CN114640481B - Block chain-based substation station control system platform APP security management method - Google Patents

Block chain-based substation station control system platform APP security management method Download PDF

Info

Publication number
CN114640481B
CN114640481B CN202011385239.7A CN202011385239A CN114640481B CN 114640481 B CN114640481 B CN 114640481B CN 202011385239 A CN202011385239 A CN 202011385239A CN 114640481 B CN114640481 B CN 114640481B
Authority
CN
China
Prior art keywords
app
control system
security
substation
station control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011385239.7A
Other languages
Chinese (zh)
Other versions
CN114640481A (en
Inventor
田华
翟桂锋
金岩磊
葛立青
王建锋
唐孝舟
张军华
谢文君
杨扬
刘青红
王小平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NR Electric Co Ltd
NR Engineering Co Ltd
Original Assignee
NR Electric Co Ltd
NR Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NR Electric Co Ltd, NR Engineering Co Ltd filed Critical NR Electric Co Ltd
Priority to CN202011385239.7A priority Critical patent/CN114640481B/en
Publication of CN114640481A publication Critical patent/CN114640481A/en
Application granted granted Critical
Publication of CN114640481B publication Critical patent/CN114640481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Public Health (AREA)
  • Water Supply & Treatment (AREA)
  • Primary Health Care (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Medical Informatics (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based substation control system platform APP safety management method, which comprises the following steps: (1) deploying a blockchain server in a security III area of a transformer substation; (2) key pair generation, secure data registration; (3) global configuration signature submission; (4) APP mirror image installation authorization inspection, and starting or maintaining the operation of the APP after successful inspection; (5) network access verification during APP operation; (6) resource access verification during APP run; (7) checking authority during APP operation. The intelligent substation station control system III is provided with a blockchain server, so that the tamper-proof and traceable security management configuration process of all the APP of the substation station control system is realized, and the secure sharing of the APP of the substation station control system under an open system is ensured; and the installation security, network access security, resource occupation security and file directory access security of the APP in the station control system are improved.

Description

Block chain-based substation station control system platform APP security management method
Technical Field
The invention relates to a substation control system platform APP safety management method, in particular to a substation control system platform APP safety management method based on a block chain.
Background
The existing substation station control system adopts a mode of an open platform and a specialized APP, wherein a basic platform realizes unified modeling of total station information, unified data acquisition and management, provides standardized service access interfaces for resource management, data management, public service, application management and the like, realizes flexible expansion of various applications, and realizes a specific intelligent specialized function of various specialized APP applications based on the platform. Through the platform + application construction model, efforts are made to create a co-built, shared, open ecosystem. However, specialized APPs are various, and under the open shared ecological system, the security risk of the substation control system platform APP of the transformer substation is as follows: 1) Unauthorized and tampered APP installations; 2) APP accesses IP outside the network address range; 3) The APP occupies the CPU, the memory, the disk and the network resource of the system excessively; 4) APP override access to external file directories. The risk exists, so that the security management efficiency of the substation control system platform APP is low, and the system security in the APP operation process cannot be guaranteed.
Disclosure of Invention
The invention aims to: the invention aims to provide a substation station control system APP safety management method based on a block chain, which has high APP safety management efficiency and ensures system safety in the APP operation process.
The technical scheme is as follows: the invention discloses a block chain-based substation control system platform APP safety management method, which comprises the following steps: (1) deploying a blockchain server in a security III area of a transformer substation; (2) key pair generation, secure data registration; (3) global configuration signature submission; (4) APP mirror image installation authorization inspection, and starting or maintaining the operation of the APP after successful inspection; (5) network access verification during APP operation; (6) resource access verification during APP run; (7) checking authority during APP operation; and (5), step (6) and step (7) terminate the APP installation and operation if verification fails.
In the step (1), a blockchain server is deployed in a security III area of an intelligent substation station control system, a blockchain client is deployed on the blockchain server to access a distributed account book, and an APP security management global configuration information access interface is provided for a security I area.
In the step (2), intelligent substation operators generate an APP manager public key and private key and APP information maintenance public key and private key through a blockchain server, and submit APP security management global configuration in a blockchain transaction mode.
In the step (3), after the intelligent substation station control system is debugged, an APP debugging maintainer submits the APP information and updates the APP security management global configuration to a chain in a block chain transaction mode.
In the step (4), based on APP security management global configuration on the blockchain, a station control system host APP manager checks an APP mirror image installation request, if the verification fails, the installation is stopped, and if the verification succeeds, the installation is executed and the APP operation is started.
In the step (5), based on APP network access configuration information in global configuration of APP security management on a blockchain, a station control system host APP manager monitors network access behaviors during APP operation, and when out-of-limit behaviors are detected, APP operation is stopped.
In the step (6), based on APP resource allocation information in global configuration of APP security management on a blockchain, a station control system host APP manager monitors resource occupation conditions during APP operation, and when out-of-limit behaviors are detected, APP operation is stopped.
In the step (7), based on the APP file directory access authority configuration information in the global configuration of APP security management on the blockchain, a host APP manager of the station control system monitors file network access behaviors during APP operation, and APP operation is stopped when out-of-limit behaviors are detected.
Compared with the prior art, the invention has the following remarkable effects: 1. the public key and the private key of the APP manager are generated by configuring the blockchain server in the area III of the intelligent substation control system, so that the untampered and traceable APP security management configuration process in the substation control system can be realized, and the secure sharing of the APP of the substation control system in an open system is ensured; 2. and under the endorsement of the public chain of the blockchain, the installation security, network access security, resource occupation security and file directory access security of all the APPs of the station control system are improved.
Drawings
FIG. 1 is a general flow chart of the present invention;
FIG. 2 is a schematic diagram of a station control system according to the present invention;
FIG. 3 is a diagram of a global configuration data structure for APP security management in a blockchain for a station control system of the present invention;
FIG. 4 is a block chain APP information configuration data structure diagram of the station control system of the present invention;
fig. 5 is a schematic diagram of an APP platform architecture of the station control system of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and the detailed description.
Fig. 1 is a general flowchart of the station control system platform APP security management method based on blockchain according to the present invention, and fig. 2 is a schematic diagram of the station control system architecture according to the present invention, including the following steps:
step 1, a blockchain server is configured in a zone III of an intelligent substation monitoring system, a blockchain client is deployed on the blockchain server and used for accessing a distributed account book, and an access interface is provided for a safe zone I.
Step 2, an intelligent substation operator generates an APP manager public key and a private key through a blockchain server; the APP information maintains a public key and a private key. The above techniques and management endorsements are risky, such as that the related algorithm is broken, the key is leaked, etc., and the related algorithm and management measures also need to be updated synchronously. Submitting security registration information (including APP information maintenance public key and current APP number) with APP manager private key signature to generate APP security management global configuration, the global configuration data structure being as shown in fig. 3, comprising the following parts:
1) And (3) an engineer signature, wherein the signature is generated by encrypting the whole data structure by using an APP manager private key, and is used for identifying whether the data structure is tampered.
2) A timestamp representing the time of generation of the entire data structure on the blockchain for identifying the version update of the data structure.
3) And the secure registration data comprises the whole APP information maintenance public key and the APP quantity and is used for identifying the identity of the APP information maintainer.
4) APP information data comprising APP information maintenance public key, signature, APP index number, network access configuration, resource access configuration, file directory authority access configuration, image file HASH and timestamp for identifying APP registration information, and APP information data result is shown in FIG. 4.
And 3, after the intelligent substation station control system is debugged, an APP debugging maintainer submits the APP image file HASH by using an APP information dimension private key signature, and APP network access configuration is finally packaged and signed by an APP manager private key, so that APP security management global configuration is updated in a transaction mode.
Step 4, after the APP manager on the host computer of the station control system receives an installation request of a certain APP (TESTAPP) mirror image, the host computer of the station control system is connected with the safe III area block chain server and reads the latest APP safety management global configuration signed by the private key of the APP manager (according to the time stamp), HASH calculation is carried out on the TESTAPP mirror image file, and a local APP mirror image file HASH to be installed is obtained; checking whether the TESTAPP image file HASH is consistent with the image file HASH in one APP information configuration in the APP security management global configuration, if not, checking failure and exiting installation; after the verification is successful, the APP manager executes the TESTAPP mirror image installation, and the operation is started after the installation is completed.
And 5, in the TESTAPP operation process, the host computer of the APP manager station control system is connected with the safe III area block chain server and reads the latest APP security management global configuration (according to the timestamp) signed by the private key of the APP manager, the network access behavior of the TESTAPP is monitored in real time based on the global configuration, and if the fact that the TESTAPP has access to the IP and the port beyond the corresponding network configuration is monitored, the APP manager stops the TESTAPP operation.
And 6, in the TESTAPP operation process, the host computer of the APP manager station control system is connected with the safe III area block chain server and reads the latest APP safety management global configuration (according to the timestamp) signed by the private key of the APP manager, the resource occupation behavior of the TESTAPP is monitored in real time based on the global configuration, and if the CPU, the memory, the disk and the network resources of which the TESTAPP occupation exceeds the external limit of the corresponding resource configuration are monitored, the APP manager stops the TESTAPP operation.
And 7, in the TESTAPP operation process, the APP manager station control system host is connected with the safe III area block chain server and reads the latest APP safety management global configuration (according to the timestamp) signed by the private key of the APP manager, the file directory access behavior of the TESTAPP is monitored in real time based on the global configuration, and if the fact that the TESTAPP has the file directory behavior beyond the corresponding directory permission configuration is monitored, the APP manager stops the TESTAPP operation.
The APP platforms in the station control system shown in fig. 5 are all executed according to the above steps (1) - (7).
The above embodiments are only for illustrating the technical solution of the present invention, and the scope of the present invention is not limited thereto, and any modification made on the basis of the technical solution according to the technical solution provided by the present invention falls within the scope of the present invention.

Claims (1)

1. The block chain-based substation control system APP safety management method is characterized by comprising the following steps of:
(1) A blockchain server is deployed in a security III area of a substation control system, a blockchain client is deployed on the blockchain server to access a distributed account book, and an access interface for APP security management global configuration is provided for a security I area of the substation control system; the APP security management global configuration comprises an engineer signature, a time stamp, security registration information and APP information data, wherein the security registration information comprises an APP information maintenance public key and APP quantity; the APP information data comprises an APP information maintenance public key, a signature, an APP index number, network access configuration, resource access configuration, file directory authority access configuration, an image file HASH and a timestamp;
(2) Generating a public key and a private key of an APP manager by a substation operator through the blockchain server, and maintaining the public key and the private key by APP information; signing and submitting security registration information by using an APP manager private key;
(3) After the debugging of a certain APP of a substation control system is finished, a debugging maintainer submits an image file HASH and network access configuration of the APP by using an APP information maintenance private key signature; the APP information maintenance private key signature submits an image file HASH and network access configuration of the APP, the image file HASH and the network access configuration are packaged and signed by an APP manager private key, the resource access configuration and the file directory authority access configuration are signed by the APP manager private key, and the APP security management global configuration is updated to a blockchain in a transaction mode;
(4) After an APP manager on a host computer of a substation control system receives an installation request of a first APP image, the host computer of the substation control system is connected with the blockchain server and reads the latest APP security management global configuration according to a time stamp, and HASH calculation is performed on a first APP image file to obtain a local APP image file HASH to be installed; checking whether the local APP image file HASH to be installed is consistent with the image file HASH of the APP in the latest APP security management global configuration; if the verification fails, the installation is exited; if the verification is successful, the APP manager executes the installation of the first APP mirror image, and the first APP starts to operate after the installation is completed;
(5) During the operation of the first APP, a substation station control system host is connected with the blockchain server, reads the latest APP security management global configuration according to the timestamp, monitors the network access behavior of the first APP in real time, and stops the operation of the APP when the out-of-limit behavior is monitored;
(6) During the operation of the first APP, a substation station control system host is connected with the block chain server, reads the latest APP security management global configuration according to the time stamp, monitors the resource occupation behavior of the first APP in real time, and stops the APP operation if the out-of-limit behavior is detected;
(7) During the operation of the first APP, a substation station control system host is connected with the blockchain server, reads the latest APP security management global configuration according to the time stamp, monitors the file directory access behavior of the first APP in real time, and stops the APP operation if the out-of-limit behavior is detected.
CN202011385239.7A 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method Active CN114640481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011385239.7A CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011385239.7A CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Publications (2)

Publication Number Publication Date
CN114640481A CN114640481A (en) 2022-06-17
CN114640481B true CN114640481B (en) 2023-09-08

Family

ID=81944748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011385239.7A Active CN114640481B (en) 2020-12-01 2020-12-01 Block chain-based substation station control system platform APP security management method

Country Status (1)

Country Link
CN (1) CN114640481B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401953A (en) * 2020-03-14 2020-07-10 广东洪心电子商务科技股份有限公司 Block chain-based consumer mutual drainage method and device
CN111682637A (en) * 2020-04-15 2020-09-18 南京南瑞继保电气有限公司 Intelligent linkage implementation method for auxiliary equipment of transformer substation based on alarm driving

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200195421A1 (en) * 2018-12-12 2020-06-18 Hewlett Packard Enterprise Development Lp Mining for internet access

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111401953A (en) * 2020-03-14 2020-07-10 广东洪心电子商务科技股份有限公司 Block chain-based consumer mutual drainage method and device
CN111682637A (en) * 2020-04-15 2020-09-18 南京南瑞继保电气有限公司 Intelligent linkage implementation method for auxiliary equipment of transformer substation based on alarm driving

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在泛在电力物联网中的研究;王宏延;完颜绍澎;顾舒娴;于佳;;山东电力技术(第11期);全文 *

Also Published As

Publication number Publication date
CN114640481A (en) 2022-06-17

Similar Documents

Publication Publication Date Title
US8667096B2 (en) Automatically generating system restoration order for network recovery
CN110278462B (en) Block chain-based mobile showing authorization management method
US9940208B2 (en) Generating reverse installation file for network restoration
US20100223609A1 (en) Systems and methods for automatic discovery of network software relationships
CN110661831B (en) Big data test field security initialization method based on trusted third party
Xu et al. An autonomic agent trust model for IoT systems
CN108038384B (en) High-safety cluster shared storage virtualization method
CN105354493A (en) Virtualization technology based terminal trust enhancement method and system
CN110598375B (en) Data processing method, device and storage medium
CN110782251A (en) Method for automatically deploying block chain network based on intelligent contracts
CN113572619B (en) Container cloud mirror image credible implementation method and system based on nottry
JP5956613B2 (en) Computer system and program
CN114640481B (en) Block chain-based substation station control system platform APP security management method
CN112565368B (en) Block chain based offshore equipment ad hoc network system, method and medium
CN112491545B (en) Credible hybrid cloud management platform, access method and system
CN114629677A (en) Safety protection system and method for thermal power generating unit electric quantity charging system
CN113922975A (en) Security control method, server, terminal, system and storage medium
CN114036560A (en) Charging pile subsidy data management method based on block chain
CN111445035B (en) Store equipment management system based on block chain
Rauter et al. Integration of integrity enforcing technologies into embedded control devices: experiences and evaluation
CN111984999B (en) Safety management and control method and system for power failure first-aid repair system
CN113939778A (en) Control system, control device, and management method
CN113094689B (en) Configuration-based single sign-on method and system in government affair system
Karoń et al. Design and implementation of ITS systems in urban agglomerations–selected system problems
CN114448643B (en) Network slice data verification method and related equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant