WO2022142529A1 - 一种安全与常规控制应用间数据隔离的方法及装置 - Google Patents
一种安全与常规控制应用间数据隔离的方法及装置 Download PDFInfo
- Publication number
- WO2022142529A1 WO2022142529A1 PCT/CN2021/120687 CN2021120687W WO2022142529A1 WO 2022142529 A1 WO2022142529 A1 WO 2022142529A1 CN 2021120687 W CN2021120687 W CN 2021120687W WO 2022142529 A1 WO2022142529 A1 WO 2022142529A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- data area
- control
- safety
- exchange
- Prior art date
Links
- 238000002955 isolation Methods 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000015654 memory Effects 0.000 claims description 25
- 231100000279 safety data Toxicity 0.000 claims description 17
- 230000007246 mechanism Effects 0.000 claims description 10
- 230000003139 buffering effect Effects 0.000 claims description 4
- 230000006870 function Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 6
- 238000004519 manufacturing process Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 3
- 230000007717 exclusion Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000004886 process control Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/418—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
- G05B19/41885—Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by modeling, simulation of the manufacturing system
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/30—Nc systems
- G05B2219/32—Operator till task planning
- G05B2219/32339—Object oriented modeling, design, analysis, implementation, simulation language
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02P—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
- Y02P90/00—Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
- Y02P90/02—Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]
Definitions
- the present application relates to the technical field of industrial process control, and in particular, to a method and device for data isolation between safety and conventional control applications.
- safety control functions require high reliability and high availability, and must be developed and implemented in accordance with relevant standards for functional safety.
- safety control applications that implement safety control functions generally include safety input data (generally refers to safety input signal points, such as DI, AI, etc.), safety control algorithms/function blocks, safety output data (generally refers to safety output signal points) , such as DO, etc.).
- safety input data generally refers to safety input signal points, such as DI, AI, etc.
- safety output data generally refers to safety output signal points
- DO safety output signal points
- conventional data including conventional input/output signal points, conventional intermediate variables, etc.
- Integrity that is, the need to ensure the isolation of security control applications from conventional control applications. As a result, regular data that security controls access to applications is limited and small.
- the system architecture of multi-channel voting is generally used to improve the fault margin.
- Each controller channel contains the same safety control application and general control application, and runs all control applications independently.
- the control system selects one channel as the master channel and the other channels as the slave channels.
- the safety control application is output externally through a specific software and hardware voting mechanism, and the conventional control application is generally output by the main channel and not output by the slave channel.
- the control system will redundantly synchronize the conventional data of the master channel to each slave channel, including conventional input/output signal points and their associated conventional variables.
- the cycle for completing a round of redundant synchronization is relatively long, generally multiple control cycles.
- the control system needs to avoid the problem that the normal data from the channel enters the safety control application, which may easily lead to the data bounce of the output of the safety application.
- each slave channel will receive the redundant regular data (data value A) from the master channel before the change in a short period of time.
- each slave channel will immediately vote to output the data before the change (data value A).
- the voting output is changed data (data value B).
- the regular data area, the security data area, and the exchange data area are all structured data or a combination of multiple data.
- the purpose of this application is to solve the functional safety integrity, functional correctness and control response characteristics of safety control applications in industrial control systems with multi-task control and multi-channel operation.
- a method and apparatus for data isolation between security and conventional control applications are provided.
- a first aspect of the present application provides a method for data isolation between security and conventional control applications
- the security control application includes a security data area and several security control tasks, the security control tasks include several security control programs
- the conventional control The application includes a conventional data area and several conventional control tasks, and the conventional control task includes several conventional control programs
- the method for data isolation includes: S1. Allocate an exchange data area for the control tasks in the safety control application/regular control application; S2 , Based on the allocated exchange data area, perform data isolation exchange between safety and conventional control applications.
- step S1 specifically includes assigning independent security exchange data areas for a number of security control tasks of the security control application, and the size is limited based on the first capacity threshold, wherein the security exchange data area includes the security exchange input data area. and the safety exchange output data area; separate regular exchange input data areas of a size limited based on the second capacity threshold are allocated for several regular control tasks of the regular control application respectively.
- the safety exchange input data area is used to store the required conventional data copied from the conventional data area, which is then read by the safety control program under the safety control task;
- the safety exchange output data area is used to store the safety control program.
- the regular exchange input data area is used to copy the specified safety data from the safety exchange data area of the relevant safety control task, and then be read by the regular control program under the regular control task.
- the data isolation exchange in step S2 includes, but is not limited to, through different memory, memory space division, and access attribute settings, thereby limiting the routine control task to be unable to directly read and write the safe exchange input data area, but can read the conventional exchange input data area. And the safety exchange output data area, and the restricted safety control task cannot directly read and write the regular exchange input data area, but can read the safety exchange input data area and rewrite the safety exchange output data area.
- step S21 specifically includes: S211, in the safety exchange input data area, allocate the memory of the corresponding exchange variable for the routine data read by the safety control task, in the safety exchange output data area, for the routine data rewritten by the safety control task. Allocate the memory of the corresponding exchange variable for the data; S212, in the regular exchange input data area, allocate the corresponding memory of the exchange variable for the safety data read by the regular control task.
- step S22 specifically includes: S221, run the safety control task, copy the required routine data from the routine data area to the safety exchange input data area; and/or, S222, run the routine control task, from the safety exchange output of the relevant control task
- the data area copies the safety data to the regular exchange input data area; S223, based on the running safety control task/routine control task, run the safety control task/routine control program.
- the method for data isolation also includes an access conflict resolution mechanism based on presetting the regular data area and the safe exchange output data area respectively, so as to avoid the safety control task, the regular control task to the regular data area and the safe exchange input data area, and the safe exchange output. Read and write conflicts in the data area.
- the access conflict resolution mechanism includes, but is not limited to, setting priorities of control tasks, read-write locks between tasks, data double buffering, and MMU memory protection.
- a second aspect of the present application provides an apparatus for data isolation between safety and conventional control applications, comprising at least two systems with a multi-channel architecture, wherein each channel is used to run several safety control applications and/or several conventional control applications Application, among which, the safety control application includes the safety data area and several safety control tasks, the regular control application includes the regular data area and several regular control tasks, and the safety data area and the regular data area are isolated from each other; the regular control task cannot rewrite the safety data area , can only read and cannot rewrite the conventional exchange input area of the conventional data area; the security control task cannot directly access the conventional data area, but can only read and cannot rewrite the security exchange input data area of the security data area.
- one channel in the multi-channel architecture system is used as the master channel, and the other channels are slave channels, and security data and normal data can be transmitted between the channels.
- the security control task of the master channel is used to copy the normal data from the normal data area to the security exchange input data area of the security control task, and distribute it to the slave channel.
- the safety control task of the slave channel selects the safety exchange input data distributed by the master channel, and covers the safety exchange input data area of the safety control task of the slave channel.
- the slave channel and the master channel cannot communicate, copy the required general data from the general data area of the current channel to the safety exchange input data area of the safety control task.
- FIG. 1 is a schematic flowchart of a method for data isolation between security and conventional control applications in an embodiment of the present application.
- FIG. 2 is a schematic flowchart of a method for isolating and exchanging data between security and conventional control applications according to an embodiment of the present application.
- FIG. 3 is a partial schematic diagram of an apparatus for data isolation between security and conventional control applications in an embodiment of the present application.
- FIG. 4 is a partial schematic diagram of data isolation between security and conventional control applications in a single channel according to an embodiment of the present application.
- FIG. 5 is a partial schematic diagram of data isolation between multiple tasks of safety and conventional control applications in a single channel according to an embodiment of the present application.
- Safety hybrid control system refers to an industrial control system that includes both safety control applications and conventional control applications.
- a channel A term specific to system devices with multiple voting structures, such as functional safety control systems.
- a channel is the basic processing unit of a multiplexed voting system architecture.
- a channel generally contains a CPU, corresponding memory, and associated microelectronics.
- Each system channel runs control logic independently, working asynchronously in parallel with other channels.
- each channel contains the same safety control application and conventional control application, wherein the safety control application is output externally through a specific software and hardware voting mechanism (the master and slave channels participate at the same time); the conventional control application Generally it is a work/standby mechanism: the master channel outputs, and the slave channel does not output.
- Safety control application refers to the control application oriented to functional safety.
- the function is to monitor the operation status of the production equipment. When abnormal conditions occur, they can be quickly handled according to the established safety control logic, so as to minimize the harm and ensure that the personnel and equipment are in a safe state of production. . It is characterized by high reliability, and is mostly used in the protection and control of key devices and equipment, monitoring and protection of gas and fire, safety of oil and gas transportation, monitoring and protection of steam boilers, and protection of unit control.
- the standards to be followed mainly include IEC 61508, GB/T20438 and so on.
- Security control applications do not allow arbitrary access to non-secure signal point data.
- the safety control application includes a safety data area and several safety control tasks, each safety control task includes a task background control program and several safety control programs, and each safety control program includes several safety control loops. Each safety control loop contains safe signal input/output points and safe control logic.
- Conventional control application refers to the control application oriented to process control, which is applied to the continuous measurement, conventional control, and operation control management of the conventional production process to ensure the smooth operation of the production device.
- the conventional control application includes a conventional data area and several conventional control tasks, each conventional control task includes a task background control program and several conventional control programs, and each conventional control program includes several conventional control loops.
- Each conventional control loop contains conventional signal input/output points, as well as conventional control logic.
- Safety data area refers to the data area subordinate to the safety control application, generally including safety input signal data, safety output signal data, safety internal data, etc.
- the data area is generally structured data or closely related data combinations. It is necessary to ensure that the control task or control program can completely read and write the entire data structure or data combination when reading and writing data, instead of only reading and writing. part of data.
- Conventional data area refers to the data area belonging to conventional control applications, generally including conventional input signal data, conventional output signal data, conventional internal data, etc.
- the data area is generally structured data or closely related data combinations. It is necessary to ensure that the control task or control program can completely read and write the entire data structure or data combination when reading and writing data. Some data was read and written.
- Task contains several control programs, some data, and task background control programs, and is the main object of control logic scheduling control in the control system.
- the execution of tasks is asynchronous and relatively independent, and there may be scenarios where multiple tasks access the same data at the same time.
- Control program contains several program segments, and generally uses a programming language that conforms to the IEC61131-3 standard to write control logic.
- Control loop The basic unit of control logic, generally including input signal point data, output signal point data, control algorithm or function block, etc., such as the classic PID control loop.
- the purpose of this application is to solve the problem of data isolation between safety control applications and conventional control applications in a safety hybrid control system, and a set of methods and corresponding devices for data isolation between safety and conventional control applications are designed.
- a method and apparatus for data isolation between security and conventional control applications are described in detail so that those skilled in the art can better understand the technical solutions of the present application.
- FIG. 1 is a schematic flowchart of a method for data isolation between security and conventional control applications of the present application, which includes the following steps:
- Allocate the exchange data area Allocate an independent, limited-size safety exchange data area for each safety control task in the safety control application, including the safety exchange input data area and the safety exchange output data area; assign an independent safety exchange data area to each routine control task in the routine control application.
- a regular swap input data area of limited size The safety exchange input data area is used to store the designated regular data copied from the regular data area, and then read by the safety control program under the safety control task.
- the safety exchange output data area is used to store exchange variables for general data overwritten by the safety control task.
- the normal exchange input data area is used to copy the designated safety data from the safety exchange data area of the relevant safety control task, and then be read by the normal control program under the normal control task.
- the data exchange includes, but is not limited to, through different memory, memory space division, and access attribute settings, thereby limiting the routine control tasks to be unable to directly read and write the secure exchange input data area, but to read the regular exchange input data. area and secure exchange output data area, and the restricted security control task cannot directly read and write the regular exchange input data area, but can read the secure exchange input data area and rewrite the secure exchange output data area.
- the routine control tasks to be unable to directly read and write the secure exchange input data area, but to read the regular exchange input data.
- area and secure exchange output data area and the restricted security control task cannot directly read and write the regular exchange input data area, but can read the secure exchange input data area and rewrite the secure exchange output data area.
- the restricted security control task cannot directly read and write the regular exchange input data area, but can read the secure exchange input data area and rewrite the secure exchange output data area.
- the memory of the corresponding transformation variable is allocated for each general data input to the safety control task.
- the exchange variable corresponding to the regular data read by the safety control task is allocated in the safety exchange input data area;
- the exchange variable of the regular data rewritten by the safety control task is allocated in the safety exchange output data area;
- the safety exchange variable read by the regular control task The regular exchange input variable corresponding to the exchange variable is allocated in the regular exchange input data area.
- each safety control task includes updating and reading the safety exchange input data area.
- each safety control task When each safety control task is running, first copy the specified part of the regular data from the regular data area to the corresponding safety exchange input data area, and then run the subordinate to the safety control task.
- Each safety control program Each safety control program.
- each safety control task and routine control task is mutually independent and asynchronous, and step update, read safety exchange input data area and update, read routine exchange input data area can be executed concurrently.
- the device adopts "setting the priority of the control task” and “setting the priority of the control task”.
- Access conflict resolution mechanisms such as "read-write locks between tasks", “data double buffering” or "MMU memory protection”.
- it is prioritized to ensure that the regular control task is allowed to rewrite the regular data area after reading the regular data area by the security control task.
- FIG. 3 a partial schematic diagram of an apparatus for data isolation between security and conventional control applications of the present application.
- the device includes at least two systems of multi-channel architecture, wherein each channel is used to run several safety control applications and/or several conventional control applications, wherein the safety control applications include a safety data area and a number of safety control tasks, the conventional control applications include The normal data area and some normal control tasks, the safety data area and the normal data area are isolated from each other.
- the regular control task cannot rewrite the security data area, but can only read and cannot rewrite the regular exchange input area of the regular data area; the security control task cannot directly access the regular data area, but can only read and cannot rewrite the security exchange input data of the security data area. Area.
- the device includes one master channel and two slave channels, and the control tasks and the control programs included in each channel are the same.
- the safety control task of the master channel copies the specified part of the regular data from the regular data area of the master channel to the safety exchange input data area of the master channel, and quickly distributes it to the slave channel 1# and the slave channel 2#. Said fast generally refers to selecting safe exchange input data from the master channel from the safety control tasks of channel 1# and slave channel 2# within a basic control cycle or task cycle.
- the safety control task of slave channel 1# or slave channel 2# copies the specified part of the regular data from its corresponding regular data area to the safety exchange input data area of the safety control task.
- a single channel includes a conventional control application and a safety control application.
- the data and programs of the safety control application and the conventional control application are relatively independent and isolated from each other.
- the conventional control application mainly includes the conventional data area and several conventional control tasks
- the safety control application mainly includes the safety data area and several safety control tasks.
- routine control tasks can directly read the data in the secure data area.
- the data is assigned to the safe exchange output data area and passed to the regular control task via the regular exchange input data area.
- Each security control task is allocated a dedicated security exchange input data area.
- each safety control task runs each time, it first copies the specified part of the regular data from the regular data area to the safety exchange input data area, and then runs each safety control program under the safety control task.
- the device restricts the security control program to only read but not to rewrite the security exchange input data area through memory space division, access attribute setting, etc.
- each security control task is allocated a dedicated security exchange output data area, and each regular control task is allocated a dedicated normal exchange input data area.
- the device limits the regular control task to directly read the regular exchange input data area, while the security control task cannot directly access the regular exchange input data area.
- the safety control task can read and write the safety exchange output data area, and each conventional control program in the regular control task cannot directly access the safety exchange output data area.
- the Access conflict resolution mechanisms such as "read-write lock”, “data double buffering” or “MMU memory protection mechanism” ensure that the security control task is allowed to read the security exchange output data only after the security control task rewrites the security exchange output data area. Area.
- FIG. 5 is a partial schematic diagram of data isolation between multiple safety control tasks and multiple conventional control tasks
- one conventional control application and one safety control application run in a single channel of the device in the embodiment of the present application
- the safety control application includes the safety control application.
- Task 1# and safety control task 2#; general control applications include general control task 1# and general control task 2#.
- the safety control application and the conventional control application may respectively include several control tasks, and each of the safety control tasks and the conventional control tasks run relatively independently and asynchronously. In this embodiment, for the sake of clarity, only two control tasks are shown in each.
- the rules for the operation of security control tasks and the operation of general control tasks are as follows:
- Safety control task 1# and safety control task 2# can simultaneously and independently read the respective specified data in the conventional data area, and copy them to safety exchange input data 1# and safety exchange input data 2# respectively;
- Regular control task 1# and regular control task 2# can simultaneously and independently read the data specified in the safety exchange output data area 1# and safety exchange output data area 2# of the related safety tasks, and copy them to Regular exchange input data area 1# and regular exchange input data area 2#.
Landscapes
- Engineering & Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- General Engineering & Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Safety Devices In Control Systems (AREA)
Abstract
Description
Claims (14)
- 一种安全与常规控制应用间数据隔离的方法,其特征在于,安全控制应用包括安全数据区和若干安全控制任务,所述安全控制任务包括若干安全控制程序;所述常规控制应用包括常规数据区和若干常规控制任务,所述常规控制任务包括若干常规控制程序;所述数据隔离的方法包括:S1、为安全控制应用/常规控制应用中的控制任务分配交换数据区;S2、基于分配的交换数据区,进行安全与常规控制应用间数据隔离交换。
- 如权利要求1所述的数据隔离的方法,其特征在于,步骤S1包括:为所述安全控制应用的若干安全控制任务分别分配独立的,并基于第一容量阈值限定大小的安全交换数据区,其中,所述安全交换数据区包括安全交换输入数据区和安全交换输出数据区;为所述常规控制应用的若干常规控制任务分别分配独立的,并基于第二容量阈值限定大小的常规交换输入数据区。
- 如权利要求2所述的数据隔离的方法,其特征在于,所述安全交换输入数据区用于存储从所述常规数据区拷贝的所需常规数据,进而被所述安全控制任务下的所述安全控制程序读取;所述安全交换输出数据区用于存储被所述安全控制任务改写的常规数据的交换变量;所述常规交换输入数据区用于从相关的安全控制任务的安全交换数据区拷贝指定的安全数据,进而被所述常规控制任务下的所述常规控制程序读取。
- 如权利要求2所述的数据隔离的方法,其特征在于,步骤S2中数据隔离交换包括通过不同的存储器、内存空间划分以及访问属性设置,从而限定所述常规控制任务不能直接读写所述安全交换输入数据区,但可以读取所述常规交换输入数据区和所述安全交换输出数据区,以及,限定所述安全控制任务不能直接读写所述常规交换输入数据区,但可以读取所述安全交换输入数据区和改写所述安全交换输出数据区。
- 如权利要求1所述的数据隔离的方法,其特征在于,步骤S2包括:S21、分配变量内存;S22、更新、读取所述安全交换输入数据区/所述常规交换输入数据区。
- 如权利要求5所述的数据隔离的方法,其特征在于,步骤S21包括:S211、在所述安全交换输入数据区,为被所述安全控制任务读取的常规数据分配对应 的交换变量的内存;在所述安全交换输出数据区,为被所述安全控制任务改写的常规数据分配对应的交换变量的内存;S212、在所述常规交换输入数据区,为被所述常规控制任务读取的安全数据分配对应的交换变量内存。
- 如权利要求5所述的数据隔离的方法,其特征在于,步骤S22包括:S221、运行所述安全控制任务,从所述常规数据区拷贝需要的常规数据到所述安全交换输入数据区;和/或,S222、运行所述常规控制任务,从相关控制任务的安全交换输出数据区拷贝安全数据至所述常规交换输入数据区;S223、基于运行的安全控制任务/常规控制任务,运行安全控制程序/常规控制程序。
- 如权利要求2所述的数据隔离的方法,其特征在于,所述方法还包括基于分别预设所述常规数据区和所述安全交换输出数据区的访问冲突解决机制,避免所述安全控制任务、所述常规控制任务对所述常规数据区以及所述安全交换输入数据区、所述安全交换输出数据区的读写冲突。
- 如权利要求8所述的数据隔离的方法,其特征在于,所述访问冲突解决机制包括设置控制任务的优先级、任务间的读写锁、数据双缓冲以及MMU内存保护。
- 一种安全与常规控制应用间数据隔离的装置,其特征在于,所述装置至少包括两个多通道架构的系统,其中每个通道均用于运行若干安全控制应用和/或若干常规控制应用,其中,所述安全控制应用包括安全数据区和若干安全控制任务,所述常规控制应用包括常规数据区和若干常规控制任务,所述安全数据区和所述常规数据区之间相互隔离;所述常规控制任务不能改写所述安全数据区,只能读取、不能改写所述常规数据区的常规交换输入区;所述安全控制任务不能直接访问所述常规数据区,只能读取、不能改写所述安全数据区的安全交换输入数据区。
- 如权利要求10所述的数据隔离的装置,其特征在于,所述多通道架构的系统中的一个通道作为主通道,其余通道为从通道,通道间用于传递安全数据和常规数据。
- 如权利要求11所述的数据隔离的装置,其特征在于,所述主通道的安全控制任务用于从所述常规数据区拷贝所述常规数据至所述安全控制任务的安全交换输入数据区,并分发至从通道。
- 如权利要求11所述的数据隔离的装置,其特征在于,所述从通道的安全控制任务选取所述主通道分发的安全交换输入数据,并覆盖所述从通道的安全控制任务的安全交换 输入数据区。
- 如权利要求11所述的数据隔离的装置,其特征在于,若所述从通道和所述主通道无法通讯,则从当前通道的常规数据区拷贝所需的常规数据到所述安全控制任务的安全交换输入数据区。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2023501611A JP2024500196A (ja) | 2020-12-29 | 2021-09-26 | 安全及びプロセス制御アプリケーション間のデータ分離のための方法及び装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011590531.2A CN112783117B (zh) | 2020-12-29 | 2020-12-29 | 一种安全控制应用与常规控制应用间数据隔离的方法及装置 |
CN202011590531.2 | 2020-12-29 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022142529A1 true WO2022142529A1 (zh) | 2022-07-07 |
Family
ID=75753177
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/120687 WO2022142529A1 (zh) | 2020-12-29 | 2021-09-26 | 一种安全与常规控制应用间数据隔离的方法及装置 |
Country Status (3)
Country | Link |
---|---|
JP (1) | JP2024500196A (zh) |
CN (1) | CN112783117B (zh) |
WO (1) | WO2022142529A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112783117B (zh) * | 2020-12-29 | 2022-05-10 | 浙江中控技术股份有限公司 | 一种安全控制应用与常规控制应用间数据隔离的方法及装置 |
WO2023093757A1 (zh) * | 2021-11-24 | 2023-06-01 | 浙江中控技术股份有限公司 | 一种控制系统中的系统数据的防护方法及相关装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101655824A (zh) * | 2009-08-25 | 2010-02-24 | 北京广利核系统工程有限公司 | 一种双口ram互斥访问的实现方法 |
US20100192217A1 (en) * | 2009-01-28 | 2010-07-29 | The Boeing Company | System and method for information sharing between non-secure devices |
CN106341397A (zh) * | 2016-08-25 | 2017-01-18 | 柏盟(北京)科技发展有限公司 | 一种工业安全隔离网闸 |
CN110320829A (zh) * | 2018-03-30 | 2019-10-11 | 欧姆龙株式会社 | 安全控制系统以及安全控制单元 |
CN110597646A (zh) * | 2019-09-16 | 2019-12-20 | 五八有限公司 | 一种数据读写方法、系统、电子设备及存储介质 |
CN112783117A (zh) * | 2020-12-29 | 2021-05-11 | 浙江中控技术股份有限公司 | 一种安全与常规控制应用间数据隔离的方法及装置 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1272931C (zh) * | 2002-11-08 | 2006-08-30 | 联想(北京)有限公司 | 一种确保数据安全性的数据存储方法及其安全存储装置 |
CN101788958A (zh) * | 2010-02-04 | 2010-07-28 | 杭州晟元芯片技术有限公司 | 一种存储器数据保护的方法 |
DE102010027906A1 (de) * | 2010-04-19 | 2011-10-20 | Beckhoff Automation Gmbh | Datenverwaltungsverfahren und speicherprogrammierbare Steuerung |
CN101840230B (zh) * | 2010-06-04 | 2012-02-01 | 浙江中控技术股份有限公司 | 一种监控和管理数据的方法及系统 |
DE102011005239B4 (de) * | 2011-03-08 | 2019-10-24 | Siemens Aktiengesellschaft | Sicherheitssystem sowie Verfahren zum Austauschen von sicherheitsgerichteten Daten in einem Sicherheitssystem |
CN102567256B (zh) * | 2011-12-16 | 2015-01-07 | 龙芯中科技术有限公司 | 处理器系统及其多通道内存拷贝dma加速器和方法 |
CN104239096A (zh) * | 2014-09-02 | 2014-12-24 | 艾体威尔电子技术(北京)有限公司 | Android系统实现安全数据区的方法及装置 |
CN104486336A (zh) * | 2014-12-12 | 2015-04-01 | 冶金自动化研究设计院 | 工业控制网络安全隔离交换装置 |
CN110620791A (zh) * | 2019-10-10 | 2019-12-27 | 江苏亨通工控安全研究院有限公司 | 一种带有预警功能的工业安全数据摆渡系统 |
CN110968534B (zh) * | 2019-11-26 | 2021-11-30 | 航天恒星科技有限公司 | 一种基于fpga的多通道分片合并处理方法及系统 |
-
2020
- 2020-12-29 CN CN202011590531.2A patent/CN112783117B/zh active Active
-
2021
- 2021-09-26 JP JP2023501611A patent/JP2024500196A/ja active Pending
- 2021-09-26 WO PCT/CN2021/120687 patent/WO2022142529A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100192217A1 (en) * | 2009-01-28 | 2010-07-29 | The Boeing Company | System and method for information sharing between non-secure devices |
CN101655824A (zh) * | 2009-08-25 | 2010-02-24 | 北京广利核系统工程有限公司 | 一种双口ram互斥访问的实现方法 |
CN106341397A (zh) * | 2016-08-25 | 2017-01-18 | 柏盟(北京)科技发展有限公司 | 一种工业安全隔离网闸 |
CN110320829A (zh) * | 2018-03-30 | 2019-10-11 | 欧姆龙株式会社 | 安全控制系统以及安全控制单元 |
CN110597646A (zh) * | 2019-09-16 | 2019-12-20 | 五八有限公司 | 一种数据读写方法、系统、电子设备及存储介质 |
CN112783117A (zh) * | 2020-12-29 | 2021-05-11 | 浙江中控技术股份有限公司 | 一种安全与常规控制应用间数据隔离的方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN112783117A (zh) | 2021-05-11 |
CN112783117B (zh) | 2022-05-10 |
JP2024500196A (ja) | 2024-01-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022142529A1 (zh) | 一种安全与常规控制应用间数据隔离的方法及装置 | |
US9547492B2 (en) | Arithmetic units accessing redundantly stored data in shared memory as part of a control device for a vehicle | |
US9794340B2 (en) | Mechanism and method for accessing data in a shared memory | |
US4466098A (en) | Cross channel circuit for an electronic system having two or more redundant computers | |
JPH01251258A (ja) | ネットワークシステムにおける共用領域管理方法 | |
US20120110303A1 (en) | Method for Process Synchronization of Embedded Applications in Multi-Core Systems | |
US20090193229A1 (en) | High-integrity computation architecture with multiple supervised resources | |
WO2024109239A1 (zh) | 集群数据同步方法、装置、设备及非易失性可读存储介质 | |
US8201179B2 (en) | Multi-threaded shared state variable control | |
CN116909741A (zh) | 一种基于新一代申威众核处理器提高从核并行写共享主存临界资源速度的方法及系统 | |
JP2001022720A (ja) | マルチプロセッサシステム | |
CN111190345B (zh) | 每个硬件单元配有多个处理器单元的冗余的自动化系统 | |
US20230055743A1 (en) | Information processing device, control method, and non-transitory computer readable medium | |
KR20200083017A (ko) | 멀티코어 프로세서 기반의 이중화된 plc 제어시스템 | |
US5522060A (en) | Multiprocessor memory managing system and method for executing sequentially renewed instructions by locking and alternately reading slave memories | |
JP2022065218A (ja) | 車両制御装置 | |
JP2021026717A (ja) | プロトコルコンバータ、データ伝送方法、データ伝送プログラム、及び、データ伝送システム | |
CN116166606B (zh) | 基于共享紧耦合存储器的高速缓存控制架构 | |
WO2022185582A1 (ja) | データ処理装置、データ処理方法およびプログラム | |
JP2003345407A (ja) | 二重化plc間のデータ等価方式 | |
CN103198023A (zh) | 缓冲存储器管理方法与相关缓冲存储器控制器 | |
Weber et al. | EPTL-A temporal logic for weakly consistent systems | |
Brzezinski et al. | Consistency requirements of distributed shared memory for Dijkstra's mutual exclusion algorithm | |
JPS62156756A (ja) | 浮動割込処理方法 | |
JP2006178614A (ja) | フォルトトレラント・コンピュータとそのバス選択制御方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21913274 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023501611 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202317028746 Country of ref document: IN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 523440582 Country of ref document: SA |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21913274 Country of ref document: EP Kind code of ref document: A1 |