CN108965170A - A kind of industrial switch system and operation method for gras generally recognized as safe access - Google Patents
A kind of industrial switch system and operation method for gras generally recognized as safe access Download PDFInfo
- Publication number
- CN108965170A CN108965170A CN201810604766.9A CN201810604766A CN108965170A CN 108965170 A CN108965170 A CN 108965170A CN 201810604766 A CN201810604766 A CN 201810604766A CN 108965170 A CN108965170 A CN 108965170A
- Authority
- CN
- China
- Prior art keywords
- industrial switch
- lock command
- server
- port
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/30—Peripheral units, e.g. input or output ports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Small-Scale Networks (AREA)
Abstract
The invention discloses a kind of industrial switch system and operation method for gras generally recognized as safe access, system includes: server and several industrial switch, and several industrial switch and server constitute network topology;Server is used to send lock command to all or part of industrial switch of several industrial switch by broadcasting packet form;The industrial switch of lock command is received according to lock command, closes the port being not used by, the IP address and MAC Address of port to be used are bound with corresponding port.Method includes: S1: server sends the broadcasting packet comprising lock command to the whole network industrial switch;S2: industrial switch receives broadcasting packet, parses the locking information for including in broadcasting packet;S3: industrial switch closes not online port, the IP address of online port and MAC Address is bound with corresponding port according to locking information.The present invention can lock the whole network industrial switch port, and then prevent from illegally being distorted.
Description
Technical field
The present invention relates to industrial switch safety protection field, especially a kind of industry exchange for gras generally recognized as safe access
Machine system and operation method.
Background technique
Extensive use with internet in fields such as industry, security protections, the network topology of industrial switch with regard to increasing,
This result in the management difficulty-for industrial switch system such as the maintenance of hardware facility, the management of data safety-not
It is disconnected to expand.In the form of traditional industry switchboard unit network, interchanger or the equipment for connecting interchanger can arbitrarily increase and decrease, respectively
The port information of interchanger can also be configured arbitrarily, data update only be carried out to it in remote server, or carry out net to it
Member alarm, but increase and decrease or port information to the network element can not be prevented to modify and prevented.This results in whole network to exist
Illegally distorted the risk stolen with data.And there is mistake in a node in the data of network, will affect whole network
Normal operation, caused by loss it is very big.For being illegally linked into the situation of switch network, illegal user can steal network
In significant data, for the data safety of switch network, may bring especially for safety of secret data can not estimate
The loss of amount.
Although process is modified in increase and port information for switch device in traditional industry group of switches net mode
Account verification is needed, there is the function of centainly preventing port from distorting, but it only verifies account, can not be to using the account
Personnel verify, i.e., illegal user can also be used legal account to carry out the access of terminal and distorting for port information.Therefore,
The security performance of this kind of mode is lower, can not solve the problems, such as to prevent illegal user from distorting network settings from the root.
Summary of the invention
Goal of the invention of the invention is: in view of the above problems, providing a kind of work for gras generally recognized as safe access
Industry switch system and operation method, with from root solution prevent industrial switch network arbitrarily distorted port information and by with
The problem of meaning is using port.
The technical solution adopted by the invention is as follows:
A kind of industrial switch system for gras generally recognized as safe access, which includes server and several industry
Interchanger, (i.e. industrial switch reticulates connect several industrial switch, and server is as net with server composition network topology
The administrative center of network);Server is used to send lock command to all or part of industrial switch of several industrial switch;It connects
The industrial switch of lock command is received according to lock command, is switched to lock state.
Further, the industrial switch of lock command is received according to lock command, is switched to lock state specifically:
The industrial switch for receiving lock command parses the locking information for including in lock command, according to locking information, is switched to
Lock state.
Further, industrial switch is switched to lock state specifically: and industrial switch closes the port being not used by,
The IP address and MAC Address of port to be used are bound with corresponding port.
Further, whether port is used according to whether port distinguishes online.
Further, server passes through all or part of industrial switch of the broadcasting packet form to several industrial switch
Send lock command.
Alternatively, server sends lock command to all or part of industrial switch of several industrial switch specifically:
Server sends lock command to all or part of industrial switch of first order industrial switch connected to it, receives lock
Surely the industrial switch ordered forwards lock command according to the information carried in lock command, to adjacent industrial switch;Afterwards
The industrial switch that continued access receives the lock command of forwarding is forwarded in the same manner;The industrial switch of fringe node does not turn
Send out lock command.
Further, server issues the mode of lock command are as follows: by manually triggering sending lock command, or is setting
When the time point set reaches, lock command is issued.
Further, by manually triggering sending lock command specifically: the account of server authentication administrator is being verified
By rear, lock command is issued according to the operation of administrator.
Further, the account of server authentication administrator specifically: administrator is connected to server by client, and
Account is sent by user end to server, account includes username and password;Server carries out the account that client is sent
Verifying.
To solve the problems, such as above-mentioned all or part, the present invention provides the operation methods of above-mentioned industrial switch system, should
Method the following steps are included:
S1: server sends the broadcasting packet comprising lock command to the whole network industrial switch;
S2: industrial switch receives broadcasting packet, parses the locking information for including in broadcasting packet;
S3: industrial switch closes not online port according to locking information, by the IP address of online port and MAC Address with
It is bound corresponding port.
In conclusion by adopting the above-described technical solution, the beneficial effects of the present invention are:
1, by this industrial switch system, targetedly the port of industrial switch can be locked, it is therefore prevented that in work
Increase illegality equipment on industry switch port to be linked into network, while also preventing distorting port information, from the root
Solves the potential problem illegally distorted to the whole network switch port.
2, this industrial switch system can lock the industrial switch of the whole network, and then guarantee the data of whole network
Safety.
3, pass through artificial triggering mode, it is ensured that the subjectivity of locking network time point, and then avoid locking net ahead of time
Network and the update for influencing normal networking.Network locked is carried out by setting particular point in time, time point can be set in advance
It is fixed, on the one hand, relieve limitation that must be on the scene to related personnel, on the other hand, lock network in the predetermined time, avoid because
The problem of local networking postpones and impacts to the normal operation of whole network.
4, lock command is issued by the forms of broadcasting, can effectively shortens time of pass down the line, and then improve the network equipment
Corresponding efficiency.
5, by way of the lock command that industrial switch forwards, industrial switch in the whole network can be made repeatedly to confirm locking
Order, and then avoid the problem for causing part industrial switch unlocked because disposably transmitting order packet loss.
6, server is managed by client, relieves the limitation to Admin Administration's network location, improves
Network management flexibility.
7, administrator's account verification is set, avoids unauthorized person and administrator is pretended to be to carry out illegal operation to the network information
Risk improves internet security.
Detailed description of the invention
Examples of the present invention will be described by way of reference to the accompanying drawings, in which:
Fig. 1 is the industrial switch system structural map for gras generally recognized as safe access.
Fig. 2 is industrial switch system operation method flow chart.
In figure, 10 be server, and 20 be industrial switch, and 30 be client, and 40 be terminal device.
Specific embodiment
All features disclosed in this specification or disclosed all methods or in the process the step of, in addition to mutually exclusive
Feature and/or step other than, can combine in any way.
Any feature disclosed in this specification (including any accessory claim, abstract), unless specifically stated,
It is replaced by other equivalent or with similar purpose alternative features.That is, unless specifically stated, each feature is a series of
An example in equivalent or similar characteristics.
As shown in Figure 1, present embodiment discloses a kind of industrial switch system for gras generally recognized as safe access, the system packet
Server and several industrial switch are included, several industrial switch and server constitute network topology.In one embodiment,
Several industrial switch and server are by generic way progress networking, and wherein server is handed over as network management terminal, each industry
It changes planes by being connected to upper end switch, increasing terminal device, the corresponding port information access network of configuration.Further, exist
When port information (IP address etc.) of configurating terminal, need to complete to configure with legal Account Logon to corresponding configuration interface.It is holding
After mouth information configuration, corresponding industrial switch, terminal are linked into network, complete networking, form network topology.It is above-mentioned
Server in one embodiment, for the centre management program on the center industrial switch that operates in network topology, or
Person is the client for being connected to center industrial switch, the client Operation Centre management program.Further, in network configuration
After the completion, centre management program needs to issue lock command into line-locked industrial switch into the whole network.Lock is issued at one
Determine in the embodiment of command forms, broadcasting packet is issued to the whole network interchanger for server, which includes lock command.
The industrial switch of lock command is received according to lock command, is switched to lock state.It is directed to through broadcasting packet form
The situation that lock command is sent to part industrial switch, to be also grouped to industrial switch, using the form pair of multicast
Industrial switch sends broadcasting packet in group.
In the embodiment that a lock command executes object, it is switched to lock state specifically: receive lock command
Industrial switch parse the locking information for including in lock command, according to locking information, be switched to lock state.In one kind
In embodiment, lock command includes the identity information table (device id or network element of industrial switch are numbered) of lock object,
The industrial switch for receiving lock command carries out the identity information of lock object in lock command and self-identity information table
Traversal comparison is switched to lock state after comparing through (including the identity information of the industrial switch in identity information table),
Otherwise not switching state.
In one embodiment, server issues lock command to the industrial switch of the whole network, and the industry for the whole network is handed over
It changes planes and executes the lock command, lock command is trigger signal.That is the whole network industrial switch is just cut after receiving lock command
Change to lock state.
In the embodiment of a lock state, industrial switch is switched to lock state specifically: industrial switch closes
The port being not used by is closed, the IP address and MAC Address of port to be used are bound with corresponding port.
In one embodiment, the port being not used by is that (port then used is online end for offline port
Mouthful), including not being connected to the port of terminal device, and it is connected to the port of terminal, but port information is not configured in the terminal, or should
Terminal is in off-line state.For the port of closing, then do not allow access terminal equipment, specific manifestation are as follows: for the end of closing
Mouthful, (whether there is the monitoring of access terminal equipment for port when there is terminal device to be linked into the port, belong to the normal of interchanger
Rule configuration, is described in detail not to this herein), industrial switch locks the port immediately, while to server (centre management
End) early warning is carried out, such as read the MAC Address of the terminal device of insertion and be reported to server.For locked port, only take
Business device, which has permission, to be reopened, such as the industrial switch into net issues the broadcasting packet to unlock, so that each industry is handed over
It changes planes and releases the lock state of port.For the port that former industrial switch is used, positive normal open is kept in the locked state
Letter, going offline for the terminal device of the port, (terminal device of the port used is there is a situation where offline, including connects for situation
Touch bad and pull out), when going offline, industrial switch execution Forewarning Measures one, such as the status information that will go offline (including the end that goes offline
Message breath and corresponding terminal facility information) it is reported;When terminal device accesses again, the terminal device is first verified that
MAC Address, IP address whether with when locking with the MAC Address and IP address of the port binding, any information (MAC Address or
IP address) verifying is obstructed out-of-date, Forewarning Measures two are executed, such as read the MAC Address of the terminal device newly accessed and reported,
The port is locked simultaneously.For locked port, only server (centre management end) has the right to reopen.The setting is based on object
Defence in reason for idle port, executes early warning in the locked state when there are terminal device access, and locking should
Port, avoid terminal device it is illegal access (such as know IP address (would generally be directly written on respective physical facility,
In order to the later maintenance of maintenance personnel) after, modifying terminal device by camouflage means is legal MAC Address, can successfully be taken advantage of
Proving program is deceived, realization is successfully accessed to network, and is actually illegal access).
Further, industrial switch is closing unused port, and by the IP address of port and MAC Address (for end
The IP address of the terminal configuration of mouthful connection and the MAC Address of terminal) bound with the port after, need server to network solution
It after lock, can just modify to related port information, such as increase equipment (including port information configuration), modify former access device
Port information.
In the embodiment that another server issues lock command, whole from server to several industrial switch or
Part industrial switch sends lock command specifically: whole or portion of the server to first order industrial switch connected to it
Point industrial switch sends lock command, receives the industrial switch of lock command according to the information carried in lock command,
Lock command is forwarded to adjacent industrial switch;The industrial switch of the lock command of subsequently received forwarding is in the same manner
It is forwarded;The industrial switch of fringe node does not forward lock command.
In one embodiment, server issues lock command message to the industrial switch all directly connected;
In one embodiment, after related industries interchanger receives the message, message is parsed, obtains needing to lock (cutting
Change to lock state) industrial switch identity information table, further, to the identity information table corresponding industrial switch hair
Give the message.In another embodiment, after related industries interchanger receives message, message is parsed, is switched to
Lock state, and forward the message to adjacent industrial switch, the industrial switch of the subsequently received message is in this way
Analytic message is switched to lock state, E-Packets, and until message is forwarded to fringe node, (only upper end is connected to industrial exchange
Machine, lower end is unloaded or is connected with terminal device) industrial switch, then no longer forward the message, only analytic message, be switched to lock
Determine state.At this point, the industry exchange of the whole network is all switched to lock state, the industrial switch in network can not then be increased
Add standby (industrial switch or terminal) or modification port information.
In the embodiment that a server issues lock command timing node, server by way of manually triggering to
Network issues lock command.In one embodiment, the account of server authentication administrator, after being verified, according to management
The operation of member issues lock command.In a specific embodiment, respective interface of the administrator at relative clients end inputs account
Information (such as username and password, or for information-that administrator's identity is verified for example recognition of face, fingerprint recognition,
Iris recognition etc.), and be transferred to server and verified.Server is verified letter after being verified, to client feedback
Breath so that client is switched to corresponding triggering interface, administrator by being clicked on the triggering interface, the behaviour such as gesture input
Make, trigger the server issues lock command.
Yet another trigger the server issues in the embodiment of lock command mode, server after above-mentioned be verified,
It is verified information to client feedback, so that client is switched to the interface of setting trigger time, administrator passes through at this
Trigger time is arranged in interface, and after the setup, is submitted to server execution;The server real-time acquisition system time, and
When system time is the trigger time of setting, lock command is issued.
Further, in one embodiment, in the above-described embodiments, after administrator's account verification passes through, management
Member can also be selected and be set (the full choosing of default, i.e. broadcasting packet format to the industrial switch for needing to be switched to lock state
Issue lock command).
As shown in Fig. 2, present embodiment discloses the operation methods of above-mentioned industrial switch system, comprising the following steps:
S1: server sends the message comprising lock command to the whole network industrial switch.
In one embodiment, server is sent after receiving trigger command, then to the whole network industrial switch comprising locking
The broadcasting packet of order.
In a specific embodiment, trigger command are as follows: from manually sending trigger signal to server, or for service
The trigger time of device setting, server issue lock command in the trigger time.In one embodiment, manually
Before trigger time is arranged before sending trigger signal to server or to server, server first verifies its identity,
After being verified, related personnel just can send trigger signal to server.In one embodiment, server is to related personnel
Carry out authentication specifically: verify to the account that it is provided, or to its identity attribute information (such as fingerprint, iris, people
Face feature) it is verified.
S2: industrial switch receives broadcasting packet, parses the locking information for including in broadcasting packet.
In one embodiment, locking information includes the identity information of the industrial switch in need for being switched to lock state
Table.For the lock command of broadcasting packet form, due to being directed to the whole network industrial switch, then without the identity information table.
S3: industrial switch is switched to lock state according to locking information.
One it is non-for the whole network industrial switch into line-locked embodiment, industrial switch will be in locking information
Identity information table is compared with self-identity information, after comparison passes through, is executed lock operation-and is switched to lock state.?
In one embodiment, it is switched to lock state specifically: close not online port, by the IP address of online port and MAC
It is bound with corresponding port location.
Correspondingly, not allowing access terminal equipment, specific manifestation then for the port of closing are as follows: for the port of closing,
When there is terminal device to be linked into the port, industrial switch locks the port immediately, while to server (centre management end)
Early warning is carried out, such as reads the MAC Address of the terminal device of insertion and is reported to server.For locked port, only service
Device, which has permission, to be reopened, such as the industrial switch into net issues the broadcasting packet to unlock, so that each industry exchange
The lock state of machine releasing port.
Above-mentioned operation method is in one embodiment, further includes:
S4: server sends the message comprising the order that unlocks to the whole network industrial switch.
Industrial switch is after receiving and unlocking order, the state that is restored to before being switched to lock state.Herein
Under state, equipment, configuration port information can be increased on industrial switch.
In one embodiment, server issues the order that unlocks by way of manually triggering, or preset
Trigger time issues the order that unlocks.
Further, before the sending of artificial trigger the server unlocks order, or in manually setting trigger time
Before, it needs to verify the identity of related personnel, verification method issues method when lock command with above-mentioned trigger the server
It is identical, it is not repeated herein.
Based on the embodiment of above-mentioned operation method, present embodiment discloses carry out state update for the whole network industrial switch
Update method:
S5: server sends the message comprising lock command to the whole network industrial switch again.It should be noted that for updating
When the lock state of the whole network industrial switch, need in advance to unlock to the industrial switch in the whole network.The purpose of update exists
In, for the network topology under lock state, need to increase new terminal device, and in the locked state, terminal can not be increased newly
Equipment, therefore, it is necessary to unlock the state (lock state for releasing industrial switch) of network, then newly-increased terminal device (packet in advance
Include the configuration process of corresponding port information) after, server issues locking message again, relocks network state, this is stylish
Network topology has included the terminal device newly accessed.It is the state based on port each in existing net each time to the locking of network
The operation of progress realizes the height collection of rights management by the way that the permission of network locked is concentrated on server (centre management end)
In, it avoids arbitrarily access and realizes the risk modified to whole network status information, there is high security level.
The invention is not limited to specific embodiments above-mentioned.The present invention, which expands to, any in the present specification to be disclosed
New feature or any new combination, and disclose any new method or process the step of or any new combination.
Claims (10)
1. a kind of industrial switch system for gras generally recognized as safe access, the industrial switch system includes server and several
Industrial switch, several industrial switch and the server constitute network topology;It is characterized in that, the server is used
In to all or part of industrial switch of several industrial switch send lock command;Receive the lock command
Industrial switch is switched to lock state according to the lock command.
2. industrial switch system as described in claim 1, which is characterized in that the industry exchange for receiving lock command
Machine is switched to lock state according to the lock command specifically: receive lock command industrial switch parse it is described
The locking information for including in lock command is switched to lock state according to the locking information.
3. industrial switch system as claimed in claim 1 or 2, which is characterized in that the industrial switch is switched to locking
State specifically: industrial switch closes the port that is not used by, the IP address and MAC Address of port to be used and corresponding
It is bound port.
4. industrial switch system as claimed in claim 3, which is characterized in that port whether used according to port whether
Line distinguishes.
5. the industrial switch system as described in claim 1,2 or 4, which is characterized in that the server passes through broadcasting packet
Form sends lock command to all or part of industrial switch of several industrial switch.
6. the industrial switch system as described in claim 1,2 or 4, which is characterized in that the server is handed over to several industry
The all or part of industrial switch changed planes sends lock command specifically: server is exchanged to first order industry connected to it
All or part of industrial switch of machine sends lock command, and the industrial switch for receiving the lock command is ordered according to locking
The information carried in order forwards the lock command to adjacent industrial switch;The lock command of subsequently received forwarding
Industrial switch is forwarded in the same manner;The industrial switch of fringe node does not forward lock command.
7. industrial switch system as claimed in claim 5, which is characterized in that the server issues the mode of lock command
Are as follows: the lock command is issued by manually triggering, or when reaching at the time point of setting, issues the lock command.
8. industrial switch system as claimed in claim 7, which is characterized in that issue the lock command by manually triggering
Specifically: the account of server authentication administrator issues the lock command according to the operation of administrator after being verified.
9. industrial switch system as claimed in claim 8, which is characterized in that the account of the server authentication administrator has
Body are as follows: administrator is connected to server by client, and sends account, the account to the server by the client
Family includes username and password;The account that server sends the client is verified.
10. the operation method of industrial switch system as claimed in claim 9, which comprises the following steps:
S1: server sends the broadcasting packet comprising lock command to the whole network industrial switch;
S2: industrial switch receives the broadcasting packet, parses the locking information for including in the broadcasting packet;
S3: industrial switch closes not online port, by the IP address of online port and MAC according to the locking information
It is bound with corresponding port location.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810604766.9A CN108965170A (en) | 2018-06-13 | 2018-06-13 | A kind of industrial switch system and operation method for gras generally recognized as safe access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810604766.9A CN108965170A (en) | 2018-06-13 | 2018-06-13 | A kind of industrial switch system and operation method for gras generally recognized as safe access |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108965170A true CN108965170A (en) | 2018-12-07 |
Family
ID=64488722
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810604766.9A Pending CN108965170A (en) | 2018-06-13 | 2018-06-13 | A kind of industrial switch system and operation method for gras generally recognized as safe access |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108965170A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116506221A (en) * | 2023-06-25 | 2023-07-28 | 金锐同创(北京)科技股份有限公司 | Industrial switch admission control method, device, computer equipment and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2612170Y (en) * | 2003-02-26 | 2004-04-14 | 上海科诺科技有限公司 | Intelligence ethernet exchanger |
US7283547B1 (en) * | 2000-08-11 | 2007-10-16 | Ericsson Ab | Switch fabrics logical synchronization utilizing propagation lockdown |
CN102118271A (en) * | 2011-03-29 | 2011-07-06 | 上海北塔软件股份有限公司 | Method for discovering illegally-accessed equipment |
CN102799914A (en) * | 2012-07-16 | 2012-11-28 | 深圳市翌日科技有限公司 | Warehouse management system based on wireless positioning |
CN102891811A (en) * | 2012-09-21 | 2013-01-23 | 杭州华三通信技术有限公司 | Name service database locking method and exchange |
US8590033B2 (en) * | 2008-09-25 | 2013-11-19 | Fisher-Rosemount Systems, Inc. | One button security lockdown of a process control network |
CN103780835A (en) * | 2012-10-19 | 2014-05-07 | 株式会社东芝 | Identification device and method |
CN105592570A (en) * | 2016-02-24 | 2016-05-18 | 江苏木盟智能科技有限公司 | Device pairing method and device pairing system |
-
2018
- 2018-06-13 CN CN201810604766.9A patent/CN108965170A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7283547B1 (en) * | 2000-08-11 | 2007-10-16 | Ericsson Ab | Switch fabrics logical synchronization utilizing propagation lockdown |
CN2612170Y (en) * | 2003-02-26 | 2004-04-14 | 上海科诺科技有限公司 | Intelligence ethernet exchanger |
US8590033B2 (en) * | 2008-09-25 | 2013-11-19 | Fisher-Rosemount Systems, Inc. | One button security lockdown of a process control network |
CN102118271A (en) * | 2011-03-29 | 2011-07-06 | 上海北塔软件股份有限公司 | Method for discovering illegally-accessed equipment |
CN102799914A (en) * | 2012-07-16 | 2012-11-28 | 深圳市翌日科技有限公司 | Warehouse management system based on wireless positioning |
CN102891811A (en) * | 2012-09-21 | 2013-01-23 | 杭州华三通信技术有限公司 | Name service database locking method and exchange |
CN103780835A (en) * | 2012-10-19 | 2014-05-07 | 株式会社东芝 | Identification device and method |
CN105592570A (en) * | 2016-02-24 | 2016-05-18 | 江苏木盟智能科技有限公司 | Device pairing method and device pairing system |
Non-Patent Citations (2)
Title |
---|
傅莉: "交换机的安全技术浅析", 《 江苏省通信学会2004年学术年会论文集》 * |
张成军,刘佰泉: "解决 IP 地址盗用的方法研究", 《齐齐哈尔大学学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116506221A (en) * | 2023-06-25 | 2023-07-28 | 金锐同创(北京)科技股份有限公司 | Industrial switch admission control method, device, computer equipment and medium |
CN116506221B (en) * | 2023-06-25 | 2023-09-19 | 金锐同创(北京)科技股份有限公司 | Industrial switch admission control method, device, computer equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11595396B2 (en) | Enhanced smart process control switch port lockdown | |
CN101141305B (en) | Network security defensive system, method and security management server | |
EP1682985B1 (en) | Distributed intrusion response system | |
CN101436934B (en) | Method, system and equipment for controlling user networking | |
EP1670188A2 (en) | Methods and systems for connection determination in a multi-point virtual private network | |
CN105915550B (en) | A kind of Portal/Radius authentication method based on SDN | |
CN106027463B (en) | A kind of method of data transmission | |
US10270863B1 (en) | System and method for internet of things (IoT) device authentication and security | |
WO2015090089A1 (en) | Authentication and authorization system and method for management of communication network | |
CN106027476B (en) | A kind of identity card cloud Verification System and card-reading system | |
CN106027466B (en) | A kind of identity card cloud Verification System and card-reading system | |
CN109347784A (en) | Terminal admittance control method, controller, management and control devices and system | |
EP3582033B1 (en) | Method for securely operating a field device | |
DE102006060040B4 (en) | Method and server for providing a protected data connection | |
CN110855707A (en) | Internet of things communication pipeline safety control system and method | |
CN109302397A (en) | A kind of network safety managing method, platform and computer readable storage medium | |
CN115085961B (en) | Authentication of devices in a communication network of an automation installation | |
CN115189958A (en) | Method for realizing authentication roaming and authentication between multi-level architectures | |
CN108965170A (en) | A kind of industrial switch system and operation method for gras generally recognized as safe access | |
CN106790134A (en) | The access control method and Security Policy Server of a kind of video monitoring system | |
CN100591068C (en) | Method of transmitting 802.1X audit message via bridging device | |
CN105391720A (en) | User terminal login method and device | |
CN108712398A (en) | Port authentication method, server, interchanger and the storage medium of certificate server | |
EP3264714B1 (en) | Method for operating a voice control system for authenticated voice control, household appliance, voice control unit, management unit and voice control system | |
WO2016008889A1 (en) | Method for unblocking external computer systems in a computer network infrastructure, distributed computing network with a computer network infrastructure of this type, and computer program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |
|
RJ01 | Rejection of invention patent application after publication |