CN111083134A - Industrial control system communication encryption method and device, electronic equipment and storage medium - Google Patents

Industrial control system communication encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111083134A
CN111083134A CN201911266944.2A CN201911266944A CN111083134A CN 111083134 A CN111083134 A CN 111083134A CN 201911266944 A CN201911266944 A CN 201911266944A CN 111083134 A CN111083134 A CN 111083134A
Authority
CN
China
Prior art keywords
industrial control
control flow
operation instruction
decryption device
upper computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911266944.2A
Other languages
Chinese (zh)
Inventor
王乃青
吴洪涛
肖新光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Antian Science And Technology Group Co ltd
Harbin Antiy Technology Group Co Ltd
Original Assignee
Harbin Antian Science And Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antian Science And Technology Group Co ltd filed Critical Harbin Antian Science And Technology Group Co ltd
Priority to CN201911266944.2A priority Critical patent/CN111083134A/en
Publication of CN111083134A publication Critical patent/CN111083134A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention discloses a method and a device for encrypting communication of an industrial control system, electronic equipment and a storage medium, relates to the technical field of industrial control safety, and can effectively solve the problem of communication safety in the industrial control system. The method comprises the following steps: capturing industrial control flow sent by an industrial control upper computer, and releasing non-industrial control flow; the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device; the hardware decryption device decrypts the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm; the hardware decryption device analyzes the decrypted industrial control flow and judges whether the industrial control flow is an important operation instruction, if so, the hardware decryption device executes interception operation and forwards the intercepted industrial control flow to an industrial control upper computer for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting.

Description

Industrial control system communication encryption method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of industrial safety, in particular to a method and a device for encrypting communication of an industrial control system, electronic equipment and a storage medium.
Background
Communication data between an upper computer (including an engineer station, an operator station or an OPC server) and a Programmable Logic Controller (PLC) in the existing industrial control network are transmitted in plaintext, once an attacker breaks through a peripheral network and enters an intranet environment, the data are very easy to intercept and leak, malicious operations such as replay and tampering can be performed on a data link, the plaintext transmission of an industrial control protocol has a serious influence on the safe operation of an industrial control system, and a data transmission and encryption scheme aiming at the industrial control system is lacked at the present stage; some simple protection methods such as IP address filtering are also adopted to solve the security problem. The above methods do not fundamentally solve the security problem of data in the communication process.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for encrypting communication of an industrial control system, an electronic device, and a storage medium, which can fundamentally solve the problem of communication security of the industrial control system.
The embodiment of the invention provides a method for encrypting communication of an industrial control system, which comprises the following steps:
capturing industrial control flow sent by an industrial control upper computer, and releasing non-industrial control flow;
the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
the hardware decryption device decrypts the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm;
the hardware decryption device analyzes the decrypted industrial control flow and judges whether the industrial control flow is an important operation instruction, if so, the hardware decryption device executes interception operation and forwards the intercepted industrial control flow to an industrial control upper computer for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC;
wherein the important operation instruction comprises: downloading, erasing, or restarting.
Further, catch the industrial control flow that industrial control host computer sent, release non-industrial control flow, specifically include:
and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
Further, the execution of the interception operation and the forwarding to the industrial control upper computer for confirmation specifically include: and if the industrial control upper computer judges that operation and maintenance change is needed, the industrial control upper computer selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
In a second aspect, an embodiment of the present invention provides an apparatus for encrypting communication in an industrial control system, including:
the agent module is arranged on the industrial control upper computer, and the hardware decryption device is connected between the industrial control upper computer and the PLC in series;
the agent module is used for capturing industrial control flow sent by the industrial control upper computer and releasing non-industrial control flow; the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
the hardware decryption device is used for decrypting the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm; analyzing the decrypted industrial control flow, judging whether the industrial control flow is an important operation instruction, if so, executing interception operation and forwarding the intercepted operation to an agent module for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting.
Further, catch the industrial control flow that industrial control host computer sent, release non-industrial control flow, specifically include:
and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
Further, the execution of the interception operation and the forwarding to the industrial control upper computer for confirmation specifically include: and if the agent module judges that the operation and maintenance change is needed, the agent module selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
In a third aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, and is used for executing any one of the industrial control system communication encryption methods.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where one or more programs are stored, and the one or more programs are executable by one or more processors to implement the method for communication encryption of an industrial control system according to any one of the foregoing implementation manners.
The industrial control system communication encryption method, device, electronic equipment and storage medium provided by the embodiment of the invention are different from the traditional simple protection method using IP filtering and the like, and the industrial control flow of the industrial control upper computer is decrypted and analyzed by serially connecting the hardware decryption device between the industrial control upper computer and the PLC, so that important operation instructions are intercepted and further judgment is carried out at the industrial control upper computer end, and the communication safety problem in the industrial control system is effectively solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flowchart of an embodiment of a method for encrypting communication of an industrial control system in an industrial control system according to the present invention;
FIG. 2 is a flowchart of a method for encrypting communication of an industrial control system in an industrial control system according to another embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an embodiment of a communication encryption apparatus for an industrial control system in an industrial control system according to the present invention;
fig. 4 is a schematic structural diagram of an embodiment of an electronic device according to the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
To more clearly illustrate the embodiments of the present invention, the technical terms involved are thus explained and illustrated:
PLC: a programmable logic controller;
the industrial control upper computer is an engineer station, an operator station or an OPC server in the industrial control system.
Engineer station: a workstation for use by an industrial process control engineer to configure, program, modify, etc. a computer system.
An operator station: in a distributed control system, a human interface device is used as an operator console. Including a display, a host, a keyboard or mouse, etc.
In a first aspect, an embodiment of the present invention provides a method for encrypting communication in an industrial control system, which can effectively solve a problem of communication security in the industrial control system.
Fig. 1 is a flowchart of a method of an embodiment of a method for encrypting communication in an industrial control system, including:
s101: and capturing the industrial control flow sent by the industrial control upper computer, and releasing the non-industrial control flow.
The industrial control flow sent by the industrial control upper computer is captured, the non-industrial control flow is released, and the specific scheme can be but is not limited to: and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
The industrial control protocol described in this embodiment includes, but is not limited to: modbus protocol, Siemens S7 protocol, OPC protocol, ENIP protocol, MMS protocol, 104 protocol.
S102: and encrypting the industrial control flow based on a preset encryption algorithm and forwarding the industrial control flow to a hardware decryption device.
S103: and the hardware decryption device decrypts the received industrial control flow based on a decryption algorithm corresponding to the preset encryption algorithm.
S104: the hardware decryption device analyzes the decrypted industrial control flow and judges whether the industrial control flow is an important operation instruction, if so, the hardware decryption device executes interception operation and forwards the intercepted industrial control flow to an industrial control upper computer for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting.
As a specific embodiment, the method for analyzing the decrypted industrial control traffic and determining whether the industrial control traffic is an important operation instruction by the hardware decryption device includes, but is not limited to: and the hardware decryption device analyzes the decrypted industrial control flow, analyzes the function code field and judges whether the operation command is an important operation command.
As a specific embodiment, the encryption algorithm and the decryption algorithm may be selected according to specific requirements, and the real-time performance, encryption and decryption efficiency, security and/or resource consumption of the industrial control system need to be considered, including but not limited to: AES.
In the embodiment, the internal software of the PLC is customized for a manufacturer and cannot be changed randomly, so that the industrial control flow is decrypted by using a hardware decryption device connected in series between the industrial control upper computer and the PLC, and meanwhile, the industrial control flow which is judged to be an important operation instruction is forwarded to the industrial control upper computer for final judgment by performing analysis operation, so that the problem of communication safety in the industrial control system is effectively solved.
Fig. 2 is a flowchart of a method of another embodiment of the communication encryption method for the industrial control system, including:
s201: and capturing the industrial control flow sent by the industrial control upper computer, and releasing the non-industrial control flow.
S202: the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
s203: the hardware decryption device decrypts the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm;
s204: the hardware decryption device analyzes the decrypted industrial control flow and judges whether the industrial control flow is an important operation instruction, and if the industrial control flow is an important operation instruction, the hardware decryption device executes interception operation and forwards the intercepted industrial control flow to an industrial control upper computer; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting.
S205: and if the industrial control upper computer judges that operation and maintenance change is needed, the industrial control upper computer selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
In this embodiment, the hardware decryption device is used for analyzing the industrial control flow, the forwarding of the operation instruction determined as important to the industrial control upper computer is further determined, if the industrial control upper computer is determined as legal, the operation and maintenance mode is entered, and a control removal instruction is sent to the hardware decryption device, so that the normal operation and maintenance operation is not affected on the premise of ensuring the safety of communication data.
In a second aspect, an embodiment of the present invention provides an apparatus for encrypting communication in an industrial control system, which can effectively solve the problem of communication security in the industrial control system.
Fig. 3 is a schematic structural diagram of an embodiment of a communication encryption device of an industrial control system according to the present invention, including:
the agent module is arranged on the industrial control upper computer, and the hardware decryption device is connected between the industrial control upper computer and the PLC in series; the industrial control upper computer can be an engineer station or an operator station.
The agent module is used for capturing industrial control flow sent by the industrial control upper computer and releasing non-industrial control flow; the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
the hardware decryption device is used for decrypting the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm; analyzing the decrypted industrial control flow, judging whether the industrial control flow is an important operation instruction, if so, executing interception operation and forwarding the intercepted operation to an agent module for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting. Wherein, industrial control host computer includes but not limited to: engineer station, operator station, or OPC server.
Preferably, catch the industrial control flow that industrial control host computer sent, pass non-industrial control flow, specifically include:
and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
Preferably, the executing of the interception operation and the forwarding to the industrial control upper computer for confirmation specifically include: and if the agent module judges that the operation and maintenance change is needed, the agent module selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
According to the embodiment, the industrial control flow is encrypted at the industrial control upper computer end, the hardware decryption device connected between the industrial control upper computer and the PLC in series is used for decrypting the industrial control flow, and meanwhile, the industrial control flow which is judged to be an important operation instruction is forwarded to the industrial control upper computer for final judgment through analysis operation, so that the problem of communication safety in an industrial control system is effectively solved.
In a third aspect, an embodiment of the present invention further provides an electronic device, which can effectively solve the problem of communication security in an industrial control system.
Fig. 4 is a schematic structural diagram of an embodiment of an electronic device of the present invention, where the electronic device may include: the device comprises a shell 41, a processor 42, a memory 43, a circuit board 44 and a power circuit 45, wherein the circuit board 44 is arranged inside a space enclosed by the shell 41, and the processor 42 and the memory 43 are arranged on the circuit board 44; a power supply circuit 45 for supplying power to each circuit or device of the electronic apparatus; the memory 43 is used for storing executable program code; the processor 42 executes a program corresponding to the executable program code by reading the executable program code stored in the memory 43, and is used for executing the method for encrypting the industrial control system communication according to any one of the foregoing embodiments.
For the specific execution process of the above steps by the processor 42 and the steps further executed by the processor 42 by running the executable program code, reference may be made to the description of the embodiment shown in fig. 1 and 2 of the present invention, which is not described herein again.
The electronic device exists in a variety of forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic equipment with data interaction function.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where one or more programs are stored, and the one or more programs are executable by one or more processors to implement the method for communication encryption of an industrial control system according to any one of the foregoing implementation manners.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
In particular, as for the method embodiment, since it is substantially similar to the apparatus embodiment, the description is simple, and the relevant points can be referred to the partial description of the apparatus embodiment.
For convenience of description, the above devices are described separately in terms of functional division into various units/modules. Of course, the functionality of the units/modules may be implemented in one or more software and/or hardware implementations of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (8)

1. A method for encrypting communication of an industrial control system is characterized by comprising the following steps:
capturing industrial control flow sent by an industrial control upper computer, and releasing non-industrial control flow;
the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
the hardware decryption device decrypts the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm;
the hardware decryption device analyzes the decrypted industrial control flow and judges whether the industrial control flow is an important operation instruction, if so, the hardware decryption device executes interception operation and forwards the intercepted industrial control flow to an industrial control upper computer for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC;
wherein the important operation instruction comprises: downloading, erasing, or restarting.
2. The method of claim 1, wherein the capturing of industrial control traffic sent by an industrial control upper computer and the releasing of non-industrial control traffic specifically comprise:
and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
3. The method of claim 1, wherein the executing of the interception operation and forwarding to the upper industrial control computer for confirmation specifically comprises: and if the industrial control upper computer judges that operation and maintenance change is needed, the industrial control upper computer selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
4. An industrial control system communication encryption device, comprising: the agent module is arranged on the industrial control upper computer, and the hardware decryption device is connected between the industrial control upper computer and the PLC in series;
the agent module is used for capturing industrial control flow sent by the industrial control upper computer and releasing non-industrial control flow; the industrial control flow is encrypted based on a preset encryption algorithm and then forwarded to a hardware decryption device;
the hardware decryption device is used for decrypting the received industrial control flow based on a decryption algorithm corresponding to a preset encryption algorithm; analyzing the decrypted industrial control flow, judging whether the industrial control flow is an important operation instruction, if so, executing interception operation and forwarding the intercepted operation to an agent module for confirmation; if the operation instruction is not an important operation instruction, forwarding the operation instruction to the PLC; wherein the important operation instruction comprises: downloading, erasing, or restarting.
5. The apparatus of claim 4, wherein the capturing of industrial control traffic sent by the industrial control host computer and the releasing of non-industrial control traffic specifically comprise:
and capturing industrial control flow and releasing non-industrial control flow by configuring an industrial control protocol or a port number used by the current system in the configuration file.
6. The apparatus of claim 4, wherein the executing of the interception operation and forwarding to the upper industrial control computer for confirmation specifically comprises: and if the agent module judges that the operation and maintenance change is needed, the agent module selects to enter an operation and maintenance mode and sends a control removal instruction to the hardware decryption device.
7. An electronic device, characterized in that the electronic device comprises: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the method of any one of claims 1 to 3.
8. A computer-readable storage medium, having one or more programs stored thereon, the one or more programs being executable by one or more processors to perform the method of any of claims 1-3.
CN201911266944.2A 2019-12-11 2019-12-11 Industrial control system communication encryption method and device, electronic equipment and storage medium Pending CN111083134A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911266944.2A CN111083134A (en) 2019-12-11 2019-12-11 Industrial control system communication encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911266944.2A CN111083134A (en) 2019-12-11 2019-12-11 Industrial control system communication encryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111083134A true CN111083134A (en) 2020-04-28

Family

ID=70313846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911266944.2A Pending CN111083134A (en) 2019-12-11 2019-12-11 Industrial control system communication encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111083134A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987688A (en) * 2023-03-20 2023-04-18 北京网藤科技有限公司 Method and system for guaranteeing safe communication between PLC and upper computer

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599835A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 Signature device and method for executing operating instructions thereof
US20110072520A1 (en) * 2003-08-23 2011-03-24 Softex Incorporated System And Method For Protecting Files Stored On An Electronic Device
CN106100836A (en) * 2016-08-09 2016-11-09 中京天裕科技(北京)有限公司 A kind of industrial user's authentication and the method and system of encryption
CN107612733A (en) * 2017-09-19 2018-01-19 杭州安恒信息技术有限公司 A kind of network audit and monitoring method and its system based on industrial control system
CN108366041A (en) * 2017-03-31 2018-08-03 北京安天网络安全技术有限公司 Industry control Environmental security defence method and system based on service order model
US20190180056A1 (en) * 2017-12-12 2019-06-13 John Almeida Virus immune computer system and method
CN110046726A (en) * 2019-04-24 2019-07-23 广东电网有限责任公司 A kind of O&M is listed method, system, equipment and storage medium automatically

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072520A1 (en) * 2003-08-23 2011-03-24 Softex Incorporated System And Method For Protecting Files Stored On An Electronic Device
CN101599835A (en) * 2009-07-14 2009-12-09 北京坚石诚信科技有限公司 Signature device and method for executing operating instructions thereof
CN106100836A (en) * 2016-08-09 2016-11-09 中京天裕科技(北京)有限公司 A kind of industrial user's authentication and the method and system of encryption
CN108366041A (en) * 2017-03-31 2018-08-03 北京安天网络安全技术有限公司 Industry control Environmental security defence method and system based on service order model
CN107612733A (en) * 2017-09-19 2018-01-19 杭州安恒信息技术有限公司 A kind of network audit and monitoring method and its system based on industrial control system
US20190180056A1 (en) * 2017-12-12 2019-06-13 John Almeida Virus immune computer system and method
CN110046726A (en) * 2019-04-24 2019-07-23 广东电网有限责任公司 A kind of O&M is listed method, system, equipment and storage medium automatically

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115987688A (en) * 2023-03-20 2023-04-18 北京网藤科技有限公司 Method and system for guaranteeing safe communication between PLC and upper computer

Similar Documents

Publication Publication Date Title
EP3148225B1 (en) Bluetooth connection-based audio playback method and apparatus
CN106529308B (en) data encryption method and device and mobile terminal
CN111355684B (en) Internet of things data transmission method, device and system, electronic equipment and medium
Pal et al. IoT technical challenges and solutions
CN107154935B (en) Service request method and device
US20180007082A1 (en) Dynamic security module server device and method of operating same
CN104580167A (en) Data transmission method, device and system
CN109286638B (en) Automobile diagnosis equipment authentication method and related device
CN106845177A (en) Cipher management method and system
CN107103211B (en) SDK send, using publication, using operation method and device
CN106203092B (en) Method and device for intercepting shutdown of malicious program and electronic equipment
CN107801059A (en) A kind of method for authenticating and server
CN107666470B (en) Verification information processing method and device
CN113722683B (en) Model protection method, device, equipment, system and storage medium
CN111030980A (en) Linux transparent network equipment platform implementation method, device and storage medium
CN104951366A (en) Mobile terminal application program login method and equipment
CN103036852B (en) A kind of method and device realizing network entry
CN106559386B (en) A kind of authentication method and device
CN113141335A (en) Network attack detection method and device
CN111246407B (en) Data encryption and decryption method and device for short message transmission
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN107872315B (en) Data processing method and intelligent terminal
CN105592459B (en) Safety certification device based on wireless communication
Renganathan et al. Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems
US10491570B2 (en) Method for transmitting data, method for receiving data, corresponding devices and programs

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Heilongjiang Province (No. 838, Shikun Road)

Applicant after: Antan Technology Group Co.,Ltd.

Address before: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Harbin, Heilongjiang Province (No. 838, Shikun Road)

Applicant before: Harbin Antian Science and Technology Group Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200428