计算机集成制造系统 ›› 2014, Vol. 20 ›› Issue (5): 1255-.DOI: 10.13196/j.cims.2014.05.yinchao.1255.11.20140529

• 产品创新开发技术 • 上一篇    

网络化制造外协加工过程技术信息安全管控支持系统

尹超,和迪壮,王明远   

  1. 重庆大学机械传动国家重点实验室
  • 出版日期:2014-05-30 发布日期:2014-06-12
  • 基金资助:
    国家自然科学基金资助项目(51175528);国家863计划资助项目(2011AA040504)。

Technical information security control support system of networked manufacturing outsourcing process

  • Online:2014-05-30 Published:2014-06-12
  • Supported by:
    Project supported by the National Natural Science Foundation,China(No.51175528),and the National High-Tech.R&D Program,China(No.2011AA040504).

摘要: 针对网络化外协加工过程中技术信息传输、数据共享、身份认证及访问控制方面的安全隐患,提出以网络安全协议、公钥基础设施技术和密码技术为基础的安全管控支持系统,从交易协议、安全认证和加密控制三个层次综合管控技术信息文件存储、传递到使用的各个环节。系统中交易协议层根据企业的信任度不同分别使用安全网际协议和安全套接层协议,安全认证层通过CA认证中心颁发的数字证书进行身份认证和加密密钥,加密控制层通过随机产出的会话密钥加密技术信息文件。最后通过应用实例验证了该支持系统的可行性和有效性。

关键词: 网络化外协加工, 虚拟专用网, 公钥基础设施, 身份认证, 数据加密

Abstract: Aiming at the potential security risks of technical information transmission,data sharing,identity authentication and access control in the networked manufacturing outsourcing process,a security control support system based on network security protocol design,Public Key Infrastructure(PKI) technology and cryptographic technology was puted forward to manage each link of technical information file's storage,transfer and use from three levels of transaction protocol,security authentication and encryption control.In this system,Internet Protocol Security(IPSec) and Secure Socket Layer (SSL) of the network security protocol were used respectively by enterprise trade agreement layer according to different trust degree.Through the digital certificate issued by CA certificate authority,the identity authentication and encryption key of security authentication layer was verified.Based on the session key generated randomly,the technical information file was encrypted by encryption control layer.The effectiveness and feasibility of proposed system was verified by the application cases.

Key words: networked outsourcing, virtual private networks, public key infrastructure, authentication, data encryption

中图分类号: