CN112905994A - Remote vulnerability patch program protection method and system - Google Patents

Remote vulnerability patch program protection method and system Download PDF

Info

Publication number
CN112905994A
CN112905994A CN202110195853.5A CN202110195853A CN112905994A CN 112905994 A CN112905994 A CN 112905994A CN 202110195853 A CN202110195853 A CN 202110195853A CN 112905994 A CN112905994 A CN 112905994A
Authority
CN
China
Prior art keywords
remote
patch
information
recorder
channel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110195853.5A
Other languages
Chinese (zh)
Other versions
CN112905994B (en
Inventor
刘子俊
晋龙兴
修荣堃
黄福全
林子钊
周瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Co ltd
Original Assignee
Shenzhen Power Supply Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Co ltd filed Critical Shenzhen Power Supply Co ltd
Priority to CN202110195853.5A priority Critical patent/CN112905994B/en
Publication of CN112905994A publication Critical patent/CN112905994A/en
Application granted granted Critical
Publication of CN112905994B publication Critical patent/CN112905994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a method and a system for protecting a remote vulnerability patch program, wherein the method comprises the following steps: obtaining first remote monitoring information; judging whether a system leak exists in the first remote intelligent oscillograph or not according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch; encrypting the first remote patch to obtain a first remote encrypted patch; sending the first remote encrypted patch to the first remote intelligent oscillograph; and the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch. The method solves the technical problems of low source and transmission security of the bug patch program of the oscillograph in the prior art.

Description

Remote vulnerability patch program protection method and system
Technical Field
The invention relates to the technical field of network security remote maintenance of a wave recorder, in particular to a method and a system for protecting a remote vulnerability patch program.
Background
The intelligent oscillograph is a device which meets the requirements of relay protection and intelligent development of a safety automatic device, meanwhile, the safe operation of a power system is realized, and the maintenance of the safety of a bug repairing program of the oscillograph becomes an important component part of the safe operation of the intelligent substation based on the digitization and the networking development of the intelligent substation.
However, in the process of implementing the technical solution of the invention in the embodiments of the present application, the inventors of the present application find that the above-mentioned technology has at least the following technical problems:
the source and transmission security of the bug patch of the wave recorder is not high.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for protecting a remote bug patch, so as to improve the source and transmission security of the bug patch of a wave recorder.
In order to solve the above technical problem, an embodiment of the present invention provides a method for protecting a remote vulnerability patch, including:
step S1, obtaining first remote monitoring information;
step S2, judging whether a system bug exists in the first remote intelligent oscillograph according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch;
step S3, the first remote patch is encrypted to obtain a first remote encrypted patch;
step S4, the first remote encrypted patch is sent to the first remote intelligent wave recorder, and the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch.
In step S4, sending the first remote encrypted patch to the first remote intelligent recorder specifically includes:
step S41, obtaining a first channel, wherein the first channel connects the first remote intelligent wave recorder and a first wave recorder master station in an encrypted communication manner;
step S42, sending the first remote encrypted patch to the first remote intelligent recorder through the first channel.
In step S4, the first remote intelligent recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch, which specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent wave recorder and a first wave recorder main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, sending the first decoding information to the first remote intelligent recorder through the second channel;
step S46, decrypting the first remote encrypted patch according to the first decoding information.
Wherein, after the step S4, the method further includes:
step S51, obtaining second remote monitoring information;
step S52, obtaining the running state information of the first remote intelligent oscillograph according to the second remote monitoring information;
and step S53, obtaining the safety level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
The method for protecting the remote vulnerability patch program further comprises the following steps:
step S61, obtaining a preset safety level threshold value;
step S62, determining whether the security level information is within the predetermined security level threshold;
step S63, if the safety level information is not within the preset safety level threshold, obtaining first early warning information;
and S64, reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
Wherein, the step S53 specifically includes:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
The invention also provides a remote vulnerability patch program protection system, which comprises:
a first obtaining unit, configured to obtain first remote monitoring information;
the first judging unit is used for judging whether a system leak exists in the first remote intelligent oscillograph according to the first remote monitoring information;
a second obtaining unit, configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit, configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit, configured to send the first remote encrypted patch to the first remote intelligent recorder;
and the first installation unit is used for installing the first remote intelligent wave recorder after decrypting the first remote encryption patch.
Wherein, the remote vulnerability patch protection system further comprises:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Wherein, the remote vulnerability patch protection system further comprises:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain first decoding information;
a third sending unit, configured to send the first decoded information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
The invention also provides a remote vulnerability patch program protection system, which comprises: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the remote vulnerability patch protection method.
The embodiment of the invention has the beneficial effects that: the patch correction is carried out on the system bug existing in the intelligent wave recorder through judgment through the obtained first remote monitoring information, the first remote patch is encrypted and then sent to the first remote intelligent wave recorder, and then the patch is installed after decryption, so that the remote monitoring on the operating system bug and the patch installation state of the wave recorder remotely accessed to the main station is achieved, and the sensible safety state after patch installation is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for protecting a remote vulnerability patch according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a remote bug patch protection system according to a second embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an exemplary electronic device in an embodiment of the present invention.
Detailed Description
The following description of the embodiments refers to the accompanying drawings, which are included to illustrate specific embodiments in which the invention may be practiced.
Referring to fig. 1, an embodiment of the present invention provides a method for protecting a remote bug patch, including:
step S1, obtaining first remote monitoring information;
step S2, judging whether a system bug exists in the first remote intelligent oscillograph according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch;
step S3, the first remote patch is encrypted to obtain a first remote encrypted patch;
step S4, the first remote encrypted patch is sent to the first remote intelligent wave recorder, and the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch.
Specifically, in step S1, the first remote monitoring information is information obtained by the intelligent wave recording master station performing remote monitoring on a vulnerability of an operating system of the remote intelligent wave recorder, wherein the remote monitoring system is built by using a sensor and has the advantage of maximizing performance cost, so that data information obtained by remote monitoring based on the database service center is more complete and scientific.
In step S2, the system bug refers to a logical defect or error of the remote recording operating system, and the first remote patch refers to a small program for repairing defects and problems of the operating system of the remote recording master station, wherein the system bug is usually utilized by an illegal person, and attacks or controls the whole system by implanting trojans and viruses, so that whether a system bug exists in the intelligent recorder operating system can be timely judged according to the first remote monitoring information, and thus the first remote patch is obtained and damaged in time, and technical effects of improving software performance and improving use safety of the recorder are achieved.
In step S3, the encryption process is a technical means of encrypting the first remote patch by a key according to an encryption algorithm, wherein the encryption algorithm is a step of combining general information with a string of numbers to generate an unintelligible ciphertext, and has more selectivity, including performing iterative encryption of data by permutation and replacement operations, or implementing grouping and obfuscating password design by the key and the ciphertext, or implementing encryption by converting a plaintext into a smaller ciphertext in an irreversible manner. At this time, the first remote encryption patch obtained after encryption processing has stronger confidentiality and security, so that the protection function of the remote bug program is enhanced.
In step S4, the decryption process refers to a technical means for decrypting the encrypted first remote patch again when the remote smart recorder installs the first remote encrypted patch, wherein the key is an algorithm for encoding and decrypting data, in this embodiment, the security of the first remote patch in the network transportation process is ensured by using a proper key encryption technology, and then the first remote patch is restored, i.e., decrypted, after using a technology the same as or different from the encryption technology, the first remote smart recorder needs to perform decryption process after obtaining the first remote encrypted patch, and then the installation and repair of the vulnerability can be performed, thereby achieving the technical effect of ensuring that the patch is in a secure state after installation.
Further, the sending the first remote encryption patch to the first remote intelligent recorder in step S4 specifically includes:
step S41, obtaining a first channel, wherein the first channel connects the first remote intelligent wave recorder and a first wave recorder master station in an encrypted communication manner;
step S42, sending the first remote encrypted patch to the first remote intelligent recorder through the first channel.
Specifically, the first channel is a transport channel specially used for transmitting a patch, the encrypted first remote encrypted patch can be obtained by connecting the first recorder master station for encrypted communication, and then the encrypted first remote encrypted patch is sent to the first remote intelligent recorder, and the first remote patch is timely encrypted through the established first channel, so that the technical effect of maintaining the security and the encryption of the first remote patch is achieved.
Further, in step S4, the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch, which specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent wave recorder and a first wave recorder main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, sending the first decoding information to the first remote intelligent recorder through the second channel;
step S46, decrypting the first remote encrypted patch according to the first decoding information.
Specifically, the second channel refers to a transport channel dedicated to transmitting decoding information, and the first channel is different from the second channel; the first decoding information is a corresponding decryption code required for decrypting the first remote encrypted patch. If different encryption algorithms are adopted, the cipher physiques corresponding to cipher keys are different, therefore, the first decoding information is sent to the first remote intelligent recorder through the second channel, then the first remote encryption patch is decrypted and installed with a patch, wherein the first decoding information transmitted by the second channel is independently owned by the system, and therefore the transmission channels respectively established achieve the technical effect of high encryption of the transmission information.
Further, step S4 is followed by:
step S51, obtaining second remote monitoring information;
step S52, obtaining the running state information of the first remote intelligent oscillograph according to the second remote monitoring information;
and step S53, obtaining the safety level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
Specifically, the second remote monitoring information is information obtained by remotely monitoring the state of the installed remote intelligent recorder patch by the intelligent recorder, and then safety level information is obtained according to the running state of the first remote intelligent recorder, wherein the safety level information is judged according to the running state of the installed recorder patch, so that the technical effect of sensible safety state of the installed patch is achieved.
Further, the embodiment of the present invention further includes:
step S61, obtaining a preset safety level threshold value;
step S62, determining whether the security level information is within the predetermined security level threshold;
step S63, if the safety level information is not within the preset safety level threshold, obtaining first early warning information;
and S64, reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
Specifically, the preset safety level threshold value is an information safety level protection threshold value preset in advance, the first early warning information is early warning information for reminding a wave recorder of potential safety hazard, the preset safety level threshold value is determined to be a threshold value for ensuring that the first remote intelligent wave recorder meets the use standard, and if the first remote intelligent wave recorder is judged not to be in the preset safety level threshold value, the first remote intelligent wave recorder is reminded of potential safety hazard according to the obtained first early warning information, so that the safety state after patch installation is timely determined, and the technical effect of safely controlling the wave recorder is further improved.
Further, step S53 specifically includes:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
Specifically, the first remote intelligent oscillograph security level information needs to be obtained according to accurate operation state information, the training model is a model capable of continuously performing self-training learning according to different actual conditions, further, the training model is a Neural network model, the Neural network model is a Neural network model in machine learning, and a Neural Network (NN) is a complex Neural network system formed by widely connecting a large number of simple processing units (called neurons), reflects many basic characteristics of human brain functions, and is a highly complex nonlinear dynamical learning system Neural network model described based on a mathematical model of the neurons. Artificial Neural Networks (Artificial Neural Networks) are a description of the first-order properties of the human brain system. Briefly, it is a mathematical model. Training based on a large amount of training data, wherein each set of training data comprises: the operation state information and the identification information used for identifying the safety level of the first remote intelligent recorder, the neural network model is continuously corrected by itself, and when the output information of the neural network model reaches the preset accuracy rate/reaches the convergence state, the supervised learning process is ended. Through data training of the neural network model, based on the characteristic that the data are processed more accurately after the training of the training model, the safety level information of the first remote intelligent recorder output by the first training model is more accurate, and the technical effect of accurately judging the safety level is achieved.
Based on the same inventive concept as the one of the foregoing embodiments, a remote vulnerability patch protection method, a second embodiment of the present invention provides a remote vulnerability patch protection system, as shown in fig. 2, the system includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain first remote monitoring information;
the first judging unit 12 is configured to judge whether a system leak exists in the first remote intelligent recorder according to the first remote monitoring information by the first judging unit 12;
a second obtaining unit 13, where the second obtaining unit 13 is configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit 14, where the third obtaining unit 14 is configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit 15, where the first sending unit 15 is configured to send the first remote encrypted patch to the first remote intelligent recorder;
a first installation unit 16, where the first installation unit 16 is configured to decrypt the first remote encrypted patch by the first remote intelligent recorder and then install the decrypted patch.
Further, the system further comprises:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Further, the system further comprises:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain first decoding information;
a third sending unit, configured to send the first decoded information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
Further, the system further comprises:
a seventh obtaining unit, configured to obtain second remote monitoring information;
an eighth obtaining unit, configured to obtain, according to the second remote monitoring information, operating state information of the first remote intelligent oscillograph;
a ninth obtaining unit, configured to obtain security level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
Further, the system further comprises:
a tenth obtaining unit for obtaining a predetermined security level threshold;
a second determination unit configured to determine whether the security level information is within the predetermined security level threshold;
an eleventh obtaining unit, configured to obtain first warning information if the security level information is not within the predetermined security level threshold;
and the first reminding unit is used for reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
Further, the system further comprises:
a twelfth obtaining unit, configured to input the operating state information as input information into a first training model, where the first training model is obtained by training multiple sets of training data, and each set of training data in the multiple sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
a thirteenth obtaining unit, configured to obtain first output information of the first training model, where the first output information includes security level information of the first remote intelligent recorder.
Various changes and specific examples of the method for protecting a remote vulnerability patch in the first embodiment of fig. 1 are also applicable to the system for protecting a remote vulnerability patch in the present embodiment, and through the detailed description of the method for protecting a remote vulnerability patch, those skilled in the art can clearly know the method for implementing the system for protecting a remote vulnerability patch in the present embodiment, so for the sake of brevity of the description, detailed description is not provided here.
An electronic device of an embodiment of the present invention is described below with reference to fig. 3. Fig. 3 shows a structure of an electronic apparatus according to an embodiment of the present invention.
Based on the inventive concept of the method for protecting a remote bug patch in the foregoing embodiment, a third embodiment of the present invention provides a system for protecting a remote bug patch, in which a computer program is stored, and when the computer program is executed by a processor, the method for protecting a remote bug patch according to the first embodiment of the present invention is implemented.
Where in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
Various changes and specific examples of the intelligent wave recorder safety protection method in the foregoing embodiment are also applicable to the intelligent wave recorder safety protection system in this embodiment, and through the foregoing detailed description of the first embodiment of the present invention, those skilled in the art can clearly know the implementation of the intelligent wave recorder safety protection system in this embodiment, so for the sake of brevity of the description, detailed descriptions are not provided herein.
From the above, compared with the prior art, the embodiment of the invention has the following beneficial effects: the method comprises the steps of obtaining first remote monitoring information, judging whether a first remote intelligent oscillograph has a leak or not by adopting the obtained first remote monitoring information, and then carrying out patch correction on a system leak existing in the intelligent oscillograph, wherein the first remote patch is sent to the first remote intelligent oscillograph after being encrypted through a first channel and then is installed after being decrypted through a second channel, so that the technical effect of remotely monitoring the operating system leak and the patch installation state of the oscillograph remotely accessed to a main station is achieved, and the source and the transmission security of a patch program of the oscillograph are improved;
the operation state information is input into a first training model as input information by adopting a training model of a neural network, the first training model is obtained through training of a plurality of groups of training data, the first output information which is accurate and convergent is obtained, so that accurate safety level information is obtained, whether the safety level information is within a preset safety level threshold value is judged, and then the first early warning information is obtained, so that the technical effect of realizing the sensible safety state after patch installation is achieved.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. A method for protecting a remote vulnerability patch, comprising:
step S1, obtaining first remote monitoring information;
step S2, judging whether a system bug exists in the first remote intelligent oscillograph according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch;
step S3, the first remote patch is encrypted to obtain a first remote encrypted patch;
step S4, the first remote encrypted patch is sent to the first remote intelligent wave recorder, and the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch.
2. The method for protecting a remote vulnerability patch according to claim 1, wherein the step S4 of sending the first remote encryption patch to the first remote intelligent recorder specifically includes:
step S41, obtaining a first channel, wherein the first channel connects the first remote intelligent wave recorder and a first wave recorder master station in an encrypted communication manner;
step S42, sending the first remote encrypted patch to the first remote intelligent recorder through the first channel.
3. The method for protecting a remote vulnerability patch according to claim 2, wherein the step S4 is performed by a first remote intelligent recorder after the first remote encrypted patch is decrypted, and specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent wave recorder and a first wave recorder main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, sending the first decoding information to the first remote intelligent recorder through the second channel;
step S46, decrypting the first remote encrypted patch according to the first decoding information.
4. The method for protecting a remote vulnerability patch according to claim 1, wherein the step S4 is followed by further comprising:
step S51, obtaining second remote monitoring information;
step S52, obtaining the running state information of the first remote intelligent oscillograph according to the second remote monitoring information;
and step S53, obtaining the safety level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
5. The method of claim 1, further comprising:
step S61, obtaining a preset safety level threshold value;
step S62, determining whether the security level information is within the predetermined security level threshold;
step S63, if the safety level information is not within the preset safety level threshold, obtaining first early warning information;
and S64, reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
6. The method for protecting a remote vulnerability patch according to claim 4, wherein the step S53 specifically comprises:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
7. A remote vulnerability patch protection system, comprising:
a first obtaining unit, configured to obtain first remote monitoring information;
the first judging unit is used for judging whether a system leak exists in the first remote intelligent oscillograph according to the first remote monitoring information;
a second obtaining unit, configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit, configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit, configured to send the first remote encrypted patch to the first remote intelligent recorder;
and the first installation unit is used for installing the first remote intelligent wave recorder after decrypting the first remote encryption patch.
8. The remote vulnerability patch protection system of claim 7, further comprising:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
9. The remote vulnerability patch protection system of claim 8, further comprising:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain first decoding information;
a third sending unit, configured to send the first decoded information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
10. A remote vulnerability patch protection system, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the remote vulnerability patch protection method of any of claims 1-6 when executing the program.
CN202110195853.5A 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system Active CN112905994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110195853.5A CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110195853.5A CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Publications (2)

Publication Number Publication Date
CN112905994A true CN112905994A (en) 2021-06-04
CN112905994B CN112905994B (en) 2023-02-03

Family

ID=76124275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110195853.5A Active CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Country Status (1)

Country Link
CN (1) CN112905994B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113741998A (en) * 2021-08-16 2021-12-03 国网河北省电力有限公司检修分公司 Data processing system and method of relay protection device with multiple plug-ins

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314382A (en) * 2020-03-20 2020-06-19 国家电网公司东北分部 Network safety protection method suitable for high-frequency emergency control system
CN112291222A (en) * 2020-10-22 2021-01-29 南方电网科学研究院有限责任公司 Electric power edge calculation safety protection system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314382A (en) * 2020-03-20 2020-06-19 国家电网公司东北分部 Network safety protection method suitable for high-frequency emergency control system
CN112291222A (en) * 2020-10-22 2021-01-29 南方电网科学研究院有限责任公司 Electric power edge calculation safety protection system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113741998A (en) * 2021-08-16 2021-12-03 国网河北省电力有限公司检修分公司 Data processing system and method of relay protection device with multiple plug-ins
CN113741998B (en) * 2021-08-16 2023-10-20 国网河北省电力有限公司检修分公司 Data processing system and method of relay protection device with multiple plug-ins

Also Published As

Publication number Publication date
CN112905994B (en) 2023-02-03

Similar Documents

Publication Publication Date Title
US9425956B2 (en) Method and system for transferring firmware or software to a plurality of devices
RU2459369C2 (en) Method and device for real-time message transfer
CN110225038B (en) Method, device and system for industrial information security
CN111130800A (en) Trusted prediction machine implementation method and device based on TEE
CN102571804B (en) Method for first logging in Internet of Things centre based on product identification code
CN112905994B (en) Remote vulnerability patch program protection method and system
CN112182551A (en) PLC equipment identity authentication system and PLC equipment identity authentication method
CN116684870B (en) Access authentication method, device and system of electric power 5G terminal
CN107872794A (en) Channel connection control method and device
CN117220752B (en) Satellite-ground data transmission link safety transmission system and method
CN117097551A (en) Industrial control system communication protocol security enhancement method, system, equipment and storage medium
CN117668783A (en) Processing method based on substrate management controller in server
CN112468493A (en) Data transmission method, identity recognition method and system based on field bus
CN108710804A (en) A kind of band hardware encryption Rapid Updating of computer UEFI firmwares
CN104636662A (en) Data processing method and terminal device
CN117335953A (en) Method for data processing in a computing environment with distributed computers
CN112995096A (en) Data encryption and decryption method, device and equipment
CN116017434A (en) Hierarchical processing, encrypting and checking method and system for rail transit data
CN111045704A (en) Method and equipment for safely upgrading high-end AMI (advanced metering infrastructure) acquisition and analysis equipment of smart grid
US20140189345A1 (en) Method for defining a filtering module, associated filtering module
CN114047947B (en) Method for controlling program version of circuit board card with double FPGA (field programmable Gate array) architectures
CN102804724B (en) The transfer of data of anti-manipulation between automation equipment
KR101885146B1 (en) Method and apparatus for protecting an application
CN113468559B (en) Firmware verification method and system
CN116048585B (en) Industrial control safety protection system and software updating method, device, equipment and medium thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant