CN111523782A - Industrial control asset management method, device, equipment and storage medium - Google Patents

Industrial control asset management method, device, equipment and storage medium Download PDF

Info

Publication number
CN111523782A
CN111523782A CN202010291667.7A CN202010291667A CN111523782A CN 111523782 A CN111523782 A CN 111523782A CN 202010291667 A CN202010291667 A CN 202010291667A CN 111523782 A CN111523782 A CN 111523782A
Authority
CN
China
Prior art keywords
information
industrial control
address
asset
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010291667.7A
Other languages
Chinese (zh)
Other versions
CN111523782B (en
Inventor
杨昀桦
宁力军
陈雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN202010291667.7A priority Critical patent/CN111523782B/en
Publication of CN111523782A publication Critical patent/CN111523782A/en
Application granted granted Critical
Publication of CN111523782B publication Critical patent/CN111523782B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/18Multiprotocol handlers, e.g. single devices capable of handling multiple protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present disclosure provides an industrial control asset management method, apparatus, device and storage medium, wherein the management method comprises: determining a corresponding transmission medium according to the address information of each industrial control asset; determining a corresponding transmission protocol according to the transmission medium of each industrial control asset; requesting the information of each industrial control asset according to the transmission protocol, and storing the received response information into an information base, wherein the information of the industrial control assets comprises asset information, state information and configuration information; and classifying the information of all industrial control assets in the information base according to a plurality of preset classification dimensions. All industrial control assets are guaranteed to be stored, so that all industrial control assets can be managed; and comprehensive information of the industrial control assets is acquired, and the information of the industrial control assets is classified according to multiple dimensions on the basis of comprehensive information, so that powerful data support is provided for occasions such as later operation and maintenance upgrading, vulnerability analysis and mining.

Description

Industrial control asset management method, device, equipment and storage medium
Technical Field
The disclosure relates to the technical field of asset management, in particular to an industrial control asset management method, device, equipment and storage medium.
Background
Most of the key infrastructures of the current societies of the national civilians depend on industrial control systems (industrial control systems for short) to realize related operations. Once the important industrial control systems are damaged, lose functions or reveal information, even the national security and public benefits are jeopardized, so that the assets in the industrial control systems need to be effectively managed. In the existing method for managing industrial control assets, the industrial control assets which can be detected are limited, namely, all the industrial control assets cannot be managed; and for the detected industrial control assets, comprehensive information of the industrial control assets cannot be acquired.
Disclosure of Invention
The disclosure provides an industrial control asset management method, an industrial control asset management device, industrial control asset management equipment and a storage medium.
Specifically, the present disclosure is realized by the following technical solutions:
in a first aspect, an industrial control asset management method is provided, where the management method includes:
determining a corresponding transmission medium according to the address information of each industrial control asset;
determining a corresponding transmission protocol according to the transmission medium of each industrial control asset;
requesting the information of each industrial control asset according to the transmission protocol, and storing the received response information into an information base, wherein the information of the industrial control assets comprises asset information, state information and configuration information;
and classifying the information of all industrial control assets in the information base according to a plurality of preset classification dimensions.
Further, the address information of the industrial control assets includes: IP address, MAC address and master-slave address;
the transmission medium includes: ethernet, WLAN and serial bus;
the transmission protocol comprises: HART-IP protocol, wirelessHART protocol, and HART protocol;
the determining the corresponding transmission medium according to the address information of each industrial control asset comprises the following steps:
responding to the IP address of the address information of the industrial control assets, and determining that a corresponding transmission medium is Ethernet; determining that the corresponding transmission protocol is the HART-IP protocol;
responding to the address information of the industrial control assets as the MAC address, and determining that the corresponding transmission medium is the WLAN; determining that the corresponding transmission protocol is a WirelessHART protocol;
responding to the address information of the industrial control assets as master-slave addresses, and determining a corresponding transmission medium as a serial bus; determining that the corresponding transmission protocol is the HART protocol;
the determining a corresponding transmission protocol according to the transmission medium of each industrial control asset comprises:
the transmission medium responding to the industrial control assets is Ethernet; determining that the corresponding transmission protocol is the HART-IP protocol;
the transmission medium responsive to the industrial control asset is a WLAN; determining that the corresponding transmission protocol is a WirelessHART protocol;
the transmission medium responding to the industrial control assets is a serial bus; the corresponding transmission protocol is determined to be the HART protocol.
Further, the requesting information of each industrial control asset according to the transmission protocol and storing the received response information into an information base includes:
sending an information acquisition request to an IP address in the Ethernet by adopting a HART-IP protocol, receiving response information of the IP address, and storing information of industrial control assets in the response information to an information base;
sending an information acquisition request to an MAC address in a WLAN by adopting a WirelessHART protocol, receiving response information of the MAC address, and storing information of industrial control assets in the response information to an information base;
sending an information acquisition request to a slave station address in a serial bus by adopting a HART protocol, receiving response information of the slave station address, and storing the information of the industrial control assets in the response information to an information base.
Further, the method also comprises the following steps:
acquiring a first identifier of each industrial control asset according to the information of each industrial control asset, wherein each industrial control asset has a unique first identifier;
and generating warning information and deleting wrong industrial control assets corresponding to the first identifications in response to the fact that the first identifications of at least two industrial control assets are the same.
Further, the method also comprises the following steps:
for each industrial control asset, acquiring information of the industrial control asset every preset time interval;
comparing the obtained information of the industrial control assets with the stored information of the corresponding industrial control assets;
and updating the stored information of the corresponding industrial control assets in response to the fact that the obtained information of the industrial control assets is different from the stored information of the corresponding industrial control assets.
Further, the method also comprises the following steps:
displaying an address input interface in advance, and storing address information input based on the address input interface;
acquiring address information from each transmission medium in advance, and storing the acquired address information; or
The method comprises the steps of obtaining address information from each transmission medium in advance, displaying an address entry interface in advance, and storing the obtained address information and address information entered based on the address entry interface.
Further, the obtaining address information from each transmission medium includes:
detecting and activating ports in a network segment of the Ethernet to acquire IP addresses of the alive ports;
performing wireless sniffing on a WLAN environment, and acquiring an MAC address which can be matched with any MAC address in an industrial control equipment MAC address library from a WLAN packet in the environment;
the slave address of the serial bus is scanned to obtain the slave address of the packet to be sent back.
In a second aspect, an industrial asset management device is provided, the management device including:
the first determining module is used for determining a corresponding transmission medium according to the address information of each industrial control asset;
the second determining module is used for determining a corresponding transmission protocol according to the transmission medium of each industrial control asset;
the storage module is used for requesting the information of each industrial control asset according to the transmission protocol and storing the received response information into an information base, wherein the information of the industrial control assets comprises asset information, state information and configuration information;
and the classification module is used for classifying and displaying the information of all industrial control assets in the information base according to a plurality of preset classification dimensions.
In a third aspect, an electronic device is provided, the device comprising a memory for storing computer instructions executable on a processor for performing industrial control asset management based on any of the methods when the computer instructions are executed.
In a fourth aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
The technical scheme provided by the embodiment of the specification can have the following beneficial effects:
in the industrial control asset management method in the embodiment of the disclosure, the corresponding transmission medium is determined according to the address information of each industrial control asset, the corresponding transmission protocol is determined according to the transmission medium, the information of each industrial control asset is requested and stored according to the determined transmission medium and transmission protocol, and after the information of the industrial control asset is stored in the information base, the industrial control asset is classified according to the preset classification dimension. Because the transmission medium and the transmission protocol of each industrial control asset are determined, the industrial control assets in various transmission media can be obtained through various transmission protocols, and further all the industrial control assets are guaranteed to be stored, so that all the industrial control assets can be managed; and the stored information of the industrial control assets comprises asset information, state information and configuration information, namely comprehensive information of the industrial control assets is obtained, and the information of the industrial control assets is classified according to multiple dimensions on the basis of comprehensive information, so that powerful data support is provided for occasions such as later operation and maintenance upgrading, vulnerability analysis and mining and the like.
Drawings
FIG. 1 is a schematic flow diagram illustrating a method for industrial asset management according to an exemplary embodiment of the present disclosure;
fig. 2 is a flowchart illustrating a method of determining a transmission medium according to another exemplary embodiment of the present disclosure;
fig. 3 is a flowchart illustrating a method of determining a transmission protocol according to another exemplary embodiment of the present disclosure;
FIG. 4 is a flow diagram illustrating a method for verifying information in an information store according to an exemplary embodiment of the present disclosure;
FIG. 5 is a flow diagram illustrating a method of monitoring information within an information store according to an exemplary embodiment of the present disclosure;
FIG. 6 is a flowchart illustrating a method for automatically obtaining address information for an industrial asset according to another exemplary embodiment of the present disclosure;
FIG. 7 is a flowchart illustrating a method of industrial asset management including a verification step according to another exemplary embodiment of the present disclosure;
FIG. 8 is a schematic structural diagram of an industrial asset management device according to another exemplary embodiment of the present disclosure;
fig. 9 is a hardware schematic diagram of a device shown in an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Most of the key infrastructures of the current societies of the national civilians depend on industrial control systems (industrial control systems for short) to realize related operations. Once these important industrial control systems are damaged, lose functions or leak information, even endangering national security and public interest, it is necessary to effectively manage the assets (i.e. related equipment applied in the industrial control system, including SCADA, PLC, DCS, RTU, HMI, industrial switch, industrial operator/engineer station, etc.) in the industrial control system. In the existing method for managing industrial control assets, the industrial control assets which can be detected are limited, namely, all the industrial control assets cannot be managed; and for the detected industrial control assets, comprehensive information of the industrial control assets cannot be acquired.
Firstly, the present disclosure provides an industrial control asset management method, which collects and manages industrial control assets in an Ethernet network by using industrial protocols (i.e. communication message protocols between an upper computer and a control device and between the control device and the control device in an industrial control system, usually including read-write control of analog quantity and digital quantity) such as Modbus, S7, Ethernet/IP, Bacnet, etc., wherein the managed information includes manufacturer information, model, version, etc. However, because the industrial control assets in the ethernet are collected only based on the IP address, the devices that use the serial bus or other transmission media such as WLAN to communicate in the actual industrial environment cannot be collected and managed; moreover, because the managed information is single, when the equipment is replaced, the asset information cannot be updated in time, for example, the asset information of the new exchanged equipment cannot be collected again, and the situation that the information does not correspond to the actual object easily occurs, so that the management method cannot comprehensively collect and manage all the industrial control assets in the system, cannot update the state of the industrial control assets in real time, and ensures the validity of the information.
Based on this, referring to fig. 1, the present disclosure further provides an industrial control asset management method, where the management method includes steps S101 to S104:
in step S101, a corresponding transmission medium is determined according to the address information of each industrial control asset.
In this step, the transmission medium corresponding to each address can be determined according to the correspondence between the address type and the transmission medium. The address information of each industrial control asset is pre-stored in the information base, the address type of each address information is determined one by one according to the storage sequence in the information base, and then the transmission medium corresponding to each industrial control asset is determined according to the address type.
In one example, the address information of the industrial control asset includes: IP address, MAC address and master-slave address; the transmission medium includes: ethernet, WLAN and serial bus; among them, ethernet is a computer local area network technology. The IEEE 802.3 standard of the IEEE organization sets forth a technical standard for ethernet, which specifies the contents of the wiring, electrical signals, and medium access layer protocols, including the physical layer. Ethernet is currently the most commonly used local area network technology, replacing other local area network technologies such as token ring, FDDI, and ARCNET; the WLAN is a short for Wireless Local Area Network, and refers to a Network system that uses Wireless communication technology to interconnect computer devices to form communication and implement resource sharing, and is essentially characterized in that a communication cable is not used to connect a computer with a Network, but the computer is connected in a Wireless manner, so that the Network construction and the terminal movement are more flexible.
The HART protocol is a protocol widely adopted in the world at present, nearly hundreds of products adopting HART technology can be obtained from different suppliers, the complete variety of the products means that HART products can almost meet the requirements of all process application occasions, and the protocol supports the management of equipment information and is suitable for various networking conditions, so that industrial control assets can be collected by using the protocol. Traditional analog and discrete quantity devices can only communicate in a single process variable manner-thus it is difficult to find an easy way to determine if the transmitted information is valid. With the HART protocol, not only process variables but also other types of information can be obtained. Each HART device includes 35-40 standard information items, such as: the method comprises the steps of firstly, equipment state, diagnosis and alarm, secondly, process variable, unit, thirdly, loop current, percentage range, and thirdly, manufacturer and equipment labels. Other information includes: the host digitally queries the HART device and informs whether the device is properly set and functioning properly, which eliminates most of the routine inspection work and helps to discover process failures before they cause significant problems.
Referring to fig. 2, a method for determining a data transmission medium is shown, which specifically includes sub-steps S201 to S203.
In sub-step S201, in response to that the address information of the industrial control asset is an IP address, it is determined that a corresponding transmission medium is ethernet.
In sub-step S202, in response to the address information of the industrial control asset being a MAC address, it is determined that the corresponding transmission medium is a WLAN.
In sub-step S203, in response to the address information of the industrial control asset being a master-slave address, it is determined that the corresponding transmission medium is a serial bus.
Through the three substeps, three transmission media of Ethernet, WLAN and serial bus can be determined, so that a foundation is laid for subsequently acquiring industrial control assets in the three transmission media, and the problem that all industrial control assets in a system cannot be comprehensively collected and managed due to the fact that only industrial control assets in a single transmission medium (such as Ethernet) are acquired is solved.
With continued reference to fig. 1, in step S102, a corresponding transmission protocol is determined according to the transmission medium of each industrial control asset.
In this step, according to the correspondence between the type of the transmission medium and the transmission protocol, the transmission protocol corresponding to each transmission medium can be determined. In step S101, the transmission medium corresponding to each industrial control asset is already determined and stored in the information base, the type of each transmission medium is determined one by one according to the storage sequence in the information base, and then the transmission protocol corresponding to each industrial control asset is determined according to the type of the transmission medium.
In one example, the transmission protocol includes: HART-IP protocol, wirelessHART protocol, and HART protocol; the HART protocol uses FSK technology, superimposes a frequency signal on the process quantity of 4-20 mA signals, successfully and simultaneously communicates analog signals and digital signals in two directions without mutual interference, refers to an open interconnection model of the international standardization organization, uses a physical layer, a data link layer and an application layer of OSI standard, specifies a transmission physical form, a message structure, a data format and a series of operation commands, is a master-slave protocol, and only makes required response when the communication mode is question-answer. The HART protocol allows for 2 hosts in the system (say, one for system control and another for hand-held instruments for HART communication), and a maximum of 15 slaves can be connected to a pair of cables in a multi-drop system if analog signals are not required; in order to meet the increasing industry demand of acquiring data through the Ethernet, the HART Communication Foundation adds a new function on the HART protocol specification to form the HART-IP protocol; the WirelessHART protocol is a publicly available specification (IEC/PAS 62591ed.1) approved by the international electrotechnical standard committee (IEC), and is indeed the first industrial wireless communication technology to achieve this level of international certification worldwide.
Referring to fig. 3, a method for determining a transmission protocol is shown, which specifically includes sub-steps S301 to S303.
In sub-step S301, a transmission medium responding to the industrial control asset is ethernet; and determining that the corresponding transmission protocol is the HART-IP protocol.
In sub-step S302, the transmission medium responsive to the industrial control asset is a WLAN; the corresponding transmission protocol is determined to be the WirelessHART protocol.
In sub-step S303, the transmission medium responsive to the industrial control asset is a serial bus; the corresponding transmission protocol is determined to be the HART protocol.
The transmission protocols corresponding to the three transmission media of the Ethernet, the WLAN and the serial bus are determined through the three substeps, so that the corresponding transmission protocols can be adopted to request information in the corresponding transmission media, a foundation is further laid for acquiring industrial control assets in the three transmission media, and the feasibility of comprehensively managing all industrial control assets in the system is improved.
Referring to fig. 1, in step S103, information of each industrial control asset is requested according to the transmission protocol, and the received response information is stored in an information base, where the information of the industrial control asset includes asset information, status information, and configuration information.
In this step, the following operations are performed on each industrial control asset, the transmission medium of the industrial control asset and the address of the transmission medium are determined, then the transmission protocol corresponding to the transmission medium is adopted to generate a request packet, then the request packet is sent to the corresponding address to read the information of the industrial control asset at the address, and after the response information is received, the request packet is stored in the information base, namely after the asset information, the state information and the configuration information of the industrial control asset at the address are read, all the request packet is stored in the information base.
In one example, the address information is an IP address, a request packet may be generated by using the HART-IP protocol, and then the request packet is sent into the ethernet to read information of the industrial control asset at the IP address, and when the response information is received, the response information is stored in the information base, that is, the asset information, the state information, and the configuration information of the industrial control asset at the address are read, and all the asset information, the state information, and the configuration information are stored in the information base.
In one example, the address information is a MAC address, and a request packet may be generated using a WirelessHART protocol, and then the request packet is sent to the WLAN to read information of the industrial control asset at the MAC address, and when the response information is received, the response information is stored in the information base, that is, the asset information, the status information, and the configuration information of the industrial control asset at the address are read, and all of the asset information, the status information, and the configuration information are stored in the information base.
In one example, the address information is a master-slave address, and a request packet may be generated using the HART protocol, and then sent to the serial bus to read information of the industrial control asset at the master-slave address, and when receiving the response information, the response information is stored in the information base, that is, the asset information, the status information, and the configuration information of the industrial control asset at the address are read and all stored in the information base.
In one example, the information base is stored in the information base according to the relevance of the asset object, the asset information, the state information, the configuration information and the like by using a Bayesian classification algorithm, so that the efficiency of the later-stage matching and analyzing operation is improved. The Bayesian classification algorithm is a statistical classification method, which is an algorithm for classification by using probability statistical knowledge. In many cases, naive Bayes (A), (B)
Figure BDA0002450620960000091
Bayes, NB) classification algorithm can be compared with decision tree and neural network classification algorithm, the algorithm can be applied to a large database, and the method is simple, high in classification accuracy and fast in speed.
In step S104, the information of all the industrial control assets in the information base is classified according to a plurality of preset classification dimensions.
In this step, the information of the industrial control assets in the information base includes asset information, state information and configuration information, and further detailed information types may exist under the three information types. Some of the information categories are classified as classified dimensions, and data support can be provided for occasions such as later operation and maintenance upgrading, vulnerability analysis and mining, so that the classified dimensions can be preset as required. After the information of all the industrial control assets is acquired and stored according to the steps S101 to S103, the assets can be classified according to preset dimensionality, and a query page can be preset and displayed.
In one example, the preset classification dimensions include: one or more of a transmission, vendor name, device type, device software version number, device hardware version number, universal command document version number, transmitter specification version number, device identification, device status, and configuration information.
In the industrial control asset management method in the embodiment, because the transmission medium and the transmission protocol of each industrial control asset are determined, the industrial control assets in various transmission media can be obtained through various transmission protocols, and further, all the industrial control assets are guaranteed to be stored, so that all the industrial control assets can be managed; and the stored information of the industrial control assets comprises asset information, state information and configuration information, namely comprehensive information of the industrial control assets is obtained, and the information of the industrial control assets is classified according to multiple dimensions on the basis of comprehensive information, so that powerful data support is provided for occasions such as later operation and maintenance upgrading, vulnerability analysis and mining and the like.
Referring to fig. 4, some embodiments of the disclosure exemplarily show a method for checking information in an information base, which may be performed after storing information of an industrial control asset or simultaneously with requesting and storing information of the industrial control asset, and specifically, include steps S401 to S402.
In step S401, a first identifier of each industrial control asset is obtained according to information of each industrial control asset, where each industrial control asset has a unique first identifier.
In this step, an identifier is determined as a first identifier according to the content of the information of the industrial control assets, and then the identifier is obtained from the information of each industrial control asset for subsequent verification, which is equivalent to obtaining the identity information of each industrial control asset.
In one example, the first identification is a MAC address.
In another example, the first identification is a device ID number.
In step S402, in response to that the first identifiers of at least two industrial control assets are the same, generating warning information and deleting a wrong industrial control asset corresponding to the first identifier.
In this step, each first identifier is compared with all other first identifiers in pairs, and because the first identifiers of each industrial control asset are different, if two first identifiers are found to be the same, it can be determined that one of the two industrial control assets having the first identifier is wrong, and in order to ensure that the information of each industrial control asset is correct, warning information can be generated under the condition so as to remind a user of paying attention, and the specific warning information can be character information displayed on a warning page or voice information sent by an alarm; and then, deleting the wrong industrial control asset corresponding to the first identifier, specifically, determining which industrial control asset really has the first identifier by checking other information of the two industrial control assets corresponding to the first identifier, and then deleting the information of the other industrial control asset. The above description of this step is given by taking the case where the first identifiers of two industrial control assets are the same, and when the first identifiers of three or more industrial control assets are the same in the checking process, the operation of this step is completed according to the above description, but the difference is that information of two or more erroneous industrial control assets needs to be deleted.
Through the verification of the steps S401 to S402, the collected asset information and the asset object can be ensured to correspond to each other and keep synchronization all the time under the condition of reducing the influence on the original network environment as much as possible, and the problem that the asset synchronization can be ensured only by simply using a general exploration tool such as PING and the like to initially and slightly judge the equipment state or newly perform large-scale asset scanning originally is solved.
Referring to fig. 5, some embodiments of the present disclosure exemplarily show a method for monitoring information in an information base, which may be performed after storing information of an industrial control asset or simultaneously with requesting and storing information of the industrial control asset, and specifically, include steps S501 to S503.
In step S501, for each industrial control asset, information of the industrial control asset is acquired at preset time intervals.
In the step, a heartbeat frequency is dynamically adjusted by using a self-adaptive algorithm, the heartbeat detection is carried out on the collected asset objects, and the state and configuration information of the on-line equipment are requested at preset time intervals under the condition of reducing the influence on the original network environment as much as possible.
The self-adaptive (self-adaptive) means that in the process of processing and analyzing, a processing method, a processing sequence, a processing parameter, a boundary condition or a constraint condition is automatically adjusted according to the data characteristics of the processed data, so that the data are adaptive to the statistical distribution characteristics and the structural characteristics of the processed data to obtain the optimal processing effect.
In step S502, the acquired information of the industrial control asset is compared with the stored information of the corresponding industrial control asset.
In this step, a Hash algorithm may be used to compare the state information and configuration information in the obtained information of the industrial control asset with the state information and configuration information of the corresponding industrial control asset originally stored in the information base, if the two are consistent, it is determined that the industrial control asset is in a normal state, and if the two are different or offset, it is determined that the industrial control asset is in an abnormal state.
The Hash algorithm, generally translated as Hash, Hash or transliteration into Hash, converts an input (also called pre-mapped pre-image) of any length into an output of fixed length through the Hash algorithm, and the output is a Hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length.
In step S503, in response to that the acquired information of the industrial control asset is different from the stored information of the corresponding industrial control asset, the stored information of the corresponding industrial control asset is updated.
In this step, a request is made again for address information of the industrial control asset in the abnormal state, information of the industrial control asset at the address is obtained again, and the newly obtained information is stored in a corresponding position in the original information base in a covering manner.
Some embodiments of the present disclosure exemplarily show a method for acquiring address information of an industrial control asset, which specifically includes three manners, namely a manual acquisition manner, an automatic acquisition manner, and a manual and automatic combination manner.
The manual acquisition mode specifically includes: and displaying an address entry interface in advance, and storing address information entered based on the address entry interface.
This way the user stores all address information by manual entry. When industrial control assets in the system are installed, lists and records generally exist, a user can enter the assets based on the lists and the records, manual entry efficiency is low, and accuracy is difficult to guarantee.
The automatic acquisition mode specifically comprises the following steps: address information is acquired from each transmission medium in advance, and the acquired address information is stored.
The system has various transmission media, such as ethernet, WLAN and serial bus, etc., and the automatic acquisition mode acquires the address information of the industrial control assets in the system for each transmission medium, respectively, and the mode has high efficiency and high accuracy, but has certain errors.
The automatic combination mode of hand specifically is: the method comprises the steps of obtaining address information from each transmission medium in advance, displaying an address entry interface in advance, and storing the obtained address information and address information entered based on the address entry interface.
The method can be used for manually inputting on the basis of automatic acquisition, the omitted data can be automatically input in the manual inputting process, the automatically acquired errors can be corrected, the accuracy is guaranteed, and the efficiency is guaranteed.
Referring to fig. 6, some embodiments of the present disclosure exemplarily show a method for automatically acquiring address information of an industrial control asset, which specifically includes steps S601 to S603, where each step is specific to one transmission medium, and address information in three transmission media can be automatically acquired through three steps, and the three steps are not limited in sequence, and may be performed simultaneously or sequentially.
In step S601, a port in a network segment of the ethernet is probed to obtain an IP address of a live port.
In this step, the TCP/UDP5094 port in the network segment is probed, and the IP address for opening the port is determined.
In step S602, a WLAN environment is sniffed wirelessly, and a MAC address that can be matched with any MAC address in the MAC address library of the industrial control device is obtained from a WLAN packet in the environment.
In the step, a wireless network sniffing mode is used for capturing a WLAN packet in an environment, MAC addresses in the packet are analyzed and separated, then a Sunday algorithm is used for matching the MAC addresses with an industrial control equipment MAC address base, relevant industrial control asset MAC addresses in the environment are matched, if the industrial control equipment MAC address base has one of Emerson application Motors and Controls with an MAC address prefix of 00243D, if the MAC address prefix of a message source destination in the environment is matched to 00243D, the situation that equipment relevant to industrial control exists in a field environment is indicated, and the corresponding MAC addresses are added into an information base.
The Sunday algorithm is the string pattern matching proposed by Daniel m. The core idea is as follows: in the matching process, when the mode strings are found to be unmatched, the algorithm can skip as many characters as possible to carry out the next matching, and therefore the matching efficiency is improved.
In step S603, the slave address of the serial bus is scanned to obtain the slave address of the packet to be sent back.
In this step, a broadcast packet is transmitted from the master station address, then the slave station address is scanned, and if a relevant return packet is received, the corresponding slave address is stored in the information base.
Referring to fig. 7, a detailed flowchart of the industrial asset management method including the checking step is shown.
In a second aspect, referring to fig. 8, an industrial asset management device is provided, where the management device includes:
a first determining module 801, configured to determine a corresponding transmission medium according to address information of each industrial control asset;
a second determining module 802, configured to determine a corresponding transmission protocol according to a transmission medium of each industrial control asset;
a storage module 803, configured to request information of each industrial control asset according to the transmission protocol, and store the received response information in an information base, where the information of the industrial control asset includes asset information, state information, and configuration information;
and the classification module 804 is configured to classify information of all industrial control assets in the information base according to a plurality of preset classification dimensions.
In a third aspect, referring to fig. 9, an electronic device is provided, the device including a memory for storing computer instructions executable on a processor, the processor for performing industrial control asset management based on any of the methods when executing the computer instructions.
In a fourth aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Moreover, a computer may be embedded in another device, e.g., a mobile telephone, a Personal Digital Assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device such as a Universal Serial Bus (USB) flash drive, to name a few.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, special purpose logic circuitry.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only exemplary of the present disclosure and should not be taken as limiting the disclosure, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. An industrial control asset management method, characterized in that the management method comprises:
determining a corresponding transmission medium according to the address information of each industrial control asset;
determining a corresponding transmission protocol according to the transmission medium of each industrial control asset;
requesting the information of each industrial control asset according to the transmission protocol, and storing the received response information into an information base, wherein the information of the industrial control assets comprises asset information, state information and configuration information;
and classifying the information of all industrial control assets in the information base according to a plurality of preset classification dimensions.
2. The industrial control asset management method according to claim 1, wherein the address information of the industrial control asset comprises: IP address, MAC address and master-slave address;
the transmission medium includes: ethernet, WLAN and serial bus;
the transmission protocol comprises: HART-IP protocol, wirelessHART protocol, and HART protocol;
the determining the corresponding transmission medium according to the address information of each industrial control asset comprises the following steps:
responding to the IP address of the address information of the industrial control assets, and determining that a corresponding transmission medium is Ethernet; determining that the corresponding transmission protocol is the HART-IP protocol;
responding to the address information of the industrial control assets as the MAC address, and determining that the corresponding transmission medium is the WLAN; determining that the corresponding transmission protocol is a WirelessHART protocol;
responding to the address information of the industrial control assets as master-slave addresses, and determining a corresponding transmission medium as a serial bus; determining that the corresponding transmission protocol is the HART protocol;
the determining a corresponding transmission protocol according to the transmission medium of each industrial control asset comprises:
the transmission medium responding to the industrial control assets is Ethernet; determining that the corresponding transmission protocol is the HART-IP protocol;
the transmission medium responsive to the industrial control asset is a WLAN; determining that the corresponding transmission protocol is a WirelessHART protocol;
the transmission medium responding to the industrial control assets is a serial bus; the corresponding transmission protocol is determined to be the HART protocol.
3. The industrial control asset management method according to claim 2, wherein the requesting information of each industrial control asset according to the transmission protocol and storing the received response information in an information base includes:
sending an information acquisition request to an IP address in the Ethernet by adopting a HART-IP protocol, receiving response information of the IP address, and storing information of industrial control assets in the response information to an information base;
sending an information acquisition request to an MAC address in a WLAN by adopting a WirelessHART protocol, receiving response information of the MAC address, and storing information of industrial control assets in the response information to an information base;
sending an information acquisition request to a slave station address in a serial bus by adopting a HART protocol, receiving response information of the slave station address, and storing the information of the industrial control assets in the response information to an information base.
4. The industrial control asset management method according to claim 3, further comprising:
acquiring a first identifier of each industrial control asset according to the information of each industrial control asset, wherein each industrial control asset has a unique first identifier;
and generating warning information and deleting wrong industrial control assets corresponding to the first identifications in response to the fact that the first identifications of at least two industrial control assets are the same.
5. The industrial control asset management method according to claim 3, further comprising:
for each industrial control asset, acquiring information of the industrial control asset every preset time interval;
comparing the obtained information of the industrial control assets with the stored information of the corresponding industrial control assets;
and updating the stored information of the corresponding industrial control assets in response to the fact that the obtained information of the industrial control assets is different from the stored information of the corresponding industrial control assets.
6. The industrial control asset management method according to claim 1, further comprising:
displaying an address input interface in advance, and storing address information input based on the address input interface;
acquiring address information from each transmission medium in advance, and storing the acquired address information; or
The method comprises the steps of obtaining address information from each transmission medium in advance, displaying an address entry interface in advance, and storing the obtained address information and address information entered based on the address entry interface.
7. The industrial asset management method according to claim 6, wherein said obtaining address information from each transmission medium comprises:
detecting and activating ports in a network segment of the Ethernet to acquire IP addresses of the alive ports;
performing wireless sniffing on a WLAN environment, and acquiring an MAC address which can be matched with any MAC address in an industrial control equipment MAC address library from a WLAN packet in the environment;
the slave address of the serial bus is scanned to obtain the slave address of the packet to be sent back.
8. An industrial asset management device, characterized in that the management device comprises:
the first determining module is used for determining a corresponding transmission medium according to the address information of each industrial control asset;
the second determining module is used for determining a corresponding transmission protocol according to the transmission medium of each industrial control asset;
the storage module is used for requesting the information of each industrial control asset according to the transmission protocol and storing the received response information into an information base, wherein the information of the industrial control assets comprises asset information, state information and configuration information;
and the classification module is used for classifying and displaying the information of all industrial control assets in the information base according to a plurality of preset classification dimensions.
9. An electronic device, comprising a memory for storing computer instructions executable on a processor, the processor for performing management of an industrial control asset based on the method of any one of claims 1 to 7 when executing the computer instructions, and a processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202010291667.7A 2020-04-14 2020-04-14 Industrial control asset management method, device, equipment and storage medium Active CN111523782B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010291667.7A CN111523782B (en) 2020-04-14 2020-04-14 Industrial control asset management method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010291667.7A CN111523782B (en) 2020-04-14 2020-04-14 Industrial control asset management method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111523782A true CN111523782A (en) 2020-08-11
CN111523782B CN111523782B (en) 2023-04-28

Family

ID=71902335

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010291667.7A Active CN111523782B (en) 2020-04-14 2020-04-14 Industrial control asset management method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111523782B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468364A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 CIP asset detection method and device, computer equipment and readable storage medium
CN113315769A (en) * 2021-05-27 2021-08-27 杭州迪普科技股份有限公司 Industrial control asset information collection method and device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012157112A1 (en) * 2011-05-19 2012-11-22 富士通株式会社 Gateway device, communication method for gateway device, node device, communication method for node device, and communication system
CN103713583A (en) * 2012-09-29 2014-04-09 西门子公司 Method and apparatus for automatically acquiring and configuring authorization information
CN104272204A (en) * 2012-03-15 2015-01-07 施耐德电器工业公司 Device address management in an automation control system
CN104331028A (en) * 2013-07-22 2015-02-04 上海联影医疗科技有限公司 Control device and bus system
CN106487879A (en) * 2016-09-20 2017-03-08 北京知道未来信息技术有限公司 A kind of network equipment recognition methodss based on device-fingerprint storehouse and device
CN108667725A (en) * 2018-04-25 2018-10-16 哈尔滨电气股份有限公司 A kind of industrial AnyRouter and implementation method based on a variety of accesses and edge calculations
US20180332069A1 (en) * 2017-05-11 2018-11-15 Tenable, Inc. Elastic asset-based licensing model for use in a vulnerability management system
CN109274551A (en) * 2018-09-14 2019-01-25 江苏博智软件科技股份有限公司 A kind of accurate efficient industry control resource location method
CN109379375A (en) * 2018-11-28 2019-02-22 杭州迪普科技股份有限公司 Acquisition methods, device and the network equipment of access control rule
CN110011973A (en) * 2019-03-06 2019-07-12 浙江国利网安科技有限公司 Industrial control network access rule construction method and training system
CN110401662A (en) * 2019-07-29 2019-11-01 华能阜新风力发电有限责任公司 A kind of industrial control equipment fingerprint identification method, storage medium
CN110635971A (en) * 2019-10-16 2019-12-31 杭州安恒信息技术股份有限公司 Industrial control asset detection and management method and device and electronic equipment
US20200034094A1 (en) * 2018-07-25 2020-01-30 Palo Alto Research Center Incorporated System and method for automatic on-boarding of printers in a printer management system
CN110868336A (en) * 2019-11-11 2020-03-06 北京明略软件***有限公司 Data management method, device and computer readable storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012157112A1 (en) * 2011-05-19 2012-11-22 富士通株式会社 Gateway device, communication method for gateway device, node device, communication method for node device, and communication system
CN104272204A (en) * 2012-03-15 2015-01-07 施耐德电器工业公司 Device address management in an automation control system
CN103713583A (en) * 2012-09-29 2014-04-09 西门子公司 Method and apparatus for automatically acquiring and configuring authorization information
CN104331028A (en) * 2013-07-22 2015-02-04 上海联影医疗科技有限公司 Control device and bus system
CN106487879A (en) * 2016-09-20 2017-03-08 北京知道未来信息技术有限公司 A kind of network equipment recognition methodss based on device-fingerprint storehouse and device
US20180332069A1 (en) * 2017-05-11 2018-11-15 Tenable, Inc. Elastic asset-based licensing model for use in a vulnerability management system
CN108667725A (en) * 2018-04-25 2018-10-16 哈尔滨电气股份有限公司 A kind of industrial AnyRouter and implementation method based on a variety of accesses and edge calculations
US20200034094A1 (en) * 2018-07-25 2020-01-30 Palo Alto Research Center Incorporated System and method for automatic on-boarding of printers in a printer management system
CN109274551A (en) * 2018-09-14 2019-01-25 江苏博智软件科技股份有限公司 A kind of accurate efficient industry control resource location method
CN109379375A (en) * 2018-11-28 2019-02-22 杭州迪普科技股份有限公司 Acquisition methods, device and the network equipment of access control rule
CN110011973A (en) * 2019-03-06 2019-07-12 浙江国利网安科技有限公司 Industrial control network access rule construction method and training system
CN110401662A (en) * 2019-07-29 2019-11-01 华能阜新风力发电有限责任公司 A kind of industrial control equipment fingerprint identification method, storage medium
CN110635971A (en) * 2019-10-16 2019-12-31 杭州安恒信息技术股份有限公司 Industrial control asset detection and management method and device and electronic equipment
CN110868336A (en) * 2019-11-11 2020-03-06 北京明略软件***有限公司 Data management method, device and computer readable storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112468364A (en) * 2020-11-25 2021-03-09 杭州安恒信息技术股份有限公司 CIP asset detection method and device, computer equipment and readable storage medium
CN112468364B (en) * 2020-11-25 2022-02-22 杭州安恒信息技术股份有限公司 CIP asset detection method and device, computer equipment and readable storage medium
CN113315769A (en) * 2021-05-27 2021-08-27 杭州迪普科技股份有限公司 Industrial control asset information collection method and device

Also Published As

Publication number Publication date
CN111523782B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
US9219644B2 (en) Automated configuration of new racks and other computing assets in a data center
CN109768870A (en) A kind of industry control network assets discovery method and system based on active probing technique
CN102902243A (en) System and method for servicing field devices in an automation plant
JP2021515498A (en) Attribute-based policies for integrity monitoring and network intrusion detection
CN111523782B (en) Industrial control asset management method, device, equipment and storage medium
KR20190017208A (en) Apparatus for serial port based cyber security vulnerability assessment and method for the same
CN112883031B (en) Industrial control asset information acquisition method and device
CN104506370A (en) Management method and management device for non-network-management system
CN104937573A (en) Device management apparatus, device management system, device management method, and program
WO2023051455A1 (en) Method and apparatus for training trust model
CN101512450B (en) Data recording device
CN115980554A (en) Chip testing method and electronic equipment thereof
CN113315769B (en) Industrial control asset information collection method and device
CN116232571A (en) Vehicle encryption method, device, equipment, storage medium and vehicle
JP5490101B2 (en) Method and apparatus for correcting information transmitted in digital form
CN103312530A (en) Method and system for correspondingly counting on-line server and rack position, and counting platform
Iatrou et al. Design classification of aggregating systems in intelligent information system architectures
US8676941B2 (en) Using wireless technology to direct complex wiring configurations
US9220127B2 (en) Wireless network system
CN112702705A (en) Equipment debugging method, device and system based on Zigbee technology
CN106803848B (en) Battery testing device middle position machine management method and device
CN115412346B (en) Message detection method and device, electronic equipment and storage medium
CN115242704B (en) Network topology data updating method and device and electronic equipment
CN116248736A (en) Automatic drawing method and system for topological graph of industrial control system
CN117193886B (en) Dynamic loading method for configuration file of industrial control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant