Multi-layer network security architecture method for iron and steel enterprises

A multi-layer network and enterprise technology, applied in the direction of network interconnection, secure communication devices, digital transmission systems, etc., can solve problems such as the stability and security of the data collection network need to be improved, threats to data collection security, and data transmission efficiency reduction , to achieve the effect of improving network reliability and forwarding capabilities, ensuring data security, and simplifying network architecture

Pending Publication Date: 2022-07-29
河钢乐亭钢铁有限公司 +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The collection and transmission of important data in enterprises depends on the network system, such as industrial data, energy data, etc., and there are many computer terminals in the general network, and during the use of computer terminals, through the Internet, U disk, etc. Virus intrusion threatens the security of data collection, leading to serious consequences such as reduced data transmission efficiency, system paralysis, and data destruction.
Moreover, the failure of network equipment will also cause network interruption, resulting in interruption and loss of data transmission, so the stability and security of the data collection network need to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-layer network security architecture method for iron and steel enterprises
  • Multi-layer network security architecture method for iron and steel enterprises
  • Multi-layer network security architecture method for iron and steel enterprises

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purposes, technical solutions and advantages of the implementation cases of the invention clearer, the following will combine the accompanying drawings in the implementation cases to clearly and completely describe the technical solutions in the implementation cases of the present invention. A small part of the implementation cases of the invention, not all of the implementation cases, based on the implementation cases in the present invention, all other implementation cases obtained by those of ordinary skill in the art without creative work, belong to the protection scope of the present invention.

[0022] A multi-layer network security architecture method for an iron and steel enterprise, comprising the following steps: adopting three-layer deployment, using redundant architecture for important equipment, and dividing it into three different areas: a data area, an office area, and a data collection area, and only a server system is deployed in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a multi-layer network security architecture method for an iron and steel enterprise, and belongs to the technical field of internet control methods. According to the technical scheme, three-layer deployment is adopted, important equipment adopts a redundant architecture and is divided into three different areas including a data area, an office area and a data acquisition area, only a server system is deployed in the data area, a computer terminal is accessed to the office area, only data acquisition related equipment is allowed to be accessed to the data acquisition area, and the data acquisition related equipment is only allowed to be accessed to the office area. And the areas are isolated by firewalls. The method has the beneficial effects that data security intercommunication between regions can be ensured, virus threats can be isolated, data related to data acquisition is specially protected, and the security of important data is ensured.

Description

technical field [0001] The invention relates to a multi-layer network security architecture method for iron and steel enterprises, and belongs to the technical field of Internet control methods. Background technique [0002] Important data collection and transmission in enterprises depend on network systems, such as industrial data, energy data, etc., and there are many computer terminals in general networks. During the use of computer terminals, through the Internet, U disk and other channels, it is very easy to be accessed. Virus intrusion threatens the security of data collection, resulting in serious consequences such as reduced data transmission efficiency, system paralysis, and data destruction. In addition, the failure of network equipment will also cause network interruption, resulting in interruption and loss of data transmission. Therefore, the stability and security of data acquisition network need to be improved. SUMMARY OF THE INVENTION [0003] The purpose o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/46H04L49/10H04L9/40
CPCH04L12/4641H04L49/10H04L63/02H04L63/0227
Inventor 张冲王丽娜孙雪娇李志磊王苏楠朱玉付高鹏李凯军么志明
Owner 河钢乐亭钢铁有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products