CN112905994B - Remote vulnerability patch program protection method and system - Google Patents

Remote vulnerability patch program protection method and system Download PDF

Info

Publication number
CN112905994B
CN112905994B CN202110195853.5A CN202110195853A CN112905994B CN 112905994 B CN112905994 B CN 112905994B CN 202110195853 A CN202110195853 A CN 202110195853A CN 112905994 B CN112905994 B CN 112905994B
Authority
CN
China
Prior art keywords
remote
patch
information
channel
recorder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110195853.5A
Other languages
Chinese (zh)
Other versions
CN112905994A (en
Inventor
刘子俊
晋龙兴
修荣堃
黄福全
林子钊
周瑜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Co ltd
Original Assignee
Shenzhen Power Supply Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Co ltd filed Critical Shenzhen Power Supply Co ltd
Priority to CN202110195853.5A priority Critical patent/CN112905994B/en
Publication of CN112905994A publication Critical patent/CN112905994A/en
Application granted granted Critical
Publication of CN112905994B publication Critical patent/CN112905994B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a method and a system for protecting a remote vulnerability patch program, wherein the method comprises the following steps: obtaining first remote monitoring information; judging whether a system bug exists in the first remote intelligent recorder or not according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch; encrypting the first remote patch to obtain a first remote encrypted patch; sending the first remote encrypted patch to the first remote intelligent oscillograph; and the first remote intelligent wave recorder is used for installing the first remote encrypted patch after decryption processing. The method solves the technical problems of low source and transmission security of the bug patch program of the oscillograph in the prior art.

Description

Remote vulnerability patch program protection method and system
Technical Field
The invention relates to the technical field of network security remote maintenance of a wave recorder, in particular to a method and a system for protecting a remote vulnerability patch program.
Background
The intelligent oscillograph is a device which meets the requirements of relay protection and intelligent development of a safety automatic device, meanwhile, the safe operation of a power system is realized, and the maintenance of the safety of a bug repairing program of the oscillograph becomes an important component part of the safe operation of the intelligent substation based on the digitization and the networking development of the intelligent substation.
However, in the process of implementing the technical solution of the invention in the embodiments of the present application, the inventors of the present application find that the above-mentioned technology has at least the following technical problems:
the source and transmission security of the bug patch of the wave recorder is not high.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method and a system for protecting a remote bug patch, so as to improve the source and transmission security of a bug patch of a wave recorder.
In order to solve the above technical problem, an embodiment of the present invention provides a method for protecting a remote vulnerability patch, including:
step S1, first remote monitoring information is obtained;
s2, judging whether a system leak exists in the first remote intelligent oscillograph according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch;
s3, encrypting the first remote patch to obtain a first remote encrypted patch;
and S4, sending the first remote encrypted patch to the first remote intelligent recorder, and installing the first remote encrypted patch after the first remote intelligent recorder decrypts the first remote encrypted patch.
In step S4, sending the first remote encrypted patch to the first remote intelligent recorder specifically includes:
step S41, a first channel is obtained, and the first channel connects the first remote intelligent oscillograph and a first oscillograph master station in an encrypted communication manner;
and step S42, sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Wherein, in the step S4, the first remote intelligent oscillograph decrypts the first remote encrypted patch and then installs the first remote encrypted patch, which specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent oscillograph and a first oscillograph main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, the first decoding information is sent to the first remote intelligent recorder through the second channel;
and step S46, decrypting the first remote encryption patch according to the first decoding information.
Wherein, step S4 is followed by further comprising:
step S51, second remote monitoring information is obtained;
step S52, obtaining the running state information of the first remote intelligent oscillograph according to the second remote monitoring information;
and S53, acquiring the safety level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
The method for protecting the remote vulnerability patch program further comprises the following steps:
step S61, obtaining a preset safety level threshold value;
step S62, judging whether the safety level information is within the preset safety level threshold value;
step S63, if the safety level information is not within the preset safety level threshold value, first early warning information is obtained;
and S64, reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
Wherein, the step S53 specifically includes:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of groups of training data, and each group of training data in the plurality of groups of training data comprises: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
The invention also provides a remote vulnerability patch program protection system, which comprises:
a first obtaining unit, configured to obtain first remote monitoring information;
the first judging unit is used for judging whether a system bug exists in the first remote intelligent recorder or not according to the first remote monitoring information;
a second obtaining unit, configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit, configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit to send the first remote encrypted patch to the first remote intelligent recorder;
and the first installation unit is used for installing the first remote intelligent wave recorder after decrypting the first remote encryption patch.
Wherein, the remote vulnerability patch protection system further comprises:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Wherein, the remote vulnerability patch protection system further comprises:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain first decoding information;
a third sending unit, configured to send the first decoded information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
The invention also provides a remote vulnerability patch program protection system, which comprises: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the program to realize the remote vulnerability patch protection method.
The embodiment of the invention has the beneficial effects that: the patch correction is carried out on the system bug existing in the intelligent wave recorder through judgment through the obtained first remote monitoring information, the first remote patch is encrypted and then sent to the first remote intelligent wave recorder, and then the patch is installed after decryption, so that the remote monitoring on the operating system bug and the patch installation state of the wave recorder remotely accessed to the main station is achieved, and the sensible safety state after patch installation is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a method for protecting a remote vulnerability patch according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a remote vulnerability patch protection system according to a second embodiment of the present invention.
Fig. 3 is a schematic structural diagram of an exemplary electronic device in an embodiment of the present invention.
Detailed Description
The following description of the embodiments refers to the accompanying drawings, which are included to illustrate specific embodiments in which the invention may be practiced.
Referring to fig. 1, an embodiment of the present invention provides a method for protecting a remote bug patch, including:
step S1, first remote monitoring information is obtained;
s2, judging whether a system bug exists in the first remote intelligent recorder or not according to the first remote monitoring information; if the first remote intelligent recorder has a system leak, obtaining a first remote patch;
s3, encrypting the first remote patch to obtain a first remote encrypted patch;
and S4, sending the first remote encrypted patch to the first remote intelligent recorder, and installing the first remote encrypted patch after the first remote intelligent recorder decrypts the first remote encrypted patch.
Specifically, in step S1, the first remote monitoring information is information obtained by the intelligent wave recording master station performing remote monitoring on a vulnerability of an operating system of the remote intelligent wave recorder, wherein the remote monitoring system is built by using a sensor and has the advantage of maximizing performance cost, so that data information obtained by remote monitoring based on the database service center is more perfect and scientific.
In the step S2, the system bug refers to a defect or an error of a remote wave recording operating system in logic, and the first remote patch refers to a small program for repairing defects and problems of the operating system of the remote wave recording master station, wherein the system bug can be usually utilized by an illegal person, and the whole system is attacked or controlled by implanting trojans and viruses, so that whether the system bug exists in the intelligent wave recorder operating system can be timely judged according to the first remote monitoring information, the first remote patch is obtained, damage is timely repaired, and the technical effects of improving software performance and improving the use safety of the wave recorder are achieved.
In step S3, the encryption process is a technical means of encrypting the first remote patch according to an encryption algorithm by using a key, wherein the encryption algorithm mainly combines common information with a string of numbers to generate an unintelligible ciphertext, and has more selectivity, including performing iterative encryption of data through permutation and replacement operations, realizing grouping and obfuscating password design by using the key and the ciphertext, and converting a plaintext into a smaller ciphertext to realize encryption in an irreversible manner. At this time, the first remote encryption patch obtained after encryption processing has stronger confidentiality and security, so that the protection function of the remote bug program is enhanced.
In step S4, the decryption process refers to a technical means for decrypting the encrypted first remote patch again when the remote intelligent recorder installs the first remote encrypted patch, wherein the secret key is an algorithm for encoding and decrypting data, in this embodiment, the security of the first remote patch in the network transportation process is ensured by using a proper secret key encryption technology, and then the first remote patch is restored, i.e., decrypted, after using a technology the same as or different from the encryption technology, the first remote intelligent recorder needs to decrypt the first remote encrypted patch before installing and repairing the vulnerability, thereby achieving the technical effect of ensuring that the patch is in a secure state after being installed.
Further, the sending the first remote encryption patch to the first remote intelligent recorder in step S4 specifically includes:
step S41, a first channel is obtained, and the first channel connects the first remote intelligent oscillograph and a first oscillograph master station in an encrypted communication manner;
and step S42, sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Specifically, the first channel is a transport channel specially used for transmitting a patch, the encrypted first remote encrypted patch can be obtained by connecting the first recorder master station for encrypted communication, and then the encrypted first remote encrypted patch is sent to the first remote intelligent recorder, and the first remote patch is timely encrypted through the established first channel, so that the technical effect of maintaining the security and the encryption performance of the first remote patch is achieved.
Further, in step S4, the first remote intelligent wave recorder decrypts the first remote encrypted patch and then installs the decrypted patch, which specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent oscillograph and a first oscillograph main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, the first decoding information is sent to the first remote intelligent recorder through the second channel;
and step S46, decrypting the first remote encryption patch according to the first decoding information.
Specifically, the second channel refers to a transport channel dedicated to transmitting decoding information, and the first channel is different from the second channel; the first decoding information is a corresponding decryption code required for decrypting the first remote encrypted patch. If different encryption algorithms are adopted, the cipher physiques corresponding to cipher keys are different, therefore, the first decoding information is sent to the first remote intelligent recorder through the second channel, then the first remote encryption patch is decrypted and installed with a patch, wherein the first decoding information transmitted by the second channel is independently owned by the system, and therefore the transmission channels respectively established achieve the technical effect of high encryption of the transmission information.
Further, step S4 is followed by:
step S51, second remote monitoring information is obtained;
step S52, obtaining the running state information of the first remote intelligent recorder according to the second remote monitoring information;
and S53, acquiring the safety level information of the first remote intelligent wave recorder according to the running state information of the first remote intelligent wave recorder.
Specifically, the second remote monitoring information is information obtained by remotely monitoring the state of the installed remote intelligent recorder patch by the intelligent recorder, and then safety level information is obtained according to the running state of the first remote intelligent recorder, wherein the safety level information is judged according to the running state of the installed recorder patch, so that the technical effect of sensible safety state of the installed patch is achieved.
Further, the embodiment of the present invention further includes:
step S61, obtaining a preset safety level threshold value;
step S62, judging whether the safety level information is within the preset safety level threshold value;
step S63, if the safety level information is not within the preset safety level threshold value, first early warning information is obtained;
and S64, reminding the first remote intelligent recorder of potential safety hazards according to the first early warning information.
Specifically, the preset safety level threshold value is an information safety level protection threshold value preset in advance, the first early warning information is early warning information for reminding a wave recorder of potential safety hazard, the preset safety level threshold value is determined to be a threshold value for ensuring that the first remote intelligent wave recorder meets the use standard, and if the first remote intelligent wave recorder is judged not to be in the preset safety level threshold value, the first remote intelligent wave recorder is reminded of potential safety hazard according to the obtained first early warning information, so that the safety state after patch installation is timely determined, and the technical effect of safely controlling the wave recorder is further improved.
Further, step S53 specifically includes:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
Specifically, the first remote intelligent oscillograph security level information needs to be obtained according to accurate operation state information, the training model is a model capable of continuously performing self-training learning according to different actual conditions, further, the training model is a Neural network model, the Neural network model is a Neural network model in machine learning, and a Neural Network (NN) is a complex Neural network system formed by widely connecting a large number of simple processing units (called neurons), reflects many basic characteristics of human brain functions, and is a highly complex nonlinear dynamical learning system Neural network model described based on a mathematical model of the neurons. Artificial Neural Networks (Artificial Neural Networks) are a description of the first-order properties of the human brain system. Briefly, it is a mathematical model. Training based on a large amount of training data, wherein each set of training data comprises: the operation state information and the identification information used for identifying the safety level of the first remote intelligent recorder, the neural network model is continuously corrected by itself, and when the output information of the neural network model reaches the preset accuracy rate/reaches the convergence state, the supervised learning process is ended. Through data training of the neural network model, based on the characteristic that the data are processed more accurately after the training of the training model, the safety level information of the first remote intelligent recorder output by the first training model is more accurate, and the technical effect of accurately judging the safety level is achieved.
Based on the same inventive concept as the one of the foregoing embodiments, a remote vulnerability patch protection method, a second embodiment of the present invention provides a remote vulnerability patch protection system, as shown in fig. 2, the system includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain first remote monitoring information;
the first judging unit 12 is configured to judge whether a system leak exists in the first remote intelligent recorder according to the first remote monitoring information by the first judging unit 12;
a second obtaining unit 13, where the second obtaining unit 13 is configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit 14, where the third obtaining unit 14 is configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit 15, where the first sending unit 15 is configured to send the first remote encrypted patch to the first remote intelligent recorder;
a first installation unit 16, where the first installation unit 16 is configured to decrypt the first remote encrypted patch by the first remote intelligent recorder and then install the decrypted patch.
Further, the system further comprises:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
Further, the system further comprises:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain first decoding information;
a third sending unit, configured to send the first decoding information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
Further, the system further comprises:
a seventh obtaining unit, configured to obtain second remote monitoring information;
an eighth obtaining unit, configured to obtain, according to the second remote monitoring information, operating state information of the first remote intelligent oscillograph;
a ninth obtaining unit, configured to obtain, according to the running state information of the first remote intelligent oscillograph, security level information of the first remote intelligent oscillograph.
Further, the system further comprises:
a tenth obtaining unit for obtaining a predetermined security level threshold;
a second determination unit configured to determine whether the security level information is within the predetermined security level threshold;
an eleventh obtaining unit, configured to obtain first warning information if the security level information is not within the predetermined security level threshold;
and the first reminding unit is used for reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
Further, the system further comprises:
a twelfth obtaining unit, configured to input the operating state information as input information into a first training model, where the first training model is obtained through training of multiple sets of training data, and each set of training data in the multiple sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
a thirteenth obtaining unit, configured to obtain first output information of the first training model, where the first output information includes security level information of the first remote intelligent recorder.
Various changes and specific examples of the method for protecting a remote vulnerability patch in the first embodiment of fig. 1 are also applicable to the system for protecting a remote vulnerability patch in the present embodiment, and through the detailed description of the method for protecting a remote vulnerability patch, those skilled in the art can clearly know the method for implementing the system for protecting a remote vulnerability patch in the present embodiment, so for the sake of brevity of the description, detailed description is not provided here.
An electronic device of an embodiment of the present invention is described below with reference to fig. 3. Fig. 3 shows a structure of an electronic apparatus according to an embodiment of the present invention.
Based on the inventive concept of the method for protecting a remote bug patch in the foregoing embodiment, a third embodiment of the present invention provides a system for protecting a remote bug patch, in which a computer program is stored, and when the computer program is executed by a processor, the method for protecting a remote bug patch according to the first embodiment of the present invention is implemented.
Wherein in fig. 3 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
Various changes and specific examples of the intelligent wave recorder safety protection method in the foregoing embodiment are also applicable to the intelligent wave recorder safety protection system in this embodiment, and through the foregoing detailed description of the first embodiment of the present invention, those skilled in the art can clearly know the implementation of the intelligent wave recorder safety protection system in this embodiment, so for the sake of brevity of the description, detailed descriptions are not provided herein.
From the above, compared with the prior art, the embodiment of the invention has the following beneficial effects: the method comprises the steps of obtaining first remote monitoring information, judging whether a first remote intelligent oscillograph has a leak or not by adopting the obtained first remote monitoring information, and then carrying out patch correction on a system leak existing in the intelligent oscillograph, wherein the first remote patch is sent to the first remote intelligent oscillograph after being encrypted through a first channel and then is installed after being decrypted through a second channel, so that the technical effect of remotely monitoring the operating system leak and the patch installation state of the oscillograph remotely accessed to a main station is achieved, and the source and the transmission security of a patch program of the oscillograph are improved;
the method comprises the steps of adopting a training model of a neural network, inputting the running state information as input information into a first training model, training by multiple groups of training data to obtain the first training model, obtaining accurate and convergent first output information so as to obtain accurate safety level information, judging whether the safety level information is within a preset safety level threshold value, and further obtaining first early warning information, so that the technical effect of realizing the sensible safety state after patch installation is achieved.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. A method for protecting a remote vulnerability patch, comprising:
step S1, first remote monitoring information is obtained;
s2, judging whether a system leak exists in the first remote intelligent oscillograph according to the first remote monitoring information; if the first remote intelligent recorder has a system bug, obtaining a first remote patch;
s3, encrypting the first remote patch to obtain a first remote encrypted patch;
and S4, sending the first remote encrypted patch to the first remote intelligent wave recorder, and installing the first remote intelligent wave recorder after decrypting the first remote encrypted patch.
2. The method for protecting a remote vulnerability patch according to claim 1, wherein the step S4 of sending the first remote encrypted patch to the first remote intelligent oscillograph specifically includes:
step S41, a first channel is obtained, and the first channel connects the first remote intelligent oscillograph and a first oscillograph master station in an encrypted communication manner;
and step S42, sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
3. The method for protecting a remote vulnerability patch according to claim 2, wherein the step S4 is that the first remote intelligent recorder decrypts the first remote encrypted patch and then installs the first remote encrypted patch, which specifically includes:
step S43, a second channel is obtained, the first channel carries out encryption communication connection on the first remote intelligent oscillograph and a first oscillograph main station, and the second channel is different from the first channel;
step S44, obtaining first decoding information;
step S45, the first decoding information is sent to the first remote intelligent oscillograph through the second channel;
and step S46, decrypting the first remote encryption patch according to the first decoding information.
4. The method of claim 1, further comprising, after step S4:
step S51, second remote monitoring information is obtained;
step S52, obtaining the running state information of the first remote intelligent recorder according to the second remote monitoring information;
and S53, obtaining the safety level information of the first remote intelligent recorder according to the running state information of the first remote intelligent recorder.
5. The method of claim 1, further comprising:
step S61, obtaining a preset safety level threshold value;
step S62, judging whether the safety level information is within the preset safety level threshold value;
step S63, if the safety level information is not within the preset safety level threshold value, first early warning information is obtained;
and S64, reminding the first remote intelligent recorder of potential safety hazard according to the first early warning information.
6. The method for protecting a remote vulnerability patch according to claim 4, wherein the step S53 specifically comprises:
step S531, inputting the operating state information as input information into a first training model, wherein the first training model is obtained by training a plurality of sets of training data, and each set of training data in the plurality of sets includes: the running state information and identification information used for identifying the safety level of the first remote intelligent recorder;
step S532, obtaining first output information of the first training model, wherein the first output information includes safety level information of the first remote intelligent recorder.
7. A remote vulnerability patch protection system, comprising:
a first obtaining unit, configured to obtain first remote monitoring information;
the first judging unit is used for judging whether a system leak exists in the first remote intelligent oscillograph according to the first remote monitoring information;
a second obtaining unit, configured to obtain a first remote patch if the first remote intelligent recorder has a system bug;
a third obtaining unit, configured to perform encryption processing on the first remote patch to obtain a first remote encrypted patch;
a first sending unit to send the first remote encrypted patch to the first remote intelligent recorder;
and the first installation unit is used for installing the first remote intelligent recorder after decrypting the first remote encrypted patch.
8. The remote vulnerability patch protection system of claim 7, further comprising:
a fourth obtaining unit, configured to obtain a first channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner;
and the second sending unit is used for sending the first remote encryption patch to the first remote intelligent recorder through the first channel.
9. The remote vulnerability patch protection system of claim 8, further comprising:
a fifth obtaining unit, configured to obtain a second channel, where the first channel connects the first remote intelligent oscillograph with a first oscillograph master station in an encrypted communication manner, and the second channel is different from the first channel;
a sixth obtaining unit configured to obtain the first decoding information;
a third sending unit, configured to send the first decoded information to the first remote intelligent recorder through the second channel;
a first processing unit, configured to perform decryption processing on the first remote encrypted patch according to the first decoding information.
10. A remote vulnerability patch protection system, comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the remote vulnerability patch protection method of any of claims 1-6 when executing the program.
CN202110195853.5A 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system Active CN112905994B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110195853.5A CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110195853.5A CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Publications (2)

Publication Number Publication Date
CN112905994A CN112905994A (en) 2021-06-04
CN112905994B true CN112905994B (en) 2023-02-03

Family

ID=76124275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110195853.5A Active CN112905994B (en) 2021-02-22 2021-02-22 Remote vulnerability patch program protection method and system

Country Status (1)

Country Link
CN (1) CN112905994B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113741998B (en) * 2021-08-16 2023-10-20 国网河北省电力有限公司检修分公司 Data processing system and method of relay protection device with multiple plug-ins

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314382B (en) * 2020-03-20 2022-07-22 国家电网公司东北分部 Network safety protection method suitable for high-frequency emergency control system
CN112291222B (en) * 2020-10-22 2022-10-28 南方电网科学研究院有限责任公司 Electric power edge calculation safety protection system and method

Also Published As

Publication number Publication date
CN112905994A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN103546576B (en) A kind of embedded device remote automatic upgrading method and system
EP2856695B1 (en) A method and system for transferring firmware or software to a plurality of devices
RU2459369C2 (en) Method and device for real-time message transfer
CN110225038B (en) Method, device and system for industrial information security
CN102571804B (en) Method for first logging in Internet of Things centre based on product identification code
CN112905994B (en) Remote vulnerability patch program protection method and system
CN104135531A (en) Method and device of upgrading Web software
CN117390637B (en) Method and system for protecting safety of safety access area system
CN107872794A (en) Channel connection control method and device
CN108710804A (en) A kind of band hardware encryption Rapid Updating of computer UEFI firmwares
CN111045704B (en) Method and equipment for safety upgrading of intelligent power network high-end AMI acquisition and analysis equipment
CN112182551A (en) PLC equipment identity authentication system and PLC equipment identity authentication method
CN104636662A (en) Data processing method and terminal device
CN117335953A (en) Method for data processing in a computing environment with distributed computers
CN116017434A (en) Hierarchical processing, encrypting and checking method and system for rail transit data
CN100596350C (en) Method for encrypting and decrypting industrial control data
CN113746642B (en) Method and system for communication between computers
US20140189345A1 (en) Method for defining a filtering module, associated filtering module
CN112468493A (en) Data transmission method, identity recognition method and system based on field bus
CN114047947B (en) Method for controlling program version of circuit board card with double FPGA (field programmable Gate array) architectures
CN116684870B (en) Access authentication method, device and system of electric power 5G terminal
CN110138811B (en) Encryption method for data transmission of Internet of things
CN115412244B (en) Method, system and equipment for updating encrypted firmware on line
CN113468559B (en) Firmware verification method and system
CN115065843B (en) Video encryption and decryption processing method and system under security authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant