Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe and efficient industrial hardware encryption method

A hardware encryption and high-efficiency technology, which is applied in the direction of secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as conflicts, communication interface transmission speed and complexity of encoding methods, sub-module random actions, etc., to achieve the effect of ensuring security

Pending Publication Date: 2022-05-13
四川易诚智讯科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a safe and efficient industrial hardware encryption method, which mainly solves the problem of data transmission security between each sub-module and the main control system in the hardware system connected to the Internet, the random action of the control sub-module that is vulnerable to network attacks, and the communication interface. The problem of the conflict between the transmission speed and the complexity of the encoding method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and efficient industrial hardware encryption method
  • Safe and efficient industrial hardware encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0023] Such as figure 1 Shown, the overall system diagram of the hardware module of a kind of embodiment that the method of the present invention is applied, figure 2 It is a flow chart of the method of the present invention, the method is used in an application scenario including a main controller and various hardware sub-modules, and the encryption method includes:

[0024] First, the access frequency and access authority requirements are set through the embedded software of the hardware sub-module to monitor and record malicious access behaviors;

[0025] The random number generated by the random number generator RNG of the microprocessor and the hardware address code pass through the encryption algorithm to generate the hidden address code, public key and private key, and the hardware sub-module only sends the public key to the master when it is powered on and initialized. MCU. Encryption methods include but are not limited to the RSA asymmetric algorithm. The hardware...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe and efficient industrial hardware encryption method. The method mainly solves the problems that in a hardware system connected with the Internet, data transmission safety of all sub-modules and a main control system and the communication interface transmission speed conflict with the complexity of a code addition method. The method comprises the following steps: software sets data access frequency and authority; generating a random number through a random number generator RNG of the microprocessor, combining the random number with a hardware sub-module address code, and generating a public key, a private key and a hidden address code; when the system is started up and initialized, the sub-module only sends the public key to the system main controller once through the serial port; and the address codes of the sub-modules are invalid only after being used once during startup. By means of the method, the system does not need to replace a common data transmission interface, secrecy of data transmission is achieved, the address of the sub-module is not an actual hardware dial switch address but is hidden, access and attack of network viruses are avoided, and dual safety of hardware functions and information is achieved.

Description

technical field [0001] The invention belongs to the field of industrial security, and in particular relates to a safe and efficient industrial hardware encryption method. Background technique [0002] In the data transmission mode of traditional industrial hardware modules and the main control system, the data is transparently transmitted, only the data check code is used to ensure the normal transmission of the data volume, and the address of each hardware module is transparent, and the data transmission interface is uniform. It is a low-to-medium speed serial port, which is vulnerable to malicious attacks or monitoring, or even random actions. To encrypt data in existing modules, it is difficult to balance the data transmission rate and data security. Even if symmetric encryption is used, since both parties have the same key, the amount of data transmitted by the hardware module in a single frame is very small, and it is easy to monitor and crack the data. [0003] There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/0428H04L63/1408H04L63/1425H04L63/10H04L63/0442H04L2209/12
Inventor 占梦来张军李良张棚王另
Owner 四川易诚智讯科技有限公司