Access control rule acquisition method, device and network equipment

A technology of access control and acquisition methods, applied in the field of network communication, can solve problems such as error-prone, heavy workload, cumbersome process, etc., and achieve the effect of avoiding configuration errors and improving accuracy

Active Publication Date: 2021-04-27
HANGZHOU DPTECH TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this method, access control rules need to be manually configured, which is a heavy workload and cumbersome process, so it is easy to make mistakes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control rule acquisition method, device and network equipment
  • Access control rule acquisition method, device and network equipment
  • Access control rule acquisition method, device and network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0031] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of this specification provide a method, device and network device for acquiring an access control rule. In the embodiment of this specification, when an industrial protocol message is received, the target industrial protocol corresponding to the industrial protocol message is identified, and the target self-learning parameter corresponding to the target industrial protocol is obtained according to the preset correspondence between the industrial protocol and the self-learning parameter , based on the target self-learning parameters, the rules of the industrial protocol messages are self-learning, and the access control rules corresponding to the target industrial protocols are obtained, and the access control rules corresponding to the industrial protocols can be automatically and intelligently obtained without manual configuration, thus avoiding artificial Misconfiguration of access control rules caused by various factors improves the accuracy of access control rule configuration.

Description

technical field [0001] This specification relates to the technical field of network communication, and in particular to a method, device and network equipment for acquiring access control rules. Background technique [0002] An industrial protocol is a communication protocol used in industrial systems. The industrial protocol itself has no encryption, authentication and other measures. Therefore, the industrial protocol message is transmitted in plain text, which has a large security risk. [0003] In order to reduce this potential safety hazard, an industrial firewall is set between the industrial client and the industrial server in the related art. On the industrial firewall, manually configure the access control rules of an industrial protocol, and use the access control rules to filter and forward the packets of this industrial protocol. In this method, the access control rules need to be manually configured, the workload is heavy, and the process is cumbersome, so it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/101H04L67/14
Inventor 贾新奎
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products