CN103036886B - Industrial control network security protection method - Google Patents
Industrial control network security protection method Download PDFInfo
- Publication number
- CN103036886B CN103036886B CN201210553196.8A CN201210553196A CN103036886B CN 103036886 B CN103036886 B CN 103036886B CN 201210553196 A CN201210553196 A CN 201210553196A CN 103036886 B CN103036886 B CN 103036886B
- Authority
- CN
- China
- Prior art keywords
- network
- industrial
- control
- industrial control
- communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The present invention discloses and provides one and can improve industrial control network safety, and communication is convenient, can also prevent external attack and invasion, the industrial control network security protection method of available protecting industrial control system and industrial equipment safety.The method comprises the following steps: carry out layered shaping to industrial enterprise's information system, takes Safeguard tactics measure to the exchanges data of described Industry Control layer; Described Industry Control layer is divided into multiple different automation cell region and adopts fire compartment wall to carry out zone isolation; Block the potential avenues of communication of described production execution level to described Industry Control layer; Industrial safety management platform module is adopted to set up the configuration of described Industry Control layer network, management, analysis, alarm and audit center.The present invention is applied to industrial control network field.
Description
Technical field
The present invention relates to industrial control network security protection method.
Background technology
Industrial control system is by various automatic control assembly and gathers real time data, the system of the process control modules composition of monitoring, the critical infrastructures of China more than 80 percent rely on industrial control system to realize automated job, industrial control network has been the important component part of National Security Strategy, once industrial control network information security starts a leak, to run industrial production and economic security of the country causes major hidden danger, therefore, government agencies at all levels of China pay much attention to, emphasize that industrial control system information security is run concerning industrial production, economic security of the country and people life property safety, conscientiously industrial control network information security management must be strengthened.
At present in the security protection of universal industrial Control System NetWork, the technical safeguard adopted is fewer, and the mode not forming system of systems carries out protective overall, along with the control integration of industrial control system, industrial control system is connected with conventional I T management system and the Internet, inside also have employed common software, common hardware and puppy parc more and more, directly in the face of all threats from the external world, adds the potential safety hazard of industrial control network information.The awareness of safety of Industry Control industry user is not enough simultaneously, entire system safe design is not considered among system, exist and only pay attention to functional realiey, think little of safe phenomenon, and in operation maintenance, safety management is also paid little attention to, add the possibility that industrial control system suffers virus, Trojan attack.
Publication number is that a Chinese patent of 102438026A discloses a kind of industrial control network security protection method and system, said method comprising the steps of: attack for external network, front main frame carries out ground floor data filtering and access control to external network data, security control main frame comes data cached by common storage area, intrusion detection is carried out to data, invalid data is carried out and alarm notify both sides main frame, rear main frame carries out in-depth filtration and access control to data, and valid data enters into internal network; Attack for internal network, rear main frame carries out ground floor data filtering and access control to inner network data, security control main frame comes data cached by common storage area, intrusion detection is carried out to data, invalid data is carried out and alarm notify both sides main frame, front main frame carries out in-depth filtration and access control to data, and valid data enters into external network.This patent adopts 3 main machine structures and three-layer protection strategy, cost of investment and management cost high, and adopt various watch-dog more complicated, the wilderness demand of industrial control network can not be met.
At present, production management system and control system are co-located in production control network, support one another information mutual communication, there is no logic isolation and infomation detection measure, as shown in Figure 1, described production control network and management network carry out logic isolation measure by fire compartment wall, and monitoring communication data each other, but this structure to exist from the virus of the Internet or other medium or wooden horse with described management network for base is by the information security hidden danger of described fire compartment wall to described production control network offensive attack.
Summary of the invention
Technical problem to be solved by this invention overcomes the deficiencies in the prior art; there is provided one can improve industrial control network safety; and communication is convenient, can also prevent external attack and invasion, the industrial control network security protection method of available protecting industrial control system and industrial equipment safety.
The technical solution adopted in the present invention is: the method comprises the following steps:
(1) according to the technical requirement of industrial control system information security, layered shaping is carried out to industrial enterprise's information system, described industrial enterprise information system is divided into three trouble free service levels, namely Industry Control layer, production execution level and management layer, take Safeguard tactics measure to the exchanges data of described Industry Control layer;
(2) according to functional characteristics and the control range of described industrial control system, described Industry Control layer is divided into multiple different automation cell region and adopts fire compartment wall to carry out zone isolation, realize packet filtering and access control, Inspection and analysis is carried out to industrial communication protocol, realize the Realtime Alerts to illegal communication, come source acknowledgement, historical record, ensure the real-time diagnosis of net control;
(3) Network Isolation module is adopted to realize the exchanges data of the safety of the non-network mode between described Industry Control layer and described production execution level, and be communicated with when ensureing that inside and outside Secure isolation module, two treatment systems are different, connect and access control technology in conjunction with anti-penetration TCP, block the potential avenues of communication of described production execution level to described Industry Control layer, thus realize the unidirectional isolation between described Industry Control layer and described production execution level;
(4) industrial safety management platform module is adopted to set up the configuration of described Industry Control layer network, management, analyze, alarm and audit center, fire compartment wall and network isolating device are configured and are managed, collection network affair alarm information also stores, retrieval and divided rank are reported to the police, communication is allowed to the terminal applies be defined within the scope of white list, Network anomalous behaviors is caught to the depth analysis of industrial control protocols, analyze potential risk, accurately catch on-the-spot virus, worm and illegal invasion, for the investigation of industrial control system network failure, analysis and security audit provide reliable basis.
In described step (1), the two ends communications network system between described Industry Control layer with described production execution level is connected by wired or wireless network mode.
In described step (2), the mode of described Inspection and analysis is that comprehensive using state detects and application layer protocol detects, and carries out multistage filtering, forms the protective barrier in comprehensive access control mechanisms and automation cell region, stop unauthorized person and use message.
In described step (2), be flow collection identification based on industrial control network to the packet filtering of communication, the described access control carried out communicating controls based on the terminal applies of white list.
In described step (3), described Network Isolation module adopts Secure isolation technology by the Reverse Turning Control abrogation of agreement of data communication, and oppositely both do not had data channel also not have control channel, forward is in blind state completely, realizes information flow one-way transmission.
The invention has the beneficial effects as follows: because the present invention adopts system layer, point territory in layer, the method of unidirectional isolation and security management and control, described system layer effectively reduces the order of severity and the damage envelope of threat, in described layer, point territory is to data zone isolation, realize the Realtime Alerts to illegal communication, carry out source acknowledgement, historical record, ensure the real-time diagnosis of net control, described unidirectional isolation achieves the unidirectional isolation between described Industry Control layer and described production execution level, described security management and control is the investigation of described industrial control system network failure, analysis and security audit provide reliable basis, it communicates conveniently for electric power system provides a kind of, use safety, do not subject to the public network communication means attacked, and the host-host protocol of electric power system is analyzed and control of authority, also for the communication of power network schedule automation public network provides safe and reliable transmission channel, thus realize using public network communication the prerequisite ensured information security carries out data communication whenever and wherever possible, resist hacker, virus, the malicious sabotage that worm etc. are initiated industrial control system by various forms and attack, prevent unauthorized user access system or illegal obtaining information and intrusion and great illegal operation and by the outside attack initiated and invasion, therefore, the present invention can improve industrial control network safety, and communication is convenient, external attack and invasion can also be prevented, available protecting industrial control system and industrial equipment safety.
Accompanying drawing explanation
Fig. 1 is the environment schematic before the present invention applies;
Fig. 2 is the environment schematic after the present invention applies;
Fig. 3 is workflow diagram of the present invention.
Embodiment
As shown in Figures 2 and 3, the technical solution adopted in the present invention is: the method comprises the following steps:
(1) according to the technical requirement of industrial control system information security, layered shaping is carried out to industrial enterprise's information system, by analyzing the risk analysis of factory, described industrial enterprise information system is divided into three trouble free service levels, i.e. Industry Control layer, production execution level and management layer, the safeguard protection emphasis of described Industry Control Ceng Shi industrial enterprise and core, take Safeguard tactics measure to the exchanges data of described Industry Control layer;
(2) according to functional characteristics and the control range of described industrial control system, described Industry Control layer is divided into multiple different automation cell region and adopts fire compartment wall to carry out zone isolation, realize packet filtering and access control, Inspection and analysis is carried out to industrial communication protocol, realize the Realtime Alerts to illegal communication, carry out source acknowledgement, historical record, ensure the real-time diagnosis of net control, described industrial control system single independently System Development of normally conforming to the principle of simplicity becomes complex network, without isolating and being seldom designed with safeguard measure between each subsystem in described network, described Industry Control layer is divided into multiple different automation cell region and adopts fire compartment wall to carry out zone isolation and efficiently solve the problem spreading to whole industrial control system network from the problem in a region,
(3) Network Isolation module is adopted to realize the exchanges data of the safety of the non-network mode between described Industry Control layer and described production execution level, and be communicated with when ensureing that inside and outside Secure isolation module, two treatment systems are different, connect and access control technology in conjunction with anti-penetration TCP, block the potential avenues of communication of described production execution level to described Industry Control layer, thus realize the unidirectional isolation between described Industry Control layer and described production execution level;
(4) industrial safety management platform module is adopted to set up the configuration of described Industry Control layer network, management, analyze, alarm and audit center, fire compartment wall and network isolating device are configured and are managed, collection network affair alarm information also stores, retrieval and divided rank are reported to the police, communication is allowed to the terminal applies be defined within the scope of white list, Network anomalous behaviors is caught to the depth analysis of industrial control protocols, analyze potential risk, accurately catch on-the-spot virus, worm and illegal invasion etc., for the investigation of industrial control system network failure, analysis and security audit provide reliable basis.
In described step (1), the two ends communications network system between described Industry Control layer with described production execution level is connected by wired or wireless network mode.
In described step (2), the mode of described Inspection and analysis is that comprehensive using state detects and application layer protocol detects, and carries out multistage filtering, forms the protective barrier in comprehensive access control mechanisms and automation cell region, stop unauthorized person and use message.
In described step (2), be flow collection identification based on industrial control network to the packet filtering of communication, the described access control carried out communicating controls based on the terminal applies of white list.
In described step (3), described Network Isolation module adopts Secure isolation technology by the Reverse Turning Control abrogation of agreement of data communication, oppositely data channel had not both been had not have control channel yet, forward is in blind state completely, realize information flow one-way transmission, both can ensure the online data of described production execution level and be transferred to described production execution level in real time, can ensure again that the data of described production execution level cannot enter described Industry Control layer.
Described industrial control system refers to by various automatic control assembly and the process control modules that gathers real time data, monitor, the common operation flow managing and control system guaranteeing industrial infrastructure automatic operating, process control and monitoring formed.Its core component comprises data acquisition analysis system (SCADA), dcs (DCS), programmable logic controller (PLC) (PLC), remote terminal (RTU), intelligent electronic device (IED) and communication interface technique etc.
Described industrial enterprise information system is carried out reasonable layering by the present invention, in order to described Industry Control layer, described production execution level and described management layer, to solve management, the system such as execution, Industry Control of producing is in consolidated network plane and causes the invasion hidden danger from management information system.Then in described Industry Control layer, be divided into multiple control area according to the functional characteristics of subsystem, control range and application need etc. situation, thus prevent the information security issue of a control area from spreading to the risk of whole industrial control system network.Between different described control areas, set up fire compartment wall to carry out logic isolation, analysis and filter is carried out to Industry Control Application layer communication protocol.Between described Industry Control layer and the network boundary of described production execution level, dispose isolation module carry out unidirectional isolation, block the potential data communication approach of described production execution level to described Industry Control layer.In Industry Control layer, set up safety management platform data collection and analysis process is carried out to described Industry Control layer network, realize " multi-point monitoring, unified coordination ".
The present invention is applied to industrial control network field.
It should be noted that, above-mentionedly only to describe the present invention with preferred embodiment, interest field of the present invention can not be limited at this point, therefore when not departing from inventive concept, the equivalence that the content of all utilizations specification of the present invention and accompanying drawing part is carried out changes, and all reason is with being included in right of the present invention.
Claims (3)
1. an industrial control network security protection method, is characterized in that: described industrial control network security protection method comprises the following steps:
(1) according to the technical requirement of industrial control system information security, layered shaping is carried out to industrial enterprise's information system, described industrial enterprise information system is divided into three trouble free service levels, namely Industry Control layer, production execution level and management layer, take Safeguard tactics measure to the exchanges data of described Industry Control layer;
(2) according to functional characteristics and the control range of described industrial control system, described Industry Control layer is divided into multiple different automation cell region and adopts fire compartment wall to carry out zone isolation, realize packet filtering and access control, Inspection and analysis is carried out to industrial communication protocol, realize the Realtime Alerts to illegal communication, come source acknowledgement, historical record, ensure the real-time diagnosis of net control; The mode of described Inspection and analysis is that comprehensive using state detects and application layer protocol detects, and carries out multistage filtering, forms the protective barrier in comprehensive access control mechanisms and automation cell region, stop unauthorized person and use message;
(3) Network Isolation module is adopted to realize the exchanges data of the safety of the non-network mode between described Industry Control layer and described production execution level, and be communicated with when ensureing that inside and outside Secure isolation module, two treatment systems are different, connect and access control technology in conjunction with anti-penetration TCP, block the potential avenues of communication of described production execution level to described Industry Control layer, thus the unidirectional isolation realized between described Industry Control layer and described production execution level, described Network Isolation module adopts Secure isolation technology by the Reverse Turning Control abrogation of agreement of data communication, oppositely data channel had not both been had not have control channel yet, forward is in blind state completely, realize information flow one-way transmission,
(4) industrial safety management platform module is adopted to set up the configuration of described Industry Control layer network, management, analyze, alarm and audit center, fire compartment wall and network isolating device are configured and are managed, collection network affair alarm information also stores, retrieval and divided rank are reported to the police, communication is allowed to the terminal applies be defined within the scope of white list, Network anomalous behaviors is caught to the depth analysis of industrial control protocols, analyze potential risk, accurately catch on-the-spot virus, worm and illegal invasion, for the investigation of industrial control system network failure, analysis and security audit provide reliable basis.
2. industrial control network security protection method according to claim 1, is characterized in that: in described step (1), and the two ends communications network system between described Industry Control layer with described production execution level is connected by wired or wireless network mode.
3. industrial control network security protection method according to claim 1, it is characterized in that: in described step (2), be flow collection identification based on industrial control network to the packet filtering of communication, the access control carried out communicating controls based on the terminal applies of white list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210553196.8A CN103036886B (en) | 2012-12-19 | 2012-12-19 | Industrial control network security protection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210553196.8A CN103036886B (en) | 2012-12-19 | 2012-12-19 | Industrial control network security protection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103036886A CN103036886A (en) | 2013-04-10 |
CN103036886B true CN103036886B (en) | 2016-02-24 |
Family
ID=48023369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210553196.8A Active CN103036886B (en) | 2012-12-19 | 2012-12-19 | Industrial control network security protection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103036886B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10268170B2 (en) | 2017-01-03 | 2019-04-23 | General Electric Company | Validation of control command in substantially real time for industrial asset control system threat detection |
Families Citing this family (41)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491108B (en) * | 2013-10-15 | 2016-08-24 | 浙江中控研究院有限公司 | A kind of industrial control network security protection method and system |
CN104883348A (en) * | 2014-09-28 | 2015-09-02 | 宁波匡恩网络科技有限公司 | Network security regulation automatic deployment method and system |
CN106161330A (en) * | 2015-03-16 | 2016-11-23 | 机械工业仪器仪表综合技术经济研究所 | A kind of security isolation system being applied to PROFINET EPA |
CN106411816B (en) * | 2015-07-29 | 2021-02-05 | 研祥智能科技股份有限公司 | Industrial control system, safety interconnection system and processing method thereof |
CN106411818B (en) * | 2015-07-30 | 2020-07-17 | 中国移动通信集团河北有限公司 | Security domain structure checking method and device |
CN105208018B (en) * | 2015-09-09 | 2018-08-17 | 上海三零卫士信息安全有限公司 | A kind of industry control network information spy method based on funneling white list |
CN105323255A (en) * | 2015-11-24 | 2016-02-10 | 北京交控科技有限公司 | Rail traffic information security defending system |
US9967274B2 (en) * | 2015-11-25 | 2018-05-08 | Symantec Corporation | Systems and methods for identifying compromised devices within industrial control systems |
CN105573291B (en) * | 2015-12-24 | 2018-05-18 | 中国信息安全测评中心 | A kind of threat detection method and safety device based on key parameter fusion verification |
CN105871620B (en) * | 2016-05-05 | 2019-04-16 | 中国科学院信息工程研究所 | A kind of quick detection recognition method of cyberspace industrial control equipment |
CN105959144B (en) * | 2016-06-02 | 2019-08-06 | 中国科学院信息工程研究所 | Secure data acquisition and method for detecting abnormality and system towards industrial control network |
CN106789932B (en) * | 2016-11-29 | 2020-04-21 | 中国电子科技集团公司第二十九研究所 | Network system safety protection method and device based on component hopping |
CN106559432A (en) * | 2016-12-06 | 2017-04-05 | 山东省电子信息产品检验院 | A kind of industrial control system and its safety device |
CN106651183B (en) * | 2016-12-26 | 2020-04-10 | 英赛克科技(北京)有限公司 | Communication data security audit method and device of industrial control system |
CN107276987A (en) | 2017-05-17 | 2017-10-20 | 厦门奥普拓自控科技有限公司 | A kind of the special line physical isolation industrial data means of communication and system |
CN108989265A (en) * | 2017-05-31 | 2018-12-11 | 西门子公司 | access control method, device and system |
CN107360134B (en) * | 2017-06-08 | 2020-04-17 | 杭州谷逸网络科技有限公司 | Method for realizing safety remote control terminal and safety system thereof |
EP3451606A1 (en) * | 2017-08-30 | 2019-03-06 | Siemens Aktiengesellschaft | Method for inspecting datagrams transmitted within an industrial automation system and automation and/or communication device |
CN107703901B (en) * | 2017-11-21 | 2023-12-19 | 丹东华通测控有限公司 | Bypass industrial control information safety industrial control system |
CN108170105A (en) * | 2017-11-22 | 2018-06-15 | 东莞理工学院 | A kind of industrial control network guard system and method |
CN109842585B (en) | 2017-11-27 | 2021-04-13 | 中国科学院沈阳自动化研究所 | Network information safety protection unit and protection method for industrial embedded system |
CN108055261B (en) * | 2017-12-11 | 2020-11-06 | 中车青岛四方机车车辆股份有限公司 | Industrial network security system deployment method and security system |
CN108375946A (en) * | 2018-03-22 | 2018-08-07 | 北京奔驰汽车有限公司 | A kind of information spy device and industrial control system |
CN108712425A (en) * | 2018-05-21 | 2018-10-26 | 南京南瑞集团公司 | A kind of analysis monitoring and managing method towards industrial control system network security threats event |
CN108924160B (en) * | 2018-08-06 | 2019-04-16 | 北京捷诺视讯数码科技有限公司 | A kind of industrial data collection analysis process system of high security |
CN111147427A (en) * | 2018-11-06 | 2020-05-12 | 上海致为信息技术有限公司 | Management system for computer network security |
CN109858293B (en) * | 2018-11-27 | 2021-01-01 | 浙江创意声光电科技有限公司 | Intrusion processing method and device for lighting control machine |
CN109507975A (en) * | 2018-12-28 | 2019-03-22 | 飞马智科信息技术股份有限公司 | A kind of acquisition network system of industry big data |
CN109739203B (en) * | 2019-02-25 | 2021-09-21 | 南京世界村云数据产业集团有限公司 | Industrial network boundary protection system |
CN110351277A (en) * | 2019-07-12 | 2019-10-18 | 李然 | Electric power monitoring system security protection alarm method |
CN110825040B (en) * | 2019-10-22 | 2021-02-19 | 中国科学院信息工程研究所 | Process control attack detection method and device for industrial control system |
CN110769067B (en) * | 2019-10-30 | 2020-08-04 | 任子行网络技术股份有限公司 | SD-WAN-based industrial internet security supervision system and method |
CN112787836B (en) * | 2019-11-07 | 2022-04-15 | 比亚迪股份有限公司 | Information security network topology system for rail transit and method for implementing information security for rail transit |
CN110995678B (en) * | 2019-11-22 | 2021-07-23 | 北京航空航天大学 | Industrial control network-oriented efficient intrusion detection system |
CN111262829A (en) * | 2019-12-31 | 2020-06-09 | 南京联成科技发展股份有限公司 | Virus of industrial control network and propagation model system thereof |
CN112532612A (en) * | 2020-11-25 | 2021-03-19 | 中国大唐集团科学技术研究院有限公司 | Industrial control network safety protection system |
CN112839031A (en) * | 2020-12-24 | 2021-05-25 | 江苏天创科技有限公司 | Industrial control network security protection system and method |
CN112751843A (en) * | 2020-12-28 | 2021-05-04 | 中铁第一勘察设计院集团有限公司 | Network safety protection system of railway power supply system |
CN112749405A (en) * | 2021-01-24 | 2021-05-04 | 武汉卓尔信息科技有限公司 | Network security protection method, system, electronic equipment and storage medium |
CN112910921B (en) * | 2021-03-02 | 2022-10-21 | 中核武汉核电运行技术股份有限公司 | Industrial control boundary network safety protection method |
CN113746852A (en) * | 2021-09-08 | 2021-12-03 | 滨州学院 | Network security risk monitoring system and method of power monitoring system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080295164A1 (en) * | 2007-05-24 | 2008-11-27 | International Business Machines Corporation | Mashup component isolation via server-side analysis and instrumentation |
-
2012
- 2012-12-19 CN CN201210553196.8A patent/CN103036886B/en active Active
Non-Patent Citations (2)
Title |
---|
信息安全新焦点——工业控制系统安全;张晔;《方案应用》;20120430;"工控系统安全防护设计"节及图1和图3 * |
网络隔离系统通道协议设计与实现;张锦玉;《中国优秀硕士学位论文全文数据库信息科技辑》;20090715;第4页第2.1.1节第2段 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10268170B2 (en) | 2017-01-03 | 2019-04-23 | General Electric Company | Validation of control command in substantially real time for industrial asset control system threat detection |
Also Published As
Publication number | Publication date |
---|---|
CN103036886A (en) | 2013-04-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103036886B (en) | Industrial control network security protection method | |
CN101399658B (en) | Safe log analyzing method and system | |
CN104852927A (en) | Safety comprehensive management system based on multi-source heterogeneous information | |
CN202975775U (en) | Security management platform | |
CN106911529A (en) | Power network industry control safety detecting system based on protocol analysis | |
CN104378365A (en) | Safety management center capable of conducting collaborative analysis | |
CN104378364B (en) | A kind of Cooperative Analysis method at information security management center | |
Coppolino et al. | Integration of a System for Critical Infrastructure Protection with the OSSIM SIEM Platform: A dam case study | |
CN113067843A (en) | Security monitoring and linkage defense system and method for power distribution Internet of things network | |
CN201909992U (en) | Remote room environment monitoring device based on VPN (virtual private network) technology | |
CN112350858A (en) | Cloud intelligent home data security management system | |
CN206962850U (en) | The security protection system and power information system of Electricity Information Network | |
Liang et al. | Information security monitoring and management method based on big data in the internet of things environment | |
CN105488396A (en) | Intelligent power grid service security gateway system based on data stream correlation analysis technology | |
CN102968872B (en) | Prevent the home intelligent safety-protection system of house robbery | |
CN106534110B (en) | Trinity transformer substation secondary system safety protection system framework system | |
CN109308062A (en) | A kind of production equipment monitoring network integrated system | |
CN212519050U (en) | Block chain-based intelligent management system for power distribution station room | |
CN103716190B (en) | The method of E-government Intranet service application safety supervision | |
CN201335962Y (en) | IDC monitoring system | |
CN115037536A (en) | Big data-based security and protection information management early warning platform capable of preventing data loss | |
CN105471857A (en) | Power grid terminal invalid external connection monitoring blocking method | |
CN104361702A (en) | Intelligent household burglary-prevention alarm method and intelligent alarm system thereof | |
CN101867497A (en) | Network physical segregation state monitoring and alarm protection system | |
CN205484461U (en) | Electric -larceny preventing electric meter box |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20191113 Address after: 519000 605, block a, entrepreneurship building, Tsinghua Science Park, No. 101, University Road, Tangjiawan Town, Zhuhai City, Guangdong Province Patentee after: Zhuhai Hongrui information technology Limited by Share Ltd Address before: 519080 Tsinghua Science Park A605, 101 Tang Cheng Road, Zhuhai, Guangdong Patentee before: Zhuhai Hongrui Software Technology Co., Ltd. |
|
TR01 | Transfer of patent right |