CN117195240B - Trusted DCS upper computer data configuration verification and release method and system - Google Patents

Trusted DCS upper computer data configuration verification and release method and system Download PDF

Info

Publication number
CN117195240B
CN117195240B CN202311448083.6A CN202311448083A CN117195240B CN 117195240 B CN117195240 B CN 117195240B CN 202311448083 A CN202311448083 A CN 202311448083A CN 117195240 B CN117195240 B CN 117195240B
Authority
CN
China
Prior art keywords
verification
release
data
trusted
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311448083.6A
Other languages
Chinese (zh)
Other versions
CN117195240A (en
Inventor
柳曦
张津
杨渊
杨柳
贾泽冰
孙浩沩
焦龙
王晓凯
钟庆尧
张军
翟亮晶
高少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Thermal Power Research Institute Co Ltd
Original Assignee
Xian Thermal Power Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Thermal Power Research Institute Co Ltd filed Critical Xian Thermal Power Research Institute Co Ltd
Priority to CN202311448083.6A priority Critical patent/CN117195240B/en
Publication of CN117195240A publication Critical patent/CN117195240A/en
Application granted granted Critical
Publication of CN117195240B publication Critical patent/CN117195240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of industrial automation, and discloses a method and a system for verifying and publishing data configuration of a trusted DCS upper computer, wherein the data configuration is stored in a logic cache, and the data configuration is published in a physical library for accessing data by the upper computer after the data configuration is verified; the method specifically comprises the following steps: identifying the current user identity, and ending release if the identity identification fails; if the identification is successful, carrying out SHA operation by using the ID of the current user data configuration release event to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if the verification results are consistent, verifying the validity of the group configuration, and if the verification results are failed, ending the release; if the verification is successful, the data configuration in the logic cache is released to the physical library, and the release is finished.

Description

Trusted DCS upper computer data configuration verification and release method and system
Technical Field
The invention relates to the technical field of industrial automation, in particular to a method and a system for verifying and issuing data configuration of a trusted DCS (distributed control system) upper computer.
Background
The Distributed Control System (DCS) upper computer database is a system operation basis and performs frequent data interaction with other data interfaces of the upper computer, so that the integrity and the effectiveness of the distributed control system are particularly important, and the data configuration in the common distributed control system is directly filled into the upper computer database, so that the problems of insufficient data effectiveness and integrity can exist. Meanwhile, with the development of informatization of the power system, aiming at the endless malicious threat of the power system, how to effectively improve the safety protection capability of the system is a problem to be solved.
Disclosure of Invention
The invention aims to provide a trusted DCS (distributed control system) upper computer data configuration verification and release method and system, which are used for overcoming the defects of the prior art.
In order to achieve the above purpose, the invention adopts the following technical scheme:
the method for verifying and releasing the data configuration of the upper computer of the trusted DCS comprises the steps of storing the data configuration in a logic cache, and releasing the data configuration in a physical library for accessing data by the upper computer after the data configuration is verified by the trusted DCS;
the trusted verification is issued to a host computer in a physical library to access data, and the method specifically comprises the following steps of:
S1: identifying the current user identity, and ending release if the identity identification fails; if the identity recognition is successful, S2 is executed;
s2: carrying out SHA operation by using the ID of the current user data configuration release event to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if so, executing S3;
s3: verifying the validity of the array configuration, and ending release if the verification fails; if the verification is successful, S4 is executed;
S4: and (5) publishing the data configuration in the logic cache to the physical library, and ending the publishing.
Further, the data configuration includes: station configuration, device information, station group information and station information.
Further, the step S3 specifically includes the following steps:
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording the device IP, and verifying the measuring point group information and the corresponding measuring point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) After the traversing of the device information list is completed, if the device IP is repeated, the device IP is regarded as an unreasonable verification item, and the unreasonable verification item is stored into a data verification report;
S32: if the data verification report has a verification unreasonable item, the release fails; otherwise, S4 is performed.
Further, the step S4 specifically includes the following steps:
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
The trusted DCS upper computer data configuration verification and release system stores the data configuration in a logic cache, and releases the data configuration in a physical library for accessing data by an upper computer after the data configuration is verified by the trusted DCS upper computer data configuration verification and release system;
the system specifically comprises an identity recognition module, a comparison module, a verification module and a release module, wherein:
An identity recognition module: the method is used for identifying the current user identity, and if the identity identification fails, the release is ended; if the identity identification is successful, entering a comparison module;
and a comparison module: performing SHA operation on the ID of the release event according to the current user data configuration to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if the two types of data are consistent, entering a verification module;
And (3) a verification module: the method comprises the steps of verifying the validity of an array configuration, and ending release if the verification fails; if the verification is successful, entering a release module;
and the release module is used for: and the method is used for publishing the data configuration in the logic cache to the physical library, and the publishing is finished.
Further, the data configuration includes: station configuration, device information, station group information and station information.
Further, the verification module specifically includes the following steps:
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording the device IP, and verifying the measuring point group information and the corresponding measuring point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) After the traversing of the device information list is completed, if the device IP is repeated, the device IP is regarded as an unreasonable verification item, and the unreasonable verification item is stored into a data verification report;
S32: if the data verification report has a verification unreasonable item, the release fails; otherwise, entering a release module.
Further, the publishing module specifically includes the following steps:
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
Compared with the prior art, the invention has the following beneficial technical effects:
The invention adopts the logic cache partition to store the user data configuration, and the user data configuration is filled into the physical library after data verification and credibility verification, so that the data integrity and the effectiveness of the upper computer physical library are ensured; meanwhile, the credibility verification is carried out on the system behaviors such as data configuration release and database loading, so that the credibility of the behavior of a host and a guest and the system data are guaranteed not to be tampered or destroyed maliciously, in addition, when the data are loaded to a physical library through a logic cache, a partition loading mode is adopted, only the partition is changed or added, and the data loading efficiency is guaranteed.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
FIG. 1 is a flow chart of a trusted DCS host computer data configuration verification and release method in accordance with an embodiment of the present invention;
FIG. 2 is a block diagram of a trusted DCS host computer data configuration verification and distribution system in accordance with a second embodiment of the present invention.
Detailed Description
The invention will be described in further detail with reference to the accompanying drawings and specific examples.
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
Referring to fig. 1, the invention provides a trusted DCS upper computer data configuration verification and distribution method, wherein a data configuration is firstly stored in a logic cache, and is distributed in a physical library to access data after being trusted verification, so as to ensure the integrity and validity of the data configuration, and the data configuration comprises: station configuration, device information, station group information and station information.
The trusted verification is issued to a host computer in a physical library to access data, and the method specifically comprises the following steps of:
S1: identifying the current user identity, and ending release if the identity identification fails; if the identity recognition is successful, S2 is executed;
S2: carrying out SHA (secure hash algorithm) operation by using the ID (identity number) of the current user data configuration release event to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if so, executing S3;
s3: verifying the validity of the array configuration, and ending release if the verification fails; if the verification is successful, S4 is executed;
The method specifically comprises the following steps:
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording a device IP (Internet protocol), and verifying the measurement point group information and the corresponding measurement point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) After the traversing of the device information list is completed, if the device IP is repeated, the device IP is regarded as an unreasonable verification item, and the unreasonable verification item is stored into a data verification report;
S32: if the data verification report has a verification unreasonable item, the release fails; otherwise, S4 is performed.
S4: the data configuration in the logic cache is released to the physical library, and release is finished;
The method specifically comprises the following steps:
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
Example two
Referring to fig. 2, the invention further provides a trusted DCS host computer data configuration verification and release system, which stores the data configuration in a logic cache, and releases the data configuration in a physical library for host computer access after trusted verification; the data configuration includes: station configuration, device information, station group information and station information.
The system specifically comprises an identity recognition module, a comparison module, a verification module and a release module, wherein:
An identity recognition module: the method is used for identifying the current user identity, and if the identity identification fails, the release is ended; if the identity identification is successful, entering a comparison module;
and a comparison module: performing SHA operation on the ID of the release event according to the current user data configuration to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if the two types of data are consistent, entering a verification module;
And (3) a verification module: the method comprises the steps of verifying the validity of an array configuration, and ending release if the verification fails; if the verification is successful, entering a release module;
The method specifically comprises the following steps:
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording the device IP, and verifying the measuring point group information and the corresponding measuring point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) And after the traversing of the device information list is completed, if the device IP is repeated, the device IP is considered as an unreasonable verification item. Storing the unreasonable verification items into a data verification report;
S32: if the data verification report has a verification unreasonable item, the release fails; otherwise, entering a release module.
And the release module is used for: the method comprises the steps of publishing data configuration in a logic cache to a physical library, and ending the publishing;
The method specifically comprises the following steps:
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the foregoing embodiments are merely for illustrating the technical aspects of the present invention and not for limiting the scope thereof, and although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that various changes, modifications or equivalents may be made to the specific embodiments of the present invention after reading the present invention, and these changes, modifications or equivalents are within the scope of the invention as defined in the appended claims.

Claims (2)

1. The method for verifying and releasing the data configuration of the trusted DCS upper computer is characterized in that the data configuration is stored in a logic cache, and the data configuration comprises the following steps: the factory station configuration, the device information, the measuring point group information and the measuring point information are issued to a host computer in a physical library to access data after trusted verification;
the trusted verification is issued to a host computer in a physical library to access data, and the method specifically comprises the following steps of:
S1: identifying the current user identity, and ending release if the identity identification fails; if the identity recognition is successful, S2 is executed;
S2: performing SHAI operation on the ID of the current user data configuration release event to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if so, executing S3;
s3: verifying the validity of the array configuration, and ending release if the verification fails; if the verification is successful, S4 is executed;
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording the device IP, and verifying the measuring point group information and the corresponding measuring point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) After the traversing of the device information list is completed, if the device IP is repeated, the device IP is regarded as an unreasonable verification item, and the unreasonable verification item is stored into a data verification report;
s32: if the data verification report has a verification unreasonable item, the release fails; otherwise, executing S4;
S4: the data configuration in the logic cache is released to the physical library, and release is finished;
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
2. The trusted DCS upper computer data configuration verification and release system is characterized in that the data configuration is stored in a logic cache, and the data configuration comprises: the factory station configuration, the device information, the measuring point group information and the measuring point information are formally released in a physical library to access data by a host computer after credible verification;
the system specifically comprises an identity recognition module, a comparison module, a verification module and a release module, wherein:
An identity recognition module: the method is used for identifying the current user identity, and if the identity identification fails, the release is ended; if the identity identification is successful, entering a comparison module;
And a comparison module: performing SHAI operation on the ID of the release event according to the current user data configuration to obtain a trusted measurement calculation value; referring to the trusted measurement hash table by using the key words of the ID of the current user data configuration release event, comparing the reference measurement value in the trusted measurement hash table with the trusted measurement calculation value, and if the reference measurement value is inconsistent with the trusted measurement calculation value, judging that the current user data configuration release event is invalid, and ending release; if the two types of data are consistent, entering a verification module;
And (3) a verification module: the method comprises the steps of verifying the validity of an array configuration, and ending release if the verification fails; if the verification is successful, entering a release module;
s31: traversing the station configuration list in the logic cache, and carrying out station configuration verification one by one, wherein the method comprises the following steps:
(a) Traversing a device information list corresponding to the current station configuration, recording the device IP, and verifying the measuring point group information and the corresponding measuring point information under the current device, wherein the verification content comprises: the validity of the measurement point name, the rationality of the remote control measurement point opening and closing rule and the rationality of the measurement point threshold value, if the verification unreasonable item exists in the verification content, the verification unreasonable item is stored into the data verification report;
(b) After the traversing of the device information list is completed, if the device IP is repeated, the device IP is regarded as an unreasonable verification item, and the unreasonable verification item is stored into a data verification report;
s32: if the data verification report has a verification unreasonable item, the release fails; otherwise, entering a release module;
and the release module is used for: the method comprises the steps of publishing data configuration in a logic cache to a physical library, and ending the publishing;
S41: performing trusted verification and integrity measurement on the physical library and the logic cache, and if the physical library or the logic cache is tampered or destroyed, sending a trusted verification failure report, and ending the release; otherwise, S42 is performed;
S42: comparing the physical library file with the logic cache file, if the comparison result of the data partition in the file is inconsistent, carrying out library loading operation on the partition which is changed or added, and loading the logic cache data in the partition which is changed or added into the physical library; if the data partition comparison results are consistent, the data of the two libraries are consistent and no update exists, and the library loading operation is not performed.
CN202311448083.6A 2023-11-02 2023-11-02 Trusted DCS upper computer data configuration verification and release method and system Active CN117195240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311448083.6A CN117195240B (en) 2023-11-02 2023-11-02 Trusted DCS upper computer data configuration verification and release method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311448083.6A CN117195240B (en) 2023-11-02 2023-11-02 Trusted DCS upper computer data configuration verification and release method and system

Publications (2)

Publication Number Publication Date
CN117195240A CN117195240A (en) 2023-12-08
CN117195240B true CN117195240B (en) 2024-05-28

Family

ID=88998346

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311448083.6A Active CN117195240B (en) 2023-11-02 2023-11-02 Trusted DCS upper computer data configuration verification and release method and system

Country Status (1)

Country Link
CN (1) CN117195240B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001216020A (en) * 2000-02-03 2001-08-10 Hitachi Ltd Distributed control system and data verification method therefor
US6393420B1 (en) * 1999-06-03 2002-05-21 International Business Machines Corporation Securing Web server source documents and executables
KR20080021970A (en) * 2006-09-05 2008-03-10 한국전력공사 A on-line, real-time thermal performance monitoring system for fossil power plant
CN103941652A (en) * 2013-01-22 2014-07-23 浙江安科网络技术有限公司 Method and device suitable for security protection and security audit of various DCS production control systems
CN104751063A (en) * 2014-12-31 2015-07-01 国家电网公司 Operation system trusted guide method based on real mode technology
CN107689887A (en) * 2017-08-23 2018-02-13 福建福清核电有限公司 A kind of nuclear power plant's control system controls change online management system temporarily
CN108628872A (en) * 2017-03-17 2018-10-09 广州康昕瑞基因健康科技有限公司 Genetic analysis database batch data introduction method and system
CN110990336A (en) * 2019-12-10 2020-04-10 北京慧虹远航科技有限公司 Industrial control-oriented function design method and system
CN115712271A (en) * 2022-11-11 2023-02-24 四川启睿克科技有限公司 Automatic data acquisition system for old production equipment
CN115994122A (en) * 2023-03-24 2023-04-21 北京江民新科技术有限公司 Method, system, equipment and storage medium for caching information
CN116011026A (en) * 2023-03-23 2023-04-25 西安热工研究院有限公司 Database configuration security rapid verification method, system, equipment and storage medium
CN116405283A (en) * 2023-04-06 2023-07-07 陈俊宏 Data encryption authentication system based on information data protection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150205966A1 (en) * 2014-01-17 2015-07-23 MalCrawler Co. Industrial Control System Emulator for Malware Analysis

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6393420B1 (en) * 1999-06-03 2002-05-21 International Business Machines Corporation Securing Web server source documents and executables
JP2001216020A (en) * 2000-02-03 2001-08-10 Hitachi Ltd Distributed control system and data verification method therefor
KR20080021970A (en) * 2006-09-05 2008-03-10 한국전력공사 A on-line, real-time thermal performance monitoring system for fossil power plant
CN103941652A (en) * 2013-01-22 2014-07-23 浙江安科网络技术有限公司 Method and device suitable for security protection and security audit of various DCS production control systems
CN104751063A (en) * 2014-12-31 2015-07-01 国家电网公司 Operation system trusted guide method based on real mode technology
CN108628872A (en) * 2017-03-17 2018-10-09 广州康昕瑞基因健康科技有限公司 Genetic analysis database batch data introduction method and system
CN107689887A (en) * 2017-08-23 2018-02-13 福建福清核电有限公司 A kind of nuclear power plant's control system controls change online management system temporarily
CN110990336A (en) * 2019-12-10 2020-04-10 北京慧虹远航科技有限公司 Industrial control-oriented function design method and system
CN115712271A (en) * 2022-11-11 2023-02-24 四川启睿克科技有限公司 Automatic data acquisition system for old production equipment
CN116011026A (en) * 2023-03-23 2023-04-25 西安热工研究院有限公司 Database configuration security rapid verification method, system, equipment and storage medium
CN115994122A (en) * 2023-03-24 2023-04-21 北京江民新科技术有限公司 Method, system, equipment and storage medium for caching information
CN116405283A (en) * 2023-04-06 2023-07-07 陈俊宏 Data encryption authentication system based on information data protection

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Automation framework for verification of LAMPS and DCS in airbag control unit (ACU)";A. Yamini等;《2017 International Conference on Inventive Communication and Computational Technologies (ICICCT)》;20170717;第1-4页 *
"核电厂非安全级DCS验证系统测试方法";王晋等;《中国高新技术企业》;20171231;第194-195页 *

Also Published As

Publication number Publication date
CN117195240A (en) 2023-12-08

Similar Documents

Publication Publication Date Title
US9514305B2 (en) Code pointer authentication for hardware flow control
US8739280B2 (en) Context-sensitive taint analysis
Kamtuo et al. Machine Learning for SQL injection prevention on server-side scripting
BR102015017215A2 (en) computer-implemented method for classifying mobile applications, and computer program encoded on non-transient storage medium
US11803461B2 (en) Validation of log files using blockchain system
CN109117201B (en) Program exiting method and related equipment
CN111400723A (en) TEE extension-based operating system kernel mandatory access control method and system
CN109271789B (en) Malicious process detection method and device, electronic equipment and storage medium
CN110647750A (en) File integrity measurement method and device, terminal and security management center
CN114095228A (en) Safe access method, system and device for data of Internet of things based on block chain and edge calculation and storage medium
CN112003824B (en) Attack detection method and device and computer readable storage medium
CN110443039A (en) Detection method, device and the electronic equipment of plug-in security
KR102308477B1 (en) Method for Generating Information of Malware Which Describes the Attack Charateristics of the Malware
CN117195240B (en) Trusted DCS upper computer data configuration verification and release method and system
KR102393913B1 (en) Apparatus and method for detecting abnormal behavior and system having the same
Matos et al. Rectify: Black-box intrusion recovery in paas clouds
CN108073411A (en) A kind of kernel loads method and device of patch
CN117235735A (en) Main and customer security access control method and system of trusted DCS controller system
US11693651B1 (en) Static and dynamic correlation of software development pipeline events
CN108647516B (en) Method and device for defending against illegal privilege escalation
CN117009931A (en) Watermarking and watermarking application methods, devices, equipment and storage medium
CN116502188A (en) Remote proving method, device and system
CN109472153B (en) Authority auditing method
CN110647771A (en) Mysql database storage integrity verification protection method and device
CN114640529B (en) Attack protection method, apparatus, device, storage medium and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant