Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and concentrator for implementing network security isolation by using concentrator

A network security and concentrator technology, applied in the field of intelligent power consumption, can solve the problems of increasing system cost and construction difficulty, high cost, complicated installation and debugging, etc., and achieve the effect of reducing system cost and construction difficulty, simple operation and low cost

Active Publication Date: 2018-05-11
SHENZHEN CLOU ELECTRONICS
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cost of the device is high and the installation and debugging are complicated, which will greatly increase the system cost and construction difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and concentrator for implementing network security isolation by using concentrator
  • Method and concentrator for implementing network security isolation by using concentrator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0019] A method for implementing network security isolation using a concentrator in an embodiment, the concentrator is provided with at least two network ports. Specifically, the at least two network ports include a public network port used to connect to a public network (public network, i.e. external network) server and a network port used to connect to a private network (internal network) server (i.e. power supply intranet master station) Private network port. Both the public network port and the private network port are independently equipped with a physical (PHY) chip and a routing (MAC) chip ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing network security isolation with a concentrator. At least two Ethernet ports are arranged in the concentrator, wherein a public network Ethernet port and a private network Ethernet port are configured with a physical chip and a routing chip independently. The method comprises the following steps: receiving data packets transmitted by the public network Ethernet port, and acquiring an IP (Internet Protocol) address and an MAC (Media Access Control) address of a data packet sender; judging whether the IP address is matched with the MAC address or not; if so, acquiring a virtual IP address of the concentrator, and transmitting the data packets to the virtual IP address; judging whether data in the data packets is data of a target format or not in the virtual IP address; if so, transmitting the data packets to an actual IP address of the concentrator; filtering the data packets in order to remove data packets of which the data frame formats do not conform to a target communication protocol format; and transmitting the filtered data packets to a private network through the private network Ethernet port. Through adoption of the method, security isolation between a public network and the private network can be realized. The invention also relates to a concentrator.

Description

technical field [0001] The invention relates to the technical field of intelligent power utilization, in particular to a method for implementing network security isolation using a concentrator, and also to a concentrator. Background technique [0002] In the field of smart electricity consumption, the concentrator is used to read the data of the electric meter downward, transmit the data of the electric meter upward to the master station, and communicate with the master station. The traditional concentrator mainly operates on the private network, that is, the meter data read by the concentrator is transmitted to the private network master station of the power supply bureau through the internal network. Users can access the internal server data of the power supply bureau through the public network (public network). In order to prevent external malicious attacks on the power supply bureau network, an isolation device must be added during the communication process between the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02
Inventor 孔成波
Owner SHENZHEN CLOU ELECTRONICS