Soft isolation assembly for network access debugging and using method thereof

A technology for isolating components and network access. It is used in data exchange networks, electrical components, digital transmission systems, etc., and can solve unauthorized access by operation and maintenance personnel, network equipment isolation access monitoring and access control, computers carrying viruses or network attacks on running equipment. and other issues to ensure safe operation and avoid network attacks.

Inactive Publication Date: 2018-05-08
南京捷安信息科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when the operation and maintenance personnel maintain and debug the network equipment such as measurement and control, protection and telecontrol of the substation operation, they usually directly connect the maintenance computer to the network switch of the substation to access and debug the target network equipment. The network structure of network access and debugging is as follows: figure 1 As shown, there is no isolation, access monitoring, and access control between the maintenance computer and the network equipment running in the substation. There is a risk of operation and maintenance personnel accessing other running network equipment without authorization, and there is also a risk of maintenance computers carrying viruses or network attacks on running equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Soft isolation assembly for network access debugging and using method thereof
  • Soft isolation assembly for network access debugging and using method thereof
  • Soft isolation assembly for network access debugging and using method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] combine figure 2 and image 3 , the present invention provides a soft isolation component for network access debugging, including a client, a network monitoring module, an isolation control module, a link establishment and data forwarding module, and an access debugging object end; the client is connected to the network monitoring module; the network The monitoring module is connected with the isolation control module; the isolation control module is connected with the link establishment and data forwarding module; the link establishment and data forwarding module is connected with the access debugging object end.

[0033] The client is connected to the maintenance computer; the maintenance computer and the client establish a link to the soft isolation component; the maintenance computer provides the client with IP and debugging port information.

[0034] The invention provides a soft isolation method for network access debugging, comprising the following steps:

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a soft isolation assembly for network access debugging and a using method thereof. A network monitoring module, an isolation control module and a link establishment and data forwarding module are included; the network monitoring module is responsible for monitoring a debugging port information network to access debugging port information and submitting client link establishment information and transmitted data to the isolation control module; the isolation control module analyzes the link information and the transmitted data and compares the information with a pre-configured authorized access condition, the network data belonging to an allowable access range are submitted to the link establishment and data forwarding module, and the network data not belonging to theallowable access range are blocked. In a condition of not changing a network structure and debugging object parameters, isolation, monitoring and control on a maintenance computer and a device are carried out when an operation and maintenance person accesses and debugs the device, device access by the operation and maintenance person in excess of authority and network attacks on the device by themaintenance computer can be avoided, and the safety operation of a substation network and the device is ensured.

Description

technical field [0001] The invention relates to the technical field of network debugging of substations and master stations, in particular to a soft isolation component for network access debugging and a method for using the same. Background technique [0002] At present, when the operation and maintenance personnel maintain and debug the network equipment such as measurement and control, protection and telecontrol of the operation of the substation, they usually directly connect the maintenance computer to the network switch of the substation to access and debug the target network equipment. The network structure of network access and debugging is as follows: figure 1 As shown, there is no isolation, access monitoring, and access control between the maintenance computer and the network equipment running in the substation. There is a risk of operation and maintenance personnel accessing other running network equipment without authorization, and there is also a risk that the m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/28H04L63/02H04L63/10H04L63/20
Inventor 叶婷
Owner 南京捷安信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products