Supercharge Your Innovation With Domain-Expert AI Agents!

A separate deployment method for rssp-i security protocol

A technology that separates deployment and security protocols, applied in the field of security communications, can solve problems such as inability to meet different platform structures, and achieve the effect of protocol deployment

Active Publication Date: 2020-06-26
CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when deploying the RSSP-I secure communication protocol at present, due to the different platform structures in the actual environment, the method of the currently deployed RSSP-I secure communication protocol cannot meet the needs of different platform structures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A separate deployment method for rssp-i security protocol
  • A separate deployment method for rssp-i security protocol
  • A separate deployment method for rssp-i security protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to further illustrate the features of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are for reference and description only, and are not intended to limit the protection scope of the present invention.

[0029] Such as Figure 3 to Figure 4 As shown, the present embodiment discloses a separate deployment method of RSSP-I security protocol, including the following steps S1 to S2:

[0030] S1. Adding different adaptation layers to the protocol stack, wherein the adaptation layer includes a D interface adaptation layer, an application adaptation layer, a network adaptation layer and a system adaptation layer;

[0031] S2. Compile all RSSP-I functional modules of the protocol stack into a static logic library and deploy the static logic library to machines A, B, and C by using the corresponding adaptation layer.

[0032] Among them, such as image 3 As shown,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a separate deployment method for RSSP-I security protocol, which belongs to the technical field of security communication, and includes: adding different adaptation layers to the protocol stack, wherein the adaptation layer includes a D interface adaptation layer, an application adaptation layer, Network adaptation layer and system adaptation layer; compile all RSSP‑I functional modules of the protocol stack into static logic libraries and deploy the static logic libraries to machines A, B and C using the corresponding adaptation layers. The present invention develops a series of adaptation layers around the core logic layer of the RSSP‑I security communication protocol, and then adds a corresponding adaptation layer to the protocol stack and compiles different function modules into static logic according to the structure of the target platform and the type of function modules The library files are deployed to the platform, so that the RSSP-I communication protocol can be developed as a general security software protocol library with cross-platform portability, and the protocol deployment for different architecture platforms is realized.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a method for separating and deploying RSSP-I security protocols. Background technique [0002] The RSSP-I secure communication protocol is suitable for safety-related communications in closed transmission systems to ensure the security of data interaction in a closed transmission system environment, to ensure the security of data transmission between safety-related products, and to improve data transmission reliability and availability. [0003] In the existing railway safety computer system, the two-by-two computer structure is mostly used, and the double-set redundancy design is generally implemented by two platforms: such as figure 1 As shown, the first type does not distinguish between safety functions and non-safety functions, and each series includes A / B machines. Such as figure 2 As shown, the second type distinguishes the safety function from the non-safe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/044H04L41/0803H04L67/04H04L69/08H04L69/322G06F8/60G06F8/41
Inventor 郭薇薇刘贞王一民左林黄雅倩
Owner CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More