Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Behavioral Mode Security Protection Method Based on Lower-position Computer

A technology of safety protection and lower computer, applied in the direction of electrical testing/monitoring, etc., can solve problems such as danger, loss of function of lower computer equipment, and operation instructions that do not conform to the normal operation process, and achieve the effect of avoiding misoperation and preventing attacks

Active Publication Date: 2019-10-22
HANGZHOU GUYI NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this reason, the present invention provides a safety protection method based on the behavior mode of the lower computer, which is used to solve the problem that the lower computer in the control system sends an operation command that does not conform to the normal operation process when the external interference or its own problems occur, causing the lower computer Or the dangerous problems caused by the loss of function of the field equipment, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Behavioral Mode Security Protection Method Based on Lower-position Computer
  • A Behavioral Mode Security Protection Method Based on Lower-position Computer
  • A Behavioral Mode Security Protection Method Based on Lower-position Computer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] exist figure 1 It indicates that in the control system environment 100, the upper computer 104 and the lower computer 102 communicate through an industrial control protocol. There is an application program interface between the lower computer 102 and the man-machine interface 106, and the field device 108 executes control commands or feeds back measurement information through the interface with the lower computer 102, including but not limited to temperature, pressure, speed, etc., configuration management equipment 114 is used for predefining the control flow behavior mode, and sending the predefined control flow behavior mode data to each protection device 112-1 to 112-N through the interface with the protection device 112. The protective devices 112-1 to 112-N monitor the control commands sent to the field device 108 through the routers 110-1 to 110-N, that is, monitor the control commands and data sent on the communication interface, if the control commands and data...

Embodiment 2

[0036] exist figure 2 Indicates that in the control system environment 100, the upper computer 104 and the lower computer 102 communicate through an industrial control protocol; there is an application program interface between the lower computer 102 and the man-machine interface 106; the protective device 112 and the lower computer 102 are provided with A communication interface that can communicate with each other; the field device 108 executes control commands or feeds back measurement information through the communication interface between the protective device 112 and the lower computer 102, including but not limited to temperature, pressure, speed, etc.; the configuration management device 114 is used to control Predefining the process behavior mode, and sending the predefined control process behavior mode data to each protection device 112-1 to 112-N through the communication interface with the protection device 112. At the same time, the communication interface is als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a behavior pattern safety protection method based on a lower computer. A lower computer is connected with a man-machine interface, a principal computer and a protection device through a router. The method comprises the following two steps: (a) the lower computer sends out a control instruction, and the protection device compares the control instruction with a predefined control process behavior pattern; and (b) if the control instruction conforms to the control process behavior pattern, the protection device forwards the control instruction to a field device; and if the control instruction does not conform to the control process behavior pattern, the protection device issues a warning and / or blocks the control instruction. When a control device receives a behavior pattern which does not conform to a standard control process, the protection device will issue a warning and / or block the control instruction. Thus, misoperation of internal personnel is avoided, and various external attack behaviors targeting the lower computer and the field device can be prevented effectively.

Description

technical field [0001] The invention relates to the technical field of industrial control security, in particular to a behavior mode security protection method based on a lower computer. Background technique [0002] Since the control system is originally designed as a system that is physically isolated from the outside world, the traditional control protocol does not consider the issues of information security and network security. With the widespread application of standard network and Internet technologies in control systems, especially the expansion and extension of Internet of Things technology in various fields (such as smart home), the security threats faced by control systems are increasing day by day, and existing firewall technologies can only partially solve them. Security issues, such as access control lists (Access ControlList) cannot solve the problem of out-of-order data packets; State Inspection Firewall (SPI) only cares about the relevance of packets, for th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G05B23/02
Inventor 胡浩何小梅王晶王明华傅刚陶靖隆刘青李志李远杨文勃侯海波
Owner HANGZHOU GUYI NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products