Encryption and decryption method, and PLC system using the same
A symmetric encryption algorithm and key technology, which is applied in the field of PLC system, can solve problems such as incomplicable calculation, limited controller processing capacity, and data processing method that cannot operate industrial control, etc., to achieve the effect of enhancing security and preventing cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] Hereinafter, the present invention will be described in detail in conjunction with the accompanying drawings.
[0032] The present invention provides a method for protecting information in a memory. A cryptographic mapping algorithm F() is selected, and a key is generated in combination with a unique identifier of the memory. Key ID =F(ID), where ID is the unique identifier of the memory, Key ID For the key, F() can include but not limited to the key hash function, which directly converts the unique identifier of the memory into the key Key ID , F() can also use the ID-key mapping method described below and so on. By using Key IDEncrypt or decrypt the information in the storage for the symmetric encryption algorithm of the key. Here, the present invention only takes the PLC system as an example to describe the control program in the PLC system for encrypting or decrypting the storage. Of course, the encryption and decryption algorithms of the present invention can als...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com