CN108701032A - A kind of PLC is credible method of automatic configuration, device and computer readable storage medium - Google Patents

A kind of PLC is credible method of automatic configuration, device and computer readable storage medium Download PDF

Info

Publication number
CN108701032A
CN108701032A CN201780009050.8A CN201780009050A CN108701032A CN 108701032 A CN108701032 A CN 108701032A CN 201780009050 A CN201780009050 A CN 201780009050A CN 108701032 A CN108701032 A CN 108701032A
Authority
CN
China
Prior art keywords
credible
plc
identity information
signal source
input signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780009050.8A
Other languages
Chinese (zh)
Inventor
唐勇平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhi He Chuang Wei Information Technology Co Ltd
Original Assignee
Shenzhen Zhi He Chuang Wei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhi He Chuang Wei Information Technology Co Ltd filed Critical Shenzhen Zhi He Chuang Wei Information Technology Co Ltd
Publication of CN108701032A publication Critical patent/CN108701032A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4411Configuring for operating with peripheral devices; Loading of device drivers

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Programmable Controllers (AREA)

Abstract

A kind of PLC is credible method of automatic configuration, device and computer readable storage medium, is related to reliable computing technology field, it is intended to when solving existing PLC system and carrying out trusted configuration, setting steps are cumbersome, power consumption is big, efficiency is low technical problem.This approach includes the following steps:According to the device port of input signal source, the equipment identity information (S101) of the input signal source is scanned;After obtaining the equipment identity information, the credible setting interface (S102) of open system is triggered;The authentication parameters (S103) of the corresponding equipment identity information of configuration on the credible setting interface of the system;The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force (S104).

Description

A kind of PLC is credible method of automatic configuration, device and computer readable storage medium
Technical field
The present invention relates to a kind of reliable computing technology field more particularly to credible method of automatic configuration of PLC, device and calculating Machine readable storage medium storing program for executing.
Background technology
Now, with the continuous development of Internet Industry, the depth defense theory extensive use of multiple technologies In industry control Prevention-Security work, he be one kind from internet to enterprise network, from industry control network to host, from host to PLC, from Multi-level defence security systems of the PLC to sensor.Threaten the Active defense System of information that will gradually be built according to industrial control system Vertical and development, is based on autonomic hardware module construction industry control operating system host strengthening mechanisms, is safeguarded based on white list strategy credible Controllable system running environment.In general, industry control security protection has been transitioned into multiple technologies layering simultaneously from single isolation stage It is the depth defense stage, following to develop to based on threat information, based on credible immune Active defense System --- credible meter Calculation technology.Reliable computing technology is using TPM/TCM safety chips as key foundation, from software and hardware architecture configuration aspects to computer System, network environment carry out safe enhancing.Include mainly:Chain-of-trust ability is established, trusted service and trusted application are provided;Mark Platform identity, identification personation platform;Protection key is provided, the key of data is protected to be sealed in crypto module, ensures safety.
Currently, reliable computing technology is in addition to being applied to reliable PC platform, also to trusted mobile platform, credible embedded PLC The directions such as system are developed.It is guidance that trust computing, which is with the safety thought of " general safety " " active immunity ", with password basis, is adopted The platform safety system built with Hardware/Software Collaborative Design.Trust computing is not limited to safety chip module, from PC, be moved to it is embedding Enter formula PLC, trust computing synthesis meets mobile, light weight using the more extensive credible thinking such as TEE, embedded-type security system The new features such as change, personalization.
But although the trusted technology of PLC is very ripe, in setting verification input signal source, output signal Credible aspect requires technical capability threshold high, and setting steps are not cumbersome easy to operate, and upstream and downstream equipment changing takes time and effort;It can not Quick promoted inside industrial system of the low O&M technical capability of low cost is come.
Invention content
It is a primary object of the present invention to propose a kind of credible method of automatic configuration of PLC, device and computer-readable storage Medium, it is intended to which when solving existing PLC system progress trusted configuration, the technology that setting steps are cumbersome, power consumption is big, efficiency is low is asked Topic.
In order to solve the above technical problem, the present invention provides a kind of credible method of automatic configuration of PLC, this method include with Lower step:
According to the device port of input signal source, the equipment identity information of the input signal source is scanned;
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Further, the equipment identity information includes at least:Device mac address, hardware characteristics code, IP address of equipment with And PORT COM.
Further, the credible ginseng of the corresponding equipment identity information of configuration on the credible setting interface of the system Several steps specifically include:According to the type of service and safe class of the equipment identity information identification equipment, according to the industry The authentication parameters are arranged in service type and the safe class.
Further, the step of equipment identity information of the scanning input signal source further includes specifically:By pre- If sweep parameter scans the input signal source, when failing to obtain the equipment identity information, the modification default scanning ginseng Number, and rescan the input signal source.
Further, the storage equipment identity information and the corresponding authentication parameters, and open and come into force After step, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Further, described that according to the authentication parameters and safe class of setting, corresponding trust authentication mode is set The step of after, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Further, it is described receive the input signal source again after judge whether the input information source is trusted sources Step specifically includes:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Based on same inventive concept, another aspect of the present invention additionally provides that a kind of PLC is credible to automatically configure device, institute Stating device includes:Memory, processor and it is stored in the trusted configuration that can be run on the memory and on the processor Integrative Program, the trusted configuration Integrative Program realize the credible sides of automatically configuring above-mentioned PLC when being executed by the processor The step of method.
Based on same inventive concept, another aspect of the present invention additionally provides a kind of computer readable storage medium, described Trusted configuration Integrative Program is stored on computer readable storage medium, the trusted configuration Integrative Program is by the processing Device realizes above-mentioned PLC credible the step of automatically configuring when executing.
The advantageous effect of technical solution of the present invention:
The credible method of automatic configuration of PLC, device and the computer readable storage medium of the present invention, can be automatic by scanning It was found that the equipment identity information of defeated entry/exit equipment, including:MAC Address, hardware characteristics code, IP address, PORT COM etc.;Operation Simply, directly pass through unified trusted configuration interface, click function button, you can realize scanning device identity information, lead Enter function, configuration trust authentication mode;The compatible PLC embedded systems based on ICP/IP protocol exploitation that current mainstream is set; Whole process configures graphical, visual fashion interface, reduces the requirement of O&M technology, improves the speed of configuration, facilitates choosing Select a variety of authentication informations;Can program be further embedded into portable industrial control equipment, form the pattern of all-in-one machine, it will is big The big trusted configuration flow for simplifying industrial control system and time, market environment are wide.
Description of the drawings
Fig. 1 is a kind of credible method of automatic configuration flow diagrams of PLC provided in an embodiment of the present invention;
Fig. 2 is the credible automatic configuration process flow diagrams of PLC provided in an embodiment of the present invention;
Fig. 3 is a kind of trust authentication process flow block diagram provided in an embodiment of the present invention;
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
PLC control system system of the present invention, Programmable Logic Controller, programmable logic Controller, a kind of electronic system of digital operation, aim at industrial environment apply and design.It is using a kind of programmable Memory, be used for its internally stored program, execute logical operation, sequential control, timing, count with arithmetical operation etc. towards with The instruction at family, and various types of machineries or production process are controlled by number or analog pattern input/output;It is Industry Control Core.
PLC controller is substantially a kind of computer being exclusively used in Industry Control, hardware configuration substantially with miniature calculating Machine is identical;It generally comprises:
Central processing unit (CPU) is the control axis of PLC controller.It is assigned according to PLC controller system program Function receives and stores the user program keyed in from programmable device and data;Check power supply, memory, I/O and warning timer State, and the syntax error in user program can be diagnosed.When PLC controller puts into operation, it is in a manner of scanning first The state and data of each input unit in scene are received, and is stored in I/O image areas respectively, then from user program memory one by one User program is read, the result for executing logic or arithmetic operator by the regulation of instruction after command interpretation is sent into I/O image areas Or in data register.After being finished etc. all user programs, finally by each output state of I/O image areas or output Data transmission in register is to corresponding output device, such circular flow, until out of service.
Memory:The memory of storage system software is known as system program memory;The memory of storage application software claims For user program memory.
Power supply:The power supply of PLC controller plays particularly significant must act in the entire system.
Formula input unit:It is responsible for providing operator's input, modification, monitors the function that formula is used as.
Input output loop:It is responsible for receiving external input element signal and is responsible for receiving external output element signal.
The course of work of PLC is as follows:
After PLC controller puts into operation, the course of work is generally divided into three phases, i.e. input sample, user program It executes and output refreshes three phases.The completion above three stage is referred to as a scan period.During whole service, PLC controls The CPU of device processed repeats the above three stage with certain sweep speed.
Fold the input sample stage:In the input sample stage, PLC controller in turn reads in all inputs with scan mode State and data, and they are stored in the mutually deserved unit in I/O image areas.After input sample, it is transferred to user program Execute and export the refreshing stage.In the two stages, even if input state and data change, the phase in I/O image areas The state and data for answering unit will not change.Therefore, if input is pulse signal, the width of the pulse signal must be big In a scan period, it just can guarantee that under any circumstance, which can be read into.
It folds user program and executes the stage:The stage is executed in user program, PLC controller always presses sequence from top to bottom In turn scanning user program (ladder diagram).When scanning each ladder diagram, but always first the scanning ladder diagram left side by each The control circuit that contact is constituted, and logic is carried out to the control circuit being made of contact by first left and then right, first up and then down sequence Operation, then according to logical operation as a result, refreshing the state that the logic coil corresponds to position in the memory blocks system RAM;Or Refresh the state that the output winding corresponds to position in I/O image areas;Or determine whether to execute the spy of the ladder diagram defined Different function command.That is, in user program implementation procedure, only state and data of the input point in I/O image areas will not be sent out Changing, and the state and data of other output points and software in I/O image areas or the memory blocks system RAM are likely to send out Changing, and come ladder diagram above, program implementing result following every can use these coils or number to coming According to ladder diagram work;On the contrary, coming following ladder diagram, the state or data of the logic coil being refreshed can only arrive down One scan period could work to the program of row in the above.
Fold the output refreshing stage:After scanning user program, PLC controller is put into the output refreshing stage. During this, CPU is according to all output latch circuits of corresponding state in I/O image areas and Refresh Data, then through output circuit Drive corresponding peripheral hardware.At this moment, it is only the real output of PLC controller.
Based on above-mentioned PLC system, it is also integrated with TPM/TCM safety chips;The credible of PLC system is matched so as to realize It sets.
Embodiment 1
As shown in Figure 1, the present invention provides a kind of credible method of automatic configuration of PLC, this approach includes the following steps:
S101, the device port according to input signal source, scan the equipment identity information of the input signal source;
S102, after obtaining the equipment identity information, the credible setting interface of open system is triggered;
S103, configuration corresponds to the authentication parameters of the equipment identity information on the credible setting interface of the system;
S104, the equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Wherein, the equipment identity information includes at least:Device mac address, hardware characteristics code, IP address of equipment and logical Interrogate port.
Wherein, the configuration on the credible setting interface of the system corresponds to the authentication parameters of the equipment identity information Step specifically includes:According to the type of service and safe class of the equipment identity information identification equipment, according to the service class The authentication parameters are arranged in type and the safe class.
As shown in Fig. 2, the step of equipment identity information of the scanning input signal source, further includes specifically:By pre- If sweep parameter scans the input signal source, when failing to obtain the equipment identity information, the modification default scanning ginseng Number, and rescan the input signal source.
As shown in figure 3, the storage equipment identity information and the corresponding authentication parameters, and opens and to come into force After step, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Wherein, the step of corresponding trust authentication mode is arranged in the authentication parameters and safe class according to setting After rapid, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Wherein, it is described receive the input signal source again after the step of whether the input information source is trusted sources judged It specifically includes:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Embodiment 2
Based on same inventive concept, another aspect of the present invention additionally provides that a kind of PLC is credible to automatically configure device, institute Stating device includes:Memory, processor and it is stored in the trusted configuration that can be run on the memory and on the processor Integrative Program, the trusted configuration Integrative Program realize the credible sides of automatically configuring following PLC when being executed by the processor The step of method:
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor The step of dynamic configuration method:
According to the type of service and safe class of the equipment identity information identification equipment, according to the type of service and institute It states safe class and the authentication parameters is set.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor The step of dynamic configuration method:
The input signal source is scanned by default sweep parameter, when failing to obtain the equipment identity information, modification The default sweep parameter, and rescan the input signal source.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor The step of dynamic configuration method:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor The step of dynamic configuration method:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement Condition;
Judge whether the input information source is trusted sources after receiving the input signal source again.
Wherein, also realize that PLC as described below is credible certainly when the trusted configuration Integrative Program is executed by the processor The step of dynamic configuration method:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
Embodiment 3
Based on same inventive concept, another aspect of the present invention additionally provides a kind of computer readable storage medium, described Trusted configuration Integrative Program is stored on computer readable storage medium, the trusted configuration Integrative Program is by the processing Device realizes above-mentioned PLC credible the step of automatically configuring when executing.
The credible method of automatic configuration of PLC, device and the computer readable storage medium of the present invention, can be automatic by scanning It was found that the equipment identity information of defeated entry/exit equipment, including:MAC Address, hardware characteristics code, IP address, PORT COM etc.;Operation Simply, directly pass through unified trusted configuration interface, click function button, you can realize scanning device identity information, lead Enter function, configuration trust authentication mode;The compatible PLC embedded systems based on ICP/IP protocol exploitation that current mainstream is set; Whole process configures graphical, visual fashion interface, reduces the requirement of O&M technology, improves the speed of configuration, facilitates choosing Select a variety of authentication informations;Can program be further embedded into portable industrial control equipment, form the pattern of all-in-one machine, it will is big The big trusted configuration flow for simplifying industrial control system and time, market environment are wide.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (9)

1. a kind of credible method of automatic configuration of PLC, which is characterized in that the described method comprises the following steps:
According to the device port of input signal source, the equipment identity information of the input signal source is scanned;
After obtaining the equipment identity information, the credible setting interface of open system is triggered;
The authentication parameters of the corresponding equipment identity information of configuration on the credible setting interface of the system;
The equipment identity information and the corresponding authentication parameters are stored, and opens and comes into force.
2. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the equipment identity information It includes at least:Device mac address, hardware characteristics code, IP address of equipment and PORT COM.
3. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that it is described the system can The step of authentication parameters of the corresponding equipment identity information of configuration, specifically includes on letter setting interface:According to the equipment identities The credible ginseng is arranged according to the type of service and the safe class in the type of service and safe class of information identification equipment Number.
4. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the scanning input The step of equipment identity information of signal source further includes specifically:The input signal source is scanned by default sweep parameter, when not When can obtain the equipment identity information, the default sweep parameter is changed, and rescan the input signal source.
5. the credible method of automatic configuration of a kind of PLC according to claim 1, which is characterized in that the storage equipment Identity information and the corresponding authentication parameters, and after the step of unlatching comes into force, the method further includes:
According to the authentication parameters and safe class of setting, corresponding trust authentication mode is set.
6. the credible method of automatic configuration of a kind of PLC according to claim 5, which is characterized in that the institute according to setting After the step of stating authentication parameters and safe class setting corresponding trust authentication mode, the method further includes:
Select the device mac address, hardware characteristics code, IP address of equipment any one or it is a variety of as credible judgement item Part;
Judge whether the input information source is trusted sources after receiving the input signal source again.
7. the credible method of automatic configuration of a kind of PLC according to claim 6, which is characterized in that described in the reception again Judge that the step of whether the input information source is trusted sources specifically includes after input signal source:
When the input information source is trusted sources, operation is executed according to the signal instruction of the input signal source;
When the input signal source is untrusted source, rejects and delete the input signal source.
8. a kind of PLC is credible to automatically configure device, which is characterized in that described device includes:Memory, processor and it is stored in institute State the trusted configuration Integrative Program that can be run on memory and on the processor, the trusted configuration Integrative Program quilt The step of credible method of automatic configuration of the PLC as described in claim any one of 1-7 is realized when the processor executes.
9. a kind of computer readable storage medium, which is characterized in that be stored with credible match on the computer readable storage medium Integrative Program is set, is realized such as any one of claim 1-7 when the trusted configuration Integrative Program is executed by the processor Described PLC credible the step of automatically configuring.
CN201780009050.8A 2017-08-09 2017-08-09 A kind of PLC is credible method of automatic configuration, device and computer readable storage medium Pending CN108701032A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/094033 WO2019028572A1 (en) 2017-08-09 2017-08-09 Plc automatic trusted configuration method, apparatus, and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108701032A true CN108701032A (en) 2018-10-23

Family

ID=63843822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780009050.8A Pending CN108701032A (en) 2017-08-09 2017-08-09 A kind of PLC is credible method of automatic configuration, device and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN108701032A (en)
WO (1) WO2019028572A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111897284A (en) * 2020-08-21 2020-11-06 湖南匡安网络技术有限公司 Safety protection method and system for PLC (programmable logic controller) equipment
CN112241141A (en) * 2020-11-12 2021-01-19 上海电气风电集团股份有限公司 Hardware configuration method, system, device and medium of PLC control system
CN113896258A (en) * 2021-09-08 2022-01-07 贵阳北控水务有限责任公司 Water plant filter control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103713583A (en) * 2012-09-29 2014-04-09 西门子公司 Method and apparatus for automatically acquiring and configuring authorization information
CN104025070A (en) * 2011-10-24 2014-09-03 施耐德电器工业公司 System and method for managing industrial processes
CN105007186A (en) * 2015-07-24 2015-10-28 武汉长光科技有限公司 EPON-based FTTH terminal automatic configuration method and system
CN106549494A (en) * 2016-10-25 2017-03-29 珠海许继芝电网自动化有限公司 A kind of method for realizing that based on IEC61850 terminal is automatically configured
CN106888408A (en) * 2017-02-15 2017-06-23 金钱猫科技股份有限公司 The method and system that a kind of ONT is automatically configured

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438026B (en) * 2012-01-12 2014-05-07 冶金自动化研究设计院 Industrial control network security protection method and system
CN103490895B (en) * 2013-09-12 2016-09-14 电小虎能源科技(北京)有限公司 A kind of industrial control identity authentication applying the close algorithm of state and device
CN103902915B (en) * 2014-04-17 2017-02-22 中国科学院信息工程研究所 Trustable industrial control terminal and establishing method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104025070A (en) * 2011-10-24 2014-09-03 施耐德电器工业公司 System and method for managing industrial processes
CN103713583A (en) * 2012-09-29 2014-04-09 西门子公司 Method and apparatus for automatically acquiring and configuring authorization information
CN105007186A (en) * 2015-07-24 2015-10-28 武汉长光科技有限公司 EPON-based FTTH terminal automatic configuration method and system
CN106549494A (en) * 2016-10-25 2017-03-29 珠海许继芝电网自动化有限公司 A kind of method for realizing that based on IEC61850 terminal is automatically configured
CN106888408A (en) * 2017-02-15 2017-06-23 金钱猫科技股份有限公司 The method and system that a kind of ONT is automatically configured

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111897284A (en) * 2020-08-21 2020-11-06 湖南匡安网络技术有限公司 Safety protection method and system for PLC (programmable logic controller) equipment
CN111897284B (en) * 2020-08-21 2021-06-29 湖南匡安网络技术有限公司 Safety protection method and system for PLC (programmable logic controller) equipment
CN112241141A (en) * 2020-11-12 2021-01-19 上海电气风电集团股份有限公司 Hardware configuration method, system, device and medium of PLC control system
CN113896258A (en) * 2021-09-08 2022-01-07 贵阳北控水务有限责任公司 Water plant filter control system

Also Published As

Publication number Publication date
WO2019028572A1 (en) 2019-02-14

Similar Documents

Publication Publication Date Title
CN108701032A (en) A kind of PLC is credible method of automatic configuration, device and computer readable storage medium
CN105683981B (en) A kind of safety interacting method and equipment
US9919224B2 (en) Color sorting puzzle game
CN103503426B (en) For showing the method for information on the display device of terminal
WO2016045328A1 (en) Terminal application control method and apparatus, and storage medium
CN105141899A (en) Interactive method and interactive system of old-age service robot
CN104318156B (en) A kind of process access safety method and system
CN109743598A (en) Third party is authorized to access method, system and the readable storage medium storing program for executing of TV
CN106502689A (en) A kind of display methods of status bar and device
CN109818922A (en) The account number sharing method and computer equipment of application program
CN106056017A (en) Intelligent card COS encrypting and downloading system
CN106209918A (en) The method of a kind of internet security management and terminal
GB2603317A (en) Security verification method and apparatus for attacked smart home internet of things system
Fu et al. A configurable context-aware simulator for smart home systems
CN105429867B (en) A kind of pattern of fusion home gateway and its access method of application service
US9779566B2 (en) Resource management based on physical authentication and authorization
CN110276191A (en) A kind of equipment configuration method, device and electronic equipment
CN106302519A (en) The method of a kind of internet security management and terminal
CN107105327A (en) One kind association method for start-up and shutdown and terminal
CN105824666B (en) Data Recapture Unit and method
Ekisa et al. An open-source testbed to visualise ics cybersecurity weaknesses and remediation strategies–a research agenda proposal
KR20110030515A (en) Security token device and method of authentication usable in smartphone
CN106209746A (en) A kind of safety service provides method and server
Pawar et al. A strategic approach to model the machine-to-machine communication of industrial IoT system for MQTT protocol with a case study
CN106933667A (en) Sensing data processing method and processing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181023