Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for safety protection of industrial control equipment based on active immune mechanism

An industrial control and security protection technology, applied in general control systems, control/regulation systems, computer control, etc., can solve problems such as product lack of supervision mechanism, loss and disaster, and achieve the effect of defending against unknown attacks and avoiding damage to important resources

Active Publication Date: 2022-02-11
SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, such products are often limited by their own design ideas, and it is difficult to deal with the new outbreak of attack methods such as advanced persistence using the logic design flaws of the program itself; in addition, build a sample library based on past attacks to perform feature comparison and killing This kind of passive response strategy is hard to guard against the endless new vulnerabilities and attack methods, which runs counter to the basic principles of information security; third, such products often lack effective supervision mechanisms, and are often designed to have the highest management authority of the system. If it is under control, it will become a springboard for intruders to launch network attacks. After being maliciously tampered with and downloaded, it will cause unpredictable losses and disasters.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for safety protection of industrial control equipment based on active immune mechanism
  • System and method for safety protection of industrial control equipment based on active immune mechanism
  • System and method for safety protection of industrial control equipment based on active immune mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0088] Such as figure 1 As shown, the present invention relates to a security protection framework and method for industrial control equipment based on an active immune mechanism. The specific method is to realize the security and credibility of node computing environment, regional boundaries, and communication network connections based on trusted computing technology. A credible protection system with a high level of security that is immune to the idea of ​​security protection. Through the establishment of a safe and trusted management center, the control, decision-making and management of the trusted computing environment, trusted area boundaries and trusted communication networks can be realized, and known and unknown viruses or attack means can be blocked and isolated, thus ensuring the industrial control system. and network business func...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a security protection framework and method for industrial control equipment based on an active immunity mechanism. The specific method is to divide the security protection system of an information system into a trusted node computing environment, a trusted region boundary and a trusted computing framework based on active immunity. The three components of the trusted communication network are based on the trusted computing theory of active immunization, and the overall design is carried out from the two levels of relevant security technology and management methods, and the active immune protection that adapts to the industrial communication network scene is established in combination with the on-site industrial control system equipment system framework. The active immune industrial control security protection framework in the present invention adopts safe and efficient cryptographic algorithms, trusted control chips, trusted software and trusted network connections, and integrates active security strategy management and control systems to form a set of active immune information suitable for industrial control sites The security protection scheme provides a credible and safe operating environment for key equipment in the industrial control system network.

Description

technical field [0001] The invention relates to a method for designing a security protection framework of industrial control equipment based on an immune mechanism to provide a security protection mechanism for on-site industrial control equipment, and belongs to the field of industrial control network security. Background technique [0002] The architecture of the traditional industrial control network is mainly composed of various controllers (PLC, DCS, etc.), transmitters, sensors, actuators, historical databases, engineer stations, operator stations and other key control equipment for industry applications. To ensure the normal execution of production and control functions, it is necessary to ensure timely response and real-time data interaction, so it has not strengthened its information security protection capabilities. However, as a new generation of industrial control worms and attacks against industrial control networks have successively broken out in the on-site pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G05B19/042
CPCG05B19/0428G05B2219/24024
Inventor 尚文利尹隆刘贤达赵剑明陈春雨佟国毓曾鹏
Owner SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products