Encryption and decryption method, and PLC system using the same

A symmetric encryption algorithm and key technology, which is applied in the field of PLC system, can solve problems such as incomplicable calculation, limited controller processing capacity, and data processing method that cannot operate industrial control, etc., to achieve the effect of enhancing security and preventing cracking

Active Publication Date: 2008-12-24
SIEMENS CHINA
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] For the field of industrial automation, programmable logic controllers (PLCs) or programmable controllers are somewhat different from existing computers. The reason is that most of the controllers used in the industrial field have limited processing capabilities and cannot That is a very complicated calculation, so most of the data processing methods applied to the computer cannot be run in the industrial control; another point is that the system design structure of the industrial controller is also different from that of the computer. For example, some memories in the industrial controller are What is not allowed to be accessed by users can only be accessed by the operating system of the industrial controller, so many data processing methods currently applied to computers are not suitable for running on industrial controllers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method, and PLC system using the same
  • Encryption and decryption method, and PLC system using the same
  • Encryption and decryption method, and PLC system using the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Hereinafter, the present invention will be described in detail in conjunction with the accompanying drawings.

[0032] The present invention provides a method for protecting information in a memory. A cryptographic mapping algorithm F() is selected, and a key is generated in combination with a unique identifier of the memory. Key ID =F(ID), where ID is the unique identifier of the memory, Key ID For the key, F() can include but not limited to the key hash function, which directly converts the unique identifier of the memory into the key Key ID , F() can also use the ID-key mapping method described below and so on. By using Key IDEncrypt or decrypt the information in the storage for the symmetric encryption algorithm of the key. Here, the present invention only takes the PLC system as an example to describe the control program in the PLC system for encrypting or decrypting the storage. Of course, the encryption and decryption algorithms of the present invention can als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of industrial computer software safety, in particular to a method for encrypting and decrypting information in a memorizer and a PLC system for applying the method. The encrypting method of the invention comprises the following steps of storing an algorithm F()in the system; mapping the unique identifier of the memorizer into a cipher key K; encrypting the information stored in the memorizer by utilizing the cipher key K based on a symmetric encryption algorithm; and predefining the access strategy based on the user identity in order to control the user's access to the information stored in the memorizer; and storing the access strategy in the memorizer by utilizing the cipher key K based on the symmetric encryption algorithm. During the decryption process, decrypting, information stored in the memorizer is decrypted by utilizing the cipher key K based on the symmetric encryption algorithm, and the access strategy is decrypted by utilizing the cipher key K based on the symmetric encryption algorithm. Then the user's access to the information stored in the memorizer is controlled based on the user identity. The method and the system of the invention have the advantage of being capable of enhancing the safety of software codes.

Description

technical field [0001] The invention relates to the field of software security, specifically a method for encrypting and decrypting information in a memory, and a PLC system applying the method. Background technique [0002] Programmable logic controllers (PLCs) or programmable controllers are widely used in factory automation, for example to control an assembly line in a factory. Existing PLCs generally use program / control parameters for operation and control, for example, ladder logic, state transition diagrams, etc. (program codes in industrial control). However, the existing PLC does not provide a good access control mechanism, such as encrypting the software to prevent the control program from leaking, especially some existing control programs are stored in hot-swappable storage media, such as multimedia cards (MMC card), secure digital memory card (SD card), etc., so the control program is easy to leak, and the manufacturer that produces the control program may suffer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/22G05B19/05G06F21/62
CPCG06F21/6218
Inventor 唐文胡建钧
Owner SIEMENS CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products