Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37 results about "Control system security" patented technology

Control system security is the prevention of (intentional or unintentional) interference with the proper operation of industrial automation and control systems. These control systems manage essential services including electricity, petroleum production, water, transportation, manufacturing, and communications. They rely on computers, networks, operating systems, applications, and programmable controllers, each of which could contain security vulnerabilities. The 2010 discovery of the Stuxnet worm demonstrated the vulnerability of these systems to cyber incidents. The United States and other governments have passed cyber-security regulations requiring enhanced protection for control systems operating critical infrastructure.

Method and system for controlling system security based on position information

The invention discloses a method and a system for controlling safety of a system based on position information, the method comprises the following steps: the current position information of an electronic device is detected; the comparison with the preset position information is carried out, whether the current position of the electronic device is in the allowable range or not is judged, and if not, a power supply of the system is controlled to be closed. The system comprises a position detection device for detecting the current position information of the electronic device; a comparison device, which is connected with the position detection device and used for comparing the current position information of the electronic device with the preset position information and judging whether the current position of the electronic device is in the allowable range or not; a system safety control device, which is connected with the comparison device; when the current position of the electronic device exceeds the allowable range, the power supply of the system of the electronic device is controlled to be closed. The system has the advantages that the system can limit the range of the workplace of the electronic device, thus protecting the information safety of the system and being applicable to the machines used in certain specific places.
Owner:MITAC COMP (SHUN DE) LTD +1

Intelligent light control system

The invention provides an intelligent light control system, which comprises a main controller used for generating a wireless control signal upon receiving a triggering instruction sent by a user; and a wireless controller used for controlling the on / off state of a light fixture according to the wireless control signal, detecting the current signal of the light fixture in real time, and then feeding the state information corresponding to the current signal back to the main controller. The main controller receives and displays the received state information to a user, so that the user can check the state information in real time. According to the technical scheme of the invention, by means of the main controller, the wireless controller and the light fixture, the visualization and the intellectualization of the entire intelligent light control system are realized, while the wiring operation is not required during the entire control process. Therefore, the waste of cables due to the traditional wiring mode can be avoided. The investment cost of the traditional wiring operation is effectively reduced. Meanwhile, the current signal of the light fixture is detected in real time by the wireless controller, and then the corresponding state information of the light fixture is fed back to the main controller. In this way, the complex process of the manual signal detection operation is avoided. The above system is time-saving and labor-saving in operation. The security of the whole control system is better and the later maintenance efficiency of the system is higher.
Owner:汤毅

Improved train control system security data interaction method

The invention discloses an improved train control system secure data interaction method, which comprises the following steps of: expanding the shared key of a data transceiver and the length of a random number generated and shared by the transceiver, and calculating a session key with an increased key length by matching with a corresponding SM4 algorithm; dividing the security data X of the train control system into blocks according to N bits, using a data block and a full text of a session key as input in each round, performing iterative computation by using a corresponding SM4 algorithm, and generating an N-bit operation result Hi corresponding to the corresponding data block; regarding the operation result Hi as encrypted data of the corresponding data block, and covering the corresponding data block, so that the security encryption of the security data X of the train control system is realized; and selecting a corresponding lossless compression algorithm according to the type of the train control system security data, performing data lossless compression on the full-text encrypted train control system security data X, and sending the compressed data X to a receiver. According to the method, the data security is greatly improved, and meanwhile, the occupancy rate of wireless resources is reduced.
Owner:CHINA RAILWAYS CORPORATION +2

Mine downhole power transformation chamber and construction method

InactiveCN107701209AMeet the installation and working environment requirementsGuaranteed uptimeUnderground chambersTunnel/mines ventillationAutomatic controlControl system
The invention provides a mine downhole power transformation chamber and a construction method. The mine downhole power transformation chamber comprises a chamber sealing retaining wall, an automatic control unit, an axial flow fan and an air purifying device. The power transformation chamber is a fully-sealed space, the chamber sealing retaining wall is arranged at the position where the chamber is connected with a mine tunnel, a chamber sealing door is arranged on the middle-lower portion of the chamber sealing retaining wall, an air outlet is formed in the upper portion of the chamber sealing retaining wall, and an air inlet is formed in the bottom of the chamber sealing retaining wall. The air purifying device is arranged at an inlet of the axial flow fan, and an outlet of the axial flow fan is connected to the air inlet. The automatic control unit is connected with the air purifying device. By implementing the mine downhole power transformation chamber and the construction method,the indoor environment of the power transformation chamber can meet the requirements of the mounting and working environment for mine downhole precision electrical appliance equipment, unattended operation and automatic control can be achieved, and a control system involved in the mine downhole power transformation chamber is high in safety, low in operation cost and capable of being reasonably applied and implemented in various complex mine downhole exploiting environments; and good popularization prospects are achieved.
Owner:GUIZHOU KAILIN GRP CO LTD

Control system security dynamic event trigger control method under false data attack

A control system security dynamic event trigger control method under false data attack designs a false data injection attack model with an observer module, a sensor module, a controller module and an actuator saturation module, and introduces a dynamic event trigger mechanism in consideration of limited communication network bandwidth resources. An improved event triggering scheme is presented. The main idea of the event triggering mechanism is to detect whether a current sampling signal satisfies a preset triggering algorithm, if so, the sampled signal is transmitted to the controller, otherwise, the sampled signal is abandoned. The method has the advantages that the improved event triggering scheme ensures that the system can operate safely and stably on the premise of global stability, meanwhile, transmission of redundant signals is reduced, the pressure of network transmission is relieved, and bandwidth resources are saved. In addition, the introduced observer module and actuator saturation module are closer to the operating environment and requirements of the power grid, the network control performance is ensured, and the expected control effect is achieved.
Owner:YINGKOU ELECTRIC POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER SUPPLY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products