beautypg.com

4 settings, 4 file encryption, 5 communications encryption – Campbell Scientific CR1000 Measurement and Control System User Manual

Page 75: 6 hiding files, 7 signatures

background image

Section 5. System Overview

75

 

5.1.10.3.4 Settings

Several CR1000 settings accessible with DevConfig enable the entry of various
passwords. See Settings

(p. 96).

• PPP Password
• PakBus/TCP Password
• FTP Password
• TLS Password (Transport Layer Security (TLS) Enabled)
• TLS Private Key Password
• AES-128 encrypted PakBus communications encryption key (see

Communications Encryption

(p. 75)

)

5.1.10.4 File Encryption

Encryption is available for CRBasic program files and provides a means of
securing proprietary code or making a program tamper resistant. .CR files, or
files specified by the Include() instruction, can be encrypted. The CR1000
decrypts program files on the fly. While other file types can be encrypted, no tool
is provided for decryption. The CRBasic Editor encryption facility (Menus | File
| Save and Encrypt) creates an encrypted "copy" of the original file in PC
memory. The encrypted file is named after the original, but the name is appended
with "_enc". The original file remains intact. The FileEncrypt() instruction
encrypts files already in CR1000 memory. The encrypted file overwrites and
takes the name of the original. The Encryption() instructions encrypts and
decrypts the contents of a file.

One use of file encryption may be to secure proprietary code but make it available
for copying.

5.1.10.5 Communications Encryption

PakBus is the CR1000 root communication protocol. By encrypting certain
portions of PakBus communications, a high level of security is given to
datalogger communications. See PakBus Encryption

(p. 363)

for more information.

5.1.10.6 Hiding Files

The option to hide CRBasic program files provides a means, apart from or in
conjunction with file encryption, of securing proprietary code, prevent it from
being copied, or making it tamper resistant. .CR files, or files specified by
the Include() instruction, can be hidden using the FileHide() instruction. The
CR1000 can locate and use hidden files on the fly, but a listing of the file or the
file name are not available for viewing. See File Management

(p. 340)

for more

information.

5.1.10.7 Signatures

Recording and monitoring system and program signatures are important
components of a security scheme. Read more about use of signatures in System
Signatures

(p. 150).