Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PLC program protection method, access method and device thereof

A program protection and program technology, applied in the direction of electrical program control, computer security device, program control in sequence/logic controller, etc., can solve the problems of no access record, multi-user simultaneous access hierarchical encryption, etc., so that it is not easy to crack, Prevent illegal access and improve the effect of protection

Inactive Publication Date: 2010-04-21
CISDI ENG CO LTD
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can protect the PLC program to a certain extent, but it has the following disadvantages: it only considers the protection of the program in the memory, and does not involve the protection of the PLC program in the computer; its access control is aimed at a single control program, and does not control part of the program, such as the function Access control of programs, program segments, function blocks, etc., without access records, multi-user simultaneous access, hierarchical encryption, superimposed encryption, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PLC program protection method, access method and device thereof
  • PLC program protection method, access method and device thereof
  • PLC program protection method, access method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1: as figure 1 , image 3 Shown, a kind of PLC program protection method comprises the following steps:

[0022] Step A: Create a user and set up a user access management mechanism;

[0023] The user access management mechanism refers to a user management mechanism that establishes individual users or user groups, and adopts access strategies such as autonomous access control strategies, mandatory access control strategies, and role access mechanism strategies. Discretionary Access Control Policy is an access control service that enforces a security policy based on the identity of system entities and their authorization to access system resources. The mandatory access control policy is "imposed" on the access subject, that is, the system forces the subject to obey the access control policy. The role access mechanism strategy is to grant different permissions according to the division of roles.

[0024] Step B: Program programming, setting program access m...

Embodiment 2

[0031] Embodiment 2: as Figure 4 Shown: a method for accessing a PLC program protected using the above-mentioned protection method, comprising the following steps:

[0032] Step A': open program request;

[0033] Step B': User identity authentication, if valid, allow to open the program, otherwise refuse to open the program;

[0034] Step C': access program request;

[0035] Step D': compare the program access rights, if they match, then allow access to the program, otherwise deny the access;

[0036] Step E': Access the program, and perform operations such as reading, modifying, uploading, downloading, and authorizing the program;

[0037] Step F': Save the program, set permissions and encrypt according to the set user and program access management mechanism and encryption method, otherwise it will not be saved; the encryption method here is the encryption method described above, and will not be repeated here .

[0038] turn off an app.

Embodiment 3

[0039] Embodiment 3: as figure 2 Shown: a kind of device that is used to realize PLC program protection method, adopts the following technical scheme: the device includes embedded microprocessor connected with communication bus, memory, personal biological unique identification code extracting device, USB interface circuit and auxiliary circuit; the embedded microprocessor is used to realize the calculation of encryption and decryption algorithms, and the management of user access mechanism and program access mechanism; the memory is used to store temporary data, user access management mechanism information, program access management mechanism information, keys, encryption The decryption algorithm and the PLC program involve memories such as EPROM, RAM, ROM, flash memory, etc.; the personal biological unique identification code extraction device is used to extract the personal biological unique identification code; the personal biological unique identification code can be sele...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a PLC program protection method, an access method and a device thereof. The PLC program protection method comprises the following: step A, creating users and setting user access management mechanisms; step B, programming and setting program access management mechanisms; step C, setting encryption modes; and step D, saving programs. The invention also discloses a device for implementing the PLC program protection method. The device comprises an embedded microprocessor connected with a communication bus, a memory, an extraction device for personal biological unique identification codes, a USB interface circuit and an auxiliary circuit. The invention can provide security protection for PLC programs and prevent the illegal access of unauthorized people to the programs. Due to hardware devices and symmetric encryption-decryption algorithms, the programs are not easy to crack and can be further protected.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a protection method, an access method and a device for a PLC (programmable controller) program. Background technique [0002] With the rapid development of automation technology, PLC is widely used in various industries, such as chemical industry, metallurgy, machinery, tobacco, automobile and so on. PLC software is used to complete the real-time control of basic automation and is the core part of industrial automation control. But for the PLC program, there is no good protection measure. The PLC manufacturing company only provides the protection of the PLC development software, such as using soft authorization (such as authorization code, authorization file, etc.) or hardware dog. However, for the PLC programs developed by individuals and companies, there is no effective protection means. Once the PLC program is obtained by outsiders, the PLC program can be read, modified, co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G05B19/05G06F21/34G06F21/44
Inventor 杜雪飞曾宪文
Owner CISDI ENG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products