Unlock instant, AI-driven research and patent intelligence for your innovation.

Security operation-maintenance gateway and operation-maintenance method thereof

An operation and maintenance network, operation and maintenance technology, applied in the field of network communication, can solve the problems of users' unauthorized access to information and video recording leakage, failure to find the root cause, waste of manpower, etc., to solve the problem of security access control and facilitate unified security management , the effect of saving operation and maintenance costs

Active Publication Date: 2019-04-12
锚丁科技(武汉)有限责任公司
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Illegal authorized access, unauthorized access by users, tampering with data, leakage of information and video recordings, difficult monitoring, unclear causes of failures, etc. If such problems do not arouse our great attention, we will pay great attention to the work of strengthening the police with science and technology in various cities and the entire safe city. development will pose a huge threat
[0003] According to the statistics of Safe City, Xueliang Project and other projects under construction and operation in major and medium-sized cities across the country, it is not difficult to find that power problems, transmission problems and video signal problems always occupy the majority of failure factors. Traditional operation and maintenance monitoring platforms, When monitoring these front-end devices, it is often only possible to monitor the surface layer, and cannot find the specific root cause
For example, when there is a problem with the camera, the traditional operation and maintenance platform cannot analyze whether it is an electrical failure, a transmission failure, or the actual cause of other failures, which brings a lot of inconvenience to the subsequent maintenance and processing, which is often The video could not be seen. After the maintenance personnel arrived at the scene, they found that there was no problem with the camera itself. They went back and forth many times to find out what the root cause was.
Not to mention the waste of manpower, the cost of time is also not a small loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security operation-maintenance gateway and operation-maintenance method thereof
  • Security operation-maintenance gateway and operation-maintenance method thereof
  • Security operation-maintenance gateway and operation-maintenance method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Such as figure 1 As shown, the operation and maintenance method of a security operation and maintenance gateway of the present invention comprises the following steps:

[0041] S101, verify whether the USB-KEY used by the operation and maintenance personnel is the USB-KEY specified by the centralized operation and maintenance management platform through the USB-KEY national secret SM2 method, if so, proceed to the next step; if not, close the operation and maintenance gateway port;

[0042] S102. Verify whether the USB-KEY has management capabilities for accessing the operation and maintenance gateway. If so, open the corresponding control port of the USB-KEY, connect the terminal device, record the IP and MAC address of the terminal device, and enter the operation and maintenance mode; if not , the operation and maintenance gateway port is closed;

[0043] S103. Turn on the temporary WLAN in the operation and maintenance management mode;

[0044] S104. The operation an...

Embodiment 2

[0055] On the basis of Embodiment 1, an operation and maintenance method of a security operation and maintenance gateway of the present invention further includes the following steps:

[0056] S101, verify whether the USB-KEY used by the operation and maintenance personnel is the USB-KEY specified by the centralized operation and maintenance management platform through the USB-KEY national secret SM2 method, if so, proceed to the next step; if not, close the operation and maintenance gateway port;

[0057] S102. Verify whether the USB-KEY has the ability to manage access to the operation and maintenance gateway, if so, go to the next step; if not, close the operation and maintenance gateway port;

[0058] S103, the operation and maintenance gateway identifies the message sent by the terminal device through the DPI deep recognition technology, and judges whether the type of device connected to the operation and maintenance gateway port is in the white list issued by the centrali...

Embodiment 3

[0065] On the other hand, if image 3 As shown, the present invention provides a security operation and maintenance gateway, which includes a main control unit, and is characterized in that it also includes an identity verification unit, a device verification unit, a temporary WLAN unit, a log unit, an environment detection unit and a WiFi unit.

[0066] The control unit controls the sending and receiving of messages, detects the PPS, traffic and bandwidth information of the terminal equipment connection port through DPI deep recognition technology, judges the basic operation status of the terminal equipment according to the detection information, and sends it to the centralized operation and maintenance management platform, through centralized operation and maintenance management The platform conducts a comprehensive analysis of the above detection information, graphically displays the advanced operating status of the equipment, and stores the environmental parameters, basic o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a security operation-maintenance gateway and an operation-maintenance method thereof. Each USB-KEY is bound with unique operation and maintenance personal and the operation-maintenance gateway by arranging a way that the operation-maintenance personnel must pass verification by using a legal USB-KEY; the operation-maintenance personnel, the USB-KEY and the gateway can reachsafe and credible access function; the PPS, traffic and bandwidth information of the terminal equipment connection port are detected through a DIP depth identification technology, a basic running state of the terminal equipment is judged according to the detection information, and is sent to a centralized operation-maintenance management platform; the centralized operation-maintenance management platform is used for comprehensively analyzing the above detection information, and the advanced running state of the equipment is displayed in a graphical way; when a fault occurs, the admission control and operation-maintenance management function of the external field equipment can be realized, the safety access control problem of the external field equipment and the refined operation-maintenance management problem of the front-end equipment are comprehensively solved.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a safe operation and maintenance gateway and an operation and maintenance method thereof. Background technique [0002] With the in-depth implementation of the "Safe City" project of the public security bureaus of various provinces and cities, the outfield equipment of various provinces and cities has been continuously filled. According to preliminary statistics, only in some city-level units, the number of video probes has reached 10. In addition, with the continuous construction and improvement of safe city video points, tens of thousands of front-end equipment (such as: video cameras, WIFI sniffing, electronic fences, etc.) In the network, while we enjoy the convenience and speed brought by technological progress, the subsequent network security issues and the operation and maintenance management issues for field equipment are becoming increasingly prominent. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26H04L12/24
CPCH04L41/069H04L41/28H04L43/08H04L63/0435H04L63/0853
Inventor 鲁大军李骏
Owner 锚丁科技(武汉)有限责任公司