Security policy matching method based on onsite layer device, and onsite layer device

A security policy and field layer technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of complex security policy matching process, complex maintenance of table items to be matched, and slow matching speed, achieving a wide range and coverage Large range and good accuracy

Active Publication Date: 2017-09-29
北京东土军悦科技有限公司 +1
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a security policy matching method based on messages of field layer devices and field layer devices to solve the problem of complex security po

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security policy matching method based on onsite layer device, and onsite layer device
  • Security policy matching method based on onsite layer device, and onsite layer device
  • Security policy matching method based on onsite layer device, and onsite layer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to better understand the above-mentioned technical solution, the above-mentioned technical solution will be described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0043] In practical applications, the industrial Internet operating system is the basic system for realizing networked industrial control, cloud industrial control, visualized factory and industrial big data analysis, etc. The unified system is a reliable guarantee for the controllability of industrial sites. like Figure 1A In the functional architecture diagram of the industrial Internet operating system shown, the industrial Internet operating system includes at least: application layer, cloud control layer and field layer, wherein the application layer includes at least: unified industrial modeling standard module 31, software-defined industrial process Module 32 and industrial visualization management module 33; cloud control layer at least in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security policy matching method based on an onsite layer device, and an onsite layer device. The onsite layer device is an important part in an industrial Internet operation system and comprises an industrial process control and management module, a heterogeneous onsite device integration module, an industrial management software loading module and an onsite bus communication protocol module. The security policy matching method is used for solving the problems of low matching speed and low matching efficiency of a security policy matching process of the onsite bus communication protocol module, and the to-be-matched table items are complex to maintain. In a multi-stage TCAM combination process, the security policy association action information in the policy information obtained by the previous stage matching can be used for determining the composition of the matching keyword used by the next stage matching and realizing flexible matching of feature information, and the screening of the security policy messages promotes the localized manufacture of safe and reliable chips.

Description

technical field [0001] The invention relates to the technical field of industrial Internet operating systems, in particular to a security policy matching method based on messages of field layer devices and field layer devices. Background technique [0002] At present, the security policy matching of messages in the switch chip is mostly maintained and searched in a binary tree structure. In the Ethernet switch chip, the security policy matching often involves quickly searching for ACL (Access Control List, Access Control List), routing, etc. Table and other functions, at this time, the search efficiency will affect the performance of the chip. In the current method for the switch chip to match the security policy of the message, the search operation for the table needs to perform multi-level search in the tree, and the security policies of different levels for the same message are not associated. Therefore, when performing security policy matching, the matching process is c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/743
CPCH04L63/205H04L45/74591
Inventor 黄鑫
Owner 北京东土军悦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products