CN108701032A - A kind of PLC is credible method of automatic configuration, device and computer readable storage medium - Google Patents
A kind of PLC is credible method of automatic configuration, device and computer readable storage medium Download PDFInfo
- Publication number
- CN108701032A CN108701032A CN201780009050.8A CN201780009050A CN108701032A CN 108701032 A CN108701032 A CN 108701032A CN 201780009050 A CN201780009050 A CN 201780009050A CN 108701032 A CN108701032 A CN 108701032A
- Authority
- CN
- China
- Prior art keywords
- credible
- plc
- identity information
- signal source
- input signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4411—Configuring for operating with peripheral devices; Loading of device drivers
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Programmable Controllers (AREA)
Abstract
A kind of PLC is credible method of automatic configuration, device and computer readable storage medium, is related to reliable computing technology field, it is intended to when solving existing PLC system and carrying out trusted configuration, setting steps are cumbersome, power consumption is big, efficiency is low technical problem.This approach includes the following steps:According to the device port of input signal source, the equipment identity information (S101) of the input signal source is scanned;After obtaining the equipment identity information, the credible setting interface (S102) of open system is triggered;The authentication parameters (S103) of the corresponding equipment identity information of configuration on the credible setting interface of the system;The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force (S104).
Description
Technical field
The present invention relates to a kind of reliable computing technology field more particularly to credible method of automatic configuration of PLC, device and calculating
Machine readable storage medium storing program for executing.
Background technology
Now, with the continuous development of Internet Industry, the depth defense theory extensive use of multiple technologies
In industry control Prevention-Security work, he be one kind from internet to enterprise network, from industry control network to host, from host to PLC, from
Multi-level defence security systems of the PLC to sensor.Threaten the Active defense System of information that will gradually be built according to industrial control system
Vertical and development, is based on autonomic hardware module construction industry control operating system host strengthening mechanisms, is safeguarded based on white list strategy credible
Controllable system running environment.In general, industry control security protection has been transitioned into multiple technologies layering simultaneously from single isolation stage
It is the depth defense stage, following to develop to based on threat information, based on credible immune Active defense System --- credible meter
Calculation technology.Reliable computing technology is using TPM/TCM safety chips as key foundation, from software and hardware architecture configuration aspects to computer
System, network environment carry out safe enhancing.Include mainly:Chain-of-trust ability is established, trusted service and trusted application are provided;Mark
Platform identity, identification personation platform;Protection key is provided, the key of data is protected to be sealed in crypto module, ensures safety.
Currently, reliable computing technology is in addition to being applied to reliable PC platform, also to trusted mobile platform, credible embedded PLC
The directions such as system are developed.It is guidance that trust computing, which is with the safety thought of " general safety " " active immunity ", with password basis, is adopted
The platform safety system built with Hardware/Software Collaborative Design.Trust computing is not limited to safety chip module, from PC, be moved to it is embedding
Enter formula PLC, trust computing synthesis meets mobile, light weight using the more extensive credible thinking such as TEE, embedded-type security system
The new features such as change, personalization.
But although the trusted technology of PLC is very ripe, in setting verification input signal source, output signal
Credible aspect requires technical capability threshold high, and setting steps are not cumbersome easy to operate, and upstream and downstream equipment changing takes time and effort;It can not
Quick promoted inside industrial system of the low O&M technical capability of low cost is come.
Invention content
It is a primary object of the present invention to propose a kind of credible method of automatic configuration of PLC, device and computer-readable storage
Medium, it is intended to which when solving existing PLC system progress trusted configuration, the technology that setting steps are cumbersome, power consumption is big, efficiency is low is asked
Topic.
In order to solve the above technical problem, the present invention provides a kind of credible method of automatic configuration of PLC, this method include with
Lower step:
According to the device port of input signal source, the equipment identity information of the input signal source is scanned;
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Further, the equipment identity information includes at least:Device mac address, hardware characteristics code, IP address of equipment with
And PORT COM.
Further, the credible ginseng of the corresponding equipment identity information of configuration on the credible setting interface of the system
Several steps specifically include:According to the type of service and safe class of the equipment identity information identification equipment, according to the industry
The authentication parameters are arranged in service type and the safe class.
Further, the step of equipment identity information of the scanning input signal source further includes specifically:By pre-
If sweep parameter scans the input signal source, when failing to obtain the equipment identity information, the modification default scanning ginseng
Number, and rescan the input signal source.
Further, the storage equipment identity information and the corresponding authentication parameters, and open and come into force
After step, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Further, described that according to the authentication parameters and safe class of setting, corresponding trust authentication mode is set
The step of after, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement
Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Further, it is described receive the input signal source again after judge whether the input information source is trusted sources
Step specifically includes:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Based on same inventive concept, another aspect of the present invention additionally provides that a kind of PLC is credible to automatically configure device, institute
Stating device includes:Memory, processor and it is stored in the trusted configuration that can be run on the memory and on the processor
Integrative Program, the trusted configuration Integrative Program realize the credible sides of automatically configuring above-mentioned PLC when being executed by the processor
The step of method.
Based on same inventive concept, another aspect of the present invention additionally provides a kind of computer readable storage medium, described
Trusted configuration Integrative Program is stored on computer readable storage medium, the trusted configuration Integrative Program is by the processing
Device realizes above-mentioned PLC credible the step of automatically configuring when executing.
The advantageous effect of technical solution of the present invention:
The credible method of automatic configuration of PLC, device and the computer readable storage medium of the present invention, can be automatic by scanning
It was found that the equipment identity information of defeated entry/exit equipment, including:MAC Address, hardware characteristics code, IP address, PORT COM etc.;Operation
Simply, directly pass through unified trusted configuration interface, click function button, you can realize scanning device identity information, lead
Enter function, configuration trust authentication mode;The compatible PLC embedded systems based on ICP/IP protocol exploitation that current mainstream is set;
Whole process configures graphical, visual fashion interface, reduces the requirement of O&M technology, improves the speed of configuration, facilitates choosing
Select a variety of authentication informations;Can program be further embedded into portable industrial control equipment, form the pattern of all-in-one machine, it will is big
The big trusted configuration flow for simplifying industrial control system and time, market environment are wide.
Description of the drawings
Fig. 1 is a kind of credible method of automatic configuration flow diagrams of PLC provided in an embodiment of the present invention;
Fig. 2 is the credible automatic configuration process flow diagrams of PLC provided in an embodiment of the present invention;
Fig. 3 is a kind of trust authentication process flow block diagram provided in an embodiment of the present invention;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only
The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
PLC control system system of the present invention, Programmable Logic Controller, programmable logic
Controller, a kind of electronic system of digital operation, aim at industrial environment apply and design.It is using a kind of programmable
Memory, be used for its internally stored program, execute logical operation, sequential control, timing, count with arithmetical operation etc. towards with
The instruction at family, and various types of machineries or production process are controlled by number or analog pattern input/output;It is Industry Control
Core.
PLC controller is substantially a kind of computer being exclusively used in Industry Control, hardware configuration substantially with miniature calculating
Machine is identical;It generally comprises:
Central processing unit (CPU) is the control axis of PLC controller.It is assigned according to PLC controller system program
Function receives and stores the user program keyed in from programmable device and data;Check power supply, memory, I/O and warning timer
State, and the syntax error in user program can be diagnosed.When PLC controller puts into operation, it is in a manner of scanning first
The state and data of each input unit in scene are received, and is stored in I/O image areas respectively, then from user program memory one by one
User program is read, the result for executing logic or arithmetic operator by the regulation of instruction after command interpretation is sent into I/O image areas
Or in data register.After being finished etc. all user programs, finally by each output state of I/O image areas or output
Data transmission in register is to corresponding output device, such circular flow, until out of service.
Memory:The memory of storage system software is known as system program memory;The memory of storage application software claims
For user program memory.
Power supply:The power supply of PLC controller plays particularly significant must act in the entire system.
Formula input unit:It is responsible for providing operator's input, modification, monitors the function that formula is used as.
Input output loop:It is responsible for receiving external input element signal and is responsible for receiving external output element signal.
The course of work of PLC is as follows:
After PLC controller puts into operation, the course of work is generally divided into three phases, i.e. input sample, user program
It executes and output refreshes three phases.The completion above three stage is referred to as a scan period.During whole service, PLC controls
The CPU of device processed repeats the above three stage with certain sweep speed.
Fold the input sample stage:In the input sample stage, PLC controller in turn reads in all inputs with scan mode
State and data, and they are stored in the mutually deserved unit in I/O image areas.After input sample, it is transferred to user program
Execute and export the refreshing stage.In the two stages, even if input state and data change, the phase in I/O image areas
The state and data for answering unit will not change.Therefore, if input is pulse signal, the width of the pulse signal must be big
In a scan period, it just can guarantee that under any circumstance, which can be read into.
It folds user program and executes the stage:The stage is executed in user program, PLC controller always presses sequence from top to bottom
In turn scanning user program (ladder diagram).When scanning each ladder diagram, but always first the scanning ladder diagram left side by each
The control circuit that contact is constituted, and logic is carried out to the control circuit being made of contact by first left and then right, first up and then down sequence
Operation, then according to logical operation as a result, refreshing the state that the logic coil corresponds to position in the memory blocks system RAM;Or
Refresh the state that the output winding corresponds to position in I/O image areas;Or determine whether to execute the spy of the ladder diagram defined
Different function command.That is, in user program implementation procedure, only state and data of the input point in I/O image areas will not be sent out
Changing, and the state and data of other output points and software in I/O image areas or the memory blocks system RAM are likely to send out
Changing, and come ladder diagram above, program implementing result following every can use these coils or number to coming
According to ladder diagram work;On the contrary, coming following ladder diagram, the state or data of the logic coil being refreshed can only arrive down
One scan period could work to the program of row in the above.
Fold the output refreshing stage:After scanning user program, PLC controller is put into the output refreshing stage.
During this, CPU is according to all output latch circuits of corresponding state in I/O image areas and Refresh Data, then through output circuit
Drive corresponding peripheral hardware.At this moment, it is only the real output of PLC controller.
Based on above-mentioned PLC system, it is also integrated with TPM/TCM safety chips;The credible of PLC system is matched so as to realize
It sets.
Embodiment 1
As shown in Figure 1, the present invention provides a kind of credible method of automatic configuration of PLC, this approach includes the following steps:
S101, the device port according to input signal source, scan the equipment identity information of the input signal source;
S102, after obtaining the equipment identity information, the credible setting interface of open system is triggered;
S103, configuration corresponds to the authentication parameters of the equipment identity information on the credible setting interface of the system;
S104, the equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Wherein, the equipment identity information includes at least:Device mac address, hardware characteristics code, IP address of equipment and logical
Interrogate port.
Wherein, the configuration on the credible setting interface of the system corresponds to the authentication parameters of the equipment identity information
Step specifically includes:According to the type of service and safe class of the equipment identity information identification equipment, according to the service class
The authentication parameters are arranged in type and the safe class.
As shown in Fig. 2, the step of equipment identity information of the scanning input signal source, further includes specifically:By pre-
If sweep parameter scans the input signal source, when failing to obtain the equipment identity information, the modification default scanning ginseng
Number, and rescan the input signal source.
As shown in figure 3, the storage equipment identity information and the corresponding authentication parameters, and opens and to come into force
After step, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Wherein, the step of corresponding trust authentication mode is arranged in the authentication parameters and safe class according to setting
After rapid, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement
Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Wherein, it is described receive the input signal source again after the step of whether the input information source is trusted sources judged
It specifically includes:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Embodiment 2
Based on same inventive concept, another aspect of the present invention additionally provides that a kind of PLC is credible to automatically configure device, institute
Stating device includes:Memory, processor and it is stored in the trusted configuration that can be run on the memory and on the processor
Integrative Program, the trusted configuration Integrative Program realize the credible sides of automatically configuring following PLC when being executed by the processor
The step of method:
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor
The step of dynamic configuration method:
According to the type of service and safe class of the equipment identity information identification equipment, according to the type of service and institute
It states safe class and the authentication parameters is set.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor
The step of dynamic configuration method:
The input signal source is scanned by default sweep parameter, when failing to obtain the equipment identity information, modification
The default sweep parameter, and rescan the input signal source.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor
The step of dynamic configuration method:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor
The step of dynamic configuration method:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement
Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor
The step of dynamic configuration method:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Embodiment 3
Based on same inventive concept, another aspect of the present invention additionally provides a kind of computer readable storage medium, described
Trusted configuration Integrative Program is stored on computer readable storage medium, the trusted configuration Integrative Program is by the processing
Device realizes above-mentioned PLC credible the step of automatically configuring when executing.
The credible method of automatic configuration of PLC, device and the computer readable storage medium of the present invention, can be automatic by scanning
It was found that the equipment identity information of defeated entry/exit equipment, including:MAC Address, hardware characteristics code, IP address, PORT COM etc.;Operation
Simply, directly pass through unified trusted configuration interface, click function button, you can realize scanning device identity information, lead
Enter function, configuration trust authentication mode;The compatible PLC embedded systems based on ICP/IP protocol exploitation that current mainstream is set;
Whole process configures graphical, visual fashion interface, reduces the requirement of O&M technology, improves the speed of configuration, facilitates choosing
Select a variety of authentication informations;Can program be further embedded into portable industrial control equipment, form the pattern of all-in-one machine, it will is big
The big trusted configuration flow for simplifying industrial control system and time, market environment are wide.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (9)
1. a kind of credible method of automatic configuration of PLC, which is characterized in that the described method comprises the following steps:
According to the device port of input signal source, the equipment identity information of the input signal source is scanned;
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
2. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the equipment identity information
It includes at least:Device mac address, hardware characteristics code, IP address of equipment and PORT COM.
3. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that it is described the system can
The step of authentication parameters of the corresponding equipment identity information of configuration, specifically includes on letter setting interface:According to the equipment identities
The credible ginseng is arranged according to the type of service and the safe class in the type of service and safe class of information identification equipment
Number.
4. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the scanning input
The step of equipment identity information of signal source further includes specifically:The input signal source is scanned by default sweep parameter, when not
When can obtain the equipment identity information, the default sweep parameter is changed, and rescan the input signal source.
5. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the storage equipment
Identity information and the corresponding authentication parameters, and after the step of unlatching comes into force, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
6. the credible method of automatic configuration of a kind of PLC according to claim 5, which is characterized in that the institute according to setting
After the step of stating authentication parameters and safe class setting corresponding trust authentication mode, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement item
Part;
Judge whether the input information source is trusted sources after receiving the input signal source again.
7. the credible method of automatic configuration of a kind of PLC according to claim 6, which is characterized in that described in the reception again
Judge that the step of whether the input information source is trusted sources specifically includes after input signal source:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
8. a kind of PLC is credible to automatically configure device, which is characterized in that described device includes:Memory, processor and it is stored in institute
State the trusted configuration Integrative Program that can be run on memory and on the processor, the trusted configuration Integrative Program quilt
The step of credible method of automatic configuration of the PLC as described in claim any one of 1-7 is realized when the processor executes.
9. a kind of computer readable storage medium, which is characterized in that be stored with credible match on the computer readable storage medium
Integrative Program is set, is realized such as any one of claim 1-7 when the trusted configuration Integrative Program is executed by the processor
Described PLC credible the step of automatically configuring.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/094033 WO2019028572A1 (en) | 2017-08-09 | 2017-08-09 | Plc automatic trusted configuration method, apparatus, and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108701032A true CN108701032A (en) | 2018-10-23 |
Family
ID=63843822
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780009050.8A Pending CN108701032A (en) | 2017-08-09 | 2017-08-09 | A kind of PLC is credible method of automatic configuration, device and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108701032A (en) |
WO (1) | WO2019028572A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111897284A (en) * | 2020-08-21 | 2020-11-06 | 湖南匡安网络技术有限公司 | Safety protection method and system for PLC (programmable logic controller) equipment |
CN112241141A (en) * | 2020-11-12 | 2021-01-19 | 上海电气风电集团股份有限公司 | Hardware configuration method, system, device and medium of PLC control system |
CN113896258A (en) * | 2021-09-08 | 2022-01-07 | 贵阳北控水务有限责任公司 | Water plant filter control system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103713583A (en) * | 2012-09-29 | 2014-04-09 | 西门子公司 | Method and apparatus for automatically acquiring and configuring authorization information |
CN104025070A (en) * | 2011-10-24 | 2014-09-03 | 施耐德电器工业公司 | System and method for managing industrial processes |
CN105007186A (en) * | 2015-07-24 | 2015-10-28 | 武汉长光科技有限公司 | EPON-based FTTH terminal automatic configuration method and system |
CN106549494A (en) * | 2016-10-25 | 2017-03-29 | 珠海许继芝电网自动化有限公司 | A kind of method for realizing that based on IEC61850 terminal is automatically configured |
CN106888408A (en) * | 2017-02-15 | 2017-06-23 | 金钱猫科技股份有限公司 | The method and system that a kind of ONT is automatically configured |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102438026B (en) * | 2012-01-12 | 2014-05-07 | 冶金自动化研究设计院 | Industrial control network security protection method and system |
CN103490895B (en) * | 2013-09-12 | 2016-09-14 | 电小虎能源科技(北京)有限公司 | A kind of industrial control identity authentication applying the close algorithm of state and device |
CN103902915B (en) * | 2014-04-17 | 2017-02-22 | 中国科学院信息工程研究所 | Trustable industrial control terminal and establishing method thereof |
-
2017
- 2017-08-09 WO PCT/CN2017/094033 patent/WO2019028572A1/en active Application Filing
- 2017-08-09 CN CN201780009050.8A patent/CN108701032A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104025070A (en) * | 2011-10-24 | 2014-09-03 | 施耐德电器工业公司 | System and method for managing industrial processes |
CN103713583A (en) * | 2012-09-29 | 2014-04-09 | 西门子公司 | Method and apparatus for automatically acquiring and configuring authorization information |
CN105007186A (en) * | 2015-07-24 | 2015-10-28 | 武汉长光科技有限公司 | EPON-based FTTH terminal automatic configuration method and system |
CN106549494A (en) * | 2016-10-25 | 2017-03-29 | 珠海许继芝电网自动化有限公司 | A kind of method for realizing that based on IEC61850 terminal is automatically configured |
CN106888408A (en) * | 2017-02-15 | 2017-06-23 | 金钱猫科技股份有限公司 | The method and system that a kind of ONT is automatically configured |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111897284A (en) * | 2020-08-21 | 2020-11-06 | 湖南匡安网络技术有限公司 | Safety protection method and system for PLC (programmable logic controller) equipment |
CN111897284B (en) * | 2020-08-21 | 2021-06-29 | 湖南匡安网络技术有限公司 | Safety protection method and system for PLC (programmable logic controller) equipment |
CN112241141A (en) * | 2020-11-12 | 2021-01-19 | 上海电气风电集团股份有限公司 | Hardware configuration method, system, device and medium of PLC control system |
CN113896258A (en) * | 2021-09-08 | 2022-01-07 | 贵阳北控水务有限责任公司 | Water plant filter control system |
Also Published As
Publication number | Publication date |
---|---|
WO2019028572A1 (en) | 2019-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108701032A (en) | A kind of PLC is credible method of automatic configuration, device and computer readable storage medium | |
CN105683981B (en) | A kind of safety interacting method and equipment | |
US9919224B2 (en) | Color sorting puzzle game | |
CN103503426B (en) | For showing the method for information on the display device of terminal | |
WO2016045328A1 (en) | Terminal application control method and apparatus, and storage medium | |
CN105141899A (en) | Interactive method and interactive system of old-age service robot | |
CN104318156B (en) | A kind of process access safety method and system | |
CN109743598A (en) | Third party is authorized to access method, system and the readable storage medium storing program for executing of TV | |
CN106502689A (en) | A kind of display methods of status bar and device | |
CN109818922A (en) | The account number sharing method and computer equipment of application program | |
CN106056017A (en) | Intelligent card COS encrypting and downloading system | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
GB2603317A (en) | Security verification method and apparatus for attacked smart home internet of things system | |
Fu et al. | A configurable context-aware simulator for smart home systems | |
CN105429867B (en) | A kind of pattern of fusion home gateway and its access method of application service | |
US9779566B2 (en) | Resource management based on physical authentication and authorization | |
CN110276191A (en) | A kind of equipment configuration method, device and electronic equipment | |
CN106302519A (en) | The method of a kind of internet security management and terminal | |
CN107105327A (en) | One kind association method for start-up and shutdown and terminal | |
CN105824666B (en) | Data Recapture Unit and method | |
Ekisa et al. | An open-source testbed to visualise ics cybersecurity weaknesses and remediation strategies–a research agenda proposal | |
KR20110030515A (en) | Security token device and method of authentication usable in smartphone | |
CN106209746A (en) | A kind of safety service provides method and server | |
Pawar et al. | A strategic approach to model the machine-to-machine communication of industrial IoT system for MQTT protocol with a case study | |
CN106933667A (en) | Sensing data processing method and processing device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181023 |