Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Power terminal and information security protection method and system of embedded system thereof

An embedded system and information security technology, applied in computer security devices, electronic digital data processing, platform integrity maintenance, etc., can solve problems such as lagging protection technology, affecting real-time performance of control services, and security function constraints, so as to improve information security. The effect of security capabilities

Active Publication Date: 2019-07-09
CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, China Power Grid has fully established a network security defense-in-depth system that focuses on network isolation and border protection. However, in the face of APT attacks that use rapidly evolving malicious code as the main technical means, the protection technology lags behind the attack methods and security functions. Restricted by business functions, protective measures affect the real-time performance of the control business, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Power terminal and information security protection method and system of embedded system thereof
  • Power terminal and information security protection method and system of embedded system thereof
  • Power terminal and information security protection method and system of embedded system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0061] like figure 1 As shown, an information security protection method for an embedded system of a power terminal, which actively performs information security protection through immune self-stabilization, immune monitoring, and immune defense methods based on the principle of artificial immunity, includes the following steps:

[0062] S1, establish an embedded system endogenous trusted operating environment for immune self-stabilization;

[0063] S2, loading an embedded system anomaly detection logic check program for immune monitoring;

[0064] S3, according to the result of the check in step S2, choose whether to load the fault emergency handling and event recording program for immune defe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a power terminal and an information safety protection method and system of an embedded system of the power terminal, information safety protection is actively carried out through immune self-stabilization, immune monitoring and immune defense modes according to an artificial immune principle, and the method comprises the following steps: S1, establishing an embedded systemendogenous credible operation environment for immune self-stabilization; S2, loading an embedded system abnormality detection logic inspection program for immunomonitoring; S3, selecting whether to load a fault emergency processing and event recording program for immune defense or not according to the result checked in the step S2: if the result checked in the step S2 is abnormal, loading the fault emergency processing and event recording program for immune defense; otherwise, not loading. According to the invention, three major functions of immune self-stabilization, immune monitoring and immune defense of human immunity are simulated, the power terminal is endowed with an anthropomorphic active immune safety protection capability, the information safety of the power industrial control terminal is maintained to a certain extent, and the safety risk of the power terminal is reduced.

Description

technical field [0001] The invention relates to the technical field of power system information security, in particular to an information security protection method and system for a power terminal and an embedded system thereof. Background technique [0002] Traditionally, the power system mainly relies on boundary isolation and dedicated system private protocols to ensure network security. Generally, power terminals are developed based on general-purpose software and hardware platforms. Except for user smart terminals that rely on the relatively simple SM1 national secret algorithm to ensure security, network security protection is rarely considered. . [0003] In recent years, advanced persistent threats (advanced persistent threat, APT) with malicious codes such as "Stuxnet", "Flame" and "Black Energy" as the main technical means have caused great harm to energy and other industrial control systems. The process is very hidden, and it can break through the existing securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F21/57G06F21/51
CPCG06F21/55G06F21/57G06F21/51Y04S40/20
Inventor 刘东奇曾祥君习伟丁凯
Owner CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products