Serialization method of binary file penetration reverse isolation device

A technology of reverse isolation device and binary file, applied in secure communication devices, electrical components, user identity/authority verification, etc., can solve problems such as data transmission obstacles in information areas

Inactive Publication Date: 2020-10-20
ZHEJIANG ZHENENG TECHN RES INST +1
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to ensure the safety of the power monitoring system and prevent hackers and malicious codes from attacking and infringing on the power monitoring system, the state has issued a series of national regulations such as the "Regulations on the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Serialization method of binary file penetration reverse isolation device
  • Serialization method of binary file penetration reverse isolation device
  • Serialization method of binary file penetration reverse isolation device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be further described below in conjunction with the examples. The description of the following examples is provided only to aid the understanding of the present invention. It should be pointed out that for those skilled in the art, some modifications can be made to the present invention without departing from the principles of the present invention, and these improvements and modifications also fall within the protection scope of the claims of the present invention.

[0037] The present invention first reads the data of the binary format file on the disk through the external network side sending program. Subsequently, the sending program on the external network side serializes the binary format data into text format data, and encapsulates the serialized text format data into E language format data. After encryption and decryption, the internal network side receiving program receives the data and saves it as E language format data, and parse ou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a serialization method of a binary file penetration reverse isolation device, which comprises the following steps: step 1, reading data of a binary format file on a disk by anexternal network side sending program to obtain a binary format data sequence; and step 2, serializing the binary format data into text format data by an external network side sending program. The method has the advantages that on the premise that the safety of the production control area is guaranteed, data reverse channels of the production control area and the information area are opened, andcomprehensive utilization of data of the information area by the production control area is achieved; the comprehensive utilization effect and the data value of the power plant information data are improved; meanwhile, the national requirement for safety protection of the power monitoring system is met, and safe and reliable operation of the production control area is guaranteed; a binary file canpenetrate through the reverse isolation device, and in the application of a power system, data such as an optimization model and optimization parameters can be efficiently transmitted between a control area and a non-control area under the condition of meeting the national power safety protection requirements.

Description

technical field [0001] The invention relates to a method for penetrating a reverse isolation device, in particular to a serialization method for a binary file to penetrate a reverse isolation device. Background technique [0002] China's national development strategy "Made in China 2025" was promulgated, which clearly stated that the deep integration of informatization and industrialization should be the main line, and the transformation of Chinese manufacturing to intelligence will bring new opportunities and challenges to the construction of thermal power plants. With the development of big data, cloud computing, Internet of Things, mobile applications, artificial intelligence and fuzzy control technology, power generation companies have gradually formed a cloud system based on the industrial Internet architecture with four management areas on the group side and plant side and one production area on the plant side. An innovative information architecture that operates colla...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/08
CPCH04L9/3247H04L9/3263H04L67/12H04L67/565
Inventor 周君良范海东朱松强解剑波王豆
Owner ZHEJIANG ZHENENG TECHN RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products