Method for encrypting communication process in industrial field and data collection device

A communication and data technology, applied in the field of information security, can solve the problems of security system cracking, forgery, hijacking, etc., and achieve the effect of improving security

Active Publication Date: 2012-10-10
ZHEJIANG SUPCON SOFTWARE +1
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] But, there is following shortcoming in the prior art to the method for encrypting the communication process in the industrial field: the first, the private key and the digital certificate file in the asymmetric encryption algorithm only use software to save on the disk of server or client, assailant can Obtain the private key and digital certificate files stored on the disk by remotely intruding into the server. Once the private key is leaked, the entire security system will be cracked
Second, because SSL technology uses an asymmetric encryption algorithm to exchange a symmetric key during the handshake phase, and then uses the symmetric key to encrypt communication data in subsequent communications, it is possible for an attacker to accumulate enough communication history data to Deduce the symmetric encryption key used, if so, the attacker may hijack the communication and send forged commands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting communication process in industrial field and data collection device
  • Method for encrypting communication process in industrial field and data collection device
  • Method for encrypting communication process in industrial field and data collection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0067] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0068] The method for encrypting the communication process in the industrial field of the present invention is applied to the communication process between the client and the server. In the method of the present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for encrypting the communication process in the industrial field and a data collection device. The method includes: invoking a first secret key in a first secret key disc to perform server side encrypting for regularly generated random data; sending the random data after server side encrypting to a client side; receiving data after client side encrypting sent by the client side; invoking the first secret key in the first secret key disc to perform decrypting for the data after client side encrypting; judging whether the decrypted data are identical to the random data to obtain a first judging result; and adopting the random data to serve as symmetrically secret keys to encrypt the communication process between the client side and the server side when the first judging result indicates that the decrypted data are identical to the random data. By adopting the method and the device, safety of the whole communication process can be improved.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for encrypting a communication process in an industrial field and a data collection device. Background technique [0002] With the development of enterprise informatization, the data of underlying control systems in the industrial field, such as distributed control systems (Distributed Control System, DCS) or programmable logic controllers (Programmable Logic Controller, PLC) are increasingly integrated into the In the upper application system. Although this has greatly improved the management efficiency of the enterprise, it has also brought serious security risks. Because once a malicious attacker intercepts the communication between the upper-level application system and the lower-level control system through network monitoring or other methods, and sends forged control information to the control system, the security of enterprise production will be seriously enda...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14
Inventor 褚健叶建位苏宏业荣冈
Owner ZHEJIANG SUPCON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products