WO2012111117A1 - プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 - Google Patents
プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 Download PDFInfo
- Publication number
- WO2012111117A1 WO2012111117A1 PCT/JP2011/053299 JP2011053299W WO2012111117A1 WO 2012111117 A1 WO2012111117 A1 WO 2012111117A1 JP 2011053299 W JP2011053299 W JP 2011053299W WO 2012111117 A1 WO2012111117 A1 WO 2012111117A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- unit
- master unit
- programmable logic
- logic controller
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/05—Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
- G05B19/058—Safety, monitoring
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
- G05B19/05—Programmable logic controllers, e.g. simulating logic interconnections of signals according to ladder diagrams or function charts
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Definitions
- the present invention relates to a technique for preventing password leakage of a control system using a programmable logic controller.
- a microprocessor is built in, and the drive control of electric loads such as various actuators and display devices is performed in response to the state of input signals such as operation switches and various sensors and the sequence program stored in the program memory.
- a programmable logic controller Programmable Logic PLC
- Each PLC unit includes a plurality of input units each including an input interface circuit, an output unit including an output interface circuit, and a basic unit that controls the input unit, the output unit, and the like based on a sequence program.
- the unit is connected to each connector on the motherboard base plate (base unit) having a plurality of connectors connected to each other by bus, or connected to each other by connecting the bus connectors to each other. Structures in which units can be easily mounted or removed and connected in various combinations are widely used.
- the PLC unit uses the password information set for itself and the password information entered by the system administrator from a personal computer tool or the like. There is a method of performing collation to determine whether the request source is a system administrator.
- the method for storing the authentication information by the PLC unit itself is a very natural method from the viewpoint of data storage.
- (k, n) threshold secret sharing method is known as a method for fragmenting and storing authentication information (see Non-Patent Document 1), and it is easy to apply this method to a PLC.
- the PLC unit is generally equipped with a mechanism for detecting the attachment / detachment of another PLC unit on the system in preparation for failure, disconnection, or unit disconnection.
- n is a natural number not including 0
- k or more pieces of password division data are prepared, the password information of the PLC unit may be restored.
- such a restoration method includes the (k, n) threshold secret sharing method described above.
- the password division data generated by the (k, n) threshold secret sharing method is saved in another PLC unit, but the password division data is also saved in the unit before the exchange. Therefore, each time the unit is exchanged, the password division data decreases, and it is necessary to prevent the password division data from being reduced when the unit exchange is repeated.
- the malicious unit can finally recover the password information by using the (k, n) threshold secret sharing method for the acquired password division data.
- the PLC unit on the control system must prevent the malicious PLC unit from collecting the password when distributing and storing its own password information to other PLC units on the control system. I must.
- a PLC unit that divides password information and distributes and stores it in other PLC units on the system is information that cannot be decrypted by other PLC units before dividing the password information. Need to be converted to Alternatively, after dividing the password information, it is necessary to convert the password fragment information into information that cannot be decoded by other PLC units. In any case, the key data used for conversion is meaningless unless the PLC unit that stores and saves the password information in another PLC unit is the only information known on the system.
- the present invention has been made in view of the above, and an object of the present invention is to obtain a programmable logic controller and a password storage method for the programmable logic controller that are effective in preventing the outflow of passwords stored in a distributed manner.
- the present invention is a programmable logic controller including a master unit and one or more slave units, and the master unit is assigned to the slave unit. It has an organization information table for managing IO numbers, and generates password distribution information using the IO numbers assigned to the slave units from the password division data obtained by dividing the password set in the master unit. The password distribution information sent from the master unit is stored.
- FIG. 1 is a block diagram showing an overall configuration of a programmable logic controller according to an embodiment of the present invention.
- FIG. 2 is a flowchart at the time of unit replacement according to the embodiment of the present invention.
- the programmable logic controller 100 includes a basic unit 110 (master unit), a plurality of input units 120, 140, 160, and a plurality of output units 130, 150.
- the input units 120, 140, 160 and the output units 130, 150 are collectively referred to as an input / output unit or a slave unit.
- the basic unit 110 is attached to a detachable connector of the slot 181a of the base unit 180, and an input / output unit (slave unit) connected to the detachable connectors of the other slots 181b, 181c, 181d, 181e, 181f of the base unit 180.
- Control of 120, 130, 140, 150, 160 and detection of attachment / detachment of the input / output units 120, 130, 140, 150, 160 are performed in cooperation with the base unit 180.
- an MPU 114 In the basic unit 110, an MPU 114, a memory (ROM) 111 serving as an auxiliary storage device, a main storage device (RAM) 112, and a data bus interface 113 for communication between the units are provided.
- ROM memory
- RAM main storage device
- Input units 120, 140, and 160 are installed in slots 181b, 181d, and 181f of base unit 180, respectively (input unit 120 is installed in slot 181b, input unit 140 is installed in slot 181d, and input unit 160 is installed in slot 181f). Are connected to the basic unit 110 via the base unit 180.
- the input unit 120 includes an input I / F (including an MPU) 122, a memory (ROM) 121 that is an auxiliary storage device, a main storage device (RAM) 123, and a data bus I / F 124.
- the input units 140 and 160 have the same configuration as shown in FIG.
- the output unit 130 includes an output I / F (including an MPU) 132, a memory (ROM) 131 that is an auxiliary storage device, a main storage device (RAM) 133, and a data bus I / F 134.
- the output unit 150 and the output unit 170 to be replaced later with the output unit 150 have the same configuration as shown in FIG.
- An external load / analog load 192 or the like is connected to the output I / F (including MPU) 132 via an output terminal block (not shown).
- the organization information 111a held in the memory (ROM) 111 of the basic unit 110 includes the slot number of the slot 181b and the head IO number assigned to the slot 181b, the slot number of the slot 181c, and the head IO assigned to the slot 181c.
- the first IO number assigned to the slot 181d and the slot 181d, the slot number of the slot 181e and the first IO number assigned to the slot 181e, the slot number of the slot 181f and the first IO number assigned to the slot 181f. Is a data group (organization information table).
- the password distribution information 111c is the password information set in the basic unit 110 itself used for authentication to the system (for example, authentication for reading data in the PLC unit from the engineering tool), for example, (k, n) secret sharing method. This is reversible data (password distributed storage data) generated by using the head IO number of the basic unit 110 for the password division data divided by the above.
- the password distribution information 111c can be restored to the original password division data by the head IO number assigned to the basic unit 110.
- the password sharing information 131a, 141a, 151a, and 161a are respectively input / output to password division data obtained by dividing the password information set in the basic unit 110 used for authentication to the system by the (k, n) secret sharing method.
- Reversible data generated in the basic unit 110 using the first IO number of the units 130, 140, 150, 160 and sent to the input / output units 130, 140, 150, 160, respectively. It is.
- the output unit 150 is a unit that is replaced in an operating system, and corresponds to the unit before replacement described above.
- the output unit 170 is a unit added to the system after replacement in place of the output unit 150, and corresponds to the unit after replacement described above.
- the replacement password 171b is password information for the basic unit 110 to determine whether or not the output unit 170 is a unit that was intentionally replaced by the system administrator when the unit is replaced.
- the flowchart of FIG. 2 relates to the operation within the basic unit 110.
- the output unit 170 shown in FIG. 1 corresponds to the “unit after replacement” in the flowchart of FIG. 2
- the output unit 150 corresponds to the “unit before replacement” in FIG. 2
- the slot 181e corresponds to the “replacement target” in FIG. Corresponds to “slot”.
- step S200 the basic unit 110 has removed the PLC unit (output unit 150) from the base unit 180 at the slot number of “replacement target slot” and a new PLC unit (output unit 170) is mounted. Is detected.
- step S210 the basic unit 110 reads the replacement password 171b in the replaced unit (output unit 170).
- step S220 the basic unit 110 determines whether or not the replacement password 171b read from the output unit 170 after replacement in step S210 matches the replacement password 111b stored in the basic unit 110. To do. If they match (step S220: Yes), the process proceeds to step S230. If they do not match (step S220: No), the process proceeds to step S290. Even when the replacement password cannot be read from the replaced unit (output unit 170) in step S210, it is determined that the passwords do not match (step S220: No), and the process proceeds to step S290. move on.
- step S230 since it is determined in step S220 that the installed output unit 170 after replacement is a unit due to installation intended by the system administrator, it is stored in the replaced unit in order to prevent the replacement password from being leaked.
- the exchange password 171b that has been used is deleted.
- step S240 the basic unit 110 collects the password distribution information stored in the unit mounted in the slot with the slot number not to be replaced, which is a slot other than the slot 181e to be replaced.
- the slots with slot numbers not subject to replacement are slots 181b, 181c, 181d, and 181f, and the units attached to them are the input / output units 120, 130, 140, and 160. Therefore, the basic unit 110 collects the password distribution information 121a, 131a, 141a, 161a.
- step S250 the basic unit 110 uses the head IO number in the composition information 111a for the password distribution information 121a, 131a, 141a, 161a collected from the unit installed in the slot with the slot number not to be replaced. It tries to restore password information by restoring to password split data and using (k, n) threshold secret sharing method.
- step S240 If the number of password sharing information collected in step S240 is less than k, the password information cannot be restored by the (k, n) threshold secret sharing method (step S250: No). In this case, the process proceeds to step S290. If the password information can be restored (step S250: Yes), the process proceeds to step S260.
- step S260 the basic unit 110 reads the first IO number assigned to the slot number of the replacement target slot 181e from the composition information 111a.
- step S280 the password distribution information generated in step S270 is transmitted to the unit after exchange (output unit 170), and the process proceeds to step S290.
- Step S290 indicates the end of authentication determination.
- the programmable logic controller password storage method is a programmable logic controller including a basic unit and a plurality of input / output units detachably connected to the basic unit.
- the password set in the basic unit is distributed and stored in other units in the system using, for example, a threshold secret sharing method.
- the password storage method of the programmable logic controller according to the embodiment is a technique for reducing the outflow of password when the unit is exchanged in the system. This means that the password management cost can be reduced, and as a result, the risk of leakage of data protected by the password can be reduced.
- the “master unit of the slot number to be exchanged” is processed by using the first IO number of the PLC unit installed in the slot number for which the password division data is to be distributed and stored, so that “password” is reversible data to the password division data.
- Data for distributed storage is generated.
- the “master unit of the slot number to be exchanged” uses the restored password information and the IO assignment information assigned to the slot number to be exchanged for password distributed storage data (which was distributed and stored in the unit before replacement). Password distributed storage data) and save it in the replaced unit that is determined to be a regular unit.
- “Master unit of slot number to be replaced” indicates that the replacement password preset in the unit after replacement does not match the replacement password held in “Master unit of slot number to be replaced”. Do not send password information, password split data, password distributed storage data, etc. to this unit.
- the master PLC unit uses a (k, n) threshold secret sharing method to set a password for protecting data such as programs and settings stored in the unit. Even if a malicious worker removes a legitimate unit on the control system and replaces it with a malicious unit, the malicious unit does not contain a replacement password. Otherwise, the password information, password split data, and password distributed storage data are not sent to the malicious unit, so that the password information can be prevented from being leaked. This can reduce the cost of password management for the system administrator.
- a password that protects data such as programs and settings stored in the unit is assigned to a plurality of PLC units on the system by the (k, n) threshold secret sharing method.
- the PLC unit serving as the master for the distributed storage even if the password for storing the password is stored by the malicious unit because the replacement password is known to the malicious operator, the data for the password distributed storage is not Since it is processed by the IO allocation information, it is difficult to restore the password split data. Even if the password split data can be restored, the password split data is generated by the (k, n) threshold secret sharing method. If the password distributed storage data is not restored to the password split data, the leakage of password information will be prevented Can do. This can reduce the cost of password management for the system administrator.
- the programmable logic controller and the password storage method of the programmable logic controller according to the present invention are useful for preventing the outflow of passwords, and are particularly suitable for distributing and storing passwords in a plurality of PLC units.
- Programmable logic controller 110 Basic unit 120, 140, 160 Input unit 130 Output unit 150 Output unit before replacement in unit replacement 170 Output unit after replacement in unit replacement 111, 121, 131, 141, 151, 161, 171 Memory (ROM) 112, 123, 133, 143, 153, 163, 173 Main memory (RAM) 113, 124, 134, 144, 154, 164, 174 Data bus I / F 114 MPU 122, 142, 162 Input I / F 132, 152, 172 Output I / F 111a Composition information 111b, 171b Replacement password 111c, 121a, 131a, 141a, 151a, 161a Password distribution information 180 Base unit 181a, 181b, 181c, 181d, 181e, 181f Slot 191, 193, 194 Open / close signal / analog signal, etc. 192 External load / analog load, etc. Steps S200 to S290
Landscapes
- Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Programmable Controllers (AREA)
Abstract
Description
以下、図面を参照しながら、この発明の実施の形態について詳細に説明する。図1はこの発明の実施形態にかかるプログラマブルロジックコントローラ100の全体構成を示すブロック図である。
図1において、プログラマブルロジックコントローラ100は、基本ユニット110(マスタユニット)、複数の入力ユニット120、140、160、および複数の出力ユニット130、150を備えている。ここでは、入力ユニット120、140、160と、出力ユニット130、150とを総称して、入出力ユニットまたはスレーブユニットという。
次に、図2のフローチャートを参照しながら図1に示したプログラマブルロジックコントローラ100における実施形態によるユニット交換時の動作について詳細な説明をする。図2のフローチャートは基本ユニット110内での動作に関する。図1に示した出力ユニット170が図2のフローチャートにおける「交換後のユニット」に相当し、出力ユニット150が図2の「交換前のユニット」に相当し、スロット181eが図2の「交換対象スロット」に相当する。
110 基本ユニット
120、140、160 入力ユニット
130 出力ユニット
150 ユニット交換における交換前の出力ユニット
170 ユニット交換における交換後の出力ユニット
111、121、131、141、151、161、171 メモリ(ROM)
112、123、133、143、153、163、173 主記憶装置(RAM)
113、124、134、144、154、164、174 データバスI/F
114 MPU
122、142、162 入力I/F
132、152、172 出力I/F
111a 編成情報
111b、171b 交換用パスワード
111c、121a、131a、141a、151a、161a パスワード分散情報
180 ベースユニット
181a、181b、181c、181d、181e、181f スロット
191、193、194 開閉信号/アナログ信号等
192 外部負荷/アナログ負荷等
S200~S290 ステップ
Claims (12)
- マスタユニットと1つ以上のスレーブユニットとを備えたプログラマブルロジックコントローラであって、
前記マスタユニットは、前記スレーブユニットに割り付けられたIO番号を管理する編成情報テーブルを有し、前記マスタユニットに設定されたパスワードを分割したパスワード分割データから前記スレーブユニットに割り付けられたIO番号を用いてパスワード分散情報を生成し、
前記スレーブユニットは、前記マスタユニットから送付された前記パスワード分散情報を保存する
ことを特徴とするプログラマブルロジックコントローラ。 - 前記マスタユニットは、前記マスタユニットに設定されたパスワードを分割したパスワード分割データから前記マスタユニットに割り付けられたIO番号を用いて自己パスワード分散情報を生成して保存する
ことを特徴とする請求項1に記載のプログラマブルロジックコントローラ。 - 前記スレーブユニットが新たなスレーブユニットと交換された場合は、
前記マスタユニットが保持している第1交換用パスワードと前記新たなスレーブユニットが保持している第2交換用パスワードが一致する場合にのみ、前記マスタユニットは交換された前記スレーブユニットが保存していた前記パスワード分散情報を前記新たなスレーブユニットに送付する
ことを特徴とする請求項1または2に記載のプログラマブルロジックコントローラ。 - 前記スレーブユニットが前記新たなスレーブユニットと交換された場合は、
前記マスタユニットは、交換されなかった前記スレーブユニットが保存していた前記パスワード分散情報を収集し、それに基づいて前記新たなスレーブユニットに送付する前記パスワード分散情報を生成する
ことを特徴とする請求項3に記載のプログラマブルロジックコントローラ。 - 前記マスタユニットが保持している前記第1交換用パスワードと前記新たなスレーブユニットが保持している前記第2交換用パスワードが一致する場合は、前記新たなスレーブユニットから前記第2交換用パスワードを削除する
ことを特徴とする請求項3または4に記載のプログラマブルロジックコントローラ。 - 前記マスタユニットに設定されたパスワードを、(k,n)閾値秘密分散法により分割してパスワード分割データを生成する
ことを特徴とする請求項1~5のいずれか1項に記載のプログラマブルロジックコントローラ。 - マスタユニットと1つ以上のスレーブユニットとを備えたプログラマブルロジックコントローラのパスワード保存方法であって、
前記マスタユニットは、前記マスタユニットに設定されたパスワードを分割してパスワード分割データを生成し、
前記マスタユニットは、自己が管理している前記スレーブユニットに割り付けられたIO番号を用いて、前記パスワード分割データからパスワード分散情報を生成し、
前記マスタユニットは、前記パスワード分散情報を前記スレーブユニットに送付し、
前記スレーブユニットは、前記マスタユニットから送付された前記パスワード分散情報を保存する
ことを特徴とするプログラマブルロジックコントローラのパスワード保存方法。 - 前記マスタユニットは、前記マスタユニットに割り付けられたIO番号を用いて、前記パスワード分割データから自己パスワード分散情報を生成して保存する
ことを特徴とする請求項7に記載のプログラマブルロジックコントローラのパスワード保存方法。 - 前記スレーブユニットが新たなスレーブユニットと交換された場合は、
前記マスタユニットが保持している第1交換用パスワードと前記新たなスレーブユニットが保持している第2交換用パスワードが一致するか否か判定し、
一致する場合にのみ、前記マスタユニットは交換された前記スレーブユニットが保存していた前記パスワード分散情報を前記新たなスレーブユニットに送付する
ことを特徴とする請求項7または8に記載のプログラマブルロジックコントローラのパスワード保存方法。 - 前記スレーブユニットが前記新たなスレーブユニットと交換された場合は、
前記マスタユニットは、交換されなかった前記スレーブユニットが保存していた前記パスワード分散情報を収集し、それに基づいて前記新たなスレーブユニットに送付する前記パスワード分散情報を生成する
ことを特徴とする請求項9に記載のプログラマブルロジックコントローラのパスワード保存方法。 - 前記マスタユニットが保持している前記第1交換用パスワードと前記新たなスレーブユニットが保持している前記第2交換用パスワードが一致する場合は、前記新たなスレーブユニットから前記第2交換用パスワードを削除する
ことを特徴とする請求項9または10に記載のプログラマブルロジックコントローラのパスワード保存方法。 - 前記マスタユニットに設定されたパスワードを、(k,n)閾値秘密分散法により分割してパスワード分割データを生成する
ことを特徴とする請求項7~11のいずれか1項に記載のプログラマブルロジックコントローラのパスワード保存方法。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/053299 WO2012111117A1 (ja) | 2011-02-16 | 2011-02-16 | プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 |
CN2011800676998A CN103370660A (zh) | 2011-02-16 | 2011-02-16 | 可编程逻辑控制器以及可编程逻辑控制器的密码保存方法 |
KR1020137021335A KR20130106884A (ko) | 2011-02-16 | 2011-02-16 | 프로그래머블 로직 컨트롤러, 및 프로그래머블 로직 컨트롤러의 패스워드 보존 방법 |
JP2012557720A JPWO2012111117A1 (ja) | 2011-02-16 | 2011-02-16 | プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 |
DE112011104899T DE112011104899T5 (de) | 2011-02-16 | 2011-02-16 | Programmierbare Logiksteuereinrichtung und Passwortspeicherverfahren einer programmierbaren Logiksteuereinrichtung |
TW100119770A TW201235804A (en) | 2011-02-16 | 2011-06-07 | Programmable logic controller, and method for preserving a password for the programmable logic controller |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2011/053299 WO2012111117A1 (ja) | 2011-02-16 | 2011-02-16 | プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012111117A1 true WO2012111117A1 (ja) | 2012-08-23 |
Family
ID=46672081
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/053299 WO2012111117A1 (ja) | 2011-02-16 | 2011-02-16 | プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 |
Country Status (6)
Country | Link |
---|---|
JP (1) | JPWO2012111117A1 (ja) |
KR (1) | KR20130106884A (ja) |
CN (1) | CN103370660A (ja) |
DE (1) | DE112011104899T5 (ja) |
TW (1) | TW201235804A (ja) |
WO (1) | WO2012111117A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111769992A (zh) * | 2020-07-13 | 2020-10-13 | 迈普通信技术股份有限公司 | 一种网络数据的管理方法、云平台及存储介质 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014012870A1 (de) | 2013-09-05 | 2015-03-05 | Seoul Viosys Co., Ltd. | Luftreiniger unter Verwendung von ultravioletten Strahlen |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009103774A (ja) * | 2007-10-22 | 2009-05-14 | Panasonic Corp | 秘密分散システム |
JP2011010170A (ja) * | 2009-06-29 | 2011-01-13 | Pioneer Electronic Corp | 電子機器及びその不正利用防止方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4788912B2 (ja) | 2006-10-12 | 2011-10-05 | オムロン株式会社 | Plc |
WO2008087734A1 (ja) * | 2007-01-19 | 2008-07-24 | Mitsubishi Electric Corporation | 暗号文生成装置及び暗号通信システム及び群パラメータ生成装置 |
CN101329658B (zh) * | 2007-06-21 | 2012-12-05 | 西门子(中国)有限公司 | 加密、解密方法,及应用所述方法的plc系统 |
US8977851B2 (en) * | 2009-01-21 | 2015-03-10 | Fisher-Rosemount Systems, Inc. | Removable security modules and related methods |
-
2011
- 2011-02-16 KR KR1020137021335A patent/KR20130106884A/ko not_active Application Discontinuation
- 2011-02-16 DE DE112011104899T patent/DE112011104899T5/de not_active Withdrawn
- 2011-02-16 WO PCT/JP2011/053299 patent/WO2012111117A1/ja active Application Filing
- 2011-02-16 CN CN2011800676998A patent/CN103370660A/zh active Pending
- 2011-02-16 JP JP2012557720A patent/JPWO2012111117A1/ja active Pending
- 2011-06-07 TW TW100119770A patent/TW201235804A/zh unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009103774A (ja) * | 2007-10-22 | 2009-05-14 | Panasonic Corp | 秘密分散システム |
JP2011010170A (ja) * | 2009-06-29 | 2011-01-13 | Pioneer Electronic Corp | 電子機器及びその不正利用防止方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111769992A (zh) * | 2020-07-13 | 2020-10-13 | 迈普通信技术股份有限公司 | 一种网络数据的管理方法、云平台及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
JPWO2012111117A1 (ja) | 2014-07-03 |
KR20130106884A (ko) | 2013-09-30 |
TW201235804A (en) | 2012-09-01 |
CN103370660A (zh) | 2013-10-23 |
DE112011104899T5 (de) | 2013-11-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9191202B2 (en) | Information processing device and computer program product | |
CN100561923C (zh) | 一种bios刷新升级的系统和方法 | |
CN110543764B (zh) | 片上系统内存防护方法、密码加速引擎及内存防护装置 | |
CN106610863B (zh) | 虚拟机可信迁移方法及装置 | |
KR20120036311A (ko) | 데이터에 대한 연산을 실행하기 위한 방법 및 메모리 디바이스 | |
CN101925867B (zh) | 现场设备及其操作方法 | |
CN109104275A (zh) | 一种hsm设备 | |
CN210776693U (zh) | 片上系统和电子装置 | |
US11516194B2 (en) | Apparatus and method for in-vehicle network communication | |
WO2012111117A1 (ja) | プログラマブルロジックコントローラ、およびプログラマブルロジックコントローラのパスワード保存方法 | |
CN113704835A (zh) | 一种支持加密卡功能的可信存储硬盘 | |
CN106203134A (zh) | 基于硬件加密的防刷机系统及方法 | |
EP3794482B1 (en) | Method for securing an automated system | |
US20220156392A1 (en) | Control system, security device, and method | |
CN116821020A (zh) | Bmc控制器、信息安全系统以及信息交互方法 | |
CN101471852A (zh) | 一种访问高安全性资源的方法、系统及一种客户端装置 | |
CN116226940A (zh) | 一种基于pcie的数据安全处理方法以及数据安全处理系统 | |
JP2002318700A (ja) | 仮想計算機システムの運用管理情報提供制御方法および仮想計算機システム | |
CN111246466B (zh) | Arm架构应用处理器的加密通信方法及系统 | |
CN102184370A (zh) | 基于微过滤驱动模型的文档安全系统 | |
US20200209818A1 (en) | Method and device for checking the integrity of modules of a wind turbine | |
KR20220123702A (ko) | 통신 암호화 보안을 위한 통신 장치 및 방법 | |
CN104468540A (zh) | 一种工作模式切换方法及pe设备 | |
US20170242802A1 (en) | Method for setting encrypted storage area, apparatus for setting encrypted storage area, and terminal | |
CN112560011B (zh) | 一种基于加密芯片的外接适配设备安全认证系统和方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11858866 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012557720 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 2013113944 Country of ref document: RU Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 20137021335 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1120111048998 Country of ref document: DE Ref document number: 112011104899 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11858866 Country of ref document: EP Kind code of ref document: A1 |