Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for enhancing network security

A network security and network technology, applied in the field of network security, can solve problems such as system danger, control system confusion, wireless devices without security verification means, etc., to achieve the effect of enhancing security and preventing illegal devices from accessing the network

Inactive Publication Date: 2008-04-30
SUPCON GRP +1
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, because the monitoring layer network in the existing industrial wireless network usually has no effective security verification means for the wireless devices connected to the on-site control layer network, therefore, illegal users can access malicious devices through the wireless network, such as Intercept the data of a transmission, tamper with the sampling or control data, and send the tampered data to the actuator, thus causing the entire system of the monitoring layer network in the industrial wireless network to be in a dangerous situation
Or in the monitoring network of the industrial wireless network, a mobile PC (computer) or wireless handheld device 108 can be disguised as an engineer station 101 or operator station 102 to maliciously modify the configuration of devices in the field control layer network information, causing the control system to be in a state of confusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for enhancing network security
  • A method and device for enhancing network security
  • A method and device for enhancing network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] A method for strengthening network security disclosed in the embodiment of the present invention can be detected when a device is connected to a wireless network. After the connection is established, it can continue to check whether any illegal device has joined the connected device. At the same time, it is also possible to further improve the security of the network by encrypting the transmitted data in the wireless network, and monitor the access rights of the equipment to comprehensively realize the security of network access, so as to prevent the network from being destroyed by illegal equipment. .

[0041] Various monitoring implementation modes of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0042] An embodiment of a method for establishing a connection of a wireless device disclosed in the present invention, this embodiment maintains a list of authorization numbers allowed to access on the routin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for strengthening the network safety, including the following steps: when new wireless equipment is accessed to the network, the network side judges whether the authorization number of the new equipment is the same with the authorization number of the wireless equipment which has established the connections, if the number is the same, the access of the new equipment is refused; otherwise, the packet of the new equipment is waited to be received. At the same time, the invention also disclose a device for strengthening the network safety, the invention can verify whether the new equipment is the legitimate by judging whether the authorization number of the new equipment is the same with the authorization numbers of the other equipments which have been accessed when the new equipment is accessed to the network, the invention can prevent the illegal equipment from accessing to the network, further to strengthen the network safety.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for strengthening network security. Background technique [0002] Commonly used wireless devices such as industrial wireless networks are linked through wireless technology, and users can easily access any device in the industrial network through the wireless network. Please refer to Figure 1, which is a schematic diagram of the control system structure of the industrial wireless network As a block diagram, an industrial wireless network usually includes a monitoring layer network and an on-site control layer network, wherein the monitoring layer network usually includes an engineer station 101, an operator station 102, a monitoring station 103, and a wireless network security management server 104, wherein the wireless network The security management server 104 is used to maintain and manage the access security of devices in the entire industrial wir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/24H04L29/06H04L12/66H04L12/56H04W12/08
Inventor 陈高翔冯冬芹褚健金建祥
Owner SUPCON GRP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More