CN106292646B - A kind of power grid control end data port monitoring system and method - Google Patents

A kind of power grid control end data port monitoring system and method Download PDF

Info

Publication number
CN106292646B
CN106292646B CN201610895872.8A CN201610895872A CN106292646B CN 106292646 B CN106292646 B CN 106292646B CN 201610895872 A CN201610895872 A CN 201610895872A CN 106292646 B CN106292646 B CN 106292646B
Authority
CN
China
Prior art keywords
data port
lock
usb device
module
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610895872.8A
Other languages
Chinese (zh)
Other versions
CN106292646A (en
Inventor
吕继锋
王超
拓广忠
李晓东
骆长胜
祁崧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING BOWANG HUAKE TECHNOLOGY Co Ltd
State Grid Corp of China SGCC
Original Assignee
BEIJING BOWANG HUAKE TECHNOLOGY Co Ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING BOWANG HUAKE TECHNOLOGY Co Ltd, State Grid Corp of China SGCC filed Critical BEIJING BOWANG HUAKE TECHNOLOGY Co Ltd
Priority to CN201610895872.8A priority Critical patent/CN106292646B/en
Publication of CN106292646A publication Critical patent/CN106292646A/en
Application granted granted Critical
Publication of CN106292646B publication Critical patent/CN106292646B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0208Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the configuration of the monitoring system
    • G05B23/0213Modular or universal configuration of the monitoring system, e.g. monitoring system having modules that may be combined to build monitoring program; monitoring system that can be applied to legacy systems; adaptable monitoring system; using different communication protocols
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/24Pc safety
    • G05B2219/24065Real time diagnostics

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Alarm Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of power grid control end data port monitoring system comprising cabinet further includes processing chip, for carrying out data processing;Data host is connect with processing chip;Data port lock, is arranged in data port, sealed for the data port progress to cabinet, protects the safety of data port;Control module sealed is controlled for what is locked to data ports physical;Authorization module is authorized for the operation to data port;And monitoring module, it is monitored for the abnormal operation to data port, and alarm in data port abnormal operation.The present invention provides a kind of power grid control end data port monitoring systems; its combination based on hardware and software; the safety of grid side control computer data port can be protected; it alarms in time in data port abnormal operation; and pass through the self-destruction program of inner setting; when there is serious security problem, data are subjected to self-destruction, are further ensured that the safety of electric network data.

Description

A kind of power grid control end data port monitoring system and method
Technical field
The present invention relates to Data Security Control field, more particularly to a kind of power grid control end data port monitoring system and Method.
Background technique
The power transformation of the various voltages entirety that electric line forms in one's power, referred to as power network, abbreviation power grid in electric system. It includes power transformation, three transmission of electricity, distribution units.The task of power network is conveying and distribution electric energy, changes voltage.Power grid is controlling In, need to use power grid control end i.e. computer end etc., to prevent the loss of data of power grid from needing to the number such as USB interface of control terminal It is controlled according to port.And the control and monitoring to the USB interface of control terminal is not present in existing power grid control end, leads to data It is easily lost, causes the security threat to power grid.
Summary of the invention
Specifically, the present invention provides a kind of power grid control end data port monitoring system, can be to power grid control end Data port is controlled and is monitored, and the loss of data at power grid end is prevented, and in external equipment insertion, needing to authorize can be read Access evidence, and need to authorize and external equipment could be extracted.
Specifically, the present invention provides a kind of power grid control end data port monitoring system comprising cabinet further includes
Chip is handled, for carrying out data processing;
Data host is connect with the processing chip;
Data port lock, is arranged in data port, and sealed, protection data port is carried out for the data port to cabinet Safety;
Data port detection sensor is inserted into for detection data port with the presence or absence of external equipment;
Control module, for controlling the sealed of data ports physical;
Authorization module is authorized for the operation to data port;And
Monitoring module is monitored for the abnormal operation to data port, and in data port abnormal operation It alarms;
The method being monitored using the power grid control end data port monitoring system, comprising the following steps:
S1, data port detection sensor detect that USB device is inserted into, and turn-on data port lock locks USB device It closes;
S2, the control module obtain USB device information, if obtaining failure, illustrate that USB is set by driver Standby damage or the non-USB device of external equipment, notify user by the monitoring module, and open the data port lock;
If S3, USB device information obtain successfully, the control module prompt user inputs verifying password, the authorization Module verification subscriber identity information is verified then Authorized operation right, and otherwise the monitoring module is alarmed;
After S4, user complete USB operation, when USB device to be extracted, need to input password, institute again according to operation indicating It states after authorization module is verified, the control module controls the data port lock and opens, and user extracts USB device;
If S5, user forget extract USB device, the data port detection sensor detect USB device without and When extract, the control module will lock again USB device, and prevent other staff from extracting in certain time threshold.
It preferably, further include unlocking sensor, for judging the data port whether by abnormal operation, the unlocking Sensor is provided with multiple.
Preferably, the data port is arranged on the cabinet, the processing chip controls when being inserted into external equipment The data port locks automatically lock.
Preferably, the authorization module includes the information acquisition unit, authentication unit and authorization letter of mutual communication connection Number transmission unit, the output end of the authorization signal transmission unit connect the input terminal of the control module;
The information acquisition unit for acquiring unlocking verification information, the authentication unit for dual lock verification information into Row verifying, is then sent to authorization signal transmission unit for verification result if the verification passes, and the authorization signal transmission unit will The verification result is converted to digital signal and is sent to the control module, and the control module is locked to the data port to be sent out Unlocking instruction out.
Preferably, the monitoring module is connected with remote control terminal, in data port abnormal operation to described remote Process control terminal sends alarm signal.
Preferably, a kind of power grid control end data port monitoring system comprising cabinet, the monitoring system further include:
Chip is handled, the processing chip is used for data processing;
Data host is connected with the processing chip;
USBKey is connected by USB interface with the processing chip, and authentication is used for;
Data port lock, is arranged on the data host, is connected with the processing chip, for opening or locking The data port of the data host, in the case where passing through authentication by the USBKey, the data port lock is opened It opens;
Monitoring module is connected with the processing chip, for not passing through authentication institute by the USBKey It states in the case that data port lock is turned on and issues alarm;
The method being monitored using the power grid control end data port monitoring system, comprising the following steps:
S1, data port detection sensor detect that USB device is inserted into, and open the data port lock, USB device is locked Firmly, forbid extracting, Public Key and private cipher key built in internal USB Key in USB device, USBKey, private cipher key does not allow outer Portion's access;
S2, authorization module will be by rivest, shamir, adelman RSA, and will be sent to using Public Key the message of USBKey It is encrypted;
S3, the USBKey are decrypted using private cipher key text of reading the newspaper, and are generated and are replied message, by Public Key plus It is close, send back authorization module, authorization module is decrypted using private cipher key pair message, and to the identity information of USB device into Row verifying, is verified, then authorized user continues operation, and authentication failed is alarmed by monitoring module, and opens data terminal Mouth lock;
After S4, user complete USB operation, USB device to be extracted, after authorization module verifying USBKey passes through, control module It controls data port lock to open, user extracts USB device, and detection sensor detects that USB device is not extracted in time, the control Molding block will lock again USB device, and prevent other staff from extracting in certain time threshold.
Preferably, data port lock includes physics lock body and lock uint, and the first of the physics lock body End is adapted for insertion into the data port, and the second end of the physics lock body is provided with the slot for being adapted for insertion into external equipment, institute It is sealed for carrying out to the physics lock body with the data port to state lock uint.
Preferably, when extracting external equipment from data port, the processing chip verifies the USBKey, It is verified the rear data port lock to open, otherwise, monitoring module described in the processing chip controls issues alarm.
It preferably, further include remote control terminal, the monitoring module of the cabinet connects the remote control terminal, is used for Warning message is sent to the remote control terminal,
The remote control terminal directly can send unlocking instruction to the processing chip, and the processing chip is according to institute The unlocking instruction control data port lock is stated to unlock
Advantages of the present invention is as described below: the present invention provides a kind of power grid control end data port monitoring system, bases In the combination of hardware and software, the safety of grid side control computer data port can be protected, in data port abnormal operation When alarm in time, and data are carried out when there is serious security problem by self-destruction by the self-destruction program of inner setting, It is further ensured that the safety of electric network data.Meanwhile, it is capable to send alarm signal to remote control terminal in time, illegal operation is recorded Time of origin and place, are remedied convenient for staff.
Detailed description of the invention
Fig. 1 is one of structural schematic block diagram of the invention;
Fig. 2 is the two of structural schematic block diagram of the invention;
Fig. 3 is the structural schematic diagram of authorization module of the invention;And
Fig. 4 is the structural schematic diagram that data port of the invention is locked.
Specific embodiment
With reference to the accompanying drawing and specific embodiment is further explained structure of the invention:
Specifically, the present invention provides a kind of power grid control end data port monitoring system comprising cabinet, as shown in Figure 1, It further includes
Chip 1 is handled, for carrying out data processing;Data host 2 is connect with the processing chip 1;Data port lock 10, it is arranged in the data port of the cabinet, it is sealed for the data port progress to cabinet, protect the peace of data port Entirely;Control module 4, for controlling the sealed and unlocking that data port is locked;Authorization module 5, for data port Operation is authorized;Monitoring module 6 is monitored for the operation to data port, and in data port by abnormal operation Shi Jinhang alarm, above-mentioned abnormal operation refer to any unwarranted operation, such as without permission by external equipments such as USB flash disks It is inserted into data port by force or is extracted from data port, or opens data port lock and other destruction numbers by force without permission The operation locked according to port and/or data port.
Preferably, further include unlocking sensor 7, for judge the data port whether by abnormal operation, it is described to open Lock sensor 7 can be set multiple.
Preferably, the data port is arranged on the cabinet, and when being inserted into external equipment, the processing chip 1 is controlled It is the external equipment for locking insertion that data port, which locks automatic locking,.
In use, after external equipment is inserted into data port, processing chip 1 controls the automatic lock of data port lock Tightly, at this point, if without associated authorization, data port lock can not be opened, therefore can not also pull out in sealed i.e. locking states External equipment out, at this point, if necessary to open data port lock, then need by authorization module 5 to the operation of data port into Row authorization, after the completion of authorization, authorization module 5 sends authorization signal to control module 4, after control module 4 receives authorization signal, control Data port lock processed is opened, to extract external equipment.
If without permission, opening data port using external force by force to lock, then sensor 7 of unlocking is sent to monitoring module 6 Data port locks the information illegally opened, and monitoring module 6 is alarmed to monitoring personnel.
Preferably, as shown in figure 3, authorization module 5 includes information acquisition unit 51, the authentication unit 52 of mutual communication connection And authorization signal transmission unit 53, the input terminal of the output end link control module 4 of authorization signal transmission unit 53.Information is adopted Collect unit 51 and acquire pertinent authorization information, pertinent authorization information can be by inputting password, input fingerprint, scanning the two-dimensional code, short Letter verifying or the long-range modes such as verification information that send are obtained.After collecting corresponding authorization message, information acquisition unit 51 Collected pertinent authorization information is sent to authentication unit 52, authentication unit 52 is believed according to the correct authorization stored before Breath, verifies collected corresponding authorization message, and after being verified, authorization signal transmission unit 53 is to control module 4 Send the information being verified.Control module is locked to the data port issues unlocking instruction.
Preferably, monitoring module 6 is connected with remote control terminal 8, in data port abnormal operation to long-range control Terminal 8 sends alarm signal.After 8 receive the alarm signal of remote control terminal, it can take measures on customs clearance and controlling terminal is carried out Control, such as the data of storage can be carried out with self-destruction or staff's progress quickly processing etc. of notice locality.
The present invention also provides a kind of power grid control end communication port monitoring methods comprising following steps:
S1, data port detection sensor detect that USB device is inserted into, and turn-on data port lock locks USB device It closes;Data port detection sensor can be photoelectric sensor.
S2, the control module obtain USB device information, if obtaining failure, illustrate that USB is set by driver Standby damage or the non-USB device of external equipment, notify user by the monitoring module, and open the data port lock;
If S3, USB device information obtain successfully, the control module prompt user inputs verifying password, the authorization Module verification subscriber identity information is verified then Authorized operation right, and otherwise the monitoring module is alarmed;Password can be with Pass through keyboard input or fingerprint input etc..
After S4, user complete USB operation, when USB device to be extracted, need to input password, institute again according to operation indicating It states after authorization module is verified, the control module controls the data port lock and opens, and user extracts USB device;
If S5, user forget extract USB device, the data port detection sensor detect USB device without and When extract, the control module will lock again USB device, and prevent other staff from extracting in certain time threshold.
Or it can also be verified by USBKey, it is preferable to, the present invention provides a kind of power grid control end data end Mouth monitoring system comprising cabinet, as shown in Fig. 2, the monitoring system further include:
Chip 1 is handled, the processing chip 1 is used for data processing;Data host 2 is connected with the processing chip 1; USBKey9 is connected with processing chip 1 by USB interface, is used for authentication;Data port lock 10, is arranged in the data On host, it is connected with the processing chip 1, for opening or locking the data port of the data host, by institute USBKey is stated by the way that in the case where authentication, the data port lock 10 is opened;Monitoring module 6, with the processing chip phase Connection is reported for issuing in the case where not being turned on by the authentication data port lock by the USBKey It is alert.
Working principle is as described below: data port detection sensor detects that USB device is inserted into, and opens the data port Lock, USB device is lockked, forbids extracting;Public Key and private cipher key built in internal USB Key in USB device, USBKey, it is private There is key not allow outside access;Authorization module will will be sent to by rivest, shamir, adelman RSA, and using Public Key The message of USBKey is encrypted;The USBKey is decrypted using private cipher key text of reading the newspaper, and is generated and is replied message, passes through public affairs There is key encryption, send back authorization module, authorization module is decrypted using private cipher key pair message, and to the body of USB device Part information is verified;It is verified, then authorized user continues operation, and authentication failed is alarmed by monitoring module, and is beaten Open data port lock;After user completes USB operation, USB device to be extracted controls mould after authorization module verifying USBKey passes through Block controls data port lock and opens, and user extracts USB device.Detection sensor detects that USB device is not extracted in time, described Control module will lock again USB device, and prevent other staff from extracting in certain time threshold.
Preferably, as shown in figure 4, data port lock 10 includes physics lock body and lock uint, the physical locks sheet The first end of body is adapted for insertion into the data port, and the lock uint is used for the physics lock body and the data port It carries out sealed.
Preferably, the lock uint includes the pushing block and hook being arranged on the physics lock body, and the pushing block is used In the sealed of the control physics lock body.
Preferably, when extracting external equipment from data port, processing chip 1 verifies the USBKey, tests Card is opened by the rear data port lock, and otherwise, monitoring module described in the processing chip controls issues alarm.
It preferably, further include remote control terminal 8, it is whole that the monitoring module 6 of the multiple cabinet connects the long-range control End 8, for sending warning message to the remote control terminal 8.
Preferably, the remote control terminal directly can send unlocking instruction, the control mould to the control module Root tuber controls the data port lock according to the unlocking instruction and unlocks.
In use, it if without associated authorization, data port lock is in locking states, can not open, at this point, If necessary to open data port lock, then need to authorize the operation of data port by authorization module 5, control module 4 It controls data port lock to open, data port lock is pulled up, external equipment can be just inserted into inside the data port of cabinet.Such as Fruit without permission, opens data port using external force by force and locks, by the way that the unlocking sensor 7 of data port lock is arranged in monitoring Module 6 sends warning message, and monitoring module 6 is alarmed to monitoring personnel.
The authorization can be verified by identity of the USBKey9 to user, and by mutually having the right, personnel provide USBKey's Mode is completed to verify.Or it can also be by directly locking input password, the pushing block that control data port is locked in data port And hook, achieve the purpose that open data port lock.
When being verified by USBKey, for the data port of not set data port lock, processing chip 1 only can USBKey is read, and remaining external equipment cannot be read.Alternatively, it is also possible to be carried out by physics password to data port lock 10 Control sealed is controlled by relay to what data port was locked.
Data port lock 10 includes physics lock body and lock uint, and the first end of the physics lock body is adapted for insertion into The data port, the lock uint are used to carry out the physics lock body with the data port sealed.
When sealed, it is pushed into sliding block 101, sliding block enters in the gap of data port and cabinet, and slider end at this time Hook 102 be locked together in physical locks body interior, input correct password, pushing block can be taken out, open data by removal hook Port lock.
Or expanding material can also be set by pushing block, can not be taken out from outside, only can utilize relay, by after The control of electric appliance releases pushing block from cabinet inside.Or it also can use USB port and extend equipment to reach data port lock Sealed purpose.
Or physical locks can also be directly locked together in data by way of in the first end of physics lock body setting lock On port, if necessary to open, then physical locks are opened using key.
In another embodiment, multiple dispersible structures can be set in the end of physics lock body, it is more after such insertion A dispersible structure dispersity distribution, achieve the purpose that sealed.
Advantages of the present invention is as described below: the present invention provides a kind of power grid control end data port monitoring system, bases In the combination of hardware and software, the safety of grid side control computer data port can be protected, in data port abnormal operation When alarm in time, and data are carried out when there is serious security problem by self-destruction by the self-destruction program of inner setting, It is further ensured that the safety of electric network data.Meanwhile, it is capable to send alarm signal to remote control terminal in time, illegal operation is recorded Time of origin and place, are remedied convenient for staff.
Finally, it should be noted that above-described embodiments are merely to illustrate the technical scheme, rather than to it Limitation;Although the present invention is described in detail referring to the foregoing embodiments, those skilled in the art should understand that: It can still modify to technical solution documented by previous embodiment, or to part of or all technical features into Row equivalent replacement;And these modifications or substitutions, it does not separate the essence of the corresponding technical solution various embodiments of the present invention technical side The range of case.

Claims (9)

1. a kind of power grid control end data port monitoring system comprising cabinet, it is characterised in that: it further includes
Chip is handled, for carrying out data processing;
Data host is connect with the processing chip;
Data port lock, is arranged in data port, sealed for the data port progress to cabinet, protects the peace of data port Entirely;
Data port detection sensor is inserted into for detection data port with the presence or absence of external equipment;
Control module, for controlling the sealed of data ports physical;
Authorization module is authorized for the operation to data port;And
Monitoring module is monitored for the abnormal operation to data port, and is carried out in data port abnormal operation Alarm;
The method being monitored using the power grid control end data port monitoring system, comprising the following steps:
S1, data port detection sensor detect that USB device is inserted into, and turn-on data port lock carries out USB device sealed;
S2, the control module obtain USB device information by driver, if obtaining failure, illustrate that USB device damages The bad or non-USB device of external equipment, notifies user by the monitoring module, and opens the data port lock;
If S3, USB device information obtain successfully, the control module prompt user inputs verifying password, the authorization module Subscriber identity information is verified, is verified then Authorized operation right, otherwise the monitoring module is alarmed;
After S4, user complete USB operation, when USB device to be extracted, need to input password again according to operation indicating, it is described to award After power module verification passes through, the control module controls the data port lock and opens, and user extracts USB device;
If S5, user forget to extract USB device, the data port detection sensor detects that USB device does not pull out in time Out, the control module will lock again USB device, and prevent other staff from extracting in certain time threshold.
2. power grid control end data port monitoring system according to claim 1, it is characterised in that: further include sensing of unlocking Device, for whether judging the data port by abnormal operation, the unlocking sensor is provided with multiple.
3. power grid control end data port monitoring system according to claim 2, it is characterised in that: the data port is set It sets on the cabinet, when being inserted into external equipment, data port described in the processing chip controls locks automatically lock.
4. power grid control end data port monitoring system according to claim 3, it is characterised in that: the authorization module packet The information acquisition unit, authentication unit and authorization signal transmission unit of mutual communication connection are included, the authorization signal sends single The output end of member connects the input terminal of the control module;
The information acquisition unit is tested for acquiring unlocking verification information, the authentication unit for dual lock verification information Card, is then sent to authorization signal transmission unit for verification result if the verification passes, and the authorization signal transmission unit will be described Verification result is converted to digital signal and is sent to the control module, and the control module is issued to data port lock and opened Lock instruction.
5. power grid control end data port monitoring system according to claim 4, it is characterised in that: the monitoring module connects It is connected to remote control terminal, sends alarm signal to the remote control terminal in data port abnormal operation.
6. a kind of power grid control end data port monitoring system comprising cabinet, it is characterised in that: the monitoring system further include:
Chip is handled, the processing chip is used for data processing;
Data host is connected with the processing chip;
USBKey is connected by USB interface with the processing chip, and authentication is used for;
Data port lock, is arranged on the data host, is connected with the processing chip, described for opening or locking The data port of data host, in the case where passing through authentication by the USBKey, the data port lock is opened;
Monitoring module is connected with the processing chip, for not passing through the authentication number by the USBKey Alarm is issued in the case where being turned on according to port lock;
The method being monitored using the power grid control end data port monitoring system, comprising the following steps:
S1, data port detection sensor detect that USB device is inserted into, and open the data port lock, USB device is lockked, Forbid extracting, Public Key and private cipher key, private cipher key do not allow outside built in internal USB Key in USB device, USBKey Access;
S2, authorization module will be carried out the message for being sent to USBKey by rivest, shamir, adelman RSA, and using Public Key Encryption;
S3, the USBKey are decrypted using private cipher key text of reading the newspaper, and are generated and are replied message, are encrypted by Public Key, are sent out Send authorization module back to, authorization module is decrypted using private cipher key pair message, and is tested the identity information of USB device Card, is verified, then authorized user continues operation, and authentication failed is alarmed by monitoring module, and opens data port Lock;
After S4, user complete USB operation, USB device to be extracted, after authorization module verifying USBKey passes through, control module control Data port lock is opened, and user extracts USB device, and detection sensor detects that USB device is not extracted in time, the control mould Block will lock again USB device, and prevent other staff from extracting in certain time threshold.
7. power grid control end data port monitoring system according to claim 6, it is characterised in that: the data port lock Including physics lock body and lock uint, the first end of the physics lock body is adapted for insertion into the data port, the object The second end of reason lock body is provided with the slot for being adapted for insertion into external equipment, and the lock uint is used for the physics lock body It is carried out with the data port sealed.
8. power grid control end data port monitoring system according to claim 6, it is characterised in that: when from data port When extracting external equipment, the processing chip verifies the USBKey, is verified the rear data port lock and opens, Otherwise, monitoring module described in the processing chip controls issues alarm.
9. power grid control end data port monitoring system according to claim 6, it is characterised in that: further include remotely controlling The monitoring module of terminal, the cabinet connects the remote control terminal, for sending alarm signal to the remote control terminal Breath,
The remote control terminal directly can send unlocking instruction to the processing chip, and the processing chip is opened according to Lock instruction controls the data port lock and unlocks.
CN201610895872.8A 2016-10-14 2016-10-14 A kind of power grid control end data port monitoring system and method Active CN106292646B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610895872.8A CN106292646B (en) 2016-10-14 2016-10-14 A kind of power grid control end data port monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610895872.8A CN106292646B (en) 2016-10-14 2016-10-14 A kind of power grid control end data port monitoring system and method

Publications (2)

Publication Number Publication Date
CN106292646A CN106292646A (en) 2017-01-04
CN106292646B true CN106292646B (en) 2019-01-22

Family

ID=57718134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610895872.8A Active CN106292646B (en) 2016-10-14 2016-10-14 A kind of power grid control end data port monitoring system and method

Country Status (1)

Country Link
CN (1) CN106292646B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617918B (en) * 2019-01-21 2021-11-05 锚丁科技(武汉)有限责任公司 Safe operation and maintenance gateway and operation and maintenance method thereof
CN110012099A (en) * 2019-04-09 2019-07-12 中国南方电网有限责任公司 Information monitoring system and method
CN111552624A (en) * 2020-04-30 2020-08-18 城云科技(中国)有限公司 Use monitoring method for cross-border trade big data platform
CN112131546B (en) * 2020-09-10 2022-09-27 重庆电子工程职业学院 Information security management and control device
CN112422562A (en) * 2020-11-18 2021-02-26 贵州电网有限责任公司 Physical anti-invasion intelligent control system for computer host USB and network port
CN118041687B (en) * 2024-04-08 2024-06-25 国网浙江省电力有限公司杭州供电公司 Perception safety protection system and method based on network port plugging equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7677065B1 (en) * 2008-11-18 2010-03-16 Jin Tay Industries Co., Ltd. Lock for a USB connector
US8254117B2 (en) * 2010-04-07 2012-08-28 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Computer with security device for peripheral components
CN104485126A (en) * 2014-11-17 2015-04-01 四川智诚天逸科技有限公司 Remotely-monitorable mobile hard disk
CN104881620A (en) * 2014-02-27 2015-09-02 魏东 USB interface lock
CN205451071U (en) * 2015-12-29 2016-08-10 大唐高鸭信安(浙江)信息科技有限公司 Machine case data destructors that uncaps

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7677065B1 (en) * 2008-11-18 2010-03-16 Jin Tay Industries Co., Ltd. Lock for a USB connector
US8254117B2 (en) * 2010-04-07 2012-08-28 Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. Computer with security device for peripheral components
CN104881620A (en) * 2014-02-27 2015-09-02 魏东 USB interface lock
CN104485126A (en) * 2014-11-17 2015-04-01 四川智诚天逸科技有限公司 Remotely-monitorable mobile hard disk
CN205451071U (en) * 2015-12-29 2016-08-10 大唐高鸭信安(浙江)信息科技有限公司 Machine case data destructors that uncaps

Also Published As

Publication number Publication date
CN106292646A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106292646B (en) A kind of power grid control end data port monitoring system and method
CN107038777A (en) A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
US8347092B2 (en) Subsystem authenticity and integrity verification (SAIV)
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN103299310B (en) Security module is protected to exempt from the apparatus and method distorting trial in equipment at the scene
CN105405185B (en) Safe verification method and device
CN106131072A (en) A kind of computer information safe system
CN103580872A (en) System and method for generating and managing secret key
CN108881298A (en) A kind of network safety system and implementation method based on big data platform
CN105447937A (en) Control system and control method for staff entrance of nuclear power station
CN102255727A (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
CN103684774A (en) Power equipment safety protection method and device thereof
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN112637172A (en) Novel data security and confidentiality method
CN109961542A (en) A kind of entrance guard device, verifying device, verifying system and its verification method
US9177161B2 (en) Systems and methods for secure access modules
US9852558B2 (en) Security apparatus for energy storage system
KR101635278B1 (en) Multi-factor authentication with dynamic handshake quick-response code
CN110223420A (en) A kind of fingerprint unlocking system
CN109450919A (en) A kind of data safety reinforcing platform
CN107249006A (en) The authentication method and device of password use environment
CN112507313A (en) Fingerprint verification method, chip and intelligent door lock
CN107229869A (en) Secure user data is locked
CN110704839A (en) Data encryption protection method based on national cryptographic algorithm
CN106953753B (en) Special equipment credible supervision method based on embedded hardware module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant