Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Timestamp technique-based industrial network security transmission method

A technology of network security and transmission method, which is applied in the field of industrial data network security transmission based on time stamp technology, and the field of industrial data security transmission. Good, low hardware requirements

Inactive Publication Date: 2016-08-03
CHINA AEROSPACE SYST ENG
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The secure transmission of data and instructions has always been a concern. If the data is transmitted in plain text during the transmission process, it is easy to be used maliciously after being intercepted; if the encrypted transmission is sniffed, it is easy for hackers to reuse the data to achieve forgery. The purpose of sending; the use of security protocols or complex encryption methods is often too costly or inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Timestamp technique-based industrial network security transmission method
  • Timestamp technique-based industrial network security transmission method
  • Timestamp technique-based industrial network security transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] The present invention mainly relates to a method for sending data at the sending end and receiving data at the receiving end, and the data sending and receiving process is closely related to the local time. Therefore, as a prerequisite for the implementation of the present invention, the time of the sending end and the receiving end are required to be synchronized. The current relevant time There are many types of synchronization devices, which can be realized by adopting a suitable time synchronization scheme according to the actual application environment. In addition, in order to facilitate the transplantation of the method of the present invention, a list of data instruction libraries is preset at the receiving end to store all the data that may be sent by the sending end; in order to improve the efficiency of judging whether it is repeated data, a history is maintained for each sending end The library is used to store the time stamp of the data sent by the sender re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a timestamp technique-based industrial network security transmission method and belongs to the technical field of security transmission. The method comprises the steps of encrypting at a transmitting end and decrypting at a receiving end. During the encrypting process, the local time is extracted to generate a time character string, and then to-be-sent data or instructions are added into the time character string. After that, the time character string is encrypted according to an encryption algorithm to generate a ciphertext, and the ciphertext is encrypted for a second time through introducing a user key to generate a final ciphertext. Finally, the time character string and the final ciphertext are transmitted together. During the decrypting process, the received ciphertext and a received timestamp are verified to be whether outmoded / forged or not. On the condition that the ciphertext and the timestamp are verified to be outmoded / forged, the ciphertext and the timestamp are discarded. Otherwise, all possible instructions / data are matched in the same encryption mode with the transmitting end. If the matching result is successful, the decryption is successful. If the matching is not successful, the operation is continued till no data or instruction is matched successfully. After that, the data / instructions are discarded. According to the technical scheme of the invention, the deceit through maliciously counterfeiting data can be prevented, so that real data obtained through sniffing cannot be reused. Moreover, the method is simple, practical, efficient, and low in requirement on hardware.

Description

Technical field: [0001] The invention relates to industrial data security transmission technology, in particular to a time stamp technology-based industrial data network security transmission method, which belongs to the field of security transmission technology. Background technique [0002] The secure transmission of data and instructions has always been a matter of concern. If the data is transmitted in plain text during transmission, it is easy to be used maliciously after being intercepted; while the encrypted transmission is sniffed, it is easy for hackers to reuse the data to achieve forgery The purpose of sending; the use of security protocols or complex encryption methods is often too costly or inefficient. Therefore, the safe transmission of data has always been a difficult problem that people are trying to solve, especially for the small amount of data in the field of industrial control and the correct identification and implementation of control instructions is o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3297H04L63/0428H04L2463/121
Inventor 曾伟兵朱小明吴荫鸿王志先张保磊
Owner CHINA AEROSPACE SYST ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products