detection method and system for SDN (software defined network)
CN104796399B (en) A kind of cryptographic key negotiation method of Data Encryption Transmission
CN111654503A (en) Remote control method, device, equipment and storage medium
WO2022135391A1 (en) Identity authentication method and apparatus, and storage medium, program and program product
WO2017020530A1 (en) Enhanced wlan certificate authentication method, device and system
CN112995140B (en) Safety management system and method
CN107104888B (en) Safe instant messaging method
CN116132043B (en) Session key negotiation method, device and equipment
CN115473655B (en) Terminal authentication method, device and storage medium for access network
Wu et al. Efficient authentication for Internet of Things devices in information management systems
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN112437436A (en) Identity authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant