Data integrity protection method and device

A technology for integrity protection and data integrity, applied in digital data protection, special data processing applications, instruments, etc., can solve problems such as digital signatures being easily revoked

Pending Publication Date: 2019-07-09
SIEMENS AG
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the degree of protection of this scheme depends on the protection of private keys and dig

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity protection method and device
  • Data integrity protection method and device
  • Data integrity protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0045] In an industrial control system, there are usually multiple control components (or called control nodes) on the production line, such as PLC, OPC UA, and SCADA. In order to better protect the data security in these control components, such as preventing damaged firmware and configuration files from being used or firmware and configuration files from being tampered with, the data integrity protection scheme proposed in the present inve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data integrity protection method and data integrity protection equipment, which are used for protecting key data in control components in an industrial control system, and themethod comprises the following steps of: establishing correlation among a plurality of control components in the industrial control system; based on identity characteristics and data characteristicsof other control components related to a first control component in the plurality of control components, determining an abstract indicating the integrity of to-be-protected data in the first control component, the data feature being used to identify the to-be-protected data in a control component, and the first control component being any one of the plurality of control components. Due to the factthat the safety of the data in any control assembly is set up on other related control assemblies, the key data in the control assemblies can be effectively protected.

Description

technical field [0001] The invention relates to the field of industrial control, in particular to a method and device for protecting data security of an industrial control system. Background technique [0002] Industrial control systems play a very important role in industries such as electric power, transportation, and fire control. In an industrial control system, control components are usually used to control industrial processes. These control components may include, but are not limited to: Programmable Logic Controller (PLC), Supervisory Control and Data Acquisition (SCADA), Unified Architecture Object Linked and Embedded Process Control System (OPCUA), etc. [0003] There are usually two very important files in these control components, namely firmware and configuration files. As the most basic and bottom-level software of the system, firmware determines the function and performance of hardware devices. During the operation of the industrial control system, the firm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64
CPCG06F21/64G05B19/042H04L63/12G06F21/60G06F16/24578G06F16/345G05B23/024
Inventor 王心怡
Owner SIEMENS AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products