Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Token-based industrial network data tamper-proofing method and system

An industrial network, tamper-proof technology, applied in digital transmission systems, transmission systems, user identity/authority verification, etc., can solve problems such as insecure data transmission, achieve data content verification, accelerate research and development cycles, prevent theft and Tampering effect

Active Publication Date: 2019-11-15
CHINA TECHENERGY +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the technical problem of insecure data transmission in the DCS system management network in the prior art, the present invention provides a token-based anti-tampering method for industrial network data And system, make the data encrypted during the transmission process, improve the security of the DCS system management network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Token-based industrial network data tamper-proofing method and system
  • Token-based industrial network data tamper-proofing method and system
  • Token-based industrial network data tamper-proofing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049]This embodiment provides a token-based anti-tampering method for industrial management network communication data. The method includes: before the engineer station sends communication data to the management network node, extracts the key information of the sent data and encodes it to generate text; The hash algorithm encrypts the text to generate a signature; the text and the signature form a token and send it together with the communication data; after the server receives it, it uses the built-in hash algorithm and the text in the token to generate a verification text; verifies the verification text and the token Whether the signature in the token matches, after matching, extract the key data of the received information and verify it with the Chinese text of the token, and prove that the communication data has not been tampered with after passing the verification.

[0050] Wherein, the token refers to a data packet describing the information to be sent, and the data pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security control, and provides a token-based industrial network data tamper-proofing method and a token-based industrial network data tamper-proofing system in order to solve the technical problem of unsafe data transmission in a DCS management network in the prior art. The method comprises the following steps that S1, a file is compiled,a token set F1 is formed through an encryption algorithm, and the token set F1 is uploaded to a real-time server; S2, the real-time server receives the token set F1 and judges whether the token set F1 meets preset requirements or not; after the token set F1 meets the requirement, the token set F1 is stored in a set list of the token set F1, and an engineer station is informed that the token set F1 is received completely; s3, the engineer station sends the file and the token set of the file to a real-time server in the form of a data packet, and the real-time server receives the file and the token set of the file; and S4, the real-time server judges whether the file and the token set of the file meet preset requirements or not, and if yes, subsequent file storage is continued.

Description

technical field [0001] The present invention relates to the technical field of information security control, in particular to the technical field of security control of data transmission in a nuclear power DCS system; more specifically, to a token-based industrial network data tamper-proof method and system. Background technique [0002] In the field of industrial control, especially in the management network of a nuclear power DCS system (Distributed Control System, distributed control system), there are usually multiple equipment nodes such as an engineer station, an operator station, a gateway, a real-time server, and a history server; specifically, such as figure 1 shown. [0003] The inventor found in the process of realizing the present invention: in the DCS system in the prior art, it is one of the basic functions for each device node to realize file data transmission and reception. In order to realize this function, a remote file service is installed in each device. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0807H04L9/3213H04L9/3247Y02P90/02
Inventor 彭立张春雷马建新任保华董晓峰刘松马腾飞
Owner CHINA TECHENERGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products