System and method for detecting comprehensive malicious codes in electric power production system

A technology for malicious code detection and power production, applied in the field of comprehensive malicious code detection systems, can solve problems such as omissions and incomplete messages, and achieve the effects of ensuring correctness and smoothness, improving performance, and ensuring delivery.

Active Publication Date: 2022-04-01
江苏政采数据科技有限公司 +1
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the above problems, this application provides a comprehensive malicious code detection system and transmission method inside the power production system, which effectively avoids the historical record messages formed by the anti-malicious code client software in the prior art, which are only stored locally and not Sending to the collection machine in the management area makes the information collected by the collection machine in the management area incomplete, and the message congestion of the collection machine in the management area makes the historical record message missing during the transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for detecting comprehensive malicious codes in electric power production system
  • System and method for detecting comprehensive malicious codes in electric power production system
  • System and method for detecting comprehensive malicious codes in electric power production system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0106] like Figure 1-Figure 8 As shown, the comprehensive malicious code detection system inside the power production system includes:

[0107] Anti-malicious code client software is installed on the factory station terminal in the factory station, and the anti-malicious code client software is used to check and kill the malicious code on the factory station terminal and form a historical record message; the anti-malicious code client software can be 360 For guard or Jinshan Guardian, the station terminal can be a PC or a server, and the history record message can include the name and capacity of the malicious code on the station terminal checked and killed, as well as the time point when the malicious code was checked and killed. Malicious codes include malicious codes such as computer virus (abbreviated as virus), Trojan horse (abbreviated as Trojan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a comprehensive malicious code detection system and method in an electric power production system, and the method comprises the steps: setting anti-malicious code client software on a plant station terminal in a plant station, and enabling the anti-malicious code client software to be used for searching and killing malicious codes on the plant station terminal and forming a historical record message; a management large area acquisition machine is arranged in the production control large area; the plant station terminal is connected with the management large area acquisition machine; the plant station terminal and the management large area acquisition machine are connected with the attached server; the defects that in the prior art, historical record messages formed by malicious code prevention client software are only stored locally and are not transmitted to a management region acquisition machine, so that the messages acquired by the management region acquisition machine are not complete, and the historical record messages are omitted during transmission due to message congestion of the management region acquisition machine are effectively avoided.

Description

technical field [0001] The present application relates to the technical field of malicious code detection, and in particular to a comprehensive malicious code detection system inside a power production system and a method thereof. Background technique [0002] The power monitoring system in the power production system is a very important and key core. The power monitoring system uses computers, communication equipment, and measurement and control units as basic tools to provide a basis for real-time data collection, switch status detection, and remote control of power transformation and distribution systems. The platform, which can form an arbitrarily complex monitoring system with detection and control equipment, plays a central role in power transformation and distribution monitoring, and can help enterprises eliminate isolated islands, reduce operating costs, improve production efficiency, and speed up the detection of abnormalities in the power transformation and distribu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06Q50/06
CPCY04S40/20
Inventor 张亮张晓陈坤裴培周劼英詹雄翟海保屈刚郑斌徐杰
Owner 江苏政采数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products