System and method for security defense of embedded terminal

An embedded terminal and security technology, which is applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems such as the lack of a perfect system, the difficulty of effectively resisting the network attack of the embedded terminal of the power grid, and the inability to effectively defend against network attacks. To achieve the effect of ensuring safe and reliable operation

Active Publication Date: 2019-04-19
CHINA ELECTRIC POWER RES INST +3
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These achievements only study the defense technology for a specific type of fault, and have not formed a complete system. It is impossible to effectively defend against certain types o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for security defense of embedded terminal
  • System and method for security defense of embedded terminal
  • System and method for security defense of embedded terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0050] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or over...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for security defense of an embedded terminal and belongs to the technical field of smart power network security. The system comprises a security threat detection unit which comprises a distributed data collection module and a security threat detection module; a security threat isolation unit which comprises an isolation policy making module, a terminal isolation module and a network isolation module; and a self-healing unit which receives network isolation information and terminal isolation information, and comprises a self-healing policy making module, an attack source tracing and elimination module, a terminal self-healing module and a network self-healing module. According to the system and the method, when a power network embedded terminal suffers from a security threat, the terminal is enabled to recover to a normal operation state timely and effectively, and further, secure and reliable operation of a power industrial control system areensured.

Description

technical field [0001] The present invention relates to the technical field of smart grid security, and more specifically, to a system and method for embedded terminal security defense. Background technique [0002] Embedded terminals have been widely used in all aspects of the smart grid and constitute an important part of the power industrial control system. While embedded devices are making the grid smarter, they also introduce more security risks. Studies have shown that most embedded devices have a large number of security risks and security holes, and there are backdoors implanted by manufacturers in the firmware of related embedded systems. The security of the equipment largely determines the security of the power industrial control system. Once attacked, it will cause the failure of the power equipment, thus threatening the safe and stable operation of the smart grid. Therefore, in the new situation where the power grid is becoming more and more intelligent, how to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0654H04L63/0227H04L63/0876H04L63/101H04L63/1416H04L2463/146Y04S40/20
Inventor 王磊李俊娥周亮应欢朱朝阳王宇韩丽芳王婷余文豪王永缪思薇
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products