CN112149078A - Auditing method and system for manufacturing execution system - Google Patents

Auditing method and system for manufacturing execution system Download PDF

Info

Publication number
CN112149078A
CN112149078A CN202011102908.5A CN202011102908A CN112149078A CN 112149078 A CN112149078 A CN 112149078A CN 202011102908 A CN202011102908 A CN 202011102908A CN 112149078 A CN112149078 A CN 112149078A
Authority
CN
China
Prior art keywords
judgment result
user
module
verification
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011102908.5A
Other languages
Chinese (zh)
Inventor
柴森春
左笑
王昭洋
张百海
崔灵果
李慧芳
姚分喜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN202011102908.5A priority Critical patent/CN112149078A/en
Publication of CN112149078A publication Critical patent/CN112149078A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • General Factory Administration (AREA)

Abstract

The invention discloses an auditing method and a system for manufacturing an execution system, wherein the auditing method comprises the following steps: acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system; matching and verifying the identity information of the login user and the historical user identity information stored in the trusted execution environment to obtain a verification result; when the verification result passes, giving the login user the management authority to the audit log; when the verification result does not pass, judging whether the verification failure times are smaller than a preset threshold value, if so, returning to the step of collecting identity information of the login user based on a trusted execution environment on the manufacturing execution system, and continuing verification; and if not, setting the verification failure times as 1, giving an alarm and locking the user interaction interface. When the user identity information is unknown, the system automatically gives an alarm and locks the user operation interface, and the safety factor of the system for information management is greatly improved.

Description

Auditing method and system for manufacturing execution system
Technical Field
The invention relates to the technical field of protection of manufacturing execution systems, in particular to an auditing method and system of a manufacturing execution system.
Background
Manufacturing Execution System (MES) is an important link in the intelligent manufacturing industry, and is an optimization system for integrating real-time production information and production process. Management and control of the MES involves planning and execution of the production process, which requires real-time dynamic monitoring during the execution of the production process, and coordination and adjustment based on the monitoring information to stabilize the operation of the production process.
The MES audit system meets the requirements, can uninterruptedly acquire log information of network equipment, a host, an operating system and a user service system of a factory in real time, assists an administrator to analyze and perform compliance audit, and timely and effectively discovers abnormal events and audit violation. Monitoring of abnormal access and sensitive information, statistical analysis of flow and generation and output of audit reports are achieved through an MES audit system, powerful data support is provided for system security strategy formulation and risk internal control to the greatest extent, and the safety factor of the MES is improved.
However, as the dependence of each industry on the MES gradually increases, the security management of the MES also becomes a key problem to be solved urgently in the industry, and the security coefficient of the MES auditing system also needs to be continuously improved. At present, the MES does not realize safe encryption when transmitting data, so that the problems of information leakage and the like are caused in the transmission process.
Disclosure of Invention
The invention aims to provide an auditing method and system for a manufacturing execution system, so as to ensure the safety of data of the manufacturing execution system.
In order to achieve the purpose, the invention provides the following scheme:
an auditing method for a manufacturing execution system, the auditing method comprising the steps of:
acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system;
matching and verifying the identity information of the login user and the historical user identity information stored in the trusted execution environment to obtain a verification result;
judging whether the verification result shows that the verification is passed or not, and obtaining a first judgment result;
if the first judgment result shows that the audit log is true, giving a login user a management authority to the audit log;
if the first judgment result shows no, judging whether the verification failure times are smaller than a preset threshold value or not, and obtaining a second judgment result;
if the second judgment result shows that the verification failure times are increased by 1, returning to the step of collecting the identity information of the login user based on the trusted execution environment on the manufacturing execution system;
and if the first judgment result shows that the verification fails, setting the number of times of verification failure as 1, giving an alarm and locking the user interaction interface.
Optionally, the method for giving the login user the management authority to the audit log further includes:
collecting operation data of a login user;
judging whether the operation data is matched with an operation blacklist or not, and obtaining a third judgment result;
if the third judgment result shows that the operation is in the operation blacklist, prompting that the operation enters the operation blacklist, and giving an alarm;
if the third judgment result shows no, judging whether the same violation or error operation occurs for multiple times in the monitoring result, and obtaining a fourth judgment result;
if the fourth judgment result shows that the operation is illegal, adding the illegal or wrong operation into a system operation blacklist and giving an alarm;
and if the fourth judgment result shows that the audit log is not the current audit log, the user continues to maintain the management authority of the audit log.
Optionally, the determining whether the operation data is matched with the operation blacklist to obtain a third determination result further includes:
and generating an operation blacklist according to audit log data generated by historical user operation of the manufacturing execution system and historical user operation data.
An audit system of a manufacturing execution system, the audit system comprising:
the first acquisition module is used for acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system;
the user management module is used for matching and verifying the login user identity information and historical user identity information stored in the trusted execution environment to obtain a verification result;
the first judgment module is used for judging whether the verification result shows that the verification is passed or not to obtain a first judgment result;
the audit log management module is used for giving a login user a management authority to the audit log if the first judgment result shows that the login user is authorized to log;
the second acquisition module is used for acquiring operation data of the login user;
the second judgment module is used for judging whether the verification failure times are smaller than a preset threshold value or not if the first judgment result shows that the verification failure times are not larger than the preset threshold value, and obtaining a second judgment result;
a returning module, configured to increase the number of verification failures by 1 if the second determination result indicates yes, and return to the step "collect login user identity information based on a trusted execution environment on the manufacturing execution system";
and the first alarm module is used for setting the verification failure times as 1 if the first judgment result shows that the verification failure times are not the same, giving an alarm and locking the user interaction interface.
Optionally, the auditing system further includes:
the second acquisition module is used for acquiring operation data of the login user;
the third judging module is used for judging whether the operation data is matched with the operation blacklist or not and obtaining a third judging result;
the second alarm module is used for prompting that the operation enters an operation blacklist and giving an alarm if the third judgment result shows that the operation is in the operation blacklist;
a fourth judging module, configured to, if the third judgment result indicates no, judge whether the same violation or error operation occurs multiple times in the monitoring result, and obtain a fourth judgment result;
the third alarm module is used for adding the illegal or wrong operation into a system operation blacklist and giving an alarm if the fourth judgment result shows that the operation is yes;
and the permission keeping module is used for keeping the management permission of the audit log if the fourth judgment result shows that the audit log is not authorized.
Optionally, the auditing system further includes:
and the operation blacklist generation module is used for generating an operation blacklist according to audit log data and historical user operation data generated by historical user operation of the manufacturing execution system.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the invention discloses an auditing method for manufacturing an execution system, which comprises the following steps: acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system; matching and verifying the identity information of the login user and the historical user identity information stored in the trusted execution environment to obtain a verification result; judging whether the verification result shows that the verification is passed or not, and obtaining a first judgment result; if the first judgment result shows that the audit log is true, giving a login user a management authority to the audit log; if the first judgment result shows no, judging whether the verification failure times are smaller than a preset threshold value or not, and obtaining a second judgment result; if the second judgment result shows that the verification failure times are increased by 1, returning to the step of collecting the identity information of the login user based on the trusted execution environment on the manufacturing execution system; and if the first judgment result shows that the verification fails, setting the number of times of verification failure as 1, giving an alarm and locking the user interaction interface. When the user identity information is unknown, the system automatically gives an alarm and locks the user operation interface, and the safety factor of the system for information management is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a flow chart of an auditing method for a manufacturing execution system according to the present invention;
FIG. 2 is a block diagram of an audit system for manufacturing an execution system according to the present invention.
Detailed Description
The invention aims to provide an auditing method and system for a manufacturing execution system, so as to ensure the safety of data of the manufacturing execution system.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
As shown in FIG. 1, the present invention provides an auditing method for manufacturing an execution system, the auditing method comprising the steps of:
step 101, acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system.
And when the MES is started, the TEE module is automatically operated, and when a user sends out an operation authority application through an interactive interface of the system, the client pops up a user login interface.
And 102, matching and verifying the identity information of the login user and the historical user identity information stored in the trusted execution environment to obtain a verification result.
Based on the trusted execution environment of the manufacturing execution system, the data acquisition module acquires the identity information input by the user and transmits the identity information to the user management module. Based on the trusted execution environment of the system, after the user management module receives the user identity information transmitted by the user data acquisition module, namely the first acquisition module, the identity information is compared with the historical user identity information stored in the TEE module to obtain a verification result.
And 103, judging whether the verification result shows that the verification is passed or not, and obtaining a first judgment result.
Step 104, if the first judgment result shows that the audit log is true, giving a login user a management authority to the audit log;
and 105, if the first judgment result shows no, judging whether the verification failure times are smaller than a preset threshold value, and obtaining a second judgment result.
And 106, if the second judgment result shows that the verification failure times are increased by 1, returning to the step of collecting the identity information of the login user based on the trusted execution environment on the manufacturing execution system.
And 107, if the first judgment result shows that the verification fails, setting the number of times of verification failure as 1, alarming and locking the user interaction interface, namely triggering an alarm system and locking the user interaction interface if the user identity verification fails for more than 2 times continuously.
Step 104, after the step of giving the login user the management authority for the audit log, further includes: collecting operation data of a login user; judging whether the operation data is matched with an operation blacklist or not, and obtaining a third judgment result; if the third judgment result shows that the operation is in the operation blacklist, prompting that the operation enters the operation blacklist, and giving an alarm; if the third judgment result shows no, judging whether the same violation or error operation occurs for multiple times in the monitoring result, and obtaining a fourth judgment result; if the fourth judgment result shows that the operation is illegal, adding the illegal or wrong operation into a system operation blacklist and giving an alarm; and if the fourth judgment result shows that the audit log is not the current audit log, the user continues to maintain the management authority of the audit log.
That is, based on the trusted execution environment of the system, when a user performs system operation or manages an audit log, the monitoring module monitors audit log data and manual control operation in the TEE, compares a monitoring result with a system blacklist, judges whether the monitoring result is consistent with the system blacklist, obtains a third judgment result, and transmits a 'the operation has entered the blacklist' prompt to the alarm system if the third judgment result indicates that the monitoring result is consistent with the blacklist; and if the third judgment result shows that the monitoring result is inconsistent with the data in the blacklist, judging whether the same violation/error operation occurs in the monitoring result for multiple times to obtain a fourth judgment result. If the fourth judgment result shows that the same violation/error operation appears in the monitoring result for multiple times, adding the operation data into a blacklist and giving an alarm; and if the fourth judgment result shows that the same violation/error operation does not occur for multiple times in the monitoring result, the operation is approved, and the user continues to maintain the management authority of the audit log.
The determining whether the operation data is matched with the operation blacklist to obtain a third determination result includes: and generating an operation blacklist according to audit log data generated by historical user operation of the manufacturing execution system and historical user operation data.
As shown in FIG. 2, the present invention provides an audit system for a manufacturing execution system, the audit system comprising: a first collection module 201, configured to collect identity information of a login user based on a trusted execution environment on a manufacturing execution system; the user management module 202 is configured to perform matching verification on login user identity information and historical user identity information stored in the trusted execution environment to obtain a verification result; the first judging module 203 is configured to judge whether the verification result indicates that the verification passes, and obtain a first judging result; the audit log management module 204 is configured to, if the first determination result indicates that the log entry user is a member of the audit log, give a management authority to the audit log to the log entry user; a second determining module 205, configured to determine whether the verification failure time is smaller than a preset threshold value if the first determining result indicates no, and obtain a second determining result; a returning module 206, configured to increase the number of times of verification failure by 1 if the second determination result indicates yes, and return to the step "collect login user identity information based on a trusted execution environment on the manufacturing execution system"; and the first alarm module 207 is configured to set the number of times of verification failure to 1 if the first determination result indicates no, alarm and lock the user interaction interface.
The auditing system also includes: the second acquisition module 208 is used for acquiring operation data of the login user; a third determining module 209, configured to determine whether the operation data matches an operation blacklist, to obtain a third determination result; the second alarm module 210 is configured to prompt that "the operation has entered the operation blacklist" and alarm if the third determination result indicates yes; a fourth determining module 211, configured to determine whether the same violation or error operation occurs multiple times in the monitoring result if the third determining result indicates no, and obtain a fourth determining result; a third alarm module 212, configured to add the illegal or incorrect operation to a system operation blacklist and alarm if the fourth determination result indicates yes; and the permission keeping module 213 is configured to, if the fourth determination result indicates that the audit log is not authorized, continue to keep the management permission for the audit log.
The auditing system also includes: and an operation blacklist generation module 214, configured to generate an operation blacklist according to audit log data and historical user operation data generated by historical user operations of the manufacturing execution system.
The auditing system of the manufacturing execution system comprises a plurality of functional sub-modules, and specifically comprises:
and the TEE module mainly comprises a TEE communication agent, a trusted kernel, a data acquisition module, a user management module and an audit log management module.
The data acquisition module comprises a user data acquisition module and an audit log data acquisition module, namely a first acquisition module and a second acquisition module. The first acquisition module is used for acquiring identity information input by a user who logs in and transmitting the identity information to the user management module; and the second acquisition module is used for acquiring operation data of the user with successful identity verification on each step of the system, namely audit log data, and transmitting the operation data to the audit log management module.
The user management module comprises a registration module, an acquisition module, a storage module, a verification module and a prompt module and is mainly responsible for identity information management of users. And when the user identity information is successfully verified, sending a prompt that the user identity information is successfully verified to the audit log management module.
And the first judgment module is used for judging whether the identity information of the login user passes the verification or not to obtain a first judgment result.
And the audit log management module is used for providing management authority for the audit log for a user and processing the audit log information acquired by the data acquisition module, wherein the audit log management module comprises information recording, storing, outputting and calling functions.
REE module, including the normal operating system of MES (i.e. ROS) and the interaction interface to the user; the ROS in the REE module mainly comprises an REE communication agent, a public peripheral driver, a monitoring module, a third judging module, a fourth judging module and an alarm module.
And the monitoring module is used for monitoring audit log data and manual control operation in the TEE, and comparing an operation blacklist generated according to MES historical data with the operation blacklist.
The third judgment module is used for judging whether the monitoring result is consistent with the system blacklist or not to obtain a third judgment result; and the fourth judgment module is used for judging whether the same violation/error operation occurs for multiple times in the monitoring result to obtain a fourth judgment result.
And the alarm modules (the first alarm module, the second alarm module and the third alarm module) are used for automatically alarming by the system, locking the user interaction interface and isolating the user.
An embodiment is provided below to further verify the validity of the auditing method of the manufacturing execution system.
The description is given by taking an example that two workers respectively operate the MES auditing system, wherein the worker a is not a system administrator, the identity information of the worker is absent in the system, and the worker b is the system administrator. Specifically, the method for managing the auditing system by the staff comprises the following steps:
s310, popping up a user login interface by the MES client, and inputting account information by a worker;
s320, the first acquisition module acquires the identity information of the user.
S330, the user management module manages the user identity information and carries out identity verification.
And S340, verifying the worker a.
And S350, verifying the worker b.
And S360, the user identity information verification is completed, and the audit log management module receives that the user identity verification is successful.
And S370, managing the MES audit system by the user and checking the audit log.
And S380, monitoring the manual control operation of the user and the audit log data of the system by the monitoring module.
And S390, triggering by the alarm module, giving an alarm and locking the user operation interface.
S340 specifically includes:
and S341, the identity information of the worker a does not exist in the system, and the worker a inputs account information (embezzles the account of the administrator) for many times without verification.
And S342, when the identity information of the worker a fails to be verified, triggering an alarm module, and locking an operation interface of the worker a.
S350 specifically includes:
and S351, the identity information of the worker b exists in the system, and the account information of the worker b passes the verification.
And S352, the identity information of the worker b is successfully verified, and the system gives the authority of the worker b to manage the auditing system.
S370 specifically includes:
s371, staff b checks the system audit log and exports log data.
S380 specifically comprises:
and S381, the operation of the worker b is violated, and the operation behavior of the worker b is consistent with that of the system blacklist.
S382, the monitoring module transmits a 'the operation enters the blacklist' prompt to an alarm system.
S390 specifically includes:
s391, the alarm module gives an alarm and locks an operation interface of the worker b.
The auditing method and system of the invention have the following advantages:
(1) the invention provides an auditing method of a manufacturing execution system, which realizes real-time auditing of MES information, comprises functions of recording, storing, calling, outputting and the like, and solves the problem of data tracking to a certain extent.
(2) The invention provides an audit system based on TEE aiming at a manufacturing execution system, which realizes the encrypted storage of audit information and solves the safety problem when a user accesses sensitive information and data to a certain extent.
(3) The invention designs an audit log management module of a manufacturing execution system, which is used for providing management authority for an audit log for a user and processing audit log information acquired by a data acquisition module, thereby improving the audit efficiency of the system.
(4) The invention designs a monitoring module of a manufacturing execution system, which monitors user control operation and system data in real time based on a system blacklist, and ensures the safety of system operation management to a certain extent.
(5) The invention designs an alarm method for manufacturing an execution system, when user identity information is unknown or operation is illegal, an alarm module automatically alarms and locks a user operation interface, and the safety factor of the system for information management is greatly improved.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The principle and the implementation manner of the present invention are explained by applying specific examples, the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof, the described embodiments are only a part of the embodiments of the present invention, not all embodiments, and all other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts belong to the protection scope of the present invention.

Claims (6)

1. An auditing method for a manufacturing execution system, the auditing method comprising the steps of:
acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system;
matching and verifying the identity information of the login user and the historical user identity information stored in the trusted execution environment to obtain a verification result;
judging whether the verification result shows that the verification is passed or not, and obtaining a first judgment result;
if the first judgment result shows that the audit log is true, giving a login user a management authority to the audit log;
if the first judgment result shows no, judging whether the verification failure times are smaller than a preset threshold value or not, and obtaining a second judgment result;
if the second judgment result shows that the verification failure times are increased by 1, returning to the step of collecting the identity information of the login user based on the trusted execution environment on the manufacturing execution system;
and if the first judgment result shows that the verification fails, setting the number of times of verification failure as 1, giving an alarm and locking the user interaction interface.
2. The audit method of manufacturing execution systems according to claim 1, wherein the granting of the login user management authority to the audit log further comprises:
collecting operation data of a login user;
judging whether the operation data is matched with an operation blacklist or not, and obtaining a third judgment result;
if the third judgment result shows that the operation is in the operation blacklist, prompting that the operation enters the operation blacklist, and giving an alarm;
if the third judgment result shows no, judging whether the same violation or error operation occurs for multiple times in the monitoring result, and obtaining a fourth judgment result;
if the fourth judgment result shows that the operation is illegal, adding the illegal or wrong operation into a system operation blacklist and giving an alarm;
and if the fourth judgment result shows that the audit log is not the current audit log, the user continues to maintain the management authority of the audit log.
3. The audit method of a manufacturing execution system according to claim 2, wherein the determining whether the operation data matches an operation blacklist to obtain a third determination result further includes:
and generating an operation blacklist according to audit log data generated by historical user operation of the manufacturing execution system and historical user operation data.
4. An auditing system for a manufacturing execution system, the auditing system comprising:
the first acquisition module is used for acquiring identity information of a login user based on a trusted execution environment on a manufacturing execution system;
the user management module is used for matching and verifying the login user identity information and historical user identity information stored in the trusted execution environment to obtain a verification result;
the first judgment module is used for judging whether the verification result shows that the verification is passed or not to obtain a first judgment result;
the audit log management module is used for giving a login user a management authority to the audit log if the first judgment result shows that the login user is authorized to log;
the second judgment module is used for judging whether the verification failure times are smaller than a preset threshold value or not if the first judgment result shows that the verification failure times are not larger than the preset threshold value, and obtaining a second judgment result;
a returning module, configured to increase the number of verification failures by 1 if the second determination result indicates yes, and return to the step "collect login user identity information based on a trusted execution environment on the manufacturing execution system";
and the first alarm module is used for setting the verification failure times as 1 if the first judgment result shows that the verification failure times are not the same, giving an alarm and locking the user interaction interface.
5. The audit system of a manufacturing execution system of claim 4, further comprising:
the second acquisition module is used for acquiring operation data of the login user;
the third judging module is used for judging whether the operation data is matched with the operation blacklist or not and obtaining a third judging result;
the second alarm module is used for prompting that the operation enters an operation blacklist and giving an alarm if the third judgment result shows that the operation is in the operation blacklist;
a fourth judging module, configured to, if the third judgment result indicates no, judge whether the same violation or error operation occurs multiple times in the monitoring result, and obtain a fourth judgment result;
the third alarm module is used for adding the illegal or wrong operation into a system operation blacklist and giving an alarm if the fourth judgment result shows that the operation is yes;
and the permission keeping module is used for keeping the management permission of the audit log if the fourth judgment result shows that the audit log is not authorized.
6. The audit system of a manufacturing execution system of claim 5, further comprising:
and the operation blacklist generation module is used for generating an operation blacklist according to audit log data and historical user operation data generated by historical user operation of the manufacturing execution system.
CN202011102908.5A 2020-10-15 2020-10-15 Auditing method and system for manufacturing execution system Pending CN112149078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011102908.5A CN112149078A (en) 2020-10-15 2020-10-15 Auditing method and system for manufacturing execution system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011102908.5A CN112149078A (en) 2020-10-15 2020-10-15 Auditing method and system for manufacturing execution system

Publications (1)

Publication Number Publication Date
CN112149078A true CN112149078A (en) 2020-12-29

Family

ID=73952017

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011102908.5A Pending CN112149078A (en) 2020-10-15 2020-10-15 Auditing method and system for manufacturing execution system

Country Status (1)

Country Link
CN (1) CN112149078A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255216A (en) * 2018-10-17 2019-01-22 北京京航计算通讯研究所 A kind of discovery of violation operation and response method
CN109426719A (en) * 2017-09-01 2019-03-05 鸿富锦精密电子(郑州)有限公司 Device authentication management method and verification management system
CN110909346A (en) * 2019-11-20 2020-03-24 北京理工大学 Management method and system for manufacturing execution system
CN111490973A (en) * 2020-03-08 2020-08-04 苏州浪潮智能科技有限公司 Network account security protection method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109426719A (en) * 2017-09-01 2019-03-05 鸿富锦精密电子(郑州)有限公司 Device authentication management method and verification management system
CN109255216A (en) * 2018-10-17 2019-01-22 北京京航计算通讯研究所 A kind of discovery of violation operation and response method
CN110909346A (en) * 2019-11-20 2020-03-24 北京理工大学 Management method and system for manufacturing execution system
CN111490973A (en) * 2020-03-08 2020-08-04 苏州浪潮智能科技有限公司 Network account security protection method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113608907A (en) * 2021-07-21 2021-11-05 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium
CN113608907B (en) * 2021-07-21 2024-03-29 阿里巴巴(中国)有限公司 Database auditing method, device, equipment, system and storage medium

Similar Documents

Publication Publication Date Title
CN112182519B (en) Computer storage system security access method and access system
Islam et al. Measuring security requirements for software security
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN112383535B (en) Method and device for detecting Hash transfer attack behavior and computer equipment
CN108259202A (en) A kind of CA monitoring and pre-alarming methods and CA monitoring and warning systems
CN109936555A (en) A kind of date storage method based on cloud platform, apparatus and system
CN114021109A (en) System and method for realizing identity authentication and access management of workshop-level industrial control system in tobacco industry
CN115987697B (en) Multi-level information data sharing method and system based on event subscription mechanism
CN111092910A (en) Database security access method, device, equipment, system and readable storage medium
CN115130122A (en) Big data security protection method and system
CN111147488A (en) Safety monitoring system for network engineering
CN112149078A (en) Auditing method and system for manufacturing execution system
CN112199700B (en) Safety management method and system for MES data system
CN101408955A (en) Method and system determining obligation base on tactic
CN111327602B (en) Equipment access processing method, equipment and storage medium
CN216122450U (en) Power grid safety audit system
CN108347411B (en) Unified security guarantee method, firewall system, equipment and storage medium
CN112883394B (en) Block chain-based big data security processing method and system
CN115640581A (en) Data security risk assessment method, device, medium and electronic equipment
CN110278127B (en) Agent deployment method and system based on secure transmission protocol
CN112199651A (en) Login identity information verification system and verification method thereof
CN109818938A (en) A kind of IT O&M two-factor authentication system and method
CN117792798B (en) Instant messaging information interaction system and method
MOSTAFA et al. FALSE ALARM REDUCTION SCHEME FOR DATABASE INTRUSION DETECTION SYSTEM.
CN110930234B (en) Financial management method with remote access function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201229