Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A comprehensive malicious code detection system and method in a power production system

A malicious code detection and power production technology, applied in the field of comprehensive malicious code detection system, can solve the problems of incomplete and missing messages, and achieve the effect of ensuring correctness and smoothness, improving performance, and ensuring delivery

Active Publication Date: 2022-06-07
江苏政采数据科技有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the above problems, this application provides a comprehensive malicious code detection system and transmission method inside the power production system, which effectively avoids the historical record messages formed by the anti-malicious code client software in the prior art, which are only stored locally and not Sending to the collection machine in the management area makes the information collected by the collection machine in the management area incomplete, and the message congestion of the collection machine in the management area makes the historical record message missing during the transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A comprehensive malicious code detection system and method in a power production system
  • A comprehensive malicious code detection system and method in a power production system
  • A comprehensive malicious code detection system and method in a power production system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The present invention will be further described below with reference to the accompanying drawings and embodiments.

[0106] like Figure 1-Figure 8 As shown, the comprehensive malicious code detection system inside the power production system includes:

[0107] An anti-malicious code client software is set on the factory station terminal in the factory station, and the anti-malicious code client software is used to detect and kill the malicious code on the factory station terminal and form a historical record message; the anti-malicious code client software can be 360 Guard or Jinshan Guard, the factory terminal can be a PC or a server, and the history record message can include the name and size of the malicious code on the factory terminal to be checked and killed, as well as the time when the malicious code was checked and killed. Malicious codes include computer viruses (referred to as viruses), Trojan horses (referred to as Trojan horses), and computer worms (refe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A comprehensive malicious code detection system inside a power production system and a method thereof, comprising: anti-malicious code client software is installed on a station terminal in a factory station, and the anti-malicious code client software is used to check and kill the factory station terminal malicious code and form historical record messages; the production control area is equipped with a management area acquisition machine; the station terminal is connected to the management area acquisition machine; the plant station terminal and the management area acquisition machine are connected to the attached server Connected; effectively avoiding the historical record message formed by the anti-malicious code client software in the prior art, which is only stored locally and not transmitted to the management area acquisition machine, making the information collected by the management area acquisition machine not complete enough, and the management area acquisition The message congestion of the machine makes the defect of history record message omission during delivery.

Description

technical field [0001] The present application relates to the technical field of malicious code detection, and in particular, to a comprehensive malicious code detection system and method in a power production system. Background technique [0002] The power monitoring system in the power production system is a very important and critical core. The power monitoring system uses computers, communication equipment, and measurement and control units as the basic tools, which provide the basis for real-time data acquisition, switch status detection and remote control of power distribution systems. The platform, which can form any complex monitoring system with detection and control equipment, plays a core role in the monitoring of power transformation and distribution. reaction speed. [0003] That is to say, the power monitoring system includes business systems and intelligent devices based on computer and network technology for monitoring and controlling the process of power pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06Q50/06
CPCY04S40/20
Inventor 张亮张晓陈坤裴培周劼英詹雄翟海保屈刚郑斌徐杰
Owner 江苏政采数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products