Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

544 results about "Industrial network" patented technology

Industrial control network security protection monitoring system

An industrial control network security protection monitoring system performs real-time prevention and protection on industrial equipment of the industrial control network, and realizes network security protection monitoring through an acquisition layer, an analysis layer, a function layer and a display layer based on an integrated application platform, wherein the display layer mainly displays security trend, system topology and industrial control panorama; the acquisition layer comprises the acquisition of network data traffic and the recording of industrial control network operations; the analysis layer mainly comprises data processing, data association, data aggregation, data modeling, and integrated interfaces of other function modules; and the function layer mainly comprises monitoring audit, intrusion prevention, vulnerability mining, and data isolation. The system provided by the invention protects and protects industrial equipment in real time through the intelligent protectiontechnology of the industrial network control system, monitors and audits the data information of the entire industrial control network through the monitoring and auditing technology to prevent the industrial control network from being attacked externally, and can also have the vulnerability mining function of the industrial control network to escort the entire industrial control network security.
Owner:中船重工信息科技有限公司

Unmanned piling and taking technique for bulk cargo stock yard

The invention relates to a port warehousing logistics technology, in particular to a bulk material yard unmanned stacking/reclaiming technology. Firstly, a database is established; secondly, operation instructions, automatic stacking/reclaiming operation modes and control instructions for automatic stacking/reclaiming operations are generated through input operation kinds of goods and the planning work amount; thirdly, the relevant instructions are sent to a central control PLC and then transmitted to the corresponding local stacker/reclaimer PLC through the industrial network; fourthly, the local PLC controls the operation of all components of the stacker/reclaimer to complete the local operation control. At the same time, a material stack laser scanning device is used to scan the material yard condition, and the scanned result will then be transferred to a central control processing unit through the industrial network; fifthly, the central control processing unit achieves the stack type scan data processing of the stacker/reclaimer to generate new instructions which will then be sent to the corresponding local stacker/reclaimer PLC; sixthly, a handle operating panel arranged inside a central control room can be taken as a backup means of manual operation under special circumstances. The invention can be applied to large-scale raw material yards, such as ports, wharfs, open warehouses, mine stacking yards, as well as iron and steel enterprises.
Owner:BAOSHAN IRON & STEEL CO LTD +1

Industrial time-sensitive network data deterministic scheduling method

The invention relates to an industrial time-sensitive network data deterministic scheduling method, which belongs to the technical field of industrial networks and comprises the following steps that:S1: a TSN management network allocates priorities to data frames sent by industrial Ethernet equipment; S2, defining industrial data characteristics according to the data frame characteristic parameters; S3, establishing a data scheduling model at an output port of the industrial TSN switch, wherein the data scheduling model is composed of a data frame distribution module, a buffer queue and a data frame scheduling module; the data frame distribution module divides the buffer queue into eight scheduling queues according to the frame characteristic parameters; S4, distributing the data frames into different scheduling queues; S5, different shaping mechanisms are adopted for all the scheduling queues according to different determinacy and real-time requirements of the data frames; and S6, the data frame scheduling module performs output scheduling on the data frames. According to the method, the determinacy and the real-time performance of industrial CDT type data transmission are ensured, the jitter of SR type data can be effectively reduced, and meanwhile, the transmission of BE type data is allowed.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Timestamp technique-based industrial network security transmission method

The invention relates to a timestamp technique-based industrial network security transmission method and belongs to the technical field of security transmission. The method comprises the steps of encrypting at a transmitting end and decrypting at a receiving end. During the encrypting process, the local time is extracted to generate a time character string, and then to-be-sent data or instructions are added into the time character string. After that, the time character string is encrypted according to an encryption algorithm to generate a ciphertext, and the ciphertext is encrypted for a second time through introducing a user key to generate a final ciphertext. Finally, the time character string and the final ciphertext are transmitted together. During the decrypting process, the received ciphertext and a received timestamp are verified to be whether outmoded/forged or not. On the condition that the ciphertext and the timestamp are verified to be outmoded/forged, the ciphertext and the timestamp are discarded. Otherwise, all possible instructions/data are matched in the same encryption mode with the transmitting end. If the matching result is successful, the decryption is successful. If the matching is not successful, the operation is continued till no data or instruction is matched successfully. After that, the data/instructions are discarded. According to the technical scheme of the invention, the deceit through maliciously counterfeiting data can be prevented, so that real data obtained through sniffing cannot be reused. Moreover, the method is simple, practical, efficient, and low in requirement on hardware.
Owner:CHINA AEROSPACE SYST ENG

OPC security gateway system

The invention discloses an OPC security gateway system, and aims at solving the technical problems of poor security in interconnection of the existing enterprise information network and industrial control network. According to the technical scheme, the system comprises an OPC client security authorization module, an OPC data packet validity inspection module, an OPC data packet content inspection module, an abnormal event detection and alarming module, a log recording and security auditing module, a network assets recognizing and managing module, a system management interface module and a remote management tool. According to the system, the information of the enterprise information network enters the industrial control network through the OPC security gateway system, the OPC security gateway system performs security authorization for the communication behavior and inspects the validity and content of a data packet as well as recognizing and filtering malevolence communication behavior and an OPC data packet, so as to prevent invasion of illegal users, preventing from being attacked by abnormal or deformed OPC data packet as well as preventing the industrial network control from being attacked; the security in interconnection of the enterprise information network and the industrial control network can be improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Light-weight authentication key negotiation method based on implicit certificate

The invention relates to a light-weight authentication key negotiation method based on an implicit certificate, and belongs to the technical field of identity authentication. The method is used for establishing a secure channel between an OPC UA server and an OPC UA client and generating of a session key. Three entities, a credible certification authority (CA), the OPC UA client A and the OPC UA server B, are involved in an authentication key negotiation process. The OPC UA server B and the OPC UA client A acquire the own implicit certificates after the CA completes identity registration. Then the OPC UA server B and the OPC UA client A complete bidirectional authentication and key negotiation between the entities by using a light-weight algorithm. According to the method provided by the invention, the light-weight authentication key negotiation method based on the implicit certificate is provided aiming at the problem that an existing OPC UA security mechanism is not applicable to a resource-constrained communication environment. The method provided by the invention can be efficiently and safely applicable to an industrial network with a large amount of resource-constrained embedded OPC UA equipment.
Owner:KYLAND TECH CO LTD

Information safe transmission control method between inside network and outside network and gateway thereof

The invention discloses an information safe transmission control method between an inside network and an outside network and a gateway thereof. An inside network gateway and an outside network gateway are respectively arranged between an inside industrial network and an outside public network. The inside industrial network is connected with the inside network gateway; the outside public network is connected with the outside network gateway through a network interface; and the inside network gateway and the outside network gateway are connected through a serial port. When the outside network gateway receives the data of the network interface from the outside public network, safety check is carried out to the received data of the network interface and the data source, and the data of the network interface passing the safety check is converted as the industrial protocol data of the serial port and sent to the inside network gateway through the serial port; and the data is sent to a targeted address through the inside network gateway. The gateway transmission manner realizes the double isolation of the hardware interface and the software protocol between the inside network and the outside network so as to effectively prevent the inside network from being attacked by outside adverse programs and ensure the security of the inside network.
Owner:ASAT CHINA TECH

Abnormality detecting method based on industrial control system network traffic

The invention relates to an abnormality detecting method based on industrial control system network traffic and belongs to the field of information security. The industrial control system network traffic is collected, by analyzing the traffic features, the fact that normal traffic and abnormal traffic samples are evidently different in terms of power spectral density is discovered when a digital signal processing method is used to convert traffic signals from a time domain to a frequency domain, a low-frequency power sum critical value is found by analyzing the difference features in a large amount of historical data, if the low-frequency power of a to-be-detected sample is larger than the critical value, the sample traffic is taken as the abnormal traffic. The method includes a data preprocessing module, a traffic modeling module and an abnormality detecting module, wherein the data preprocessing module is used for processing early data traffic, the traffic modeling module is used for building normal models and abnormal models according toe low-frequency power and distribution of normal traffic and abnormal traffic, and the low-frequency power sum critical valve can be calculated. The abnormality detecting module is used for detecting abnormality. The false alarm rate of the method is 6.1% and the alarm missing rate of the method is 9.3%.
Owner:BEIJING UNIV OF TECH

Motor vehicle exhaust smoke video identification system

The invention discloses a motor vehicle exhaust smoke video identification system. The motor vehicle exhaust smoke video identification system comprises a video acquisition unit, a video data processing unit and a data center unit, wherein the video acquisition unit comprises an industrial network camera, the video data processing unit comprises an industrial control computer, and the industrial control computer comprises a vehicle tracking and processing module, a license plate identification and processing module, a vehicle speed measuring module and a vehicle exhaust monitoring module. The motor vehicle exhaust smoke video identification system has properties of simple structure, good robustness and no linkage equipment and has no equipment linkage coupling problem. Multi-lane monitoring, excessive vehicle discharge monitoring and license plate recording can be accomplished at one step, position recording is intelligible, and video recording is more persuasive. According to the motor vehicle exhaust smoke video identification system, the industrial network camera and the industrial control computer are only needed to realize processing on the lanes such as vehicle exhaust monitoring, license plate identification, smoke detection, vehicle velocity measurement, cost for equipment and mounting is greatly saved, and smoke detection efficiency is improved.
Owner:NANJING NEWVISION INTELLIGENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products