Remote operation and maintenance and data exchange method for equipment industrial control security

A data exchange and industrial control technology, applied in the field of information security, can solve the problems of data being easily intercepted, targeted malicious code, failure to detect equipment in time, abnormal data changes, etc., to reduce the probability of intercepting running data packets and control data packets, The effect of wide coverage and improved safety

Active Publication Date: 2020-01-10
贵州航天云网科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the equipment runs too fast during the operation of the equipment, if the equipment operation data is not monitored, abnormal changes in the data during the operation of the equipment cannot be found in time, and some environments are not suitable for the staff to stay for a long time. The data is sent to the background for monitoring. If the operation and maintenance data is sent to the background for observation, the data is easily intercepted or invaded by targeted malicious code during the transmission to the background, which makes data security in the industrial control process particularly important.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote operation and maintenance and data exchange method for equipment industrial control security
  • Remote operation and maintenance and data exchange method for equipment industrial control security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Remote operation and maintenance and data exchange methods for equipment industrial control security, such as figure 1 Shown: Include the following steps:

[0036] S100, collecting the operation data during the operation of the equipment through the collection terminal;

[0037] S200, encrypting the operation data at the acquisition end and generating an encryption password, forming an operation data packet after encrypting the operation data, generating pseudo information in the same format as the operation data transmission at the acquisition end, and mixing the encrypted password into the pseudo information to form an uplink pseudo information packet , the acquisition end backs up and stores the encrypted running data packet and the pseudo-information packet carrying the encrypted password;

[0038] S300, when exchanging data, first send an uplink dummy information packet added with an encrypted password, the uplink dummy information packet is sent through an explic...

Embodiment 2

[0045] The difference with Embodiment 1 is that, if figure 2As shown, in the process of industrial control, the workpiece produced is turned and scanned through the steering mechanism. The steering mechanism includes a support plate 1, and the workpiece is placed on the support plate 1 for scanning. The bottom of the support plate 1 is welded with the shaft 2, and the middle of the shaft 2 is keyed. There is a driven gear 3, and the end of the rotating shaft 2 is key-connected with a rotating bearing 6. The rotating bearing 6 can be installed on other support frames. The driven gear 3 is meshed with a driving gear 4. The diameter of the driving gear 4 is smaller than that of the driven gear 3. The rotation of the plate 1 is decelerated, the driving gear 4 is connected to the support shaft, and the motor 5 is installed at the bottom of the support shaft. The motor 5 can be an existing SM130-100-15LFB servo motor, and also includes a scanning module. The position of the scanning...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, particularly relates to a remote operation and maintenance and data exchange method for equipment industrial control security. Themethod includes the following steps: s100, acquiring operation data in the operation process of the equipment through an acquisition terminal; and S200, encrypting the collected operation data to form an operation data packet and generate an encryption password, mixing the encryption password into the pseudo information to form an uplink pseudo information packet, and S300, when sending operationdata, sending the uplink pseudo information packet first and then sending the operation data packet. According to the method, the probability that the operation data packet is intercepted is reducedby counterfeiting normal operation data, the safety of sending the operation data is improved, and meanwhile, the encryption password is sent firstly, so that subsequent decoding is facilitated.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a remote operation and maintenance and data exchange method oriented to equipment industrial control security. Background technique [0002] With the development of information technology, the automatic control technology of industrial equipment is developing rapidly. Industrial control is industrial automation control, which mainly uses the combination of electronics, machinery and software to realize industrial control. efficiency and precision. [0003] However, because the equipment runs too fast during the operation of the equipment, if the equipment operation data is not monitored, abnormal changes in the data during the operation of the equipment cannot be found in time, and some environments are not suitable for the staff to stay for a long time. The data is sent to the background for monitoring. If the operation and maintenance data is sent to the backgroun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/1441
Inventor 杨灵运张昌福文杰邓生雄袁江远李琳
Owner 贵州航天云网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products