CN113569213A - Industrial park application safety support system and method based on 5G technology - Google Patents

Industrial park application safety support system and method based on 5G technology Download PDF

Info

Publication number
CN113569213A
CN113569213A CN202110930880.2A CN202110930880A CN113569213A CN 113569213 A CN113569213 A CN 113569213A CN 202110930880 A CN202110930880 A CN 202110930880A CN 113569213 A CN113569213 A CN 113569213A
Authority
CN
China
Prior art keywords
module
data
park
industrial
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110930880.2A
Other languages
Chinese (zh)
Inventor
郭仲勇
曹彦朋
张宏元
岳勇
许高锋
梁勇利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Zhongdun Yunan Information Technology Co ltd
Original Assignee
Henan Zhongdun Yunan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Zhongdun Yunan Information Technology Co ltd filed Critical Henan Zhongdun Yunan Information Technology Co ltd
Priority to CN202110930880.2A priority Critical patent/CN113569213A/en
Publication of CN113569213A publication Critical patent/CN113569213A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/40Transportation
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/30Control
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Abstract

The invention relates to a safety support system and a method for industrial park application based on a 5G technology, which effectively solve the problem of the overall information safety of an industrial park cloud network side end; the technical scheme provided by the system comprises a digital identity subsystem, a timestamp service subsystem, an electronic signing subsystem and a block chain public service subsystem; the digital identity subsystem comprises an identity authentication module, an access control module and a data encryption and decryption module; the timestamp service subsystem comprises a trusted timestamp management module, a system management module, an equipment management module and an audit management module; the electronic signing subsystem comprises a signing management module, a contract template module and a user management module; the invention meets the requirements of all parties on real-time supervision and timely reaction in the industrial production process, and improves the treatment capacity and the sharing level of industrial production data.

Description

Industrial park application safety support system and method based on 5G technology
Technical Field
The invention relates to the technical field of park information safety, in particular to an industrial park application safety support system and method based on a 5G technology.
Background
The industrial park is taken as an important carrier for promoting the economic development of China, is always regarded as a main battlefield of economic construction, the development of the industrial park is subjected to rapid increase in quantity and different development stages from the beginning of quality to the integration and upgrading, and about 30000 industrial parks in China are found by counting the quantity of the industrial parks in China. However, it is worth noting that the information security system of the industrial park in China is relatively lagged at present, and especially with the development of the new generation information technology of the 5G and internet of things technologies, more and more terminal devices are accessed to the industrial park, so that the information security risk is further increased, which is mainly reflected in the following aspects:
1. the safety of the terminal equipment is characterized in that a large number of internet of things terminals are deployed to prevent safety accidents due to the fact that the safety of the terminal equipment and most industrial parks relate to the safety production problem, the types of the terminal equipment are various, the related problems comprise how to effectively manage access, access anytime and anywhere, how to manage and control terminal access, how to intensively and quickly issue security policies to the terminals and the like.
2. The problem of network security, industry garden network extend to the end in garden, and equipment access volume is big, the management and control degree of difficulty is high, is cracked by limited invasion or wireless easily, has illegal equipment to access the hidden danger in network. Meanwhile, due to the fact that the access devices are various in types, the devices are prone to disconnection and network instability when suffering electromagnetic interference.
3. The data security problem, the industrial park collects a large amount of industrial production data, and park enterprises often have the requirement that the data cannot be exported, and the data are at risk of being tampered and stolen, so that data sharing and data management are difficult to guarantee on the basis of data security.
Therefore, the present invention provides a system and a method for applying safety support to industrial park based on 5G technology to solve the above problems.
Disclosure of Invention
Aiming at the situation, in order to overcome the defects of the prior art, the invention provides a system and a method for applying safety support to an industrial park based on a 5G technology, which effectively solve the problem of the whole information safety of the cloud network side end of the industrial park.
The system comprises a digital identity subsystem, a timestamp service subsystem, an electronic signing subsystem and a block chain public service subsystem;
the digital identity subsystem comprises an identity authentication module, an access control module and a data encryption and decryption module;
the timestamp service subsystem comprises a trusted timestamp management module, a system management module, an equipment management module and an audit management module;
the electronic signing subsystem comprises a signing management module, a contract template module and a user management module;
the block chain public service subsystem comprises a park public security and protection sensing equipment collected data chaining module, an industrial enterprise intelligent production equipment chaining module, a transmission safety module, a trusted storage module, a sharing exchange module and a BaaS service module.
Preferably, the identity authentication module comprises a plurality of security carriers, and the plurality of security carriers comprise SE, TEE and soft algorithm;
the SE is a security chip with a high-security computing environment and a high-security storage environment;
the TEE is a trusted execution environment and is used for providing functions of isolated execution, integrity of trusted application, confidentiality of trusted data and safe storage;
the soft algorithm realizes reinforcement protection on sensitive data through software encryption and scrambling technologies;
the identity authentication module adopts a lightweight security protocol and a compliance algorithm;
each device and each session in the identity authentication module have independent keys;
the identity authentication module supports offline authentication between equipment ends;
the identity authentication module supports RSA, AES, ECC, SM1, SM2, SM3, SM4 and SM9 cryptographic algorithms.
Preferably, the access control module includes an authorization function, a file protection function, and an audit function, wherein:
an authorization function: after the identity authentication submodule authenticates the user correctly, different use resources are allocated to the identity authentication submodule according to different user identifications for authorization;
the file protection function: refers to additional protection provided for files and makes files unreadable by unauthorized users;
and (4) auditing function: the process of recording all activities performed by the user system, including the time, date, and user activities that the user used the system in violation of security regulations.
Preferably, the data uploading module collected by the campus public security sensing equipment stores and synchronizes the data hash uploaded by the campus public security sensing equipment to each node;
the industrial enterprise intelligent production equipment chaining module is used for chaining industrial enterprise production equipment by setting data hash and setting alarm upper and lower limits by using a block chain intelligent contract;
the trusted storage module is used for reporting monitoring data acquired by the industrial enterprise safety production monitoring equipment to an industry department of charge and simultaneously linking the service data hash with a certificate;
the transmission safety module is used for guaranteeing the safety of the data transmission process from the industrial enterprise to the industry department;
the sharing exchange module is used for sharing the public security data and the enterprise safety production monitoring data of the industrial park to a park manager and an industry department of charge business system;
the BaaS service module adopts unified API/SDK, and the BaaS service module adopts Docker container technology to support machine room deployment and cloud server deployment.
Preferably, the network deploys: deploying a 5G private network in the industrial park;
deployment of a safety support system: deploying a 5G MEP edge computing platform in an industrial park machine room, abstracting computing capacity and network capacity into services to open the industrial park, and realizing cloud network cooperation, cloud edge cooperation and cloud end cooperation;
deploying an industrial park application safety support system on the 5G MEP, and realizing the credibility of identities, the credibility of collected transmission data and the credibility of data sharing and exchange of park public security sensing equipment and intelligent production equipment of industrial enterprises in the park by utilizing identity authentication, time stamping, electronic signing and block chain technologies;
the deployment of the safety support system comprises the following implementation processes:
s1: 5G private network access authentication;
s2: performing secondary authentication;
s3: controlling access;
s4: data acquisition, signature and timestamp addition;
s5: data encryption transmission;
s6: data chaining and clouding.
Preferably, the 5G private network includes a terminal device, a base station device, an MEC device, a core network device, and a network management platform, wherein:
the terminal equipment comprises a handheld 5G intelligent terminal, a 5G communication module and 5G block chain gateway equipment;
the base station equipment provides 5G private network coverage;
the MEC equipment provides a special MEC service environment.
By creating a novel industrial park application safety support system and a novel industrial park application safety support method, on one hand, reliable application safety support is provided for safety production of industrial enterprises in a park management party and a park, on the other hand, a sharing co-construction idea is adopted, and by means of deploying a 5G private network and a block chain public service platform in an industrial park, the deployment cost of a 5G base station and a block chain system is greatly reduced, the requirements of all parties on real-time supervision and timely reaction in the industrial production process are met, the safety sharing and exchange of data of all parties are realized, the treatment capacity and the sharing level of industrial production data are improved, and the system and the method have the following beneficial effects:
1. the characteristics of high bandwidth, low time delay and large connection of the 5G technology are utilized, and the technical requirements of various sensing equipment for public management of industrial parks and intelligent production equipment of park enterprises on high reliability of the network are met;
2. by adopting a 5G edge computing technology, the access of a campus user to local network resources with low time delay and high bandwidth is realized by deploying a 5G edge computing server in an industrial campus computer room for local distribution, and data can not be exported;
3. the identity authentication technology is adopted to ensure that bidirectional identity authentication is carried out through a lightweight security authentication protocol and a compliance algorithm when various intelligent devices in the industrial park communicate with the cloud platform, so that the identity security of the devices is ensured;
4. the method adopts a timestamp service technology to provide accurate, reliable and non-reliable timestamp service for various users in the industrial park;
5. by adopting an electronic signature technology, various electronic contract signature and signature services are provided for enterprises in the park and the park, and the actual on-line signing requirements of the enterprises in the park are met;
6. and (3) building an industrial park block chain public service system, and chaining and sharing key data in the park management and park enterprise production and manufacturing processes to each participating node, so that the park management cost reduction, the efficiency improvement and the mode upgrading are promoted.
Drawings
FIG. 1 is a schematic diagram of a system architecture according to the present invention.
Fig. 2 is a schematic diagram of the system deployment of the present invention.
FIG. 3 is a schematic flow chart of the method of the present invention.
Detailed Description
The foregoing and other aspects, features and advantages of the invention will be apparent from the following more particular description of embodiments of the invention, as illustrated in the accompanying drawings in which reference is made to figures 1 to 3. The structural contents mentioned in the following embodiments are all referred to the attached drawings of the specification.
In the description of the present invention, it is to be understood that the terms "upper", "middle", "outer" and "inner" indicate orientations and positional relationships, and are used for convenience in describing the present invention and simplifying the description, but do not indicate or imply that the referenced components or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present invention, it should be noted that, unless explicitly stated or limited otherwise, the terms "connected" and "connected" are to be interpreted broadly, e.g., as a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; may be directly connected or indirectly connected through an intermediate. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations. In the description of the present invention, unless otherwise specified, "a plurality" means two or more, and will not be described in detail herein.
Exemplary embodiments of the present invention will be described below with reference to the accompanying drawings.
The invention discloses a safety support system for industrial park application based on a 5G technology, which is characterized by comprising a digital identity subsystem, a timestamp service subsystem, an electronic signing subsystem and a block chain public service subsystem, wherein:
digital identity subsystem
Digital identity subsystem mainly used realizes that all kinds of video monitoring in garden, water and electricity sensing, environmental monitoring, pipe network monitoring, fire fighter's air defense response monitoring garden public security equipment and garden enterprise manufacture smart machine's authentication, access control, data encryption and decryption, including authentication module, access control module, data encryption and decryption module, wherein:
the identity authentication module can provide the identity authentication service of the Internet of things equipment with multiple security levels, less resource occupation, one secret and offline authentication;
1. and (4) multiple security levels: the system supports multiple safety carriers of SE, TEE and soft algorithm, different safety carriers can provide different levels of safety, the SE refers to a safety chip with high-safety computing environment and high-safety storage environment, and the SE safety chip can provide high-level safety;
the TEE is a trusted execution environment, provides an isolated execution environment, and provides functions of isolated execution, integrity of trusted application, confidentiality of trusted data and safe storage;
the soft algorithm is to realize reinforcement protection on sensitive data through software encryption and scrambling technologies, and can select a proper safety carrier according to the safety requirement of the equipment of the park Internet of things to balance safety and cost, for example, the park intelligent door lock equipment has high safety requirement, and can improve the safety by using an SE (secure element) safety chip;
2. the resource occupation is less: the equipment identity authentication adopts a lightweight security protocol, the requirement on the equipment performance is reduced on the premise of ensuring the security, and the equipment identity authentication service of the Internet of things can be normally used even for equipment with limited resources;
3. one secret is used: the mode of one machine and one time is adopted, each device and each session are ensured to have independent keys, higher safety is brought, even if a single device or a single session key is leaked, the safety of other devices or other sessions can be still ensured, meanwhile, historical log analysis can be resisted, and the forward secrecy effect is achieved;
4. and (3) offline authentication: the system supports an end-side offline authentication function, namely, the equipment ends can be authenticated offline, the whole process does not need to communicate with an identity authentication module, the equipment identity authentication time and network flow are saved, and industrial park enterprises can determine whether to select the offline authentication function according to the use scene of the equipment per se;
5. a variety of cryptographic algorithms are supported: in addition to international cryptographic algorithms such as RSA, AES, ECC, the identity authentication sub-module supports domestic commercial cryptographic algorithms such as SM1, SM2, SM3, SM4, SM 9;
the access control module is mainly used for ensuring the authentication and control of the legal use of the park perception equipment by an industrial park management party and an enterprise, preventing illegal access of illegal users or illegal use of legal users, ensuring that the whole park perception equipment can be reasonably and properly utilized, and having the functions of authorization, file protection and audit, wherein:
1. authorization: the ID of the identifier is used as a key word to control programs and data accessed by the user, and the user is authenticated by the identity authentication submodule and then is allocated to different used resources according to different user identifications for authorization;
in practical application of an industrial park, access rights of users are generally required to be clarified from three aspects of user types, application resources and access rules;
2. file protection: the method is characterized in that the method is an additional protection provided for the file, which can make an unauthorized user unreadable, and generally adopts an additional protection for encrypting the file;
3. auditing: auditing is the process of recording all activities performed by a user system, namely recording the time and date when a user uses the system in violation of safety regulations and user activities;
the data encryption and decryption module is mainly used for encrypting and decrypting data acquired by the sensing equipment of the industrial park, can provide functions of key full-life-cycle management, configurable key use strategy access authority, key encryption and decryption and signature verification, supports management of various encrypted objects including a symmetric key, an asymmetric key, a digital certificate and an authentication token, adopts a hardware encryption mode, and has the advantages of high encryption speed, less occupied computer resources and high safety compared with software encryption.
Timestamp service subsystem
The timestamp service subsystem meets the basic requirement of timestamp issuance, adopts the safety mechanism of accurate time source and high-strength high standard, can provide accurate, reliable and non-repudiatable timestamp service for various users in the garden, and the timestamp service subsystem includes trusted timestamp management module, system management module, equipment management module, audit management module, wherein:
1. trusted timestamp management: the module is a core function of a timestamp service module and comprises application configuration of a timestamp signature certificate, timestamp data query, service monitoring, update of an administrator certificate and query of a service log;
2. and (3) system management: the method comprises the functions of site certificate application, site certificate configuration, administrator authority certificate management, authority management, database configuration and license configuration;
3. equipment management: the method comprises the functions of network setting, trusted time source management, network diagnosis management, SNMP service management, system monitoring and network monitoring; (ii) a
4. And (4) audit management: the method comprises the functions of checking audit information, setting filing records of filing strategies and updating the certificate of the security auditor.
Electronic signing subsystem
The electronic signing subsystem is used for meeting various electronic contract signing and signing functional requirements of the industrial park and enterprises in the park, and comprises a signing and signing management module, a contract template module and a user management module, wherein:
1. signature management: the signature generation has two modes, can be generated according to a company name system, and can also be generated by uploading a official seal picture;
2. contract management: custom classification of contracts, wherein each classification comprises various states of the contract, such as waiting for signing, withdrawing, completing and overdue;
the intelligent search of the contract can be carried out according to the contract validity periods of the signer and the initiator;
3. contract template management: supporting the uploading of files with various formats into a template, wherein the template can be provided with common options of signing areas of both parties, and the template is provided with a switch and can be used for signing after being started;
4. personnel management: and a user account can be created, and the user account can log in the electronic signing subsystem for contract signing and checking.
Block chain common service subsystem
The block chain public service subsystem is used as an industrial park public service trust network foundation support, a service park manager, enterprises, industrial companies, tax, environmental protection, emergency and fire control government departments are managed, and the block chain is fused with park production and manufacturing enterprise intelligent equipment and the service systems of the existing government departments, so that the credible storage of the processes of registration from the industrial companies to the production and manufacturing and tax payment of the parks is realized, the data in the whole process cannot be falsified and is real and credible, safety support is provided for the open sharing and privacy protection of park public service data, the park management cost reduction, the efficiency improvement and the mode upgrade are promoted, and the system specifically comprises the following modules:
1. the data chaining module is used for chaining the data collected by the public security sensing equipment in the park by means of a block chain technology, and synchronizing the data to each node, so that the characteristic that the block chain cannot be tampered is fully exerted, and the risk of tampering collection and collection of the sensing equipment is guaranteed; meanwhile, 5G block chain gateways can be deployed around the public security sensing equipment in the park, so that the data acquired by the equipment can be protected through the gateway pre-chaining at the first time, and the data source is guaranteed to be real and credible;
2. industrial enterprise's intelligent production equipment cochain module sets up data cochain with industrial enterprise's production equipment like control unit, industrial computer equipment, prevents that the people from falsifying probably, and usable block chain intelligence contract simultaneously sets for the upper and lower limit of reporting to the police, and is safer and more reliable than the people settlement. The light nodes deployed at the enterprise end realize traceable performance of GDS, FDS and DCS system equipment parameter configuration data and trace marks on a configuration process chain;
3. the transmission security module is arranged at a light node at the industrial enterprise end, so that the security of the transmission process of data from the industrial enterprise to the industrial administrative department end is guaranteed, the trace left on the chain can be traced, the light node at the enterprise end supports RSA, AES and ECC international cryptographic algorithms, SM1, SM2, SM3, SM4 and SM9 domestic cryptographic algorithms and equipment certificate services, an encryption channel is constructed, and the secure transmission of the equipment identity trusted data can be guaranteed;
4. the credible storage module is used for performing chain storage on key business data while storing the key business data after the industry administrative department receives the monitoring data collected and reported by the industrial enterprise safety production monitoring equipment, so as to ensure that the original basic data is real and credible, and the key business data is used as a powerful basis for credible digital supervision, safety data analysis and enterprise evaluation of the industrial enterprise by the industry administrative department;
5. the sharing exchange module shares the industrial park public security data and the enterprise safety production monitoring data to a park manager and an industry director service system, so that the park manager and the industry director can conveniently supervise the park safety production in real time;
6. the BaaS service module adopts unified API/SDK to facilitate development and docking, and the BaaS service adopts Docker container technology to support machine room deployment and cloud server deployment.
The second embodiment is that on the basis of the first embodiment, the invention provides a safety support method for industrial park application based on 5G technology; the method comprises the following steps of firstly deploying a 5G private network in an industrial park, meeting the requirements of remote monitoring, visualization, remote guidance and high-speed collaborative business scene of production and manufacturing enterprises in the park by using the characteristics of high bandwidth, low time delay and large connection of the 5G network, solving the safety production of the enterprises, and improving the production efficiency, and comprises the following steps:
network deployment
Network deployment: deploying a 5G private network in the industrial park;
in the aspect of a 5G private network, considering that an industrial park has extremely high requirements on network security and management control, an independent network isolated from a public network needs to be established, wherein the 5G private network mainly comprises terminal equipment, base station equipment, MEC equipment, core network equipment and a network management platform, and the method comprises the following steps:
terminal equipment includes handheld 5G intelligent terminal, 5G communication module, 5G block chain gateway equipment, wherein:
the handheld intelligent terminal device provides production information inquiry, device operation, positioning, image and data transmission functions for industrial park managers and production workers;
the 5G communication module is arranged on various sensors, portable mobile equipment and acquisition equipment and supports the functions of data transmission and positioning;
the 5G blockchain gateway is deployed in an industrial field, unified management is carried out on various machines and equipment interfaces in the industrial field, the capability of comprehensively accessing a base station is provided, and the 5G blockchain gateway supports Ethernet ports, Wi-Fi, Bluetooth and RS232/485 mainstream protocols, so that management connection of heterogeneous networks in a park is realized;
the base station equipment provides 5G private network coverage, realizes the access functions of industrial park managers and various wireless broadband terminals in parks, provides wireless resource distribution and scheduling and mobility management functions for the terminals in the coverage area, and meets the communication guarantee requirements of broadband mobile users in the wireless coverage area;
the MEC equipment provides a special MEC service environment for the industrial park, and industrial enterprise production operation applications, such as industrial control applications and position applications, are deployed on the MEC equipment;
the core network equipment realizes the control and management of the base station and provides the functions of authentication, access, service connection and data management of the user;
the network management platform is used for managing related network layer equipment and comprises a server, an operation maintenance terminal, an alarm box, a management console and some networking equipment;
safety support system deployment
The method comprises the steps that a 5G MEP edge computing platform is deployed in an industrial park machine room, computing capacity and network capacity are abstracted into service to open the industrial park, cloud network cooperation, cloud edge cooperation and cloud end cooperation are achieved, internal application of the industrial park is flexibly and efficiently deployed to the edge of the network, and application innovation requirements of high speed, low time delay and service localization are met;
meanwhile, an industrial park application safety support system is deployed on the 5G MEP, and identity credibility, credibility of collected and transmitted data, credibility of data sharing and credibility of data exchange of park public security sensing equipment and intelligent production equipment of industrial enterprises in the park are realized by using identity authentication, time stamping, electronic signing and block chain technologies;
the industrial park application safety support method based on the 5G technology specifically realizes the following processes:
1. 5G private network access authentication
Identity Authentication is carried out on various intelligent terminals of the industrial park based on a 5G-AKA (5G Authentication and Key Agreement ) or EAP-AKA' (Extensible Authentication Protocol-Authentication and Key Agreement, extended Authentication Protocol-Authentication and Key Agreement) security Authentication mechanism, and only legal terminals can be ensured to be accessed into a 5G private network of the park;
when access authentication is carried out, a 5G AKA or EAP-AKA' mechanism can negotiate out encryption and integrity protection keys for a terminal and a network, and terminal signaling and user data are encrypted and integrity protected on a network access level and a non-access level, so that the information of an industrial park is prevented from being tampered and eavesdropped;
2. secondary authentication
The method comprises the following steps that an identity authentication module of a digital identity subsystem of an industrial park application safety support system is used for carrying out secondary authentication on various intelligent terminals of the industrial park, various intelligent terminal devices of the park need to be registered in the identity authentication module, the industrial park application safety support system and gateway register key related information, and data collection can be carried out safely only after registration;
3. access control
When an illegal user or the illegal user is illegally accessed to the industrial park network, the access control module is triggered to ensure that the whole park sensing equipment can be reasonably and properly utilized;
4. data acquisition, signature and time stamping
The 5G block chain gateway receives, analyzes and converts data acquired by the intelligent terminal equipment of the industrial park, signs the data through the electronic signing subsystem of the application safety support system of the industrial park, and adds a timestamp on the signed data through the timestamp service subsystem;
5. data encrypted transmission
The 5G blockchain gateway encrypts and transmits the data to the edge layer through the special 5G network slice according to the type and the scene of the acquired data; the industrial park decrypts the received data by using a data encryption and decryption module of a digital identity subsystem of the safety support system, otherwise, the data encryption process of returning the edge layer to the 5G block chain gateway is the same as the process;
6. data chaining and clouding
And uploading the data to all consensus nodes of the block chain public service subsystem by calling a data chaining intelligent contract of the block chain public service subsystem of the industrial park application safety support system. And the consensus node simultaneously signs and encrypts the acquired data contained in the block through the key management module, and uploads a signature result and a ciphertext of the acquired data to the campus cloud platform.
In a third embodiment, on the basis of the first embodiment, referring to fig. 2, the invention provides a specific embodiment of deployment of an industrial park application safety support system based on a 5G technology;
the safety support system applied to a certain industrial park is applied to logistics distribution of an unmanned distribution vehicle in the park, and the unmanned distribution vehicle is carried or connected with a 5G block chain gateway, has the functions of remote control, automatic cargo loading and unloading, online payment, GIS cruise, online signing and safety access control, and can realize unmanned distribution of cargoes in the industrial park;
the terminal equipment comprises an electronic password card, an electronic password key and an intelligent terminal, wherein the intelligent terminal comprises a 5G module, and functions of online signing, online payment and access authorization, and can realize the cooperative receiving and dispatching of goods with the unmanned distribution vehicle;
the industrial park is deployed with a 5G private network, 5G MEPs are deployed in the 5G private network, and an application security support system of the industrial park is deployed in an edge computing platform and comprises a digital identity subsystem, a timestamp service subsystem, an electronic signing subsystem and a block chain public service subsystem. The terminal equipment and the unmanned distribution vehicle are registered in the 5G private network, and the registration identification is obtained.
In a fourth embodiment, referring to fig. 3 on the basis of the second embodiment, the present invention provides an embodiment for explaining an implementation process of distributing goods by an unmanned delivery vehicle in an industrial park, which applies a safety support system to the industrial park based on the 5G technology, the implementation process includes the following steps:
1. 5G private network access authentication
Before the logistics distribution business starts, the unmanned distribution vehicle and the terminal intelligent equipment need to be accessed and authenticated in a 5G private network, become legal network access equipment after the authentication is passed, and have the networking communication capacity of the 5G private network;
2. secondary authentication
A large number of service scenes exist in the industrial park, equipment authenticated by the 5G private network still needs to be authenticated for the second time, and identity authentication and access control of the equipment under different scenes are realized;
various devices need to perform identity registration, authentication and authorization through an identity authentication module of the digital identity subsystem. Firstly, initializing a secret key in the equipment, then exporting and sending the public key to a digital identity authentication subsystem to apply for a digital certificate, authenticating and binding the identity after the digital identity authentication subsystem passes the verification, and distributing the certificate to the equipment;
the equipment required in the process comprises intelligent equipment of a goods receiver, intelligent equipment of a goods sender and an unmanned distribution vehicle;
3. receiving order
The receiving party orders through the intelligent terminal, and ordering information comprises GIS coordinates of the receiving party, GIS addresses of the delivering party, certificate information of the receiving party and information of the goods;
after ordering is completed, the unmanned distribution vehicle collects goods according to the GIS coordinates of the goods sender, and the unmanned distribution vehicle reaches the GIS coordinates of the goods sender according to the scheduling system and the cruise setting;
the unmanned delivery vehicle informs the delivery party of the start of loading of the intelligent terminal and sends a random loading code to the intelligent terminal;
after receiving the delivery code, the delivery party signs the delivery code and sends the signature information, the delivery code and the identity information of the delivery party to the unmanned delivery vehicle;
the unmanned delivery vehicle verifies the information of the delivery party and the signature of the delivery code through an identity authentication module of the digital identity subsystem, and allows the door to be opened for loading after the verification is passed;
4. remote loading
The unmanned distribution vehicle utilizes the characteristics of high bandwidth and low time delay of a 5G private network and uses VR and remote control technology for loading;
5. freight accounting
After the goods are loaded by the delivery party, a goods loading completion notice is sent through the intelligent terminal, and after the unmanned delivery vehicle receives the goods loading completion notice, the size and weight related information of the goods are calculated through OCR recognition and intelligent perception, and freight cost accounting is carried out;
after the accounting is finished, sending order information to the delivery party intelligent terminal, performing single-party signing on the order through an electronic signing subsystem of the application security support system, and performing time signing through a timestamp service subsystem;
6. request for payment
And after the shipper receives the order information and confirms that the order information is correct, paying the related fee on line. Meanwhile, an electronic signing subsystem applying a safety support system signs orders, and then a time stamp service subsystem signs time, so that the signing time of the two parties is not different;
7. block chaining storage certificate
Writing an online signing certificate-storing intelligent contract in a block chain public service subsystem in advance, storing certificates of electronic signing of both sides on the block chain after signing is completed, returning a block chain transaction ID after the certificates are successfully stored, and storing the transaction ID by the electronic signing subsystem;
8. application for delivery
And the unmanned delivery vehicle receives the signing completion notice and sends the notice to the intelligent terminal of the delivery party. The shipper can check the signing records and order information of both parties through an electronic signing subsystem of the application security support system, and can check the certificate storing information of the signing records on the block chain;
9. unmanned delivery
The unmanned delivery vehicle sends the goods to a designated position according to the GIS coordinates of the goods receiver and informs the goods receiver to receive the goods, and the unmanned delivery vehicle sends a random goods receiving code to the intelligent terminal of the goods receiver;
10. application for receiving goods
After the intelligent terminal of the goods receiving party receives the goods receiving notice and the goods receiving codes, the terminal signs the goods receiving codes, initiates goods receiving application after the signature is completed, and sends the goods receiving code signature, the goods receiving codes and the identity information of the goods receiving party to the unmanned distribution vehicle;
11. receiving certification
The unmanned distribution vehicle verifies the signature of the goods receiving code and the identity information of the goods receiving party through an identity authentication module of the digital identity subsystem;
12. remote offloading
The unmanned vehicle utilizes the characteristics of high bandwidth and low time delay of a 5G private network and uses VR and remote control technology to carry out remote unloading;
13. completion of delivery
The method comprises the steps that a logistics order evidence storage intelligent contract is compiled in a block chain service subsystem in advance, after an intelligent terminal confirms that goods receiving is completed, a delivery party information, a receiving party information and an order information are linked and stored on the block chain service subsystem by an unmanned delivery vehicle, and meanwhile the receiving party and the delivery party can verify the order information on the block chain through the intelligent terminal.
By creating a novel industrial park application safety support system and a novel industrial park application safety support method, on one hand, reliable application safety support is provided for safety production of industrial enterprises in a park management party and a park, on the other hand, a sharing co-construction idea is adopted, and by means of deploying a 5G private network and a block chain public service platform in an industrial park, the deployment cost of a 5G base station and a block chain system is greatly reduced, the requirements of all parties on real-time supervision and timely reaction of an industrial production process are met, the treatment capacity and the sharing level of industrial production data are improved, and the industrial park application safety support system and the industrial park application safety support method have the following beneficial effects:
1. the characteristics of high bandwidth, low time delay and large connection of the 5G technology are utilized, and the technical requirements of various sensing equipment for public management of industrial parks and intelligent production equipment of park enterprises on high reliability of the network are met;
2. by adopting a 5G edge computing technology, the access of a campus user to local network resources with low time delay and high bandwidth is realized by deploying a 5G edge computing server in an industrial campus computer room for local distribution, and data can not be exported;
3. the identity authentication technology is adopted to ensure that bidirectional identity authentication is carried out through a lightweight security authentication protocol or algorithm when various intelligent devices in the industrial park communicate with the cloud platform, so that the identity security of the devices is ensured;
4. the method adopts a timestamp service technology to provide accurate, reliable and non-reliable timestamp service for various users in the industrial park;
5. by adopting an electronic signature technology, various electronic contract signature and signature services are provided for enterprises in the park and the park, and the actual on-line signing requirements of the enterprises in the park are met;
6. and (3) building an industrial park block chain public service system, and chaining and sharing key data in the park management and park enterprise production and manufacturing processes to each participating node, so that the park management cost reduction, the efficiency improvement and the mode upgrading are promoted.

Claims (6)

1. A safety support system for industrial park application based on 5G technology is characterized by comprising a digital identity subsystem, a timestamp service subsystem, an electronic signing subsystem and a block chain public service subsystem;
the digital identity subsystem comprises an identity authentication module, an access control module and a data encryption and decryption module;
the timestamp service subsystem comprises a trusted timestamp management module, a system management module, an equipment management module and an audit management module;
the electronic signing subsystem comprises a signing management module, a contract template module and a user management module;
the block chain public service subsystem comprises a park public security and protection sensing equipment collected data chaining module, an industrial enterprise intelligent production equipment chaining module, a transmission safety module, a trusted storage module, a sharing exchange module and a BaaS service module.
2. The industrial park application safety support system based on 5G technology according to claim 1, wherein the identity authentication module comprises a plurality of safety carriers, the plurality of safety carriers comprises SE, TEE, soft algorithm;
the SE is a security chip with a high-security computing environment and a high-security storage environment;
the TEE is a trusted execution environment and is used for providing functions of isolated execution, integrity of trusted application, confidentiality of trusted data and safe storage;
the soft algorithm realizes reinforcement protection on sensitive data through software encryption and scrambling technologies;
the identity authentication module adopts a lightweight security protocol and a compliance algorithm;
each device and each session in the identity authentication module have independent keys;
the identity authentication module supports offline authentication between equipment ends;
the identity authentication module supports RSA, AES, ECC, SM1, SM2, SM3, SM4 and SM9 cryptographic algorithms.
3. The industrial park application safety support system based on 5G technology according to claim 1, wherein the access control module comprises an authorization function, a file protection function and an audit function, wherein:
an authorization function: after the identity authentication submodule authenticates the user correctly, different use resources are allocated to the identity authentication submodule according to different user identifications for authorization;
the file protection function: refers to additional protection provided for files and makes files unreadable by unauthorized users;
and (4) auditing function: the process of recording all activities performed by the user system, including the time, date, and user activities that the user used the system in violation of security regulations.
4. The industrial park application safety support system based on 5G technology according to claim 1, wherein the data collected by the park public security sensing equipment cochain module is used for cochain storage and synchronization of the data hash collected by the park public security sensing equipment to each node;
the industrial enterprise intelligent production equipment chaining module is used for chaining industrial enterprise production equipment by setting data hash and setting alarm upper and lower limits by using a block chain intelligent contract;
the trusted storage module is used for reporting monitoring data acquired by the industrial enterprise safety production monitoring equipment to an industry department of charge and simultaneously linking the service data hash with a certificate;
the transmission safety module is used for guaranteeing the safety of the data transmission process from the industrial enterprise to the industry department;
the sharing exchange module is used for sharing the public security data and the enterprise safety production monitoring data of the industrial park to a park manager and an industry department of charge business system;
the BaaS service module adopts unified API/SDK, and the BaaS service module adopts Docker container technology to support machine room deployment and cloud server deployment.
5. A safety support method for industrial park application based on 5G technology is characterized by comprising the following steps:
network deployment: deploying a 5G private network in the industrial park;
deployment of a safety support system: deploying a 5G MEP edge computing platform in an industrial park machine room, abstracting computing capacity and network capacity into services to open the industrial park, and realizing cloud network cooperation, cloud edge cooperation and cloud end cooperation;
deploying an industrial park application safety support system on the 5G MEP, and realizing the credibility of identities, the credibility of collected transmission data and the credibility of data sharing and exchange of park public security sensing equipment and intelligent production equipment of industrial enterprises in the park by utilizing identity authentication, time stamping, electronic signing and block chain technologies;
the deployment of the safety support system comprises the following implementation processes:
s1: 5G private network access authentication;
s2: performing secondary authentication;
s3: controlling access;
s4: data acquisition, signature and timestamp addition;
s5: data encryption transmission;
s6: data chaining and clouding.
6. The industrial park application safety support method based on 5G technology according to claim 5, wherein in the network deployment, the 5G private network includes a terminal device, a base station device, an MEC device, a core network device and a network management platform, wherein:
the terminal equipment comprises a handheld 5G intelligent terminal, a 5G communication module and 5G block chain gateway equipment;
the base station equipment provides 5G private network coverage;
the MEC equipment provides a special MEC service environment.
CN202110930880.2A 2021-08-13 2021-08-13 Industrial park application safety support system and method based on 5G technology Pending CN113569213A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110930880.2A CN113569213A (en) 2021-08-13 2021-08-13 Industrial park application safety support system and method based on 5G technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110930880.2A CN113569213A (en) 2021-08-13 2021-08-13 Industrial park application safety support system and method based on 5G technology

Publications (1)

Publication Number Publication Date
CN113569213A true CN113569213A (en) 2021-10-29

Family

ID=78171609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110930880.2A Pending CN113569213A (en) 2021-08-13 2021-08-13 Industrial park application safety support system and method based on 5G technology

Country Status (1)

Country Link
CN (1) CN113569213A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114023031A (en) * 2021-11-26 2022-02-08 河南中盾云安信息科技有限公司 Intelligent fire-fighting management system and method for small and micro-place based on 5G technology
CN114760060A (en) * 2022-06-15 2022-07-15 杭州天舰信息技术股份有限公司 Service scheduling method for edge computing
CN114928617A (en) * 2022-06-15 2022-08-19 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115955674A (en) * 2023-03-10 2023-04-11 中国人民解放军军事科学院战争研究院 Mobile communication secrecy method and system for border prevention and control network

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114023031A (en) * 2021-11-26 2022-02-08 河南中盾云安信息科技有限公司 Intelligent fire-fighting management system and method for small and micro-place based on 5G technology
CN114760060A (en) * 2022-06-15 2022-07-15 杭州天舰信息技术股份有限公司 Service scheduling method for edge computing
CN114928617A (en) * 2022-06-15 2022-08-19 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN114760060B (en) * 2022-06-15 2022-09-23 杭州天舰信息技术股份有限公司 Service scheduling method for edge calculation
CN114928617B (en) * 2022-06-15 2023-07-21 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115955674A (en) * 2023-03-10 2023-04-11 中国人民解放军军事科学院战争研究院 Mobile communication secrecy method and system for border prevention and control network

Similar Documents

Publication Publication Date Title
US11304057B2 (en) Authorized access to vehicle data
CN113569213A (en) Industrial park application safety support system and method based on 5G technology
CN111049660B (en) Certificate distribution method, system, device and equipment, and storage medium
CN110782252B (en) Monitoring video data transaction method and system based on block chain
CN101951603B (en) Access control method and system for wireless local area network
CN103109495B (en) Method for authenticating and registering devices
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
CN201194396Y (en) Safe gateway platform based on transparent proxy gateway
CN106790064B (en) The method that both sides are communicated in credible root server-cloud computing server model
CN110381145B (en) Interaction method and system between electric automobile and power grid
CN101447907A (en) VPN secure access method and system thereof
US20140122890A1 (en) Method and system for securing the exchange of data between a client module and a server module
CN103312691A (en) Method and system for authenticating and accessing cloud platform
CN102448061A (en) Method and system for preventing phishing attack on basis of mobile terminal
CN110474921B (en) Perception layer data fidelity method for local area Internet of things
CN103974255B (en) A kind of vehicle access system and method
CN112565294B (en) Identity authentication method based on block chain electronic signature
CN112152801A (en) Data asset right confirming method based on block chain technology
CN114866245B (en) Power data acquisition method and system based on block chain
CN100407190C (en) Service providing method, system and program
CN114430552B (en) Vehicle networking v2v efficient communication method based on message pre-authentication technology
CN114553463A (en) Internet of things perception data management system and management method based on block chain
KR101120059B1 (en) Billing verifying apparatus, billing apparatus and method for cloud computing environment
CN209882108U (en) Device for mobile phone terminal to safely access information network
Feng et al. Autonomous Vehicles' Forensics in Smart Cities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination