Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Industrial network security system

A security system and industrial network technology, which is applied in the field of industrial network security systems, can solve system security threats, theft, session breaking and other problems, and achieve the effect of preventing data loss or being stolen, preventing data loss, and improving security performance

Pending Publication Date: 2021-04-02
上海磐御网络科技有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the rapid development of computer technology and network communication technology, the wide application of computer networks in various fields has greatly improved people's work efficiency; however, while the Internet has brought huge benefits to people, hackers have begun to attack major organizations through network viruses. Servers and databases have brought huge losses to normal users who use the network, especially have a relatively large adverse impact on industrial network systems; existing industrial network systems are difficult to quickly detect and respond to their own vulnerabilities and viruses, and viruses will destroy It will damage the program or hardware inside the computer, affect the running speed of the computer, or destroy the files inside the computer, or steal the files inside the computer and personal information, which will bring immeasurable losses to individuals and companies, and seriously threaten the security of the system. needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial network security system
  • Industrial network security system
  • Industrial network security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0045] like Figure 1-5 As shown, an industrial network security system proposed by the present invention includes a central processing unit, an identity verification module, a display module, a vulnerability detection module, a vulnerability repair module, a vulnerability database, a virus scanning module, a virus database, a virus isolation module, and a risk assessment module, network security monitoring module, data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An industrial network security system comprises a central processing unit, an identity verification module, a display module, a vulnerability detection module, a vulnerability repair module, a vulnerability database, a virus scanning module, a virus database, a virus isolation module, a risk assessment module, a network security monitoring module, a data migration module, an isolation backup module, a data encryption module and an encryption database. The central processing unit is in communication connection with the identity verification module, the display module, the vulnerability detection module and the virus scanning module; the vulnerability detection module is in communication connection with the vulnerability database and the vulnerability repair module, and the virus scanning module is in communication connection with the virus database and the virus isolation module. According to the method, vulnerability and viruses can be rapidly detected and processed, Trojan horse viruses are effectively prevented from invading an industrial system, data in the industrial system can be effectively protected, data loss and stealing are prevented, the safety performance of the industrial system is remarkably improved, the use effect is extremely good, and the system is suitable for application and popularization.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an industrial network security system. Background technique [0002] Industrial network refers to a fully digital, two-way, multi-station communication system installed in an industrial production environment, including dedicated and closed industrial networks, open industrial networks and standard industrial networks, among which, dedicated and closed industrial networks Network specifications are developed by each company and are often designed for a specific application field. The efficiency is also the highest, but when they are connected to each other, the indicators are uneven, and it is difficult to coordinate promotion and maintenance; open industrial networks except Some simpler standards are unconditionally open, most of them are conditionally open, or only open to members; the standard industrial network conforms to the industrial network of international stan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/56G06F21/57G06F21/60G06F21/62G06F21/64
CPCG06F21/31G06F21/577G06F21/568G06F21/602G06F21/6218G06F21/64
Inventor 黄龙飞
Owner 上海磐御网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products