CN111624934B - PLC application program data protection system and method - Google Patents

PLC application program data protection system and method Download PDF

Info

Publication number
CN111624934B
CN111624934B CN202010351775.9A CN202010351775A CN111624934B CN 111624934 B CN111624934 B CN 111624934B CN 202010351775 A CN202010351775 A CN 202010351775A CN 111624934 B CN111624934 B CN 111624934B
Authority
CN
China
Prior art keywords
application program
program data
security module
key
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010351775.9A
Other languages
Chinese (zh)
Other versions
CN111624934A (en
Inventor
丁琦
张鲁国
何骏
廖正赟
李鑫
刘武忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinda Jiean Information Technology Co Ltd
Original Assignee
Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Xinda Jiean Information Technology Co Ltd filed Critical Zhengzhou Xinda Jiean Information Technology Co Ltd
Priority to CN202010351775.9A priority Critical patent/CN111624934B/en
Publication of CN111624934A publication Critical patent/CN111624934A/en
Application granted granted Critical
Publication of CN111624934B publication Critical patent/CN111624934B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/05Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
    • G05B19/054Input/output
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/10Plc systems
    • G05B2219/14Plc safety
    • G05B2219/14092Display menu and its code, sense code, compare with registered code

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Programmable Controllers (AREA)

Abstract

The invention provides a PLC application program data protection system and a method, wherein the system comprises a first safety module and a second safety module, wherein the first safety module is used for being in communication connection with a storage module of a PLC system, and the second safety module is used for being in communication connection with development equipment; the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner; the encryption and decryption of the application program data, the verification of the identification and the storage of the key and the identification are carried out through the first safety module and the second safety module, so that the use of the application program data is encrypted and protected, the development and maintenance processes of the application program are also encrypted and protected, the chance of exposing the plaintext of the application program data is avoided, and the safety, confidentiality and controllability of the application program data are fully ensured.

Description

PLC application program data protection system and method
Technical Field
The invention relates to the field of industrial control and safety, in particular to a PLC application program data protection system and method.
Background
An industrial control system or an industrial control system is an important component of a national industrial system and key infrastructure, and the safety of the industrial control system is related to the strategic safety and social stability of the country. Programmable Logic Controllers (PLCs) are important basic control devices in industrial control systems, and the safety problem faced by them is also receiving more and more attention.
The PLC application program belongs to a core secret in many cases, so that the confidentiality, the integrity, the availability and the controllability of the PLC application program are protected, and the PLC application program is also an important content of PLC safety and industrial control system safety protection.
In the prior art, some brands of PLC application programs can be encrypted and decrypted by software, but the PLC application programs are not controllable once decrypted. Some brands of PLCs use software and hardware double encryption to encrypt part of the core blocks of the application program, and the unencrypted blocks can be normally monitored and maintained, so that the core program is protected from being stolen. In some safe PLC technologies, in order to protect the safety of application programs, an encryption processing module is added in a PLC, data written into a PLC storage module and data read from the PLC storage module are encrypted and decrypted, but the data are plaintext data before being written into the PLC storage module and after being read from the PLC storage module, and the safety cannot be guaranteed. In an industrial control system with higher safety requirements, the data of the PLC application program is usually protected in a full-flow and all-around manner.
Disclosure of Invention
The invention aims to provide a PLC application program data protection system and method aiming at the requirement of the whole process security of PLC application program data, and can provide security protection in the whole process of generation, use and maintenance of an application program.
In order to achieve the above object, a first aspect of the present invention provides a PLC application data protection system including a first security module for communication connection with a storage module of a PLC system and a second security module for communication connection with a development device;
the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module;
the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage.
The second aspect of the present invention further provides a PLC application data protection method, including the steps of:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
The third aspect of the invention also provides a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method.
According to the technical scheme, the safety modules are respectively added into the computer system and the PLC system containing the PLC application program development environment to encrypt and decrypt data, verify identification and store keys and the identification, so that the PLC application program data can have full-flow safety protection.
Compared with the prior art, the invention has prominent substantive characteristics and remarkable progress, in particular:
1. the technical scheme of the invention not only carries out encryption protection on the application program data stored in the PLC system, but also carries out encryption protection on the application program data in the development equipment for carrying out application program development and maintenance.
2. The technical scheme of the invention provides encryption protection for the application program data in the whole process from generation to use and maintenance, avoids the chance of exposing the plaintext of the application program data, and fully ensures the security and the controllability of the application program.
Drawings
Fig. 1 is a schematic diagram of a process for writing application data to a PLC system according to the present invention.
Fig. 2 is a schematic diagram of a process of reading application data from a PLC system according to the present invention.
Detailed Description
Example 1
The present embodiment provides a PLC application data protection system, as shown in fig. 1 and 2, which includes a first security module for communication connection with a memory module of a PLC system and a second security module for communication connection with a development device. The development device includes a PLC dedicated or general programmer, a computer including a PLC development environment, and the like. The security module may be a hardware security module or a software security module. Preferably, in this embodiment, the first security module and the second security module are hardware security modules including a cryptographic security chip.
Specifically, the second security module has an identifier F2, and securely stores a key K1, a key K2, and an identifier F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module; if the verification fails, the application program data is not decrypted, encrypted and sent;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system; if the verification fails, the application program data is not decrypted, encrypted and written;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module; if the verification fails, the application program data is not decrypted, encrypted and sent;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage. And if the verification fails, the application program data is not decrypted, encrypted and stored.
In this embodiment, when the decrypted application data is encrypted using the key K4, a symmetric encryption algorithm is used, and the decrypted application data is still decrypted using the key K4. Alternatively, an asymmetric encryption algorithm may be used, and the decryption is performed using the other key of the public-private key pair corresponding to the key K4. Similarly, when the application data is encrypted by using the key K2, a symmetric encryption algorithm is used, and the application data is still decrypted by using the key K2. Alternatively, an asymmetric encryption algorithm may be used, and the decryption is performed using the other key of the public-private key pair corresponding to the key K2.
In this embodiment, the key K1 is the same as the key K3, and the first security module and the second security module encrypt and decrypt the application data using a symmetric cryptographic algorithm. Symmetric cryptographic algorithms such as AES, DES, 3DES, RC4, RC5, SM1, SM4, SM7, SSF33, grand-dashes cipher, etc. may be used.
In this embodiment, the identifier F1 of the first security module and the identifier F2 of the second security module include check codes; verifying the identity F1 or the identity F2, including verifying the check code.
Example 2
This example differs from example 1 in that: in this embodiment, the key K1 and the key K3 are a pair of public and private keys, and an asymmetric cryptographic algorithm is adopted when the first security module uses the key K3 and the second security module uses the key K1 to encrypt or decrypt application data, respectively. Asymmetric cryptographic algorithms such as RSA, SM2, SM9, etc. may be used.
Example 3
This example differs from example 1 in that: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1;
after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
Example 4
Based on the same inventive concept as the above system, as shown in fig. 1 and fig. 2, the present embodiment provides a PLC application data protection method, including the following steps:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
In this embodiment, if the authentication between the first security module and the second security module fails, the corresponding processing procedure is directly ended.
In this embodiment, the key K1 and the key K3 are the same or a pair of public and private keys. In other embodiments, the key K1 and the key K3 may also adopt the following scheme: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1; after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
Example 5
This example differs from example 4 in that: the first security module is further configured to be connected with a CPU module of the PLC system, and when the CPU module needs to acquire application data, the application data is decrypted by the first security module using the key K4.
When the application program data are read from the PLC system, the second security module decrypts the application program data by using the key K1, sends the decrypted application program data to the development equipment to perform corresponding operation on the application program data, encrypts the application program data processed by the development equipment by using the key K2, and stores the encrypted application program data to the development equipment. The development equipment can modify, query, search, copy and the like the application program data.
Example 6
The present embodiment provides a computer-readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the steps of the construction method of the PLC application data protection method.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated module may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, all or part of the flow in the method of the embodiments described above may be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A PLC application data protection system is characterized in that: the system comprises a first safety module and a second safety module, wherein the first safety module is used for being in communication connection with a storage module of the PLC system, and the second safety module is used for being in communication connection with development equipment;
the second security module has an identification F2 and securely stores a key K1, a key K2 and an identification F1 of the first security module;
the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
the second security module is used for reading and verifying an identifier F1 of the first security module when the application program data is written into the PLC system; after the verification is successful, acquiring application program data which is prestored in the development equipment and encrypted by the key K2, decrypting the application program data by using the key K2, encrypting the decrypted application program data by using the key K1, and sending the encrypted application program data to the first security module;
the first safety module is used for reading and verifying an identifier F2 of the second safety module when the application program data is written into the PLC system; after the verification is successful, the received application program data is decrypted by using the key K3, and the decrypted application program data is encrypted by using the key K4 and then written into a storage module of the PLC system;
the first safety module is also used for reading and verifying an identifier F2 of the second safety module when the application program data is read from the PLC system; after the verification is successful, the application program data in the storage module of the PLC system is decrypted by using the key K4, and then the decrypted application program data is encrypted by using the key K3 and then sent to the second security module;
the second security module is further used for reading and verifying the identifier F1 of the first security module when the application program data is read from the PLC system; and after the verification is successful, the received application program data is decrypted by using the key K1, and the decrypted application program data is encrypted by using the key K2 and then sent to the development equipment for storage.
2. The PLC application data protection system of claim 1, wherein: the key K1 and the key K3 are the same or a pair of public and private keys.
3. The PLC application data protection system of claim 1, wherein: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1;
after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
4. The PLC application data protection system of claim 1, wherein: the identifier F1 and the identifier F2 both comprise check codes; when the identifier F1 or the identifier F2 is verified, the verification of the check code is included.
5. A PLC application data protection method is characterized by comprising the following steps:
configuring a first security module for communicative connection with a memory module of the PLC system and a second security module for communicative connection with the development device; wherein the second security module has an identity F2 and securely stores a key K1, a key K2 and an identity F1 of the first security module; the first security module is provided with an identifier F1 and stores a key K3 corresponding to the key K1, an identifier F2 of the second security module and a key K4 in a secure manner;
when writing application data to the PLC system, the second security module reads and verifies the identification F1 of the first security module, and the first security module reads and verifies the identification F2 of the second security module;
after the second security module is successfully verified, the second security module acquires the application program data which is prestored in the development equipment and encrypted by the key K2, after the application program data is decrypted by using the key K2, the decrypted application program data is encrypted by using the key K1 and then sent to the first security module;
after the first security module is successfully verified, the first security module decrypts the received application program data by using the key K3, encrypts the decrypted application program data by using the key K4 and then writes the encrypted application program data into a storage module of the PLC system;
when reading application data from the PLC system, the first security module reads and verifies the identification F2 of the second security module, and the second security module reads and verifies the identification F1 of the first security module;
after the first security module is successfully verified, the first security module firstly decrypts the application program data acquired from the storage module of the PLC system by using the key K4, and then encrypts the decrypted application program data by using the key K3 and sends the encrypted application program data to the second security module;
after the second security module is successfully verified, the second security module decrypts the received application program data by using the key K1, and encrypts the decrypted application program data by using the key K2 and sends the encrypted application program data to the development equipment for storage.
6. The PLC application data protection method of claim 5, wherein: the key K1 and the key K3 are the same or a pair of public and private keys.
7. The PLC application data protection method of claim 5, wherein: after the first security module encrypts the application program data by using the key K3, calculating a first hash value of an application program data ciphertext, and sending the first hash value and the application program data ciphertext to the second security module; after the second security module verifies that the identifier F1 of the first security module is successful, calculating a hash value of an application program data ciphertext, comparing the hash value with the received first hash value, and if the hash value is the same as the received first hash value, decrypting the application program data ciphertext by using the secret key K1; after the second security module encrypts the application program data by using the key K1, calculating a second hash value of an application program data ciphertext, and sending the second hash value and the application program data ciphertext to the first security module; and after the first security module verifies that the identifier F2 of the second security module is successful, calculating the hash value of the application program data ciphertext, comparing the hash value with the received second hash value, and decrypting the application program data ciphertext by using the key K3 if the hash value is identical to the received second hash value.
8. The PLC application data protection method of claim 5, wherein: the first security module is further configured to be connected with a CPU module of the PLC system, and when the CPU module needs to acquire application data, the application data is decrypted by the first security module using the key K4.
9. The PLC application data protection method of claim 5, wherein: when the application program data are read from the PLC system, the second security module decrypts the application program data by using the key K1, sends the decrypted application program data to the development equipment to perform corresponding operation on the application program data, encrypts the application program data processed by the development equipment by using the key K2, and stores the encrypted application program data to the development equipment.
10. A computer-readable storage medium having stored thereon computer instructions, characterized in that: the computer instructions, when executed by a processor, perform the steps of the method of any one of claims 5 to 9.
CN202010351775.9A 2020-04-28 2020-04-28 PLC application program data protection system and method Active CN111624934B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010351775.9A CN111624934B (en) 2020-04-28 2020-04-28 PLC application program data protection system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010351775.9A CN111624934B (en) 2020-04-28 2020-04-28 PLC application program data protection system and method

Publications (2)

Publication Number Publication Date
CN111624934A CN111624934A (en) 2020-09-04
CN111624934B true CN111624934B (en) 2021-04-27

Family

ID=72258133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010351775.9A Active CN111624934B (en) 2020-04-28 2020-04-28 PLC application program data protection system and method

Country Status (1)

Country Link
CN (1) CN111624934B (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058189A (en) * 1997-06-20 2000-05-02 Secure Choice Llc Method and system for performing secure electronic monetary transactions
JPH11196084A (en) * 1997-10-31 1999-07-21 Matsushita Electric Ind Co Ltd Ciphering system
JP4519963B2 (en) * 1999-06-21 2010-08-04 富士通株式会社 Biometric information encryption / decryption method and apparatus, and personal authentication system using biometric information
CN1346110A (en) * 2000-09-30 2002-04-24 刘耀民 Network platform based software protection and sales system
JP4007873B2 (en) * 2002-07-09 2007-11-14 富士通株式会社 Data protection program and data protection method
US20060173787A1 (en) * 2003-03-24 2006-08-03 Daniel Weber Data protection management apparatus and data protection management method
CN102254122A (en) * 2010-05-21 2011-11-23 深圳市合信自动化技术有限公司 Programmable logic controller and management method of user programs thereof
JP5836504B2 (en) * 2012-12-20 2015-12-24 三菱電機株式会社 Control system, program transmission device, authentication server, program protection method, program transmission method, and program for program transmission device
CN103152362B (en) * 2013-03-28 2015-09-16 胡祥义 Based on the large data files encrypted transmission method of cloud computing

Also Published As

Publication number Publication date
CN111624934A (en) 2020-09-04

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
CN102880836B (en) Safety feature
CN103618607B (en) A kind of Security Data Transmission and key exchange method
CN101989991B (en) Method for importing secret keys safely, electronic signature tool, authentication device and system
CN110490008B (en) Security device and security chip
CN101950347B (en) Method and system for encrypting data
CN107453880B (en) Cloud data secure storage method and system
CN112187544B (en) Firmware upgrading method, device, computer equipment and storage medium
CN110059458B (en) User password encryption authentication method, device and system
CN109635610B (en) RFID tag data reading and writing system and method
JP2017514390A (en) Method and system for protecting electronic data exchange between industrial programmable devices and portable programmable devices
CN110298186B (en) Non-key data encryption and decryption method based on dynamic reconfigurable cipher chip
US9065635B2 (en) Information processing apparatus, IC chip, and information processing method
CN103378971A (en) Data encryption system and method
CN104268447A (en) Encryption method of embedded software
CN104866784A (en) BIOS encryption-based safety hard disk, and data encryption and decryption method
CN105262586B (en) The method for distributing key and device of automobile burglar equipment
CN102811124B (en) Based on the system Authentication method of two card trigram technology
KR20100031354A (en) Tag security processing method using one time password
JPH10171717A (en) Ic card and cipher communication system using the same
US9432186B2 (en) Password-based key derivation without changing key
US10764260B2 (en) Distributed processing of a product on the basis of centrally encrypted stored data
CN111624934B (en) PLC application program data protection system and method
CN103378966A (en) Secret key programming on safety dynamic piece
CN107276961A (en) A kind of method and device based on cipher algorithm encryption and ciphertext data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant