Policy access control method based on industrial control protocol general framework

An industrial control protocol and access control technology, applied in electrical components, transmission systems, etc., can solve the problems of inability to flexibly modify the configuration expansion of the development mode, slow linear matching, and increase the workload, so as to reduce the repetitive development workload and configuration. Flexibility and the effect of reducing maintenance costs

Inactive Publication Date: 2019-07-12
郑州轨道交通信息技术研究院
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, every time a new protocol is added to the existing industrial control firewall, a new module needs to be developed, and the access control is based on linear matching, which brings about two main problems: First, t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy access control method based on industrial control protocol general framework
  • Policy access control method based on industrial control protocol general framework

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0012] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0013] figure 1 A schematic flow diagram of a policy access control method based on a general framework of an industrial control protocol according to an embodiment of the present invention is shown...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a policy access control method based on an industrial control protocol universal framework. The policy access control method comprises the following steps: acquiring a newly-compiled industrial protocol configuration file; analyzing the obtained industrial protocol configuration file to obtain a target strategy capable of being analyzed by a data plane, and issuing the target strategy to the data plane; analyzing a message flowing through an industrial firewall based on the data plane to obtain matching information of the message, the matching information comprising an IP address, a service object and a configuration function item; and matching the matching information with the target strategy based on a multi-mode matching mode, and executing the matched strategy action. Through the technical scheme of the invention, the repeated development workload can be effectively reduced, the configuration is more flexible, the development efficiency is improved, and the maintenance cost is reduced.

Description

technical field [0001] The invention relates to the technical field of industrial control networks, in particular to a policy access control method based on the general framework of industrial control protocols. Background technique [0002] The industrial firewall is used in the network environment of the industrial control system to isolate and control the industrial control protocols (such as modbus, iec104). It is mainly reflected in two aspects: one is to refine the user-configurable function items for industrial protocols (such as modubs function codes, point tables, etc.), and form strategies by configuring function items; the other is to analyze and analyze the data passing through the wall. The match achieves access control results. However, every time a new protocol is added to the existing industrial control firewall, a new module needs to be developed, and the access control is based on linear matching, which brings about two main problems: First, the fixed deve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245
Inventor 刘振宇杨丰印吴凯李侠
Owner 郑州轨道交通信息技术研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products