CN114640481A - Block chain-based substation control system platform APP safety management method - Google Patents

Block chain-based substation control system platform APP safety management method Download PDF

Info

Publication number
CN114640481A
CN114640481A CN202011385239.7A CN202011385239A CN114640481A CN 114640481 A CN114640481 A CN 114640481A CN 202011385239 A CN202011385239 A CN 202011385239A CN 114640481 A CN114640481 A CN 114640481A
Authority
CN
China
Prior art keywords
app
control system
block chain
safety
substation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011385239.7A
Other languages
Chinese (zh)
Other versions
CN114640481B (en
Inventor
田华
翟桂锋
金岩磊
葛立青
王建锋
唐孝舟
张军华
谢文君
杨扬
刘青红
王小平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NR Electric Co Ltd
NR Engineering Co Ltd
Original Assignee
NR Electric Co Ltd
NR Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NR Electric Co Ltd, NR Engineering Co Ltd filed Critical NR Electric Co Ltd
Priority to CN202011385239.7A priority Critical patent/CN114640481B/en
Publication of CN114640481A publication Critical patent/CN114640481A/en
Application granted granted Critical
Publication of CN114640481B publication Critical patent/CN114640481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Operations Research (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a block chain-based substation control system platform APP safety management method, which comprises the following steps: (1) a block chain server is deployed in a transformer substation security III area; (2) generating a key pair and registering security data; (3) submitting a global configuration signature; (4) the APP mirror image installation authorization is checked, and after the APP mirror image installation authorization is checked successfully, the APP is started or keeps running; (5) network access check during APP operation; (6) checking resource access during APP operation; (7) and checking the authority during the APP operation. The block chain server is configured in the area III of the intelligent substation control system, so that the non-tampering and traceability of the safety management configuration process of all APPs of the substation control system are realized, and the safety sharing of the APPs of the substation control system under an open system is ensured; the installation safety, the network access safety, the resource occupation safety and the file directory access safety of the APP in the station control system are improved.

Description

Block chain-based substation control system platform APP safety management method
Technical Field
The invention relates to a substation control system platform APP safety management method for a substation, in particular to a substation control system platform APP safety management method based on a block chain.
Background
The existing substation control system adopts an open platform and specialized APP mode, wherein a basic platform realizes unified modeling of information of a total station, unified acquisition and management of data, standardized service access interfaces such as resource management, data management, public service and application management are provided, flexible extension of various applications is realized, and specific intelligent specialized functions are realized by the applications of various specialized APPs based on the platform. Through a platform + application construction mode, a co-construction, sharing and open ecosystem is created in an effort. But the specialized APP is various, and under the open shared ecosystem, the safety risks of the substation control system platform APP are as follows: 1) unauthorized and tampered APP installation; 2) the APP accesses IP outside the network address range; 3) the APP excessively occupies the CPU, the memory, the disk and the network resource of the system; 4) the APP has unauthorized access to external file directories. The existence of the above-mentioned risk makes the station control system platform APP safety control inefficiency of transformer substation, unable guarantee APP system safety in the operation.
Disclosure of Invention
The purpose of the invention is as follows: the invention aims to provide a block chain-based substation control system APP safety management method which is high in APP safety management efficiency and ensures system safety in an APP operation process.
The technical scheme is as follows: the invention discloses a block chain-based substation control system platform APP safety management method, which comprises the following steps: (1) a block chain server is deployed in a transformer substation security III area; (2) generating a key pair and registering security data; (3) submitting a global configuration signature; (4) the APP mirror image installation authorization is checked, and after the APP mirror image installation authorization is checked successfully, the APP is started or keeps running; (5) network access check during APP operation; (6) checking resource access during APP operation; (7) authority checking during APP operation; and (5), step (6) and step (7), if the verification fails, terminating the APP installation and operation.
In the step (1), a block chain server is deployed in a safety III area of the station control system of the intelligent substation, a block chain client is deployed on the block chain server and used for accessing a distributed account book, and meanwhile, an APP safety management global configuration information access interface is provided for a safety I area.
In the step (2), the intelligent substation operating personnel generate an APP manager public key and a private key and an APP information maintenance public key and a private key through the blockchain server, and submit the APP security management global configuration in a blockchain transaction mode.
After the debugging of a certain APP of the intelligent substation station control system is finished in the step (3), the APP debugging maintenance personnel submit the APP information, and the APP security management global configuration is updated to the chain in a block chain transaction mode.
And (4) based on the APP safety management global configuration on the block chain, the APP manager of the station control system host checks the APP mirror image installation request, if the check fails, the installation is stopped, and if the check succeeds, the installation is executed and the APP operation is started.
And (5) based on APP security management of APP network access configuration information in global configuration on the block chain, monitoring network access behaviors during the APP operation by a station control system host APP manager, and stopping the APP operation when the out-of-limit behaviors are monitored.
And (6) based on APP security management of APP resource configuration information in global configuration on the block chain, monitoring resource occupation conditions during APP operation by a station control system host APP manager, and stopping APP operation when out-of-limit behaviors are monitored.
And (7) based on APP safety management on the block chain, managing APP file directory access authority configuration information in the global configuration, monitoring file network access behaviors of the APP during the operation period by a station control system host APP manager, and stopping the APP operation when the out-of-limit behaviors are monitored.
Compared with the prior art, the invention has the following remarkable effects: 1. by configuring a block chain server in a zone III of the intelligent substation control system to generate an APP manager public key and a private key, the non-tampering and traceability of the APP security management configuration process in the substation control system of the substation can be realized, and the safe sharing of the APP of the substation control system under an open system is ensured; 2. the installation safety, the network access safety, the resource occupation safety and the file directory access safety of all APPs of the station control system are improved under the endorsement of the block chain public chain.
Drawings
FIG. 1 is a general flow chart of the present invention;
FIG. 2 is a diagram of a station control system architecture of the present invention;
fig. 3 is a diagram of an APP security management global configuration data structure of the station control system in a block chain according to the present invention;
FIG. 4 is a diagram of an APP information configuration data structure in a blockchain of the station control system according to the present invention;
fig. 5 is an architecture diagram of a station control system APP platform of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and the detailed description.
Fig. 1 is a general flowchart of the block chain-based APP security management method for the station control system platform of the present invention, and fig. 2 is a schematic diagram of the architecture of the station control system of the present invention, including the following steps:
step 1, configuring a block chain server in a monitoring system III area of an intelligent substation, deploying a block chain client on the block chain server to access a distributed account book, and providing an access interface for a safety I area.
Step 2, generating an APP manager public key and a private key by an intelligent substation operator through a block chain server; the APP information maintains a public key and a private key. The above techniques and management endorsements are risky, for example, related algorithms are broken, keys are leaked, and the related algorithms and management measures need to be updated synchronously. Submitting secure registration information (including APP information maintenance public key and current APP number) with APP manager private key signature to generate APP security management global configuration, the global configuration data structure is shown in fig. 3, and includes the following parts:
1) and (4) signing by an engineer, wherein the signature is generated by encrypting the whole data structure by using an APP manager private key and is used for identifying whether the data structure is tampered.
2) And the time stamp represents the generation time of the whole data structure on the block chain and is used for identifying the version update of the data structure.
3) And the safety registration data comprises the whole APP information maintenance public key and the APP quantity, and is used for identifying the identity of the APP information maintainer.
4) The APP information data includes an APP information maintenance public key, a signature, an APP index number, a network access configuration, a resource access configuration, a file directory authority access configuration, a mirror image file HASH, and a timestamp, and is used for identifying registration information of the APP, and the APP information data result is shown in fig. 4.
And step 3, after the APP of the intelligent substation station control system is debugged, the APP debugging maintenance personnel submit the APP image file HASH and the APP network access configuration by using the APP information dimension private key signature, and finally the APP is packaged and signed by the APP manager private key to update the APP security management global configuration in a transaction mode.
Step 4, after the APP manager on the station control system host receives an installation request of an APP (TESSTAPP) image, the station control system host is connected with the block chain server in the security III area, reads the latest APP security management global configuration (according to a time stamp) of the private key signature of the APP manager, and performs HASH calculation on the TESSTAPP image file to obtain a local APP image file HASH to be installed; checking whether the TESSTAPP image file HASH is consistent with an image file HASH in certain APP information configuration in the APP security management global configuration, and if the TESSTAPP image file HASH is inconsistent with the image file HASH in certain APP information configuration in the APP security management global configuration, the installation is aborted after the checking is failed; and after the verification is successful, the APP manager executes the TESSTAPP mirror image installation, and the operation is started after the installation is finished.
And step 5, in the operation process of the TESSTAPP, connecting the APP manager station control system host to the block chain server in the security III area, reading the latest APP security management global configuration (according to the time stamp) signed by the APP manager private key, monitoring the network access behavior of the TESSTAPP in real time based on the global configuration, and if the TESSTAPP is monitored to have an IP and a port for accessing the TESSTAPP except the corresponding network configuration, stopping the TESSTAPP operation by the APP manager.
And 6, in the operation process of the TESSTAPP, connecting the APP manager station control system host to the block chain server in the safety III area, reading the latest APP safety management global configuration (according to the timestamp) signed by the APP manager private key, monitoring the resource occupation behavior of the TESSTAPP in real time based on the global configuration, and stopping the TESSTAPP operation by the APP manager if the TESSTAPP is monitored to occupy the CPU, the memory, the disk and the network resource which exceed the limit of the TESSTAPP outside the corresponding resource configuration.
And 7, in the operation process of the TESSTAPP, connecting the APP manager station control system host to the block chain server in the security III area, reading the latest APP security management global configuration (according to the time stamp) signed by the APP manager private key, monitoring the file directory access behavior of the TESSTAPP in real time based on the global configuration, and stopping the TESSTAPP operation by the APP manager if the TESSTAPP is monitored to have the file directory behavior except the corresponding directory authority configuration.
The APP platforms in the station control system shown in fig. 5 are executed according to the steps (1) to (7) described above.
The above embodiments are only for illustrating the technical solutions of the present invention, and the protection scope of the present invention is not limited thereby, and any modifications made on the basis of the technical solutions proposed by the present invention fall within the protection scope of the present invention.

Claims (8)

1. A transformer substation station control system platform APP safety management method based on a block chain is characterized by comprising the following steps: (1) a block chain server is deployed in a transformer substation security III area; (2) generating a key pair and registering security data; (3) submitting a global configuration signature; (4) the APP mirror image installation authorization is checked, and after the APP mirror image installation authorization is checked successfully, the APP is started or keeps running; (5) network access check during APP operation; (6) checking resource access during APP operation; (7) checking authority during APP operation; and (5), step (6) and step (7), if the verification fails, terminating the APP installation and operation.
2. The block chain-based substation control system platform APP safety management method according to claim 1, characterized in that: in the step (1), a block chain server is deployed in a safety III area of the station control system of the intelligent substation, a block chain client is deployed on the block chain server and used for accessing a distributed account book, and meanwhile, an APP safety management global configuration information access interface is provided for a safety I area.
3. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: in the step (2), the intelligent substation operating personnel generate an APP manager public key and a private key and an APP information maintenance public key and a private key through the blockchain server, and submit the APP security management global configuration in a blockchain transaction mode.
4. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: after the debugging of a certain APP of the intelligent substation station control system is finished in the step (3), the APP debugging maintenance personnel submit the APP information, and the APP security management global configuration is updated to the chain in a block chain transaction mode.
5. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: and (4) based on the APP safety management global configuration on the block chain, the APP manager of the station control system host checks the APP mirror image installation request, if the check fails, the installation is stopped, and if the check succeeds, the installation is executed and the APP operation is started.
6. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: and (5) based on APP security management of APP network access configuration information in global configuration on the block chain, monitoring network access behaviors during the APP operation by a station control system host APP manager, and stopping the APP operation when the out-of-limit behaviors are monitored.
7. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: and (6) based on APP security management of APP resource configuration information in global configuration on the block chain, monitoring resource occupation conditions during APP operation by a station control system host APP manager, and stopping APP operation when out-of-limit behaviors are monitored.
8. The block chain-based substation control system platform APP security management method of claim 1, characterized in that: and (7) based on APP safety management on the block chain, managing APP file directory access authority configuration information in the global configuration, monitoring file network access behaviors of the APP during the operation period by a station control system host APP manager, and stopping the APP operation when the out-of-limit behaviors are monitored.
CN202011385239.7A 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method Active CN114640481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011385239.7A CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011385239.7A CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Publications (2)

Publication Number Publication Date
CN114640481A true CN114640481A (en) 2022-06-17
CN114640481B CN114640481B (en) 2023-09-08

Family

ID=81944748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011385239.7A Active CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Country Status (1)

Country Link
CN (1) CN114640481B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200195421A1 (en) * 2018-12-12 2020-06-18 Hewlett Packard Enterprise Development Lp Mining for internet access
CN111401953A (en) * 2020-03-14 2020-07-10 广东洪心电子商务科技股份有限公司 Block chain-based consumer mutual drainage method and device
CN111682637A (en) * 2020-04-15 2020-09-18 南京南瑞继保电气有限公司 Intelligent linkage implementation method for auxiliary equipment of transformer substation based on alarm driving

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200195421A1 (en) * 2018-12-12 2020-06-18 Hewlett Packard Enterprise Development Lp Mining for internet access
CN111401953A (en) * 2020-03-14 2020-07-10 广东洪心电子商务科技股份有限公司 Block chain-based consumer mutual drainage method and device
CN111682637A (en) * 2020-04-15 2020-09-18 南京南瑞继保电气有限公司 Intelligent linkage implementation method for auxiliary equipment of transformer substation based on alarm driving

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王宏延;完颜绍澎;顾舒娴;于佳;: "区块链技术在泛在电力物联网中的研究", 山东电力技术, no. 11 *

Also Published As

Publication number Publication date
CN114640481B (en) 2023-09-08

Similar Documents

Publication Publication Date Title
CN110826111A (en) Test supervision method, device, equipment and storage medium
CN108038384B (en) High-safety cluster shared storage virtualization method
CN110598375B (en) Data processing method, device and storage medium
CN110011848B (en) Mobile operation and maintenance auditing system
CN110782251A (en) Method for automatically deploying block chain network based on intelligent contracts
CN111414612B (en) Security protection method and device for operating system mirror image and electronic equipment
CN112700246B (en) Block chain-based data processing method, device, equipment and readable storage medium
JP2007280096A (en) Log maintenance method, program, and system
CN110597541B (en) Interface updating processing method, device, equipment and storage medium based on block chain
CN113111389A (en) Information management method and device of measuring equipment
CN113132318A (en) Active defense method and system for information safety of power distribution automation system master station
CN104464114A (en) System and method for managing and monitoring safety of application of financial terminals
CN110881186B (en) Illegal device identification method and device, electronic device and readable storage medium
CN111339141A (en) Data transmission method, block link node equipment and medium
CN114629677A (en) Safety protection system and method for thermal power generating unit electric quantity charging system
CN110705712A (en) Artificial intelligence basic resource and technology open platform for third-party social service
CN114640481B (en) Block chain-based substation station control system platform APP security management method
CN112491545A (en) Credible hybrid cloud management platform, access method and system
CN111797410A (en) Multi-server authorization control method and device
CN115017480A (en) Computer safety protection management and control system based on intelligent control
CN111698227B (en) Information synchronization management method, device, computer system and readable storage medium
CN114036560A (en) Charging pile subsidy data management method based on block chain
CN111445035B (en) Store equipment management system based on block chain
CN111984999B (en) Safety management and control method and system for power failure first-aid repair system
CN102739690A (en) Safety data exchange process monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant