Data network security protection method, device, computer equipment and storage medium

A data network and security technology, applied in the direction of security communication devices, digital transmission systems, electrical components, etc., can solve the problem that the operation and maintenance security of railway signal security data network cannot be guaranteed, train operation is out of control, and threats to social order and public interests, people Personal and property safety and other issues to achieve the effect of avoiding illegal intrusion, ensuring safety, and ensuring the integrity of the border

Active Publication Date: 2022-04-15
BEIJING SWJTU RICHSUN TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the signal security data network is invaded and destroyed, it will cause the train to run out of control, seriously threatening social order, public interest, people's personal and property safety
[0003] In the traditional technology, the signal safety data network and external systems are only isolated by firewalls, and ordinary firewalls cannot effectively intercept intrusions to the signal safety data network, making the operation and maintenance security of the railway signal safety data network unable to be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data network security protection method, device, computer equipment and storage medium
  • Data network security protection method, device, computer equipment and storage medium
  • Data network security protection method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0029] The data network security protection method provided by this application can be applied to the railway signal security data network, and is used to control and check the control operation of the railway signal security data network through the login user account, and to install the railway signal security data network through the user account. The inspection of the application program, the inspection of the data information entering and leaving the railway signal safety data network, and the inspection of the internal and external connection relationship of the railw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a data network security protection method, device, computer equipment and storage medium. The method includes performing a control check on the data network and obtaining the result of the control check; the control check includes the control operation of the logged-in user account on the data network Check the program of the data network to obtain the result of the program check; the program check includes the check of the application program installed on the data network; check the data of the data network to obtain the result of the data check; the data check includes the data information entering and leaving the data network Check the connection of the data network to obtain the result of the connection check; the connection check includes the check of the internal and external connection relationship of the data network; according to the above inspection results, the security control of the data network is carried out. Realize the internal and external comprehensive protection of the railway signal safety data network, ensure the closure and independence of the railway signal safety data network, and enable the railway signal safety data network to have high-level security protection capabilities.

Description

technical field [0001] The present application relates to the technical field of network and information security, in particular to a data network security protection method, device, computer equipment and storage medium. Background technique [0002] The signal safety data network is a dedicated communication network for each control system of the railway signal system. The controlled subsystems, such as the train control center, computer interlocking, temporary speed limit server, and wireless automatic blocking system, are on-site control and execution systems for train operations. , to ensure the safe, orderly, stable and reliable operation of the train. After the signal security data network is invaded and destroyed, it will cause the train to run out of control, seriously threatening social order, public interest, people's personal and property safety. [0003] In the traditional technology, the signal safety data network and external systems are only isolated by fire...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/20H04L63/1416H04L63/1441H04L63/145H04L63/02H04L63/0227
Inventor 史增树杨滨茂张启鹤马研
Owner BEIJING SWJTU RICHSUN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products