Geo Cruiser Digital For Cloud & Consultancy: Leading the New Era of Underground Space Technology

Explore technology and lead the future

Geo Cruiser Digital For Cloud & Consultancy LLC. - Business Fields

Geo Cruiser Digital For Cloud & Consultancy LLC. as a leading technology innovation enterprise in the industry, focuses on the research and application of integrated digital twin technology and intelligent solutions based on artificial intelligence. Through our professional services and innovative technologies, we bring efficient, precise, and secure solutions to numerous industries, helping customers achieve digital transformation and upgrading.

New Product Recommendations in Business Fields

Geo Cruiser Digital For Cloud & Consultancy LLC. as a leader in the industry, has once again launched multiple innovative products covering multiple business areas such as drone technology, geological exploration, and intelligent surveying. These new products not only represent the strong technological research and development capabilities of the aviation industry, but also bring unprecedented changes and improvements to related industries. Explore these cutting-edge technological products now and embark on a new chapter in your intelligent work!
Integrated digital twin platform for reservoir wellbore surface integration
The integrated digital twin platform for reservoir wellbore surface is a cutting-edge technological innovation achievement in the field of petroleum industry. This platform is based on advanced digital twin concepts, combined with advanced technologies such as the Internet of Things, big data analysis, and artificial intelligence, providing a comprehensive, accurate, and real-time digital management solution for key links such as oil exploration, development, production, and management
Digital twin technology is the core of this platform. It achieves comprehensive and accurate simulation and monitoring of physical objects by constructing digital models that correspond one-to-one with physical wellbores, oil reservoirs, pipelines, and surface facilities in virtual space. These digital models not only contain basic information such as the geometric shape and physical properties of physical objects, but also reflect dynamic information such as the operating status and production parameters of physical objects through real-time collected sensor data

Desert Fox Second Generation
A. Industrial grade high-performance design: capable of long-term reliable operation in a wide temperature range of -40 ℃ to+80 ℃ and harsh environments such as humidity, salt spray, and dust. B. Excellent anti electromagnetic interference performance: RTU has passed the EMC3 level test of GB/T13729 type test; Excellent resistance to electromagnetic shocks such as lightning. C. New sealing structure design: The equipment shell has excellent water tightness, air tightness, and explosion-proof performance; The unidirectional molecular sieve structure of the transmitter housing can significantly reduce the condensation phenomenon of the transmitter in humid and hot alternating environments; Concealed seal ring structure has excellent anti-aging performance. D. High stability intelligent self calibration design: The transmitter is equipped with a high-precision constant source, and the accuracy stability of the transmitter's AD sampling and conversion is over 10 years; Intelligent self diagnosis and self calibration design ensure that the transmitter can maintain high precision and stability even under complex and harsh working conditions for a long time. E. Data compression transmission technology: a patented algorithm that solves the bottleneck of narrowband wireless data transmission, significantly improves communication efficiency, and reduces construction costs.

Dynamometer (three-phase electric parameter version)
1. Intelligent diagnosis, evaluation, and prediction based on artificial intelligence and data mining, easy to use and user-friendly; 2. Capable of achieving automatic continuous measurement of oil well fluid production; 3. The rod pump oil production system adopts an indicator based on electrical parameters, which can achieve accurate detection and calculation of electrical parameters ->suspension point load/power diagram ->pump power diagram, with detection accuracy comparable to existing high-end indicators; 4. It can automatically measure the dynamic and static liquid levels of oil wells in rod pump oil production systems, with measurement accuracy comparable to high-end dynamometers; 5. Capable of monitoring the working conditions of all key equipment from motors to underground systems; 6. By collecting data such as motor current and voltage, and obtaining existing production data, dynamic monitoring of all current oil production system operating conditions, automatic continuous measurement of liquid production volume, and continuous monitoring of dynamic liquid level depth can be achieved through various proprietary patented algorithms and software; 7. All equipment is installed on the ground, and there is no need to install any equipment underground. The installation location is flexible (at any suitable position of the motor power supply line), with simple installation, easy implementation of the plan, and low cost, avoiding the installation difficulties, impact on maintenance operations, and high costs caused by the existing plan of installing sensors and equipment underground; 8. Do not damage or change the original structure of the oil production system, and do not affect the operation of the original system; 9. Support the use of power lines or 4G/5G mobile data communication technology for data transmission; 10. Not only can it monitor the current operating conditions of the oil production system, but it can also predict the future operating conditions of the oil production system.

Edge computing Gateway (GCT-X1130P)
① Based on the edge layer development of the industrial Internet platform, the embedded development technology is used to move the computing focus from the server side down to the edge side, effectively reduce the server load, significantly improve the availability of dynamometer card diagnosis and measurement, and use a new method and concept to achieve dynamometer card diagnosis and measurement Applying grayscale recognition algorithm for power diagram diagnosis, innovatively proposing power diagram segmentation and comparison, greatly improving the accuracy of power diagram recognition. At the same time, additional conditions are added to the recognized power diagram for calculation. Convolutional neural networks are applied to learn for different working conditions and types of wells, and then the liquid production is calculated. The results of each power diagram are integrated directly, and cross validation can greatly improve the accuracy of the output of the power diagram liquid production results Developed the SaaS application of the edge computing management platform, realized the AI algorithm based on the neural network, and had the ability of independent learning. Through model learning, it was highly replicable, scalable, and adaptive to various geological conditions, permeability, and well types. ④ Through the platform, the edge transmission module and edge computing gateway equipment can have remote maintenance function, effectively reducing routine maintenance work.

Intelligent IoT expansion cabin
With the rapid development of high technology, people are increasingly relying on facilities and equipment such as computers, making command not just about brain decision-making, but more about precise calculations. Therefore, various command systems have emerged. The mobile command system is divided according to the carrying method and equipment scale, mainly including single soldier type, vehicle compartment type, train transport type, early warning aircraft type, satellite and other command systems. At present, the mobile command system mainly consists of military command and emergency command systems. Therefore, in combination with the field command requirements of oil fields, we have designed a vehicle compartment style command system. In the current market, the mobile command system is a command and dispatch system that integrates monitoring, conferencing, and command and dispatch, and is widely used in public security and military applications. Most systems are designed from the perspective of comprehensive management of the entire public security command center, which not only meets the management, monitoring, and office functions of the command and dispatch center; It also reserves interfaces for interaction with the higher-level traffic management system and with the decision support system, facilitating the transmission and statistics of various data, and making it easy to upgrade and expand in the future. Therefore, based on the actual needs of the oilfield environment and mobile command, and combined with the intelligent IoT system of the oilfield, we have designed and developed a mobile command IoT expansion cabin, which can be used in conjunction with current digital and intelligent IoT products and platforms in the oilfield to meet the needs of rapid response to emergency rescue events, mobile command decision-making, on-site disposal, on-site analysis decision-making, etc. It is an internationally leading mobile integrated command and dispatch IoT solution.

EasyCore Core Core Core Description Software
EasyCore has the universal plotting function of any core description software, as well as unique display features and beautiful visualization functions. It is suitable for Windows operating systems and tablets, and can save logging data in various digital forms for easy data analysis and sharing.

EasyCopy 2D graphics processing software
Edit the manuscript, optimize the images, and add annotations, etc; Convert research results into various formats for sharing; Adapt to any printer; Display the research results in a more detailed manner in the original document.

EasyDB Core Description and Interpretation Results Database
Based on MS-SQL, integrated with EasyCore, using File Explorer to browse data, supporting backup and recovery functions as well as cloud storage capabilities.

Development Geological Modeling Software
The application of advanced technologies such as complex geological modeling, 3D mesh generation, large-scale modeling, and large-scale model visualization.

Opendtect high-frequency sequence stratigraphic interpretation system
1. Fast speed: fast tracking of layers and faults. 2. Leading concept: pioneering the use of mature machine learning models for reservoir description and oil and gas prediction. 3. Mature interfaces with general software: Mature interfaces with DecisionSpace and Perel

Web geological mapping software
The "Web based Contour Mapping" is designed using the B/S framework and developed based on HTML5 web technology. The underlying layer uses the PetroChina A2 database, and users do not need to install any plugins to generate contour maps (in vector format) on the web page,

"Eagle Eye" urban security risk comprehensive monitoring and early warning platform
The system aims to prevent major urban security incidents such as gas explosions, road collapse, and large-scale water and gas outages. It relies on core public security technologies and integrates cutting-edge information technologies such as the IoT, big data, and cloud computing.Thoroughly perceive the operating status of urban lifeline projects such as gas, water supply, drainage, heating pipe networks, subways, tunnels, and elevators, deeply explore the safe operation rules of the city, and achieve overall comprehensive perception, early prediction and warning, and efficient collaborative response. The project includes a comprehensive monitoring and early warning center for urban security risks, "one map" for comprehensive monitoring of urban security risks, and "one network" for comprehensive monitoring of urban security risks. Three support systems including IOT platform, BigData platform, GIS+BIM platform, and urban security big data center cover all aspects of urban life and other business systems.

SSMC Safety & Security Monitor Center Platform
The Industrial Safety & Security Monitor Center is a centralized security management system and situational awareness platform for ICS.

SEES - Security Energy Efficiency Management System
The security energy efficiency management system belongs to the fields of Internet of Things, big data, energy management and other fields. It adopts the method of energy efficiency uniformity to achieve management and energy saving. Through horizontal and vertical benchmarking and alarm closed-loop methods, it evaluates the matching of production and operation of each power circuit. The system Taking energy efficiency rather than the absolute value of energy consumption as the management object, identify the starting points for energy-saving behavior management, capture abnormal current and energy consumption in real time, and discover energy consumption hazards in advance. At the same time, the sub-item data automatically collected by the system serves as the data source of the digital twin simulation model, synchronously simulates the operation, reacts on the actual operation data, compares the sub-items with serious deviations, evaluates and formulates plans for maintenance and replacement of equipment, and ensures reliable and stable operation. Basically ensure the best effect of energy saving. The security energy efficiency management system is a data capture tool for managing energy conservation and is also a data support for optimizing equipment life cycle management. It is suitable for energy-saving and consumption-reduction management in urban buildings, parks, oil fields, factories and other enterprises, and has achieved practical results in some industries (annual electricity costs dropped by 3%-12% year-on-year, and continued to decline but narrowed in the following year). "A layman knows what to manage, an expert knows how to manage it." Evaluate energy efficiency and carbon emissions to continuously shorten the process of carbon peaking.

NIOs-9702 Industrial Firewall
With the rapid development of national economy, all walks of life have accelerated the pace of electronics, networking, informatization, and intelligence. Remote data transmission, remote monitoring and remote control are gradually becoming one of the essential functions of automation equipment and systems with their significant advantages. While users fully experience the various conveniences that the network brings to industrial production, supply chain interconnection, and industry supervision, it often also brings new risks and hidden dangers to the original ICS, which can easily cause economic losses, production suspension, casualties, and large-scale Environmental pollution and social panic have caused immeasurable losses to national security. SEAtech is committed to using security zoning, network exclusive use, horizontal isolation, vertical certification and comprehensive monitoring under the current situation where major equipment, devices and systems in China's petrochemical, electric power, transportation, municipal administration, military, intelligent manufacturing and other industries are equipped with foreign products. The defense-in-depth causing step-by-step and layered construction from the edge to the core of the system, in conjunction with the management system, operation and maintenance system, and the deployment of multiple security products to achieve industrial control system security. the ultimate goal.

NIOs-9702NG - Next Generation Firewall System
next-generation firewall is efficient, reliable, and easy to expand. It provides application-based access control functions, allowing users to have more flexible access control policy setting space and more effective management of network resources. and security protection. In addition, it also integrates identity authentication, traffic management, Internet behavior management, DoS/DDoS , anti-virus and intrusion prevention, web security and other functions to truly achieve three-dimensional and allround protection. At the same time, next-generation firewall supports IPSEC VPN to meet the needs of corporate headquarters-branch establishments of VPN networks; it supports SSL VPN, allowing corporate employees to safely log into the corporate internal network anytime and anywhere, ensuring office efficiency while ensuring network access security. Thanks to the SEAtech security operating system's one-time unpacking and comprehensive analysis algorithm, next-generation firewall series products have excellent and efficient data processing capabilities and can still maintain high performance when multiple functional modules are enabled at the same time.

SSMC-6000 All-in-one Security System
"Cybersecurity Law" clearly stipulates: The state implements a network security hierarchical protection system. Network operators should perform corresponding security protection obligations in accordance with the requirements of the network security system, protect the network from interference, destruction or unauthorized access, and prevent network data from being leaked or stolen or tampered with. The network security graded protection system is a systematic set of information security policies and standards in P.R.China. By carrying out graded protection work, information security capabilities can be improved and the safe and stable operation of information systems can be guaranteed. After the implementation of the "Cybersecurity Law", failure to carry out security construction in accordance with the relevant requirements of graded protection will hold the legal responsibility of network operators and supervisors.

NIOs-9702M ICS Mimic active defense system
Mimic Security Defense aims to obtain a favorable defense posture from initiative, variability and randomness. It refers to dynamically and pseudo-randomly selecting and executing various hardware variants under active and passive trigger conditions. Corresponding software variants make the hardware execution environment and software working conditions observed by internal and external attackers uncertain, making it impossible or difficult to build an attack chain based on vulnerabilities or backdoors to reduce system security risks. In essence, mimetic security defense is an active and passive fusion defense system, that is, an active and passive fusion defense system that integrates mimetic security active defense and traditional passive defense and introduces "security genes". ▪ Use systems engineering thinking to solve security problems ▪ Solve component security issues through system architecture ▪ Use dynamic heterogeneous redundancy construction to transform uncertain security problems into controllable probabilistic problems

SWAF-3000 Web application firewall
The web application firewall is based on the signature protection engine and combines six new security engines including intelligent semantic analysis engine, machine learning engine, active defense engine, threat intelligence engine, and intrusion prevention engine to build an "active" + "passive" in-depth defense system. , not only used to protect Internet-facing Web applications, but also deployed in front of internal Web application servers to perform access control and business auditing on internal business access to prevent internal threats and comprehensively improve Web application protection capabilities.

SGAP-3000 Security isolation and information import system
SGAP-3000 is mainly composed of three parts: trusted zone module, untrusted zone module and dedicated switching/import hardware. The trusted zone module is connected to the trusted security domain, and the untrusted zone module is connected to the untrusted security domain. The trusted zone/untrusted zone module is responsible for the acquisition and protocol analysis of network information in the trusted zone and untrusted zone respectively. The main program of the trusted zone module completes information security detection, network isolation and secure exchange according to the security policy. SGAP-3000 is mainly used in the automation and informatization construction of industrial enterprises (such as comprehensive automation of coal mines, plant-level monitoring system SIS of power plants, MES and data mining networks of refining and chemical enterprises, and EMS of metallurgical enterprises) to avoid low security levels. Information management network attacks and damages industrial control systems and equipment with higher security levels. The main applications are: ▪ Various business service interfaces provided by nodes at all levels to the outside world ▪ Data exchange interfaces between different levels and security zone within ICS SGAP-3000 strictly controls the flow of data and can provide the highest level of security protection for data exchange between two networks, two hosts, and between hosts and networks.

SOAD-3000 Scheduling automation operation and maintenance gateway
SOAD-3000 dispatch automation operation and maintenance gateway is specially designed to meet the operation and maintenance audit needs of the power grid power monitoring system, block the security weak link of on-site operation and maintenance and remote operation and maintenance of power dispatch automation equipment, and provide technical monitoring means for the on-site accompanying system. The dispatch automation operation and maintenance gateway takes the main station automation system as the main operation and maintenance object. It performs panoramic maintenance process records and security audits on ICS and equipment maintained through the network, serial ports and special interfaces, and conducts backtracking and evidence collection on problems that arise during the maintenance process. Provide alarm or security protection for serious illegal operations during maintenance. SOAD-3000 dispatch automation operation and maintenance gateway complies with the special technical specifications for high-performance dispatch automation operation and maintenance gateways of the State Grid Power Monitoring System, and passed the China Electric Power Research Institute dispatch automation operation and maintenance gateway type test.

SOAD-3000 Portable Operation and Maintenance Gateway
The SOAD-3000 portable operation and maintenance gateway is specially designed to meet the operation and maintenance audit needs of the power grid power monitoring system, blocking the security weak link of on-site operation and maintenance and remote operation and maintenance of power dispatching automation equipment, with the main station automation system as the main operation and maintenance object, and ICS and equipment maintained through the network, serial port and special interface can perform panoramic recording and security audit of the maintenance process, trace back and collect evidence for problems that arise during the maintenance process, and provide alarms or security protection for serious illegal operations that occur during maintenance. SOAD-3000 portable operation and maintenance gateway integrates many functions such as data collection, analysis, storage, playback, alarm, configuration saving, deletion, recovery, etc. It is compact, easy to operate and powerful.

SIDS/SIPS-3000 Intrusion detection system/intrusion prevention system
The SIDS/SIPS intrusion detection/prevention system uses a signature detection engine to detect network traffic. It can detect internal and external network attacks in a timely manner, and issue an alarm or immediately block the network connection of the attack source to achieve dynamic protection of network security. It supports in-depth analysis of industrial network protocols and uses artificial intelligence algorithms to detect and analyze complex ICS network behaviors and discover hidden attack behaviors. SIDS/SIPS provides rich reporting functions and user-friendly design, which can greatly reduce the difficulty for security managers to discover and monitor intrusion behaviors, and has become a powerful tool for protecting ICS network security.

SMAD-3000 Industrial monitoring and auditing device
The SMAD industrial monitoring and auditing device uses an abnormal behavior rule detection engine. On the basis of monitoring network traffic, through indepth analysis of network protocols and artificial intelligence algorithms, it can detect and analyze daily complex network behaviors. It can also restore network data to discover Implicit abnormal behavior. Through in-depth mining and analysis of the data protocol level, it provides users with traffic analysis, event analysis, timely and accurate alarm functions, and rich report presentation and screen display, which can help security managers better conduct risk and anomaly analysis and early warning. SMAD's rich functions, good manageability and user-friendly design can greatly reduce the difficulty of security managers' behavior discovery and monitoring of abnormal audits and event audits, becoming a powerful tool for discovering and protecting network security.

SOAD-3000 industrial equipment operation and maintenance audit device
The SOAD-3000 industrial equipment operation and maintenance audit device is based on the characteristics of ICS and equipment operation and maintenance, and takes mobile use as the main working mode. It performs panoramic maintenance process recording and security audit of ICS and equipment maintained through the network, serial port and special interface, and performs maintenance Problems that arise during the process can be traced back and evidence collected, and serious illegal operations that occur during maintenance can be alarmed or protected. SOAD-3000 industrial equipment operation and maintenance audit device integrates many functions such as data collection, analysis, storage, playback, alarm, configuration saving, deletion, recovery, etc. It is compact, easy to operate and powerful.

SDBA - Database Audit System
Compliance is the guarantee for the ICS security construction and operation and maintenance process to achieve the ultimate goal of security. SDBA is a new generation database audit product developed by the company during many years of database security theoretical research and technical practice. In view of the importance and risks faced by databases and business systems, Database audit system can provide database real-time attack detection, real-time monitoring, and real-time audit functions, thereby improving the overall security level of databases and business systems. Database audit system is an important part of the core data protection solution. The core of the product sets up a supervision mechanism between the application system and the database to monitor all access to the database and collect and collect data flows and users accessing the database. Analyze, identify, shield, replace, block, authorize, authenticate and identify operations, and store, analyze and query related behaviors related to accessing the database, and related content sent and received.

SVSS Industrial equipment vulnerability scanning and management system
SVSS is oriented to industrial control scenarios, with a built-in vulnerability signature database of more than 80,000 items, supporting asset detection and baseline detection of automation systems and related protocols, equipment, operating systems, application software, databases, big data components, thirdparty components, etc. in industrial scenarios. , vulnerability scanning, security hardening, and through rich reporting functions to intuitively display the security overview of the entire industrial control environment, provide detailed vulnerability analysis and vulnerability patching suggestions, and provide managers with comprehensive vulnerability scanning and management methods. Based on the industry's well-known ICS security research team, supported by the most comprehensive and authoritative Chinese vulnerability knowledge base in China, and based on rich market experience, SVSS is a product worthy of user trust and can help enterprises conduct comprehensive and accurate Vulnerability risk assessment and systematic vulnerability management work can calmly face the huge challenge of vulnerability security issues.

SLSS - Log Audit & Analysis System
SEAtech log audit analysis system collects various information such as security events (such as network attacks, anti-virus, etc.), user access records, system operation logs, system operation status, network access logs, etc. in the system through centralized collection, through standardization, filtering, After merging and alarm analysis, it is centrally stored and managed in the form of logs in a unified format. Through the log audit and analysis system, administrators can understand the operation of the entire system at any time, and promptly discover abnormal events and illegal access behaviors of the system; through post-analysis and rich reporting systems, they can also conveniently and efficiently conduct targeted information on the information system. security audit. In the event of special security events and system failures, the log audit analysis system can ensure log integrity and availability, assist administrators in quickly locating faults, and provide objective basis for tracing and recovery.

SIHP-3000 - Intrusion Trapping System
▪ Use CPK algorithm to implement encrypted transmission of uploaded data and distributed configurations ▪ Achieve concurrent transmission of large amounts of data through Kafka ▪ Simple configuration and deployment: fanless, redundant power supply , only simple configuration of network IP is required ▪ Independent deployment without business risk: no need to connect services, independent deployment does not affect the normal operation of the business. Confuse attacks, protect users’ real assets, delay attacks, and gain valuable response time for users ▪ Automatic upgrade and zero maintenance: After the user's initial deployment and configuration is completed, no subsequent maintenance is required.

Network Access System
In network information security prevention, intranet security is receiving more and more attention. Users hope to be able to authenticate and control access rights for users entering the intranet, and conduct security inspections on the equipment they use. The SNAC comprehensively controls the security of the intranet from aspects such as identity authentication of network access personnel, health detection and repair of network access equipment, permission allocation and resource management after network access. In addition to eliminating potential security risks of the intranet, it can also greatly Improve network management efficiency. SNAC supports a variety of access control technologies and is well compatible with users' existing networks, reducing network transformation costs. It supports multiple identity authentication methods to meet users' different authentication needs. It provides anti-virus software detection, system patch detection, and security reinforcement. Detection and other security detection items, and can detect illegal external connections, private access to network equipment, private use of mobile storage devices and other violations according to specific industry regulations, meeting the requirements of Class A 2.0 for network boundary security protection and computing environment security protection.

SAPT-3000 APT attack detection system
APT is a stealthy and persistent network intrusion process. It is usually motivated by business or politics and is carefully planned by certain individuals. It targets a specific organization or country. It lurks for a long time in peacetime and defeats the enemy with one move in wartime. APT can easily bypass most traditional security devices through zero-day threats, special Trojan variants, virus variants, etc. Traditional security products based on signature detection are useless against APT's unknown threat attacks. SAPT combines AI, big data and security technology to analyze network traffic in real time. It has a variety of built-in detection technologies that can cross-detect and cross-verify APT attack chains. In addition to regular IDS functions, SAPT can also restore files from network traffic and effectively identify known threats such as viruses and Trojans through the detection engine; detect malicious code variants through genetic map detection technology; and can also discover through sandbox behavior detection technology Unknown threats; perform intelligence detection, anomaly detection, and traffic genetic detection on the extracted network traffic metadata; and finally perform correlation analysis on all security threats.

SNBR Network Behavior Management System
SNBR Network Behavior Management System is a product launched by SEAtech to audit and control network behavior. It provides an efficient solution to the increasing network traffic management needs of enterprises and the country's compliance requirements for Internet behavior. SNBR can accurately identify Internet access behaviors, control users' Internet access permissions according to policies, and audit Internet access behaviors. This not only improves the efficiency of the company's network bandwidth usage, but also allows network construction to comply with national laws and regulations.

ICS Industrial Internet connection verification tool
The problems that ICS network security practitioners often encounter are: (1) Most ICS engineers and operators firmly believe that their industrial control systems are not connected to the external network/Internet and are physically isolated; (2) Most industrial control systems lack a complete network topology and asset list, not even the physical topology, let alone the logical topology. Therefore, exploring whether there is complete physical isolation and real physical topology and logical connection topology is not only a matter of great concern to network security practitioners, but also very important to end users. It is also the primary issue that government authorities are most concerned about. ICS is dedicated to industrial Internet connection verification. Tools can help you solve this problem.

SNMS-6000 Industrial Network Security Management System
SNMS industrial automation network security management system is an enterpriselevel solution that supports real-time monitoring of thousands of servers, virtual machines and network devices, and collects millions of monitoring indicators. The system provides distributed monitoring and network monitoring functions based on the Web interface, monitors various network parameters, and ensures the safe operation of the server system; it also provides a flexible notification mechanism to allow system administrators to quickly locate/solve various existing problems.

SVMP Industrial control protocol vulnerability mining platform
ICS security is a system project. In addition to deploying security protection equipment, audit equipment, intrusion detection systems and industrial monitoring and early warning platforms in the ICS system, if the equipment, hosts, operating systems, middleware, firmware and application software that make up the ICS system cannot achieve The corresponding security level itself has great vulnerabilities, so achieving the intrinsic security of the ICS system will be half the effort, or even impossible to achieve at all. SVMP conducts vulnerability mining for ICS industrial protocols, constructs malformed data of various compliant and non-compliant industrial communication protocols, and inputs it into the equipment and systems under test for vulnerability mining, thereby realizing automated testing of the security and robustness of ICS and equipment. , mining vulnerabilities in ICS and the device itself. SEAtech has many years of research and understanding of industrial communication protocols, reasonably constructs large-capacity test cases, optimizes the protocol vulnerability mining process, and improves the efficiency of ICS and equipment vulnerability mining.

SIBV Industrial Security Configuration Verification Tool
Compliance is the guarantee for the ICS security construction and operation and maintenance process to achieve the ultimate goal of security. Network security risk inspection and assessment is one of the basic and normal work contents and important links of security assurance, and runs through the entire life cycle of equipment operation such as network and information system construction, project acceptance, operation and maintenance, etc. The relevant industrial security management departments have issued clear guidance documents for security risk inspections, requiring regular security risk inspections of ICS.

ICS Security Lab
In order to meet the needs of universities and research institutes for ICS security risk demonstrations, talent training, offensive and defensive drills, capture-the-flag competitions, security research, etc., SEAtech has developed an ICS security laboratory based on on-site simulation and virtualization technology, which can be customized according to the needs of different users. Achieve flexible and customized laboratory construction according to various needs. According to the particularity of ICS, in order to conduct security testing and attack and defense experiments on actual running ICS, building a demonstration system that is close to the actual industrial operating environment and has complete core functions is currently the most economical, practical and feasible solution for conducting industrial control network security research. The laboratory platform simulates the typical industrial control system environment of the user's industry. Through in-depth vulnerability mining, attack path research, and protection method testing on the system, it can realize vulnerability mining, attack effect display, and security protection plan verification of the industrial control system. Support products using the latest mimicry defense theory for threat situation awareness and active defense products. The industrial security monitoring and early warning platform SSMC is used to realize centralized configuration and centralized management of industrial equipment and security products, and the effect of security protection is evaluated through SSMC. Monitor and trace the source of abnormal data packets.

NIOs-9702DA Security data collection machine
As a universal solution, the OPC protocol based on Microsoft COM/DCOM technology has been widely used. The use of OPC protocol can realize the interconnection and interoperability of control systems or databases from different manufacturers, and can provide unified interface control functions. However, the OPC interface technology based on DCOM was designed before network security issues broke out on a large scale and the concept of network security was not widely understood. Therefore, security was not fully considered, which ultimately made it impossible to use traditional OPC interfaces at present. Firewall or other information security device to ensure its security. In addition, OPC also faces the following security, reliability and performance risks: ▪ Any client can access ▪ Completely open read and write permissions to the entire OPC Server ▪ Unauthorized or unsecured OPC servers can be used to add additional load to ICS or cause corruption, resulting in OPC server performance degradation or crashes. ▪ The OPC client can use write commands to confuse the control system. ▪ Unauthorized clients can access confidential data NIOs-9702DA can convert unsafe OPC communication into secure and encrypted data communication. For occasions where OPC must be applied, data forwarding subsets can be established for different clients to limit the modification of data and the scope of output. Frequency, time period and change rate, establish different encrypted channels for different OPC clients, so as to effectively identify and check different clients, and log the communication process to achieve the security of ICS system interconnection. NIOs-9702DA is simple and easy to use without changing any configuration of OPC client and server. This advanced solution goes beyond traditional fully open OPC communication.

NIOs-9704 OPC-specific industrial security gateway
As a general solution, the OPC protocol based on Microsoft COM/DCOM technology has been widely used. However, the OPC interface technology based on DCOM was developed before ICS network security issues broke out on a large scale and the network security concept was not recognized. Therefore, security has not been fully considered, which ultimately makes it impossible for OPC to use traditional information security devices to improve security. In addition, OPC also faces the following security, reliability and performance risks: ▪ Any client can access ▪ Completely open read and write permissions to the entire OPC Server ▪ Unauthorized or unsecured OPC servers can be used to add additional load to ICS or cause corruption, resulting in OPC server performance degradation or crashes. ▪ The OPC client can use write commands to confuse the control system. ▪ Unauthorized clients can access confidential data NIOs-9704 can convert unsafe OPC communication into secure data communication. For occasions where OPC must be applied, data forwarding subsets can be established for different clients to limit the modification of data and limit the output range, frequency, Time period and change rate, establish different channels for different OPC clients, so as to effectively identify and check different clients, and log the communication process to achieve the security of ICS system interconnection. NIOs-9704 is simple and easy to use, without changing any configuration of the OPC client and server. This advanced solution goes beyond the traditional fully open OPC communication.

ECG edge computing gateway
As the intelligent layout of vehicles, roads, and clouds continues to improve, consumer demand will be gradually released. At the same time, with the formation of the autonomous driving market mechanism, the industry chain will become more mature. Vehicle-road collaboration is one of the foundations of smart transportation. Through technologies such as 5G and C-V2X, roads, vehicles and related transportation elements are effectively integrated to achieve realtime communication between vehicles, vehicles and roads, vehicles and people, and vehicles and networks. Data interaction plays a vital role in the construction of smart transportation. Smart city infrastructure is an important part of "dual intelligence", and the construction of smart transportation infrastructure is a top priority. High-level autonomous driving of automobiles supported by vehicle, road, cloud, and network collaboration is the future direction. Many problems that cannot be solved by single-vehicle intelligence must be solved with the help of vehicle-road collaboration. SEAtech provides a variety of edge computing units and controllers to create "smart cars + smart roads + collaborative cloud + interconnected network" to serve car companies, Internet of Vehicles and autonomous driving.

isRTU Endogenous security localized RTU
The isRTU series is built on the domestic Loongson processor and supports high-speed network communication. It is suitable for industrial control, industrial computing and industrial Internet applications that have extremely high requirements for independent controllability, network information security and localized substitution. The isRTU main control adopts the industrial-grade Loongson 2K1000 dual-core processor and is equipped with 7 function expansion slots, which can support a variety of extended function modules, such as analog, digital, pulse, wireless data transmission and positioning, protocol conversion, bus interface and others Specific functional modules, such as network switching, FPGA-based high-speed data acquisition, etc. Through the free combination of the above modules, most application scenarios of industrial automation can be covered, allowing users to realize the required functions flexibly and efficiently. The product has a compact structure design and supports wall-mounted or rail-mounted installation. The outer casing is made of high-strength industrial aluminum alloy material. The equipment supports AC and DC power input, and the signal interface supports Phoenix terminals, which not only improves system reliability, but also facilitates on-site deployment and installation. Supports Linux3.0 embedded operating system, providing an open and efficient software platform for user software development. It supports C/C++ or IEC 61131-3 programming language, and combined with the independently developed middleware API, applications can be completed conveniently and efficiently. Program development and interactive debugging.

京ICP备18044876号