CN111624934B - PLC application program data protection system and method - Google Patents
PLC application program data protection system and method Download PDFInfo
- Publication number
- CN111624934B CN111624934B CN202010351775.9A CN202010351775A CN111624934B CN 111624934 B CN111624934 B CN 111624934B CN 202010351775 A CN202010351775 A CN 202010351775A CN 111624934 B CN111624934 B CN 111624934B
- Authority
- CN
- China
- Prior art keywords
- application program
- program data
- security module
- key
- hash value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/05—Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
- G05B19/054—Input/output
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/10—Plc systems
- G05B2219/14—Plc safety
- G05B2219/14092—Display menu and its code, sense code, compare with registered code
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Programmable Controllers (AREA)
Abstract
The invention provides a PLC application program data protection system and a method, wherein the system comprises a first safety module and a second safety module, wherein the first safety module is used for being in communication connection with a storage module of a PLC system, and the second safety module is used for being in communication connection with development equipment; the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner; the encryption and decryption of the application program data, the verification of the identification and the storage of the key and the identification are carried out through the first safety module and the second safety module, so that the use of the application program data is encrypted and protected, the development and maintenance processes of the application program are also encrypted and protected, the chance of exposing the plaintext of the application program data is avoided, and the safety, confidentiality and controllability of the application program data are fully ensured.
Description
Technical Field
The invention relates to the field of industrial control and safety, in particular to a PLC application program data protection system and method.
Background
An industrial control system or an industrial control system is an important component of a national industrial system and key infrastructure, and the safety of the industrial control system is related to the strategic safety and social stability of the country. Programmable Logic Controllers (PLCs) are important basic control devices in industrial control systems, and the safety problem faced by them is also receiving more and more attention.
The PLC application program belongs to a core secret in many cases, so that the confidentiality, the integrity, the availability and the controllability of the PLC application program are protected, and the PLC application program is also an important content of PLC safety and industrial control system safety protection.
In the prior art, some brands of PLC application programs can be encrypted and decrypted by software, but the PLC application programs are not controllable once decrypted. Some brands of PLCs use software and hardware double encryption to encrypt part of the core blocks of the application program, and the unencrypted blocks can be normally monitored and maintained, so that the core program is protected from being stolen. In some safe PLC technologies, in order to protect the safety of application programs, an encryption processing module is added in a PLC, data written into a PLC storage module and data read from the PLC storage module are encrypted and decrypted, but the data are plaintext data before being written into the PLC storage module and after being read from the PLC storage module, and the safety cannot be guaranteed. In an industrial control system with higher safety requirements, the data of the PLC application program is usually protected in a full-flow and all-around manner.
Disclosure of Invention
The invention aims to provide a PLC application program data protection system and method aiming at the requirement of the whole process security of PLC application program data, and can provide security protection in the whole process of generation, use and maintenance of an application program.
In order to achieve the above object, a first aspect of the present invention provides a PLC application data protection system including a first security module for communication connection with a storage module of a PLC system and a second security module for communication connection with a development device;
the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module;
the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage.
The second aspect of the present invention further provides a PLC application data protection method, including the steps of:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
The third aspect of the invention also provides a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method.
According to the technical scheme, the safety modules are respectively added into the computer system and the PLC system containing the PLC application program development environment to encrypt and decrypt data, verify identification and store keys and the identification, so that the PLC application program data can have full-flow safety protection.
Compared with the prior art, the invention has prominent substantive characteristics and remarkable progress, in particular:
1. the technical scheme of the invention not only carries out encryption protection on the application program data stored in the PLC system, but also carries out encryption protection on the application program data in the development equipment for carrying out application program development and maintenance.
2. The technical scheme of the invention provides encryption protection for the application program data in the whole process from generation to use and maintenance, avoids the chance of exposing the plaintext of the application program data, and fully ensures the security and the controllability of the application program.
Drawings
Fig. 1 is a schematic diagram of a process for writing application data to a PLC system according to the present invention.
Fig. 2 is a schematic diagram of a process of reading application data from a PLC system according to the present invention.
Detailed Description
Example 1
The present embodiment provides a PLC application data protection system, as shown in fig. 1 and 2, which includes a first security module for communication connection with a memory module of a PLC system and a second security module for communication connection with a development device. The development device includes a PLC dedicated or general programmer, a computer including a PLC development environment, and the like. The security module may be a hardware security module or a software security module. Preferably, in this embodiment, the first security module and the second security module are hardware security modules including a cryptographic security chip.
Specifically, the second security module has an identifier F2, and securely stores a key K1, a key K2, and an identifier F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module; if the verification fails, the application program data is not decrypted, encrypted and sent;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system; if the verification fails, the application program data is not decrypted, encrypted and written;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module; if the verification fails, the application program data is not decrypted, encrypted and sent;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage. And if the verification fails, the application program data is not decrypted, encrypted and stored.
In this embodiment, when the decrypted application data is encrypted using the key K4, a symmetric encryption algorithm is used, and the decrypted application data is still decrypted using the key K4. Alternatively, an asymmetric encryption algorithm may be used, and the decryption is performed using the other key of the public-private key pair corresponding to the key K4. Similarly, when the application data is encrypted by using the key K2, a symmetric encryption algorithm is used, and the application data is still decrypted by using the key K2. Alternatively, an asymmetric encryption algorithm may be used, and the decryption is performed using the other key of the public-private key pair corresponding to the key K2.
In this embodiment, the key K1 is the same as the key K3, and the first security module and the second security module encrypt and decrypt the application data using a symmetric cryptographic algorithm. Symmetric cryptographic algorithms such as AES, DES, 3DES, RC4, RC5, SM1, SM4, SM7, SSF33, grand-dashes cipher, etc. may be used.
In this embodiment, the identifier F1 of the first security module and the identifier F2 of the second security module include check codes; verifying the identity F1 or the identity F2, including verifying the check code.
Example 2
This example differs from example 1 in that: in this embodiment, the key K1 and the key K3 are a pair of public and private keys, and an asymmetric cryptographic algorithm is adopted when the first security module uses the key K3 and the second security module uses the key K1 to encrypt or decrypt application data, respectively. Asymmetric cryptographic algorithms such as RSA, SM2, SM9, etc. may be used.
Example 3
This example differs from example 1 in that: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1;
after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
Example 4
Based on the same inventive concept as the above system, as shown in fig. 1 and fig. 2, the present embodiment provides a PLC application data protection method, including the following steps:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
In this embodiment, if the authentication between the first security module and the second security module fails, the corresponding processing procedure is directly ended.
In this embodiment, the key K1 and the key K3 are the same or a pair of public and private keys. In other embodiments, the key K1 and the key K3 may also adopt the following scheme: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1; after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
Example 5
This example differs from example 4 in that: the first security module is further configured to be connected with a CPU module of the PLC system, and when the CPU module needs to acquire application data, the application data is decrypted by the first security module using the key K4.
When the application program data are read from the PLC system, the second security module decrypts the application program data by using the key K1, sends the decrypted application program data to the development equipment to perform corresponding operation on the application program data, encrypts the application program data processed by the development equipment by using the key K2, and stores the encrypted application program data to the development equipment. The development equipment can modify, query, search, copy and the like the application program data.
Example 6
The present embodiment provides a computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the construction method of the PLC application data protection method.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated module may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow in the method of the embodiments described above may be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (10)
1. A PLC application data protection system is characterized in that: the system comprises a first safety module and a second safety module, wherein the first safety module is used for being in communication connection with a storage module of the PLC system, and the second safety module is used for being in communication connection with development equipment;
the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module;
the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage.
2. The PLC application data protection system of claim 1, wherein: the key K1 and the key K3 are the same or a pair of public and private keys.
3. The PLC application data protection system of claim 1, wherein: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1;
after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
4. The PLC application data protection system of claim 1, wherein: the identifier F1 and the identifier F2 both comprise check codes; when the identifier F1 or the identifier F2 is verified, the verification of the check code is included.
5. A PLC application data protection method is characterized by comprising the following steps:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
6. The PLC application data protection method of claim 5, wherein: the key K1 and the key K3 are the same or a pair of public and private keys.
7. The PLC application data protection method of claim 5, wherein: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1; after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
8. The PLC application data protection method of claim 5, wherein: the first security module is further configured to be connected with a CPU module of the PLC system, and when the CPU module needs to acquire application data, the application data is decrypted by the first security module using the key K4.
9. The PLC application data protection method of claim 5, wherein: when the application program data are read from the PLC system, the second security module decrypts the application program data by using the key K1, sends the decrypted application program data to the development equipment to perform corresponding operation on the application program data, encrypts the application program data processed by the development equipment by using the key K2, and stores the encrypted application program data to the development equipment.
10. A computer-readable storage medium having stored thereon computer instructions, characterized in that: the computer instructions, when executed by a processor, perform the steps of the method of any one of claims 5 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010351775.9A CN111624934B (en) | 2020-04-28 | 2020-04-28 | PLC application program data protection system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010351775.9A CN111624934B (en) | 2020-04-28 | 2020-04-28 | PLC application program data protection system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111624934A CN111624934A (en) | 2020-09-04 |
CN111624934B true CN111624934B (en) | 2021-04-27 |
Family
ID=72258133
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010351775.9A Active CN111624934B (en) | 2020-04-28 | 2020-04-28 | PLC application program data protection system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111624934B (en) |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6058189A (en) * | 1997-06-20 | 2000-05-02 | Secure Choice Llc | Method and system for performing secure electronic monetary transactions |
JPH11196084A (en) * | 1997-10-31 | 1999-07-21 | Matsushita Electric Ind Co Ltd | Ciphering system |
JP4519963B2 (en) * | 1999-06-21 | 2010-08-04 | 富士通株式会社 | Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information |
CN1346110A (en) * | 2000-09-30 | 2002-04-24 | 刘耀民 | Network platform based software protection and sales system |
JP4007873B2 (en) * | 2002-07-09 | 2007-11-14 | 富士通株式会社 | Data protection program and data protection method |
US20060173787A1 (en) * | 2003-03-24 | 2006-08-03 | Daniel Weber | Data protection management apparatus and data protection management method |
CN102254122A (en) * | 2010-05-21 | 2011-11-23 | 深圳市合信自动化技术有限公司 | Programmable logic controller and management method of user programs thereof |
JP5836504B2 (en) * | 2012-12-20 | 2015-12-24 | 三菱電機株式会社 | Control system, program transmission device, authentication server, program protection method, program transmission method, and program for program transmission device |
CN103152362B (en) * | 2013-03-28 | 2015-09-16 | 胡祥义 | Based on the large data files encrypted transmission method of cloud computing |
-
2020
- 2020-04-28 CN CN202010351775.9A patent/CN111624934B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN111624934A (en) | 2020-09-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110519260B (en) | Information processing method and information processing device | |
CN102880836B (en) | Safety feature | |
CN103618607B (en) | A kind of Security Data Transmission and key exchange method | |
CN101989991B (en) | Method for importing secret keys safely, electronic signature tool, authentication device and system | |
CN110490008B (en) | Security device and security chip | |
CN101950347B (en) | Method and system for encrypting data | |
CN107453880B (en) | Cloud data secure storage method and system | |
CN112187544B (en) | Firmware upgrading method, device, computer equipment and storage medium | |
CN110059458B (en) | User password encryption authentication method, device and system | |
CN109635610B (en) | RFID tag data reading and writing system and method | |
JP2017514390A (en) | Method and system for protecting electronic data exchange between industrial programmable devices and portable programmable devices | |
CN110298186B (en) | Non-key data encryption and decryption method based on dynamic reconfigurable cipher chip | |
US9065635B2 (en) | Information processing apparatus, IC chip, and information processing method | |
CN103378971A (en) | Data encryption system and method | |
CN104268447A (en) | Encryption method of embedded software | |
CN104866784A (en) | BIOS encryption-based safety hard disk, and data encryption and decryption method | |
CN105262586B (en) | The method for distributing key and device of automobile burglar equipment | |
CN102811124B (en) | Based on the system Authentication method of two card trigram technology | |
KR20100031354A (en) | Tag security processing method using one time password | |
JPH10171717A (en) | Ic card and cipher communication system using the same | |
US9432186B2 (en) | Password-based key derivation without changing key | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
CN111624934B (en) | PLC application program data protection system and method | |
CN103378966A (en) | Secret key programming on safety dynamic piece | |
CN107276961A (en) | A kind of method and device based on cipher algorithm encryption and ciphertext data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |