Credible protocol conversion method and credible protocol conversion system

A protocol conversion and trusted technology, which is applied in the field of trusted protocol conversion methods and systems, can solve problems such as low reliability and extended communication time of industrial control systems, so as to reduce system delays, enhance self-safety protection functions, and improve boundaries The effect of security capabilities

Active Publication Date: 2016-02-17
INSECTECH BEIJING CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a trusted protocol conversion method and system to solve the problems of extended communication time and low reliability between existing industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credible protocol conversion method and credible protocol conversion system
  • Credible protocol conversion method and credible protocol conversion system
  • Credible protocol conversion method and credible protocol conversion system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] It should be noted that, in the case of no conflict, the implementations in the present application and the features in the implementations can be combined with each other.

[0029] It should also be noted that in this article, relational terms such as first and second etc. are only used to distinguish one entity or operation from another e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a credible protocol conversion method which is used for protocol conversion between a first industrial control system and a second industrial control system. The method comprises the steps of receiving an external access request to be transmitted to the first industrial control system; judging the legality of the external access request according to a preset white list, and judging the access types of the external access request, wherein the access types include a data query request and a control operation request; when the external access request is the data query request, grouping the state data queried by the first industrial control system according to the protocol of the second industrial control system, and sending to the second industrial control system; and when the external access request is the control operation request, grouping the control operation request according to the protocol of the first industrial control system, and sending to the first industrial control system. Correspondingly, the invention also provides a credible protocol conversion system. According to the invention, the delay of the communication between the industrial control systems can be alleviated, and the reliability of the communication between the industrial control systems can be promoted.

Description

technical field [0001] The invention relates to the technical field of industrial information, in particular to a trusted protocol conversion method and system. Background technique [0002] With the rapid development of industrial automation control, more and more industrial enterprises use their internal (or private) network to interconnect their production process special equipment or industrial intelligent equipment (Intelligent Electric Device, referred to as "IED") to form a production control system The internet. [0003] Various industrial control network protocols are based on the ISO / OSI open system interconnection model. The OSI reference model is divided into 7 layers. The industrial control network communication protocol is simplified according to its own specificity. It adopts the physical layer, data link layer and Network layer, while considering the control function and specific application of field devices, the application layer is added. To realize the co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/101H04L69/08
Inventor 潘洪勤
Owner INSECTECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products