CN107040545A - Project file Life cycle method for security protection - Google Patents
Project file Life cycle method for security protection Download PDFInfo
- Publication number
- CN107040545A CN107040545A CN201710382595.5A CN201710382595A CN107040545A CN 107040545 A CN107040545 A CN 107040545A CN 201710382595 A CN201710382595 A CN 201710382595A CN 107040545 A CN107040545 A CN 107040545A
- Authority
- CN
- China
- Prior art keywords
- project file
- link
- isomery
- security protection
- life cycle
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Abstract
The present invention relates to a kind of Automated condtrol information Security Protection Technology field, more particularly to a kind of project file Life cycle method for security protection, the method for security protection is with isomery redundancy, redundance voting technology is core, respectively with the compiling link of project file Life cycle, transmission link, store link, run the idiographic flow of link, technology is combined, so that project file is compiling many variants of isomery of link generation in the absence of unanimously using attack path, can not be by man-in-the-middle attack in transmission link, it can not be tampered in storage link, the attack being subjected in operation link can not come into force, it is finally reached the purpose protected to project file in flow, increase the confidentiality of Logical Configuration project file, integrality, availability, the threat at the unknown back door of unknown leak can be successfully managed.
Description
Technical field
The present invention relates to a kind of Automated condtrol information Security Protection Technology field, more particularly to a kind of project file is complete
Life cycle method for security protection.
Background technology
Industrial control system is widely applied to field of industrial automation control, such as the country such as electric power, oil, science and techniques of defence
Infrastructure, and the people's livelihood field such as food, medicine, traffic.But industrial control system more consideration physics at the beginning of construction
Safety, functional safety, system architecture design are only realization automation, information-based control function, and convenient production and management lack
Information security considers and built.With industry and information-based depth integration, the proposition of industry 4.0, and later " internet
+ ", these while the industrial control network of closing is connected into internet, industrial control system information security issue also with
Be exposed, for example, the leak back door problem brought using general software and hardware, the new challenge that new technology is brought, and face
" national team " that Stuxnet, Flame virus etc. is reflected behind threatens.
In traditional industrial control system in order to when ensureing that a certain firmware failure occurs system can normally run and always
Using isomorphism redundancy backup, but this mode can tackle mechanical disorder problem and can not solve that artificial attack brings altogether because of mistake
The information security issue of effect.And it is concentrated mainly on following several aspects for known industrial control system information security solution:
First, divide area of isolation according to different level of security demand and solve safety problem -- for example Border Protection, fire wall, white list
Belong to this kind of scheme;2nd, management and control operating personnel, increase monitoring system;3rd, the detection technique of feature based code identification.
In this three classes scheme, the safety problem that a certain invasion mode is brought in the whole industrial control system of solution that all can only be unilateral, and it is right
In unknown leak, the unknown threat such as unknown back door just seems powerless many.
The content of the invention
For the deficiencies in the prior art, the present invention provides a kind of project file Life cycle safeguard protection side
Method, the method for security protection decides by vote technology as core using isomery redundancy, redundance, respectively with the volume of project file Life cycle
Translate link, transmission link, storage link, the idiographic flow for running link, technology to be combined, be finally reached to engineering text in flow
The purpose of part protection, increases confidentiality, integrality, the availability of Logical Configuration project file, can be attacked known to effective prevent
The threat at the unknown back door of unknown leak is tackled on the basis of hitting.
To achieve these goals, the present invention uses following technical scheme:
The present invention provides a kind of project file Life cycle method for security protection, and engineering text is generated to since project file
Corresponding method for security protection has all been formulated in the last operation of part, covers compiling, transmission, storage and the operation of project file
Whole life cycle;The threat of unknown leak and back door is tackled using isomery redundancy and redundance voting mechanism, including it is following
Step:
Step 1, multiple height are generated respectively in the compilation process of Logical Configuration project file with multiple object run platforms to mix
Confuse, the Logical Configuration project file of function equivalence;
Step 2, the multi-protocols synchronization reconstructed in project file transmission link using industry control agreement with normal protocol, base
Communication channel is built in dynamic key, project file packet is carried out data transmission with many sliced fashions in random walk,
Complete industrial control system End to End Encryption safe transmission;
Step 3, build block chain server using block chain technology in project file storage link prevents engineering in the mode of knowing together
File is tampered;
Step 4, running link in configuration project file uses isomery redundancy, redundance voting mechanism to cause the execution of project file
As a result determination is decided by vote jointly by multiple isomery variants.
Further, the process that implements of the step 1 is:Foundation ring is run based on isomery multimode slave computer software and hardware
Border generates the intermediate code of cross-platform environment, according to global symbol, key data structure, program in compilation process be laid out it is various
Property, the isomery variant with randomness, Biodiversity Characteristics is automatically generated, and increase function during isomery variant is generated
Level, the dynamic restructuring technology of module level so that the available attack path of uniformity is not present between multiple isomery variants.
Further, the process that implements of the step 3 is:Project file storage principle based on block chain is to incite somebody to action
Project file calculates the cryptographic Hash of the project file and the value is stored in into block chain server while being stored in slave computer,
Storage to slave computer project file be performed before calculate the now cryptographic Hash of project file and with the cryptographic Hash of server end
Contrasted to confirm whether project file is tampered, once find to be tampered the execution of suspension of engineering work file.
Further, it is hidden using isomery redundancy, redundance voting in configuration project file operation link in the step 4
Hide the implementing result of the industrial control unit (ICU) being broken, it is ensured that industrial control system is carried out with the implementing result of normal commercial controller
Output so that the probability that many variants of isomery are broken exponentially rises with the quantity of variant.
Compared with prior art, the present invention has advantages below:
1st, method for security protection of the present invention decides by vote technology as core using isomery redundancy, redundance, respectively with the full life of project file
Compiling link, transmission link, storage link, the idiographic flow for running link, the technology in cycle are combined so that project file exists
The many variants of isomery of compiling link generation, using attack path, can not be attacked in the absence of uniformity in transmission link by go-between
Hit, can not be tampered in storage link, the attack being subjected in operation link can not come into force, can effectively prevent known attack
On the basis of tackle the threat at the unknown back door of unknown leak.
2nd, corresponding method for security protection has all been formulated in the whole life cycle of project file, has brought industrial control system certainly
The General Promotion of body safety.
3rd, project file compiling and operation link efficiently solve artificial attack band using isomery redundancy, redundance voting technology
The common cause failure problem come.
4th, the present invention is using multi-protocols synchronization, the rewriting of transmission communication agreement and encrypts dynamic tunneling technique,
Increase the privacy in data transfer.
5th, block chain technology is applied in industrial control system so that project file can not be modified, replace in storage link
Change.
Brief description of the drawings
Fig. 1 is the flow chart of project file Life cycle method for security protection of the present invention;
Fig. 2 is project file compiling and the polymorphic checking of operation link and protection philosophy figure;
Fig. 3 is function level dynamic restructuring technical schematic diagram;
Fig. 4 is module level dynamic restructuring technical schematic diagram;
Fig. 5 is multi-protocols synchronous operation and many burst opportunistic transmission schematic diagrams.
Embodiment
With reference to the accompanying drawings and examples, the embodiment to the present invention is described in further detail:
Embodiment one, as shown in figure 1, in project file Life cycle method for security protection of the present invention, being compiled comprising project file
Link, project file transmission link, project file storage link and project file operation link four-stage are translated, in each link
In based on isomery redundancy, redundance voting mechanism, increase corresponding security protection technology with reference to idiographic flow, form information security
Protection scheme, specifically includes following steps:
Step 1, as shown in Fig. 2 running the centre that basic environment generates cross-platform environment based on isomery multimode slave computer software and hardware
Code;In the compilation process of Logical Configuration project file with multiple object run platforms generate respectively multiple height obscure, work(
Energy Logical Configuration project file of equal value;
Intermediate code generate, start with from the programming language of industrial control unit (ICU), to programming industrial controllers language carry out morphological analysis,
Syntactic analysis, semantic analysis, basic environment is run based on isomery multimode slave computer software and hardware(Including CPU architecture, operating system
Deng)Generate the intermediate code of cross-platform environment.
Static many variants are automatically generated, by using global symbol, pass in the compilation process of Logical Configuration project file
The random technique of compiling of diversity of key data structure, program layout, generation has randomness, multifarious isomery variant, and
Increase function level, the dynamic restructuring technology of module level during isomery variant is generated so that between multiple isomery variants not
There is the available attack path of uniformity, the lawful acts of project file decide by vote determination jointly by multiple isomery variants, this
Unknown safety problem under single space is just converted into minimum probability problem under hyperspace by sample.
As shown in figure 3, Key Functions are passed through each by many variant dynamic restructuring technologies of stratification of many variant superpositing function levels
From mimicry compiler automatically generate it is multiple realize body, it is operationally random according to account of the history by smart random selector
Several many variants are selected to complete function performance, and the return value of many variants to choosing carries out multimode judgement.
As shown in figure 4, many variant dynamic restructuring technologies of stratification of many variant laminating module levels, to key modules by intending
The technologies such as state compiler automatically generate it is multiple realize body, performing stage control stream in system by automatic distributing device is distributed to each
In heterogeneous module, and the output result of each heterogeneous module is collected, finally the output result to multiple heterogeneous modules carries out multimode
Adjudicate the output result of determination system.
Step 2, the multi-protocols reconstructed in project file transmission link using industry control agreement and normal protocol run simultaneously machine
System, based on dynamic encryption tunnel, project file packet is carried out data transmission with many sliced fashions in random walk, is completed
Privacy in industrial control system End to End Encryption safe transmission, increase data transfer, effectively prevents Logical Configuration project file from existing
The man-in-the-middle attack of transmission link;
Wherein dynamic encryption tunneling technique, dynamic encryption tunnel mechanics of communication is based on PKI asymmetric-key encryption mechanism, the technology
Public and private key is encrypted by information, the public and private key of communication tunnel carries out encryption and decryption operation, can be applicable to industry control network Surveillance center and PLC
Direct-connected dynamic tunnel is set up between node communication is encrypted.As shown in figure 5, to send data instance from Surveillance center to PLC,
Surveillance center is by information PLC public key encryptions, then by being sent to other side after communication tunnel private key signature, and other side is using communication tunnel
Again with PLC private keys decryption message after road public key verifications.Communication tunnel public private key pair for encryption and decryption is changed by system at regular intervals,
The channel ID of i.e. replaceable channel Extended Protocols, can provide dynamic communication channel for api interface(channel)'s
Call so that encrypted transmission tunnel is able to dynamic change.
Wherein many burst opportunistic transmission technologies, first Surveillance center are divided into some fragments, each burst letter after information is encrypted
Breath is sent to terminal from Surveillance center by random walk.Intermediate node in random walk is by the burst information oneself being responsible for mesh
Mark direction next node to send, this node data is deleted while being sent to next node, until all burst informations are sent
To destination node, destination node merges decryption after all burst informations and obtains raw information.As shown in figure 5, with Surveillance center to
PLC2 is sent exemplified by message A, is comprised the following steps that:
Step 201, message A is encrypted in Surveillance center;
Step 202, it is 3, respectively burst 1, burst 2 and burst 3 message A to be divided;
Step 203, burst 1 reaches PLC2 by PLC1, and burst 2 directly reaches PLC2, and burst 3 reaches PLC2 by PLC3;
Step 204, PLC2 collects the message A encrypted after 3 complete information to Message merging;
Step 205, finally decryption obtains message A.
Each Surveillance center sends other message, all repeats the above steps, and the number of burst may be set with system to be become
Change, message transmitting path can also be changed at random, and dynamic message transmission means is built with this.
Step 3, build block chain server using block chain technology in project file storage link is prevented in the mode of knowing together
Project file is tampered;
Logical Configuration project file block chain distribution technology, the decentralization characteristic based on block chain builds block chain server,
Guarantee is stored in the security of block chain server data.Industry control network block chained file delivery system is used to store Logical Configuration
Project file, the system includes 2 Rotating fields, and upper strata is user oriented industry control network block platform chain, and bottom is by block chain number
Built according to storehouse;The operating procedure of platform is as follows:
Step 301, user applies for issue logic configuration project file to block platform chain keeper;
Step 302, the relevant information formation of the file after Logical Configuration project file can be compiled after keeper's examination & approval pass through is sent out
Cloth summary info is stored onto block chain, and issue summary info can be inquired about according to issue odd numbers.Issue summary info bag
Include storage publisher A(Surveillance center)With recipient B(PLC)Address, the cryptographic Hash of file publishing etc., and respectively being saved by block chain
Point covers timestamp jointly;
Step 303, PLC is downloaded after Logical Configuration project file, according to issue odd numbers by the file cryptographic Hash and block after compiling
Data on chain are compared, if inconsistent, and supporting paper is tampered and alarmed to Surveillance center.
Step 4, isomery redundancy, redundance voting mechanism is used to cause project file in configuration project file operation link
Implementing result decides by vote determination jointly by multiple isomery variants, and isomery redundancy, redundance are used in configuration project file operation link
The implementing result for the industrial control unit (ICU) that voting concealment is broken, it is ensured that industrial control system is with the execution knot of normal commercial controller
Fruit is exported so that the probability that many variants of isomery are broken exponentially rises with the quantity of variant, i.e., for many variants of isomery
The small probability time is presented in the attack of industrial control system.
Illustrated above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (4)
1. a kind of project file Life cycle method for security protection, it is characterised in that work is generated to since project file
Corresponding method for security protection has all been formulated in the last operation of journey file, covers compiling, transmission, storage and the fortune of project file
Capable whole life cycle;The threat of unknown leak and back door is tackled using isomery redundancy and redundance voting mechanism, including
Following steps:
Step 1, multiple height are generated respectively in the compilation process of Logical Configuration project file with multiple object run platforms to mix
Confuse, the Logical Configuration project file of function equivalence;
Step 2, the multi-protocols synchronization reconstructed in project file transmission link using industry control agreement with normal protocol, base
Communication channel is built in dynamic key, project file packet is carried out data transmission with many sliced fashions in random walk,
Complete industrial control system End to End Encryption safe transmission;
Step 3, build block chain server using block chain technology in project file storage link prevents engineering in the mode of knowing together
File is tampered;
Step 4, running link in configuration project file uses isomery redundancy, redundance voting mechanism to cause the execution of project file
As a result determination is decided by vote jointly by multiple isomery variants.
2. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 1
The process that implements be:In the middle generation that basic environment generates cross-platform environment, is run based on isomery multimode slave computer software and hardware
Code, the diversity being laid out according to global symbol in compilation process, key data structure, program is automatically generated with randomness, many
The isomery variant of sample feature, and increase the dynamic restructuring technology of function grade, module level during isomery variant is generated,
So that the available attack path of uniformity is not present between multiple isomery variants.
3. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 3
The process that implements be:Project file storage principle based on block chain is while project file is stored in into slave computer
Calculate the cryptographic Hash of the project file and the value is stored in block chain server, in the project file quilt of storage to slave computer
The now cryptographic Hash of project file is calculated before performing and is contrasted whether to confirm project file with the cryptographic Hash of server end
It is tampered, once find to be tampered the execution of suspension of engineering work file.
4. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 4
In, run the execution for the industrial control unit (ICU) that link is broken using isomery redundancy, redundance voting concealment in configuration project file
As a result, it is ensured that industrial control system is exported with the implementing result of normal commercial controller so that many variants of isomery are broken
Probability exponentially rise with the quantity of variant.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710382595.5A CN107040545B (en) | 2017-05-26 | 2017-05-26 | Project file Life cycle method for security protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710382595.5A CN107040545B (en) | 2017-05-26 | 2017-05-26 | Project file Life cycle method for security protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107040545A true CN107040545A (en) | 2017-08-11 |
CN107040545B CN107040545B (en) | 2019-05-31 |
Family
ID=59538901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710382595.5A Active CN107040545B (en) | 2017-05-26 | 2017-05-26 | Project file Life cycle method for security protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107040545B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109358508A (en) * | 2018-11-05 | 2019-02-19 | 杭州安恒信息技术股份有限公司 | One kind being based on self study industrial control host safety protecting method and system |
IT201800003504A1 (en) * | 2018-03-13 | 2019-09-13 | Ali Group Srl Carpigiani | MACHINE FOR THE PRODUCTION OF LIQUID OR SEMI-LIQUID FOOD PRODUCTS AND PRODUCTION SYSTEM INCLUDING THIS MACHINE |
CN110611672A (en) * | 2019-09-17 | 2019-12-24 | 中国人民解放军战略支援部队信息工程大学 | Network space safety protection method, server equipment, node equipment and system |
CN111149322A (en) * | 2017-09-25 | 2020-05-12 | 三菱电机株式会社 | Control device and control device system |
CN112217778A (en) * | 2020-06-09 | 2021-01-12 | 国家数字交换系统工程技术研究中心 | Network security defense method and system, effect evaluation method and related device thereof |
CN112291346A (en) * | 2020-10-29 | 2021-01-29 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Pseudo application deployment management system, method and medium for heterogeneous node cluster |
US11888976B2 (en) | 2017-12-13 | 2024-01-30 | Nchain Licensing Ag | System and method for multi-party generation of blockchain-based smart contract |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2068215A2 (en) * | 2007-09-14 | 2009-06-10 | Fisher-Rosemount Systems, Inc. | Apparatus and methods for protecting safety instrumented process control systems from intrusions |
CN103645908A (en) * | 2013-12-29 | 2014-03-19 | 中国科学院软件研究所 | Full life circle development achievement system of intemetware |
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN105391551A (en) * | 2015-11-25 | 2016-03-09 | 广西电网有限责任公司电力科学研究院 | Method for encryption and decryption of intelligent electric meter embedded engineering file |
-
2017
- 2017-05-26 CN CN201710382595.5A patent/CN107040545B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2068215A2 (en) * | 2007-09-14 | 2009-06-10 | Fisher-Rosemount Systems, Inc. | Apparatus and methods for protecting safety instrumented process control systems from intrusions |
CN103645908A (en) * | 2013-12-29 | 2014-03-19 | 中国科学院软件研究所 | Full life circle development achievement system of intemetware |
CN104778420A (en) * | 2015-04-24 | 2015-07-15 | 广东电网有限责任公司信息中心 | Method for establishing safety management view of full life cycle of unstructured data |
CN105391551A (en) * | 2015-11-25 | 2016-03-09 | 广西电网有限责任公司电力科学研究院 | Method for encryption and decryption of intelligent electric meter embedded engineering file |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111149322A (en) * | 2017-09-25 | 2020-05-12 | 三菱电机株式会社 | Control device and control device system |
CN111149322B (en) * | 2017-09-25 | 2021-06-11 | 三菱电机株式会社 | Control device and control device system |
US11888976B2 (en) | 2017-12-13 | 2024-01-30 | Nchain Licensing Ag | System and method for multi-party generation of blockchain-based smart contract |
IT201800003504A1 (en) * | 2018-03-13 | 2019-09-13 | Ali Group Srl Carpigiani | MACHINE FOR THE PRODUCTION OF LIQUID OR SEMI-LIQUID FOOD PRODUCTS AND PRODUCTION SYSTEM INCLUDING THIS MACHINE |
EP3540665A1 (en) * | 2018-03-13 | 2019-09-18 | Ali Group S.r.l. - Carpigiani | Machine for making liquid or semi-liquid food products and production system comprising the machine |
CN110269127A (en) * | 2018-03-13 | 2019-09-24 | 艾力集团有限责任公司-卡皮贾尼 | For making the machine of liquid or semi-liquid food products and including the production system of the machine |
US10945447B2 (en) | 2018-03-13 | 2021-03-16 | Ali Group S.R.L.—Carpigiani | Machine for making liquid or semi-liquid food products and production system comprising the machine |
CN109358508A (en) * | 2018-11-05 | 2019-02-19 | 杭州安恒信息技术股份有限公司 | One kind being based on self study industrial control host safety protecting method and system |
CN110611672A (en) * | 2019-09-17 | 2019-12-24 | 中国人民解放军战略支援部队信息工程大学 | Network space safety protection method, server equipment, node equipment and system |
CN112217778A (en) * | 2020-06-09 | 2021-01-12 | 国家数字交换系统工程技术研究中心 | Network security defense method and system, effect evaluation method and related device thereof |
CN112291346A (en) * | 2020-10-29 | 2021-01-29 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Pseudo application deployment management system, method and medium for heterogeneous node cluster |
CN112291346B (en) * | 2020-10-29 | 2022-08-16 | 华东计算技术研究所(中国电子科技集团公司第三十二研究所) | Pseudo application deployment management system, method and medium for heterogeneous node cluster |
Also Published As
Publication number | Publication date |
---|---|
CN107040545B (en) | 2019-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107040545B (en) | Project file Life cycle method for security protection | |
CN109274524B (en) | Equipment management and sharing system based on alliance block chain | |
CN109302491A (en) | A kind of industry internet framework and its operation method based on block chain | |
CN113691597B (en) | Block chain contract deployment method, device, equipment and storage medium | |
CN101479984B (en) | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks | |
CN112926982A (en) | Transaction data processing method, device, equipment and storage medium | |
CN109040235A (en) | A kind of storage method of the industrial control system operation note based on block chain technology | |
CN112134956A (en) | Distributed Internet of things instruction management method and system based on block chain | |
ES2812765T3 (en) | Apparatus, system and method for processing application log data | |
CN114499895A (en) | Data trusted processing method and system fusing trusted computing and block chain | |
CN103501293B (en) | The authentication method that trusted end-user is accessed in a kind of intelligent grid | |
Guttman | Shapes: Surveying crypto protocol runs | |
CN105610837A (en) | Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system | |
CN105391540A (en) | IOT safety system, interconnection equipment, and implementation method | |
CN113709095A (en) | Resource request method, device and storage medium | |
CN110866265A (en) | Data storage method, device and storage medium based on block chain | |
CN115580491B (en) | Industrial control programming platform based on state cryptographic algorithm, construction method and operation method | |
CN109067709A (en) | A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium | |
Delaune et al. | A decision procedure for the verification of security protocols with explicit destructors | |
Hofer et al. | Architecture and its vulnerabilities in smart-lighting systems | |
CN110113186A (en) | A kind of mixing smart city network structure based on block chain | |
Zhu et al. | A Novel Covert Timing Channel Based on Bitcoin Messages | |
Gu et al. | IoT security and new trends of solutions | |
Sureshkumar et al. | Design and implementation of a framework for blockchain based security using IoT | |
CN115391795A (en) | Data processing method, related device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |