CN116011026A - Database configuration security rapid verification method, system, equipment and storage medium - Google Patents

Database configuration security rapid verification method, system, equipment and storage medium Download PDF

Info

Publication number
CN116011026A
CN116011026A CN202310292372.5A CN202310292372A CN116011026A CN 116011026 A CN116011026 A CN 116011026A CN 202310292372 A CN202310292372 A CN 202310292372A CN 116011026 A CN116011026 A CN 116011026A
Authority
CN
China
Prior art keywords
database configuration
updated
database
file
designated node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310292372.5A
Other languages
Chinese (zh)
Other versions
CN116011026B (en
Inventor
张津
杨渊
胡波
李家港
孙浩沩
李亚都
冯震震
邱起瑞
豆心杰
李广亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Thermal Power Research Institute Co Ltd
Original Assignee
Xian Thermal Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Thermal Power Research Institute Co Ltd filed Critical Xian Thermal Power Research Institute Co Ltd
Priority to CN202310292372.5A priority Critical patent/CN116011026B/en
Publication of CN116011026A publication Critical patent/CN116011026A/en
Application granted granted Critical
Publication of CN116011026B publication Critical patent/CN116011026B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method, a system, equipment and a storage medium for quickly verifying database configuration safety, which are characterized in that a designated node is set in a unit to be updated, a database configuration file to be updated is transmitted to the designated node, the database configuration file in the designated node is updated, independent verification is carried out on the database configuration file to be updated in the designated node, and the problem that the working efficiency of a whole machine is reduced due to synchronous verification failure of other nodes is avoided.

Description

Database configuration security rapid verification method, system, equipment and storage medium
Technical Field
The invention belongs to the technical field of wind power control, and particularly relates to a method, a system, equipment and a storage medium for quickly verifying database configuration safety.
Background
The configuration of the database is a software platform and a development environment at the level of the monitoring layer of the automatic control system, and a flexible configuration mode is used, so that a universal-level software tool for quickly constructing the monitoring function of the industrial automatic control system can be provided for users. The configuration software has wide application fields, and can be applied to various fields such as data acquisition and monitoring control, process control and the like in the fields of power systems, water supply systems, petroleum, chemical industry and the like.
When the configuration of the database of the upper computer needs to be adjusted in the running process of the upper computer of the wind power control system, the current mode is that the database is released after manual adjustment and manual inspection, and as the whole units are mutually related, verification is generally directly carried out on the running whole unit, and if problems occur in the verification process, the whole unit needs to be modified and released again. In this case, if the problem in the configuration is not checked and is released to the running unit, a certain influence is generated on the running of the whole unit, so that the risk of the running of the unit caused by the configuration update is increased.
Disclosure of Invention
The invention aims to provide a method, a system, equipment and a storage medium for quickly verifying database configuration safety, so as to solve the problem that the whole unit is easy to cause shutdown risk in the existing configuration updating process.
A database configuration safety quick verification method comprises the following steps:
s1, a designated node is set in a unit to be updated, a database configuration file to be updated is transmitted to the designated node, the database configuration file in the designated node is updated, and the database configuration file to be updated is independently verified in the designated node;
and S2, if the verification of the database configuration file to be updated in the designated node is successful, updating other nodes in the unit to be updated, if the verification of the database configuration file to be updated in the designated node is failed, returning the database configuration file to be updated, and returning the database configuration file of the designated node to the database configuration file before updating.
Preferably, when an individual verification is performed in a designated node, binary comparison is performed between the database configuration file to be updated and the current database configuration file of the designated node, and the comparison result is saved as a compare.
Preferably, the compact.diff file is compressed by adopting an lzfse algorithm, and the compressed file is sent to the designated node.
Preferably, after receiving the compressed file, the designated node decompresses to obtain a compare.diff file, and exclusive-or operation is performed on the decompressed compare.diff file and the database.dat file in the designated node to obtain an updated database.dat file.
Preferably, the decompressed compare. Diff file and the database. Dat file in the designated node are subjected to exclusive OR operation to obtain an updated database. Dat file, and meanwhile, the original database configuration file in the designated node is backed up.
Preferably, when the database configuration file to be updated in the designated node is independently verified, the operation mode of the designated node is modified into a single mode before local loading, and only the heartbeat is kept with other nodes in the unit to be updated, so that data interaction is not performed.
Preferably, after the database configuration file to be updated is successfully verified by the designated node, a new real-time database is started locally to serve as a standby database, the database configuration file to be updated is loaded by the real-time database to serve as a standby start, then the database configuration file to be updated is loaded to other nodes, and after the loading of the other nodes is successfully started, the master-slave switching is performed between the real-time database and each node.
A database configuration safety rapid verification system comprises a configuration management module, a man-machine interaction module and a verification module;
the configuration management module is used for storing and managing database configuration files of each node;
the man-machine interaction module is used for sending management instructions of the database configuration files in the configuration management module, selecting a designated node in the man-machine interaction module, transmitting the database configuration files to be updated to the designated node, updating the database configuration files in the designated node, and independently verifying the database configuration files to be updated in the designated node;
and the verification module is used for verifying the database configuration file to be updated in the designated node according to the selection of the man-machine interaction module, if the database configuration file to be updated in the designated node is successfully verified, other nodes in the unit to be updated are updated, if the database configuration file to be updated in the designated node fails to be verified, the database configuration file to be updated is returned, and the database configuration file of the designated node is returned to the database configuration file before updating.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the database configuration security fast verification method described above when the computer program is executed.
A computer readable storage medium storing a computer program which when executed by a processor performs the steps of the database configuration security fast verification method described above.
Compared with the prior art, the invention has the following beneficial technical effects:
the invention provides a database configuration safety quick verification method, which is characterized in that a designated node is set in a unit to be updated, a database configuration file to be updated is transmitted to the designated node, the database configuration file in the designated node is updated, independent verification is carried out on the database configuration file to be updated in the designated node, and the problem that the working efficiency of a whole machine is reduced due to synchronous verification failure of other nodes is avoided.
Preferably, the lzfse algorithm is adopted to compress the compact file and the compressed file is sent to the appointed node, so that the transmission speed in the updating process of the database configuration file can be greatly improved, and the verification speed of the database configuration update can be improved.
Preferably, after the verification of the database configuration file to be updated by the designated node is successful, a new real-time database is started locally to serve as a standby database, the database configuration file to be updated is loaded by the real-time database to serve as a standby start, then the database configuration file to be updated is loaded to other nodes, and after the loading of the other nodes is successful, the main-standby switching is performed between the real-time database and each node, so that the running stability of the whole machine in the switching process of the database configuration can be ensured.
Drawings
Fig. 1 is a schematic diagram of a system structure according to an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The invention provides a database configuration safety quick verification method, which comprises the following steps:
s1, a designated node is set in a unit to be updated, a database configuration file to be updated is transmitted to the designated node, the database configuration file in the designated node is updated, and the database configuration file to be updated is independently verified in the designated node;
in the prior art, when the database configuration files of operation control are required to be adjusted, the database configuration files are updated uniformly for verification, so that if the database configuration operation is problematic, the operation of the whole machine is affected, the database configuration of the nodes is required to be adjusted, and the database configuration before updating is returned or the database configuration before updating is modified for continuous operation verification, thereby greatly reducing the operation efficiency of the whole machine.
Based on a configuration management module, aiming at a database configuration file to be updated, verifying the database configuration to be updated (the database configuration file which is modified) on a designated node, wherein other nodes in the whole machine operate according to the original database configuration file, and the operation of the whole machine is not influenced by wind power control; when the database configuration file verified on the designated node passes, the modified database configuration is updated to other nodes of the whole machine, so that the problems that the whole machine is stopped and the efficiency is reduced due to failure of the database configuration verification in the database configuration updating process are greatly reduced.
And S2, if the verification of the database configuration file to be updated in the designated node is successful, updating other nodes in the unit to be updated, if the verification of the database configuration file to be updated in the designated node is failed, returning the database configuration file to be updated, and returning the database configuration file of the designated node to the database configuration file before updating.
When the independent verification is carried out in a designated node, binary comparison is carried out on the database configuration file to be updated and the current database configuration file of the designated node, the size of the database configuration file is fixed, and the comparison result is saved as a compare.diff file; the compare.diff file is a binary file, the result of comparing the database configuration file according to the bits is recorded, in the compare.diff file, 0 indicates that the byte is not modified, and 1 indicates that the byte is modified.
And compressing the compact file by adopting an lzfse algorithm, wherein when the modified content of the compact file is not much, the compression ratio is large, hundreds of M compact files can be compressed to tens of K after being compressed, the speed of transmitting the compressed files among nodes is higher than the efficiency of directly transmitting the modified configuration files, and the compressed files are transmitted to the designated nodes after the compression is finished.
Decompressing the compressed file received by the designated node to obtain a compact.diff file, and performing exclusive OR operation on the decompressed compact.diff file and a database.dat file in the designated node to obtain an updated database dat file; and simultaneously backing up original database configuration files in the appointed node.
Verifying the correctness of the database configuration file (updated database. Dat file) to be updated, specifically verifying whether the number of each variable and the value of each variable in the database configuration file are within a specified range, if the number of each variable and the value of each variable are within the specified range, the verification is successful, otherwise, the verification is failed. The number of each variable, the value of each variable and the relation among the variables in the database configuration file are agreed, and verification is carried out according to agreed rules.
When the database configuration file to be updated is verified, the operation mode of the designated node is required to be changed into a single mode before local loading, and only heartbeat is kept with other nodes in the unit to be updated, so that data interaction is not performed; the designated nodes are isolated through the upper computer cluster, the designated nodes keep single machine operation, the data of other nodes cannot be influenced, and the minimum influence on the unit is kept while the database configuration file is verified. The verification method and the verification system ensure that the verification designated node only performs the verification of the correctness of the configuration file of the database to be updated, and do not influence other nodes in the unit to be updated.
When the designated node successfully verifies the database configuration file to be updated, a new database configuration file is loaded on line, a new real-time database is started locally to serve as a standby database, the database configuration file to be updated is loaded in the real-time database to serve as a standby start, then the database configuration file to be updated is loaded to other nodes, and after the other nodes are successfully loaded in the starting mode, the main-standby switching is performed between the real-time database and each node, so that the loading of the database configuration file of each node of the whole machine is completed.
The following are device embodiments of the present invention for performing method embodiments of the present invention. For details of the device embodiment that are not careless, please refer to the method embodiment of the present invention.
Referring to fig. 1, in yet another embodiment of the present invention, a database configuration security fast verification system includes a configuration management module, a man-machine interaction module, and a verification module;
the configuration management module is used for storing and managing database configuration files of each node;
the man-machine interaction module is used for sending management instructions of the database configuration files in the configuration management module, selecting a designated node in the man-machine interaction module, transmitting the database configuration files to be updated to the designated node, updating the database configuration files in the designated node, and independently verifying the database configuration files to be updated in the designated node;
and the verification module is used for verifying the database configuration file to be updated in the designated node according to the selection of the man-machine interaction module, if the database configuration file to be updated in the designated node is successfully verified, other nodes in the unit to be updated are updated, if the database configuration file to be updated in the designated node fails to be verified, the database configuration file to be updated is returned, and the database configuration file of the designated node is returned to the database configuration file before updating.
The man-machine interaction module is used for operating personnel, the operating personnel designates a node by using the man-machine interaction module, modifies and updates the database configuration file in the designated node, and then clicks and releases by using the man-machine interaction module, and the release is to independently verify the designated node.
The man-machine interaction module performs binary comparison on the database configuration file after modification and the database configuration file before modification, saves the comparison result as a compare.diff file, and saves the comparison result as a compare.diff file; the compare.diff file is a binary file, the result of comparing the database configuration file according to the bits is recorded, in the compare.diff file, 0 indicates that the byte is not modified, and 1 indicates that the byte is modified. Compressing the compact file by adopting an lzfse algorithm, wherein when the modified content of the compact file is not much, the compression ratio is large, hundreds of M compact files can be compressed to tens of K after being compressed, and the speed of transmitting the compressed files between nodes is higher than the efficiency of directly transmitting the modified configuration files; and the man-machine interaction module sends the compressed file to a configuration management module of the appointed node.
The configuration management module of the designated node decompresses the compressed file to obtain a compare.diff file, and exclusive OR operation is carried out on the decompressed compare.diff file and a database.dat file in the designated node to obtain an updated database.dat file; and simultaneously backing up original database configuration files in the appointed node.
The verification module verifies the correctness of the database configuration file to be updated, specifically verifies whether the number of each variable and the value of each variable in the database configuration file are within a specified range, if the number of each variable and the value of each variable are within the specified range, the verification is successful, otherwise, the verification is failed. The number of each variable, the value of each variable and the relation among the variables in the database configuration file are agreed, and verification is carried out according to agreed rules.
When verifying the database configuration file to be updated of the designated node, modifying the operation mode of the designated node into a single mode before local loading of the upper computer, and only keeping heartbeat with other nodes in the unit to be updated without data interaction; the designated nodes are isolated through the upper computer cluster, the designated nodes keep single machine operation, the data of other nodes in the unit to be updated cannot be influenced, and the minimum influence on the unit is kept while the database configuration file is verified. The verification method and the verification system ensure that the verification designated node only performs the verification of the correctness of the configuration file of the database to be updated, and do not influence other nodes in the unit to be updated.
After the verification of the database configuration file to be updated by the designated node is successful, a new real-time database is started locally to serve as a standby database, the database configuration file to be updated is loaded by the real-time database to serve as a standby start, then the database configuration file to be updated is loaded to other nodes, and after the start loading of other nodes is successful, the main-standby switching is performed between the real-time database and each node, so that the loading of the database configuration file of each node of the unit to be updated is completed; the designated node operating mode is then restored to the cluster mode.
In yet another embodiment of the present invention, a terminal device is provided, the terminal device including a processor and a memory, the memory for storing a computer program, the computer program including program instructions, the processor for executing the program instructions stored by the computer storage medium. The processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), off-the-shelf Programmable gate arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc., which are the computational core and control core of the terminal adapted to implement one or more instructions, in particular adapted to load and execute one or more instructions to implement a corresponding method flow or a corresponding function; the processor provided by the embodiment of the invention can be used for the operation of the database configuration safety rapid verification method.
In a further embodiment of the present invention, the present invention also provides a storage medium, in particular, a computer readable storage medium (Memory), which is a Memory device in a terminal device, for storing programs and data. It will be appreciated that the computer readable storage medium herein may include both a built-in storage medium in the terminal device and an extended storage medium supported by the terminal device. The computer-readable storage medium provides a storage space storing an operating system of the terminal. Also stored in the memory space are one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by the processor. The computer readable storage medium herein may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory. One or more instructions stored in a computer-readable storage medium may be loaded and executed by a processor to implement the corresponding steps of the method for secure and fast verification of database configuration in the above embodiments.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (10)

1. The method for quickly verifying the database configuration safety is characterized by comprising the following steps:
s1, a designated node is set in a unit to be updated, a database configuration file to be updated is transmitted to the designated node, the database configuration file in the designated node is updated, and the database configuration file to be updated is independently verified in the designated node;
and S2, if the verification of the database configuration file to be updated in the designated node is successful, updating other nodes in the unit to be updated, if the verification of the database configuration file to be updated in the designated node is failed, returning the database configuration file to be updated, and returning the database configuration file of the designated node to the database configuration file before updating.
2. The method for quickly verifying the security of a database configuration according to claim 1, wherein when a specific node performs a single verification, the database configuration file to be updated is binary-compared with the current database configuration file of the specific node, and the comparison result is saved as a compare.
3. The method for quickly verifying the security of the database configuration according to claim 2, wherein the compatibility file is compressed by adopting the lzfse algorithm, and the compressed file is sent to the designated node.
4. A method for quickly verifying the security of a database configuration according to claim 3, wherein the designated node decompresses the compressed file to obtain a compare file, and performs an exclusive-or operation on the decompressed compare file and the database file in the designated node to obtain an updated database file.
5. The method for quickly verifying the security of database configuration according to claim 4, wherein the decompressed compact file and the database file in the designated node are exclusive-ored to obtain the updated database file, and the original database configuration file in the designated node is backed up.
6. The method for quickly verifying the safety of the database configuration according to claim 1, wherein when the database configuration file to be updated in the designated node is verified independently, the operation mode of the designated node is modified to a single mode before local loading, and only the heartbeat is kept with other nodes in the unit to be updated, and no data interaction is performed.
7. The method for quickly verifying the security of the database configuration according to claim 1, wherein after the database configuration file to be updated is successfully verified by the designated node, a new real-time database is started locally to serve as a standby database, the database configuration file to be updated is loaded by the real-time database, the database is started as a standby, the database configuration file to be updated is loaded by other nodes, and after the database configuration file to be updated is loaded by the other nodes, the master-slave switching is performed between the real-time database and each node.
8. The database configuration safety rapid verification system is characterized by comprising a configuration management module, a man-machine interaction module and a verification module;
the configuration management module is used for storing and managing database configuration files of each node;
the man-machine interaction module is used for sending management instructions of the database configuration files in the configuration management module, selecting a designated node in the man-machine interaction module, transmitting the database configuration files to be updated to the designated node, updating the database configuration files in the designated node, and independently verifying the database configuration files to be updated in the designated node;
and the verification module is used for verifying the database configuration file to be updated in the designated node according to the selection of the man-machine interaction module, if the database configuration file to be updated in the designated node is successfully verified, other nodes in the unit to be updated are updated, if the database configuration file to be updated in the designated node fails to be verified, the database configuration file to be updated is returned, and the database configuration file of the designated node is returned to the database configuration file before updating.
9. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the database configuration security fast verification method according to any one of claims 1 to 7 when the computer program is executed by the processor.
10. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the database configuration security fast verification method according to any one of claims 1 to 7.
CN202310292372.5A 2023-03-23 2023-03-23 Database configuration security rapid verification method, system, equipment and storage medium Active CN116011026B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310292372.5A CN116011026B (en) 2023-03-23 2023-03-23 Database configuration security rapid verification method, system, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310292372.5A CN116011026B (en) 2023-03-23 2023-03-23 Database configuration security rapid verification method, system, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116011026A true CN116011026A (en) 2023-04-25
CN116011026B CN116011026B (en) 2023-06-16

Family

ID=86037678

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310292372.5A Active CN116011026B (en) 2023-03-23 2023-03-23 Database configuration security rapid verification method, system, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116011026B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117195240A (en) * 2023-11-02 2023-12-08 西安热工研究院有限公司 Trusted DCS upper computer data configuration verification and release method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105549557A (en) * 2015-12-16 2016-05-04 天津市奥朗新能源科技有限公司 Real-time dynamic 3D water balance monitoring system of power plant and working method of system
US20170033993A1 (en) * 2015-07-27 2017-02-02 Konica Minolta, Inc. Apparatus and method for applying settings, and computer-readable storage medium for computer program
CN112486737A (en) * 2021-01-18 2021-03-12 之江实验室 Configuration management method of mimicry industrial controller
CN113407635A (en) * 2021-07-09 2021-09-17 浙江明度智控科技有限公司 Multi-terminal data synchronization method and system for intelligent manufacturing
CN114020835A (en) * 2021-10-25 2022-02-08 浙江中控软件技术有限公司 Synchronization method, system, equipment and medium for real-time database system configuration data
CN114610351A (en) * 2022-03-11 2022-06-10 北京海量数据技术股份有限公司 Database upgrading method
CN115391755A (en) * 2022-08-02 2022-11-25 中广核工程有限公司 DCS (distributed control system) engineering data management method, system, configuration server and client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170033993A1 (en) * 2015-07-27 2017-02-02 Konica Minolta, Inc. Apparatus and method for applying settings, and computer-readable storage medium for computer program
CN105549557A (en) * 2015-12-16 2016-05-04 天津市奥朗新能源科技有限公司 Real-time dynamic 3D water balance monitoring system of power plant and working method of system
CN112486737A (en) * 2021-01-18 2021-03-12 之江实验室 Configuration management method of mimicry industrial controller
CN113407635A (en) * 2021-07-09 2021-09-17 浙江明度智控科技有限公司 Multi-terminal data synchronization method and system for intelligent manufacturing
CN114020835A (en) * 2021-10-25 2022-02-08 浙江中控软件技术有限公司 Synchronization method, system, equipment and medium for real-time database system configuration data
CN114610351A (en) * 2022-03-11 2022-06-10 北京海量数据技术股份有限公司 Database upgrading method
CN115391755A (en) * 2022-08-02 2022-11-25 中广核工程有限公司 DCS (distributed control system) engineering data management method, system, configuration server and client

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
YAHUI LI: "Assisting reachability verification of network configurations updates with NUV", 《ELSEVIER》 *
周华;李晓;华志刚;冉晓隆;肖亮;单福昌;: "基于仿真技术的核电厂非安全级DCS组态验证", 核动力工程, no. 1 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117195240A (en) * 2023-11-02 2023-12-08 西安热工研究院有限公司 Trusted DCS upper computer data configuration verification and release method and system
CN117195240B (en) * 2023-11-02 2024-05-28 西安热工研究院有限公司 Trusted DCS upper computer data configuration verification and release method and system

Also Published As

Publication number Publication date
CN116011026B (en) 2023-06-16

Similar Documents

Publication Publication Date Title
TWI751402B (en) Data synchronization method, distributed system, computer readable storage and retrieval media, computer equipment and distributed equipment
CN110825420B (en) Method, device, equipment and storage medium for updating configuration parameters of distributed cluster
CN110209405B (en) Automatic upgrading method and device for distributed system
US9367301B1 (en) Dynamic update of a distributed message processing system
CN107844386B (en) Data backup and recovery method and device
CN116011026B (en) Database configuration security rapid verification method, system, equipment and storage medium
CN109508295B (en) Block chain consensus algorithm testing method and device, calculating device and storage medium
CN105320577B (en) A kind of data backup and resume method, system and device
CN107391303B (en) Data processing method, device, system, server and computer storage medium
CN113064755B (en) Data recovery method, device, equipment, medium and program product
CN111275289B (en) Consistency checking method and device for main scheduling system and standby scheduling system
CN115129574A (en) Code testing method and device
CN117474306A (en) Production flow control method and device, electronic equipment and readable storage medium
CN112131177A (en) Data migration method and device, storage medium and electronic equipment
CN110620800B (en) Method and device for synchronously processing configuration data of power secondary system across safety zones
CN116700884A (en) Snapshot rollback data consistency test method, device, equipment and medium
CN116303348A (en) Method and system for online migration of DRDS (data distribution system) database and table division based on cap
CN109189444A (en) A kind of upgrade control method and device of the management node of server virtualization system
CN113703821A (en) Cloud mobile phone updating method, device, equipment and storage medium
CN114443356A (en) Container cluster processing method and system
CN114553859A (en) BMC configuration management method and device, electronic equipment and storage medium
CN114243715A (en) Method and system for testing hydropower station AGC control device
CN111209139B (en) Disaster recovery method and device based on version control management system
CN105765908A (en) Method, client and system for multi-site automatic update
CN118260815B (en) Encryption disk backup method and device, electronic equipment, storage medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant