An industrial Ethernet communication data encryption transparent transmission module

A technology of communication data and Ethernet, which is applied in the field of industrial control information security, can solve problems such as lack of security strategies, low efficiency, and failure to consider security issues, etc., achieve high code execution efficiency and code density, increase packet data size, reduce The effect of encryption and decryption times

Active Publication Date: 2018-10-19
BEIJING AEROSPACE MEASUREMENT & CONTROL TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are some security flaws in the existing TCP / IP protocol: the industrial Ethernet communication process usually follows the standard Ethernet protocol, and the format of the user's data area in the protocol packet is fixed, such as the position and length range, and the general user data is not encrypted. It is easy to be monitored and hijacked, the vulnerability of TCP / IP services, and the lack of security policies
The data communication network of the industrial control system is based on the computer network. The TCP / IP-based network itself does not consider security issues. Even if it is isolated from the Internet, it cannot prevent internal attacks. The security threat of the data communication network still exists.
At the same time, conventional information encryption technologies such as DES, AES, RAS, etc. are often complicated to use and inefficient, and it is difficult to meet the needs of high-speed real-time transmission of large amounts of data in modern industrial control systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An industrial Ethernet communication data encryption transparent transmission module
  • An industrial Ethernet communication data encryption transparent transmission module

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Embodiment 1, figure 1 It is a functional block diagram of the industrial Ethernet communication data encryption transparent transmission module of the present invention. The core of the module uses a 32-bit ARM Cortex-M0 core, which has strong security features on the one hand, and industry-leading low power consumption performance on the other hand, as well as efficient code execution efficiency and code density based on the ARMv6-M architecture; The chip integrates a variety of secure cryptographic modules, such as HRNG, DES, RSA / ECC, SM1, SM2, SM3, SM4 and other functional and algorithm modules, and provides a crystal-free USB2.0 full-speed interface, ISO7816 master-slave device interface and SPI interface, Support T=0 / T=1 protocol. There are two Ethernet interfaces on the module, and each interface can be realized by switching to RS232, RS485, RS422, CAN, GPRS, WIFI and other interfaces.

[0022] The technical principle of the mixed encryption algorithm of the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial Ethernet communication data encryption transparent transmission module which is used for being connected between a communication node and a communication network and performing encryption and decryption on communication data. The industrial Ethernet communication data encryption transparent transmission module comprises an ARM (Advanced RISC Machine) processor, a power management module and an encryption algorithm storage chip; the power management module is connected with a power end of the ARM processor; an encryption rule is gated through the ARM processor during electrification; the encryption rule which is set before the power failure is stored after the power failure of the ARM processor; the encryption algorithm storage chip is connected with a storage extension end of the ARM processor; multiple encryption algorithm modules are integrated in the encryption algorithm storage chip; two Ethernet interfaces and a standard serial port are formed in the ARM processor, wherein one of the two Ethernet interfaces serves as a plain code data interface which is used for connecting with the communication node, the other Ethernet interface serves as an encrypted data interface which is connected with the communication network, and the standard serial port is connected with a configuration computer which is used for configuring the encryption rule for the encryption transparent transmission module. According to the industrial Ethernet communication data encryption transparent transmission module, the safe high-speed transmission of network signals can be implemented.

Description

technical field [0001] The invention belongs to the technical field of industrial control information security, in particular to an industrial Ethernet communication data encryption transparent transmission module. Background technique [0002] Due to its good openness, cheap price, high efficiency, and ease of use, Ethernet communication is an ideal way for information sharing and exchange, and it has developed vigorously in the field of industrial control in recent years. However, there are some security flaws in the existing TCP / IP protocol: the industrial Ethernet communication process usually follows the standard Ethernet protocol, and the format of the user's data area in the protocol packet is fixed, such as the position and length range, and the general user data is not encrypted. It is easy to be monitored and hijacked, the TCP / IP service is fragile, and the security policy is lacking. It is easy to intercept user data and obtain user information by using network p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00
CPCH04L63/0263H04L63/0435H04L63/0485
Inventor 张志董秀军李秉刚门光飞张小廷
Owner BEIJING AEROSPACE MEASUREMENT & CONTROL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products