CN107040545A - Project file Life cycle method for security protection - Google Patents

Project file Life cycle method for security protection Download PDF

Info

Publication number
CN107040545A
CN107040545A CN201710382595.5A CN201710382595A CN107040545A CN 107040545 A CN107040545 A CN 107040545A CN 201710382595 A CN201710382595 A CN 201710382595A CN 107040545 A CN107040545 A CN 107040545A
Authority
CN
China
Prior art keywords
project file
link
isomery
security protection
life cycle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710382595.5A
Other languages
Chinese (zh)
Other versions
CN107040545B (en
Inventor
魏强
常天佑
刘雯雯
麻荣宽
耿洋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201710382595.5A priority Critical patent/CN107040545B/en
Publication of CN107040545A publication Critical patent/CN107040545A/en
Application granted granted Critical
Publication of CN107040545B publication Critical patent/CN107040545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Abstract

The present invention relates to a kind of Automated condtrol information Security Protection Technology field, more particularly to a kind of project file Life cycle method for security protection, the method for security protection is with isomery redundancy, redundance voting technology is core, respectively with the compiling link of project file Life cycle, transmission link, store link, run the idiographic flow of link, technology is combined, so that project file is compiling many variants of isomery of link generation in the absence of unanimously using attack path, can not be by man-in-the-middle attack in transmission link, it can not be tampered in storage link, the attack being subjected in operation link can not come into force, it is finally reached the purpose protected to project file in flow, increase the confidentiality of Logical Configuration project file, integrality, availability, the threat at the unknown back door of unknown leak can be successfully managed.

Description

Project file Life cycle method for security protection
Technical field
The present invention relates to a kind of Automated condtrol information Security Protection Technology field, more particularly to a kind of project file is complete Life cycle method for security protection.
Background technology
Industrial control system is widely applied to field of industrial automation control, such as the country such as electric power, oil, science and techniques of defence Infrastructure, and the people's livelihood field such as food, medicine, traffic.But industrial control system more consideration physics at the beginning of construction Safety, functional safety, system architecture design are only realization automation, information-based control function, and convenient production and management lack Information security considers and built.With industry and information-based depth integration, the proposition of industry 4.0, and later " internet + ", these while the industrial control network of closing is connected into internet, industrial control system information security issue also with Be exposed, for example, the leak back door problem brought using general software and hardware, the new challenge that new technology is brought, and face " national team " that Stuxnet, Flame virus etc. is reflected behind threatens.
In traditional industrial control system in order to when ensureing that a certain firmware failure occurs system can normally run and always Using isomorphism redundancy backup, but this mode can tackle mechanical disorder problem and can not solve that artificial attack brings altogether because of mistake The information security issue of effect.And it is concentrated mainly on following several aspects for known industrial control system information security solution: First, divide area of isolation according to different level of security demand and solve safety problem -- for example Border Protection, fire wall, white list Belong to this kind of scheme;2nd, management and control operating personnel, increase monitoring system;3rd, the detection technique of feature based code identification. In this three classes scheme, the safety problem that a certain invasion mode is brought in the whole industrial control system of solution that all can only be unilateral, and it is right In unknown leak, the unknown threat such as unknown back door just seems powerless many.
The content of the invention
For the deficiencies in the prior art, the present invention provides a kind of project file Life cycle safeguard protection side Method, the method for security protection decides by vote technology as core using isomery redundancy, redundance, respectively with the volume of project file Life cycle Translate link, transmission link, storage link, the idiographic flow for running link, technology to be combined, be finally reached to engineering text in flow The purpose of part protection, increases confidentiality, integrality, the availability of Logical Configuration project file, can be attacked known to effective prevent The threat at the unknown back door of unknown leak is tackled on the basis of hitting.
To achieve these goals, the present invention uses following technical scheme:
The present invention provides a kind of project file Life cycle method for security protection, and engineering text is generated to since project file Corresponding method for security protection has all been formulated in the last operation of part, covers compiling, transmission, storage and the operation of project file Whole life cycle;The threat of unknown leak and back door is tackled using isomery redundancy and redundance voting mechanism, including it is following Step:
Step 1, multiple height are generated respectively in the compilation process of Logical Configuration project file with multiple object run platforms to mix Confuse, the Logical Configuration project file of function equivalence;
Step 2, the multi-protocols synchronization reconstructed in project file transmission link using industry control agreement with normal protocol, base Communication channel is built in dynamic key, project file packet is carried out data transmission with many sliced fashions in random walk, Complete industrial control system End to End Encryption safe transmission;
Step 3, build block chain server using block chain technology in project file storage link prevents engineering in the mode of knowing together File is tampered;
Step 4, running link in configuration project file uses isomery redundancy, redundance voting mechanism to cause the execution of project file As a result determination is decided by vote jointly by multiple isomery variants.
Further, the process that implements of the step 1 is:Foundation ring is run based on isomery multimode slave computer software and hardware Border generates the intermediate code of cross-platform environment, according to global symbol, key data structure, program in compilation process be laid out it is various Property, the isomery variant with randomness, Biodiversity Characteristics is automatically generated, and increase function during isomery variant is generated Level, the dynamic restructuring technology of module level so that the available attack path of uniformity is not present between multiple isomery variants.
Further, the process that implements of the step 3 is:Project file storage principle based on block chain is to incite somebody to action Project file calculates the cryptographic Hash of the project file and the value is stored in into block chain server while being stored in slave computer, Storage to slave computer project file be performed before calculate the now cryptographic Hash of project file and with the cryptographic Hash of server end Contrasted to confirm whether project file is tampered, once find to be tampered the execution of suspension of engineering work file.
Further, it is hidden using isomery redundancy, redundance voting in configuration project file operation link in the step 4 Hide the implementing result of the industrial control unit (ICU) being broken, it is ensured that industrial control system is carried out with the implementing result of normal commercial controller Output so that the probability that many variants of isomery are broken exponentially rises with the quantity of variant.
Compared with prior art, the present invention has advantages below:
1st, method for security protection of the present invention decides by vote technology as core using isomery redundancy, redundance, respectively with the full life of project file Compiling link, transmission link, storage link, the idiographic flow for running link, the technology in cycle are combined so that project file exists The many variants of isomery of compiling link generation, using attack path, can not be attacked in the absence of uniformity in transmission link by go-between Hit, can not be tampered in storage link, the attack being subjected in operation link can not come into force, can effectively prevent known attack On the basis of tackle the threat at the unknown back door of unknown leak.
2nd, corresponding method for security protection has all been formulated in the whole life cycle of project file, has brought industrial control system certainly The General Promotion of body safety.
3rd, project file compiling and operation link efficiently solve artificial attack band using isomery redundancy, redundance voting technology The common cause failure problem come.
4th, the present invention is using multi-protocols synchronization, the rewriting of transmission communication agreement and encrypts dynamic tunneling technique, Increase the privacy in data transfer.
5th, block chain technology is applied in industrial control system so that project file can not be modified, replace in storage link Change.
Brief description of the drawings
Fig. 1 is the flow chart of project file Life cycle method for security protection of the present invention;
Fig. 2 is project file compiling and the polymorphic checking of operation link and protection philosophy figure;
Fig. 3 is function level dynamic restructuring technical schematic diagram;
Fig. 4 is module level dynamic restructuring technical schematic diagram;
Fig. 5 is multi-protocols synchronous operation and many burst opportunistic transmission schematic diagrams.
Embodiment
With reference to the accompanying drawings and examples, the embodiment to the present invention is described in further detail:
Embodiment one, as shown in figure 1, in project file Life cycle method for security protection of the present invention, being compiled comprising project file Link, project file transmission link, project file storage link and project file operation link four-stage are translated, in each link In based on isomery redundancy, redundance voting mechanism, increase corresponding security protection technology with reference to idiographic flow, form information security Protection scheme, specifically includes following steps:
Step 1, as shown in Fig. 2 running the centre that basic environment generates cross-platform environment based on isomery multimode slave computer software and hardware Code;In the compilation process of Logical Configuration project file with multiple object run platforms generate respectively multiple height obscure, work( Energy Logical Configuration project file of equal value;
Intermediate code generate, start with from the programming language of industrial control unit (ICU), to programming industrial controllers language carry out morphological analysis, Syntactic analysis, semantic analysis, basic environment is run based on isomery multimode slave computer software and hardware(Including CPU architecture, operating system Deng)Generate the intermediate code of cross-platform environment.
Static many variants are automatically generated, by using global symbol, pass in the compilation process of Logical Configuration project file The random technique of compiling of diversity of key data structure, program layout, generation has randomness, multifarious isomery variant, and Increase function level, the dynamic restructuring technology of module level during isomery variant is generated so that between multiple isomery variants not There is the available attack path of uniformity, the lawful acts of project file decide by vote determination jointly by multiple isomery variants, this Unknown safety problem under single space is just converted into minimum probability problem under hyperspace by sample.
As shown in figure 3, Key Functions are passed through each by many variant dynamic restructuring technologies of stratification of many variant superpositing function levels From mimicry compiler automatically generate it is multiple realize body, it is operationally random according to account of the history by smart random selector Several many variants are selected to complete function performance, and the return value of many variants to choosing carries out multimode judgement.
As shown in figure 4, many variant dynamic restructuring technologies of stratification of many variant laminating module levels, to key modules by intending The technologies such as state compiler automatically generate it is multiple realize body, performing stage control stream in system by automatic distributing device is distributed to each In heterogeneous module, and the output result of each heterogeneous module is collected, finally the output result to multiple heterogeneous modules carries out multimode Adjudicate the output result of determination system.
Step 2, the multi-protocols reconstructed in project file transmission link using industry control agreement and normal protocol run simultaneously machine System, based on dynamic encryption tunnel, project file packet is carried out data transmission with many sliced fashions in random walk, is completed Privacy in industrial control system End to End Encryption safe transmission, increase data transfer, effectively prevents Logical Configuration project file from existing The man-in-the-middle attack of transmission link;
Wherein dynamic encryption tunneling technique, dynamic encryption tunnel mechanics of communication is based on PKI asymmetric-key encryption mechanism, the technology Public and private key is encrypted by information, the public and private key of communication tunnel carries out encryption and decryption operation, can be applicable to industry control network Surveillance center and PLC Direct-connected dynamic tunnel is set up between node communication is encrypted.As shown in figure 5, to send data instance from Surveillance center to PLC, Surveillance center is by information PLC public key encryptions, then by being sent to other side after communication tunnel private key signature, and other side is using communication tunnel Again with PLC private keys decryption message after road public key verifications.Communication tunnel public private key pair for encryption and decryption is changed by system at regular intervals, The channel ID of i.e. replaceable channel Extended Protocols, can provide dynamic communication channel for api interface(channel)'s Call so that encrypted transmission tunnel is able to dynamic change.
Wherein many burst opportunistic transmission technologies, first Surveillance center are divided into some fragments, each burst letter after information is encrypted Breath is sent to terminal from Surveillance center by random walk.Intermediate node in random walk is by the burst information oneself being responsible for mesh Mark direction next node to send, this node data is deleted while being sent to next node, until all burst informations are sent To destination node, destination node merges decryption after all burst informations and obtains raw information.As shown in figure 5, with Surveillance center to PLC2 is sent exemplified by message A, is comprised the following steps that:
Step 201, message A is encrypted in Surveillance center;
Step 202, it is 3, respectively burst 1, burst 2 and burst 3 message A to be divided;
Step 203, burst 1 reaches PLC2 by PLC1, and burst 2 directly reaches PLC2, and burst 3 reaches PLC2 by PLC3;
Step 204, PLC2 collects the message A encrypted after 3 complete information to Message merging;
Step 205, finally decryption obtains message A.
Each Surveillance center sends other message, all repeats the above steps, and the number of burst may be set with system to be become Change, message transmitting path can also be changed at random, and dynamic message transmission means is built with this.
Step 3, build block chain server using block chain technology in project file storage link is prevented in the mode of knowing together Project file is tampered;
Logical Configuration project file block chain distribution technology, the decentralization characteristic based on block chain builds block chain server, Guarantee is stored in the security of block chain server data.Industry control network block chained file delivery system is used to store Logical Configuration Project file, the system includes 2 Rotating fields, and upper strata is user oriented industry control network block platform chain, and bottom is by block chain number Built according to storehouse;The operating procedure of platform is as follows:
Step 301, user applies for issue logic configuration project file to block platform chain keeper;
Step 302, the relevant information formation of the file after Logical Configuration project file can be compiled after keeper's examination & approval pass through is sent out Cloth summary info is stored onto block chain, and issue summary info can be inquired about according to issue odd numbers.Issue summary info bag Include storage publisher A(Surveillance center)With recipient B(PLC)Address, the cryptographic Hash of file publishing etc., and respectively being saved by block chain Point covers timestamp jointly;
Step 303, PLC is downloaded after Logical Configuration project file, according to issue odd numbers by the file cryptographic Hash and block after compiling Data on chain are compared, if inconsistent, and supporting paper is tampered and alarmed to Surveillance center.
Step 4, isomery redundancy, redundance voting mechanism is used to cause project file in configuration project file operation link Implementing result decides by vote determination jointly by multiple isomery variants, and isomery redundancy, redundance are used in configuration project file operation link The implementing result for the industrial control unit (ICU) that voting concealment is broken, it is ensured that industrial control system is with the execution knot of normal commercial controller Fruit is exported so that the probability that many variants of isomery are broken exponentially rises with the quantity of variant, i.e., for many variants of isomery The small probability time is presented in the attack of industrial control system.
Illustrated above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (4)

1. a kind of project file Life cycle method for security protection, it is characterised in that work is generated to since project file Corresponding method for security protection has all been formulated in the last operation of journey file, covers compiling, transmission, storage and the fortune of project file Capable whole life cycle;The threat of unknown leak and back door is tackled using isomery redundancy and redundance voting mechanism, including Following steps:
Step 1, multiple height are generated respectively in the compilation process of Logical Configuration project file with multiple object run platforms to mix Confuse, the Logical Configuration project file of function equivalence;
Step 2, the multi-protocols synchronization reconstructed in project file transmission link using industry control agreement with normal protocol, base Communication channel is built in dynamic key, project file packet is carried out data transmission with many sliced fashions in random walk, Complete industrial control system End to End Encryption safe transmission;
Step 3, build block chain server using block chain technology in project file storage link prevents engineering in the mode of knowing together File is tampered;
Step 4, running link in configuration project file uses isomery redundancy, redundance voting mechanism to cause the execution of project file As a result determination is decided by vote jointly by multiple isomery variants.
2. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 1 The process that implements be:In the middle generation that basic environment generates cross-platform environment, is run based on isomery multimode slave computer software and hardware Code, the diversity being laid out according to global symbol in compilation process, key data structure, program is automatically generated with randomness, many The isomery variant of sample feature, and increase the dynamic restructuring technology of function grade, module level during isomery variant is generated, So that the available attack path of uniformity is not present between multiple isomery variants.
3. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 3 The process that implements be:Project file storage principle based on block chain is while project file is stored in into slave computer Calculate the cryptographic Hash of the project file and the value is stored in block chain server, in the project file quilt of storage to slave computer The now cryptographic Hash of project file is calculated before performing and is contrasted whether to confirm project file with the cryptographic Hash of server end It is tampered, once find to be tampered the execution of suspension of engineering work file.
4. project file Life cycle method for security protection according to claim 1, it is characterised in that the step 4 In, run the execution for the industrial control unit (ICU) that link is broken using isomery redundancy, redundance voting concealment in configuration project file As a result, it is ensured that industrial control system is exported with the implementing result of normal commercial controller so that many variants of isomery are broken Probability exponentially rise with the quantity of variant.
CN201710382595.5A 2017-05-26 2017-05-26 Project file Life cycle method for security protection Active CN107040545B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710382595.5A CN107040545B (en) 2017-05-26 2017-05-26 Project file Life cycle method for security protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710382595.5A CN107040545B (en) 2017-05-26 2017-05-26 Project file Life cycle method for security protection

Publications (2)

Publication Number Publication Date
CN107040545A true CN107040545A (en) 2017-08-11
CN107040545B CN107040545B (en) 2019-05-31

Family

ID=59538901

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710382595.5A Active CN107040545B (en) 2017-05-26 2017-05-26 Project file Life cycle method for security protection

Country Status (1)

Country Link
CN (1) CN107040545B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109358508A (en) * 2018-11-05 2019-02-19 杭州安恒信息技术股份有限公司 One kind being based on self study industrial control host safety protecting method and system
IT201800003504A1 (en) * 2018-03-13 2019-09-13 Ali Group Srl Carpigiani MACHINE FOR THE PRODUCTION OF LIQUID OR SEMI-LIQUID FOOD PRODUCTS AND PRODUCTION SYSTEM INCLUDING THIS MACHINE
CN110611672A (en) * 2019-09-17 2019-12-24 中国人民解放军战略支援部队信息工程大学 Network space safety protection method, server equipment, node equipment and system
CN111149322A (en) * 2017-09-25 2020-05-12 三菱电机株式会社 Control device and control device system
CN112217778A (en) * 2020-06-09 2021-01-12 国家数字交换系统工程技术研究中心 Network security defense method and system, effect evaluation method and related device thereof
CN112291346A (en) * 2020-10-29 2021-01-29 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Pseudo application deployment management system, method and medium for heterogeneous node cluster
US11888976B2 (en) 2017-12-13 2024-01-30 Nchain Licensing Ag System and method for multi-party generation of blockchain-based smart contract

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2068215A2 (en) * 2007-09-14 2009-06-10 Fisher-Rosemount Systems, Inc. Apparatus and methods for protecting safety instrumented process control systems from intrusions
CN103645908A (en) * 2013-12-29 2014-03-19 中国科学院软件研究所 Full life circle development achievement system of intemetware
CN104778420A (en) * 2015-04-24 2015-07-15 广东电网有限责任公司信息中心 Method for establishing safety management view of full life cycle of unstructured data
CN105391551A (en) * 2015-11-25 2016-03-09 广西电网有限责任公司电力科学研究院 Method for encryption and decryption of intelligent electric meter embedded engineering file

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2068215A2 (en) * 2007-09-14 2009-06-10 Fisher-Rosemount Systems, Inc. Apparatus and methods for protecting safety instrumented process control systems from intrusions
CN103645908A (en) * 2013-12-29 2014-03-19 中国科学院软件研究所 Full life circle development achievement system of intemetware
CN104778420A (en) * 2015-04-24 2015-07-15 广东电网有限责任公司信息中心 Method for establishing safety management view of full life cycle of unstructured data
CN105391551A (en) * 2015-11-25 2016-03-09 广西电网有限责任公司电力科学研究院 Method for encryption and decryption of intelligent electric meter embedded engineering file

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111149322A (en) * 2017-09-25 2020-05-12 三菱电机株式会社 Control device and control device system
CN111149322B (en) * 2017-09-25 2021-06-11 三菱电机株式会社 Control device and control device system
US11888976B2 (en) 2017-12-13 2024-01-30 Nchain Licensing Ag System and method for multi-party generation of blockchain-based smart contract
IT201800003504A1 (en) * 2018-03-13 2019-09-13 Ali Group Srl Carpigiani MACHINE FOR THE PRODUCTION OF LIQUID OR SEMI-LIQUID FOOD PRODUCTS AND PRODUCTION SYSTEM INCLUDING THIS MACHINE
EP3540665A1 (en) * 2018-03-13 2019-09-18 Ali Group S.r.l. - Carpigiani Machine for making liquid or semi-liquid food products and production system comprising the machine
CN110269127A (en) * 2018-03-13 2019-09-24 艾力集团有限责任公司-卡皮贾尼 For making the machine of liquid or semi-liquid food products and including the production system of the machine
US10945447B2 (en) 2018-03-13 2021-03-16 Ali Group S.R.L.—Carpigiani Machine for making liquid or semi-liquid food products and production system comprising the machine
CN109358508A (en) * 2018-11-05 2019-02-19 杭州安恒信息技术股份有限公司 One kind being based on self study industrial control host safety protecting method and system
CN110611672A (en) * 2019-09-17 2019-12-24 中国人民解放军战略支援部队信息工程大学 Network space safety protection method, server equipment, node equipment and system
CN112217778A (en) * 2020-06-09 2021-01-12 国家数字交换系统工程技术研究中心 Network security defense method and system, effect evaluation method and related device thereof
CN112291346A (en) * 2020-10-29 2021-01-29 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Pseudo application deployment management system, method and medium for heterogeneous node cluster
CN112291346B (en) * 2020-10-29 2022-08-16 华东计算技术研究所(中国电子科技集团公司第三十二研究所) Pseudo application deployment management system, method and medium for heterogeneous node cluster

Also Published As

Publication number Publication date
CN107040545B (en) 2019-05-31

Similar Documents

Publication Publication Date Title
CN107040545B (en) Project file Life cycle method for security protection
CN109274524B (en) Equipment management and sharing system based on alliance block chain
CN109302491A (en) A kind of industry internet framework and its operation method based on block chain
CN113691597B (en) Block chain contract deployment method, device, equipment and storage medium
CN101479984B (en) Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
CN112926982A (en) Transaction data processing method, device, equipment and storage medium
CN109040235A (en) A kind of storage method of the industrial control system operation note based on block chain technology
CN112134956A (en) Distributed Internet of things instruction management method and system based on block chain
ES2812765T3 (en) Apparatus, system and method for processing application log data
CN114499895A (en) Data trusted processing method and system fusing trusted computing and block chain
CN103501293B (en) The authentication method that trusted end-user is accessed in a kind of intelligent grid
Guttman Shapes: Surveying crypto protocol runs
CN105610837A (en) Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system
CN105391540A (en) IOT safety system, interconnection equipment, and implementation method
CN113709095A (en) Resource request method, device and storage medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN115580491B (en) Industrial control programming platform based on state cryptographic algorithm, construction method and operation method
CN109067709A (en) A kind of Vulnerability Management method, apparatus, electronic equipment and storage medium
Delaune et al. A decision procedure for the verification of security protocols with explicit destructors
Hofer et al. Architecture and its vulnerabilities in smart-lighting systems
CN110113186A (en) A kind of mixing smart city network structure based on block chain
Zhu et al. A Novel Covert Timing Channel Based on Bitcoin Messages
Gu et al. IoT security and new trends of solutions
Sureshkumar et al. Design and implementation of a framework for blockchain based security using IoT
CN115391795A (en) Data processing method, related device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant