Industrial control network data security system

A data security and industrial control network technology, applied in the field of information network security, to achieve the effect of sacrificing efficiency, realizing safe transmission, and high forwarding rate

Inactive Publication Date: 2017-12-19
天津中新智冠信息技术有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the rapid development and application of the Internet of Things industry, each item may have its own identification mark in the future, which needs to be transmitted to the background system for logical processing. Data of different levels will be processed separately. All kinds of industry data need powerful The system backing support can only be realized through cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control network data security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to further understand the invention content, characteristics and effects of the present invention, the following examples are given, and detailed descriptions are as follows in conjunction with the accompanying drawings:

[0018] see figure 1 , an industrial control network data security system, used to improve the security of data interaction between public cloud and private cloud; including:

[0019] An encryption module for encrypting plaintext information into ciphertext; the encryption module includes an AES encryption chip, a bastion machine, a data encryption unit, and a data storage module; the AES encryption chip performs data interaction with the bastion machine through the Zigbee protocol; The bastion host performs data interaction with the data encryption unit through the https protocol; the data encryption unit performs data interaction with the data storage module through the https protocol;

[0020] A decryption module for decrypting ciphertext ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control network data security system, and relates to the technical field of information network security. The industrial control network data security system is used for improving the security of data interaction between public cloud and private cloud. The industrial control network data security system is characterized by at least comprising an encryption module used for encrypting plaintext information into a ciphertext, wherein the encryption module comprises an AES encryption chip, a fortress machine, a data encryption unit and a data storage module, the AES encryption chip performs data interaction with the fortress machine through a Zigbee protocol, the fortress machine performs data interaction with the data encryption unit through an https protocol, and the data encryption unit performs data interaction with the data storage module through the https protocol; and a decryption module used for decrypting the ciphertext into a plaintext, wherein the decryption module comprises an AES decoding chip. By adoption of the above technical scheme, the industrial control network data security system disclosed by the invention can improve the security of the data interaction between the public cloud and the private cloud.

Description

technical field [0001] The invention relates to the technical field of information network security, in particular to an industrial control network data security system. Background technique [0002] Cloud technology refers to a hosting technology that unifies a series of resources such as hardware, software, and network in a wide area network or a local area network to realize data calculation, storage, processing, and sharing. Cloud technology (Cloud technology) is a general term for network technology, information technology, integration technology, management platform technology, application technology, etc. based on cloud computing business model applications. It can form a resource pool and be used on demand, which is flexible and convenient. Cloud computing technology will become an important support. The background services of technical network systems require a lot of computing and storage resources, such as video websites, picture websites and more portal websites...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L29/08
CPCH04L9/0631H04L63/02H04L63/0485H04L63/08H04L67/02
Inventor 李太友吴皓
Owner 天津中新智冠信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products