Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety protection method for the whole life cycle of engineering documents

A technology of full lifecycle and engineering documents, which is applied in the field of security protection of the whole lifecycle of engineering documents, can solve problems such as weak threats, and achieve the effect of improving self-security and increasing privacy

Active Publication Date: 2019-05-31
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among these three types of solutions, they can only one-sidedly solve the security problems caused by a certain intrusion method in the entire industrial control system, but for unknown threats such as unknown loopholes and unknown backdoors, it is much weaker.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety protection method for the whole life cycle of engineering documents
  • Safety protection method for the whole life cycle of engineering documents
  • Safety protection method for the whole life cycle of engineering documents

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Embodiment one, such as figure 1 As shown, the project file full lifecycle security protection method of the present invention includes four stages: project file compilation link, project file transmission link, project file storage link and project file operation link. In each link, based on heterogeneous redundancy, Redundancy voting mechanism, combined with the specific process to increase the corresponding security protection technology to form an information security protection plan, specifically includes the following steps:

[0027] Step 1, such as figure 2 As shown, the intermediate code of the cross-platform environment is generated based on the basic environment of the heterogeneous multi-mode lower computer software and hardware; in the process of compiling the logic configuration project file, multiple target operating platforms are used to generate multiple highly confusing and functionally equivalent Logical configuration project files;

[0028] Interme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the automatic control information safety protection technology field, especially relates to an engineering document full life cycle safety protection method. By taking a heterogeneous redundancy voting technology as a core, the engineering document full life cycle safety protection method is combined with the concrete flows and the concrete technologies of the compiling link, the transmission link, the storage link, and the operation link of the engineering document full life cycle. Heterogeneous polymorphs of engineering documents generated in the compiling link do not have any consistent available attack paths, cannot be attached by any intermediaries in the transmission link, and cannot be tampered in the storage link, and in addition, attacks on the heterogeneous polymorphs of the engineering documents are invalid, and finally, an object of protecting the engineering documents in a flow is achieved, and therefore the confidentiality, the integrity, and the availability of the logical configuration engineering documents are enhanced, and threats on unknown loopholes and unknown backdoors are effectively prevented.

Description

technical field [0001] The invention relates to the technical field of automatic control information security protection, in particular to a method for security protection of the entire life cycle of engineering documents. Background technique [0002] Industrial control systems are widely used in the field of industrial automation and control, such as national infrastructure such as electric power, petroleum, and national defense technology, as well as people's livelihood fields such as food, medicine, and transportation. However, at the beginning of the construction of the industrial control system, more considerations were given to physical safety and functional safety. The system architecture design was only to realize automation and information-based control functions, which facilitated production and management, and lacked information security considerations and construction. With the deep integration of industry and informatization, the introduction of Industry 4.0, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/62
CPCG06F21/6218H04L63/0442H04L63/123H04L63/126H04L2209/72
Inventor 魏强常天佑刘雯雯麻荣宽耿洋洋
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products