Supercharge Your Innovation With Domain-Expert AI Agents!

Implementation method and device for improving operation speed of industrial security host

A technology of running speed and industrial safety, applied in the field of implementation methods and devices for improving the running speed of an industrial safety host, can solve the problems of slow running of the host system, increased memory usage, downtime, etc. The effect of usability

Inactive Publication Date: 2022-04-26
北京威努特技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During the operation of the protection software, the memory usage will increase a lot, which may cause the host system to run slowly; because the operation of the business software takes up too much memory resources, it may even cause a downtime problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method and device for improving operation speed of industrial security host
  • Implementation method and device for improving operation speed of industrial security host

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1 of the present invention provides an implementation method for increasing the operating speed of an industrial security host computer, such as figure 1 shown, including:

[0028] Step B1: When the program whitelist protection software receives the trigger information for starting the business software, it judges whether the business software is in the used list of the program whitelist library, if yes, execute step B5, otherwise execute step B2;

[0029] In this embodiment, the programs in the program whitelist library used list are extracted from the program whitelist full library, and are being used by the program whitelist protection software. The hash table of the program whitelist library process file; the program whitelist library The initial value of the used list is empty, and the used list of the program whitelist library is stored in memory;

[0030] Optionally, in this embodiment, if it is judged that the business software is in the used list of...

Embodiment 2

[0046] Embodiment 2 of the present invention provides an implementation device for increasing the operating speed of an industrial security host, such as figure 2 shown, including:

[0047] The first judging module 201 is used to judge whether the business software is in the used list of the program whitelist library when receiving the trigger information for starting the business software, if so, trigger the timing update module 205, otherwise trigger the judgment update module 202;

[0048] Judgment update module 202, used to judge whether the business software is in the common list of the program whitelist database, if so, update the business software information in the common list of the program whitelist database to the used list of the program whitelist database, and execute the trigger timing update module 205, otherwise trigger the second judging module 203;

[0049] The second judging module 203 is used to judge whether the business software is in the list to be loa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method and device for improving the running speed of an industrial security host, and the method comprises the steps: enabling started business software to run in a used list of a program white list library or a common list of the program white list library; if the business software is in the to-be-loaded list of the program white list library, performing Hash calculation on business software information to obtain Hash information, adding process information and the Hash information of the business software into a common list of the program white list library and a used list of the program white list library, and automatically adding 1 to the process use frequency and automatically adding 2 seconds to the process residence timeout time; when the service software starts to run, countdown is started according to the overtime of the process resident memory, if the time is zero, the used list of the program white list library is updated to the common list of the program white list library, and the service software information in the used list of the program white list library is deleted. According to the method, the system running speed can be increased, and the usability of the program white list characteristics in an actual industrial field is improved.

Description

technical field [0001] The invention relates to the field of industrial control program protection, in particular to a method and device for improving the running speed of an industrial security host. Background technique [0002] With the advent of Industry 4.0 and the integration of industrialization and industrialization, the traditional industrial control system network security (referred to as industrial control security) has become a severe challenge for enterprises and national security, and has attracted more and more attention from enterprises and governments. Industrial control systems After a long period of closed state has begun to develop. In the early days, industrial control systems usually did not upgrade patches due to concerns about system compatibility issues. Therefore, for the specific environment of industrial control, the program whitelist knowledge base technology in the industrial control environment was introduced. The principle of the program whit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/572G06F21/575
Inventor 王玉成杨建平
Owner 北京威努特技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More