Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Trusted computing application method for protecting nuclear power DCS engineer station

An engineer station, trusted computing technology, applied in computing, computer security devices, electrical digital data processing, etc., can solve problems such as difficulty in meeting safety requirements, malicious code attacks on nuclear power DCS engineer stations, and difficulties in on-site safety maintenance of nuclear power control systems , to achieve the effect of improving defense performance and defense reliability

Active Publication Date: 2020-12-22
CHENGDU ZHONGKE HEXUN TECH CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The nuclear power DCS engineer station plays a vital role in the entire nuclear power control system, but the nuclear power DCS engineer station is vulnerable to malicious code attacks during operation, which brings certain difficulties to the on-site safety maintenance of the nuclear power control system
At the same time, known / unknown viruses or APTs targeting nuclear power control systems emerge in endlessly, and traditional passive defense methods are difficult to meet the corresponding security requirements
At present, the security protection of most nuclear power DCS engineering stations is mainly composed of three parts: firewall, intrusion detection and virus killing, but the "blocking and killing" method corresponding to these three parts is difficult to cope with the logic of using nuclear power DCS engineer stations attacks due to flaws, and these three parts also have corresponding security risks
It can be seen that the passive defense methods against malicious codes or viruses in the prior art cannot effectively improve the active security defense capabilities of the nuclear power DCS engineering station

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted computing application method for protecting nuclear power DCS engineer station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] refer to figure 1 , is a schematic flowchart of a trusted computing application method for protecting a nuclear power DCS engineer station provided by the present invention. The trusted computing application method for protecting a nuclear power DCS engineer station includes the following steps:

[0035] Step S1, constructing a root of trust functional layer according to the general PC framework, and triggering and executing the BIOS code corresponding to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trusted computing application method for protecting a nuclear power DCS engineer station. According to the method, the active safety defense of the nuclear power DCS engineerstation is realized through the construction of three levels of safety mechanisms, namely, a trusted root function layer, a trusted system function layer and a trusted service function layer. measurable and controllable active security defense of the whole operation process of the nuclear power DCS engineer station is achieved based on trusted computing, known / unknown viruses or APT can be effectively prevented from being predicted, prevented and controlled through the active security defense, and therefore, the defensive performance and defensive reliability of the nuclear power DCS engineerstation are effectively improved.

Description

technical field [0001] The invention relates to the technical field of information security protection, in particular to a trusted computing application method for protecting a nuclear power DCS engineer station. Background technique [0002] The nuclear power DCS engineer station plays a vital role in the entire nuclear power control system, but the nuclear power DCS engineer station is vulnerable to malicious code attacks during operation, which brings certain difficulties to the on-site safety maintenance of the nuclear power control system. At the same time, known / unknown viruses or APTs targeting nuclear power control systems emerge in an endless stream, and traditional passive defense methods are difficult to meet the corresponding security requirements. At present, the security protection of most nuclear power DCS engineering stations is mainly composed of three parts: firewall, intrusion detection and virus killing, but the "blocking and killing" method corresponding...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57G06F21/55
CPCG06F21/575G06F21/55
Inventor 唐敏张戎
Owner CHENGDU ZHONGKE HEXUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products