CN111970698B - Industrial field weak network environment optimization method - Google Patents

Industrial field weak network environment optimization method Download PDF

Info

Publication number
CN111970698B
CN111970698B CN202010785941.6A CN202010785941A CN111970698B CN 111970698 B CN111970698 B CN 111970698B CN 202010785941 A CN202010785941 A CN 202010785941A CN 111970698 B CN111970698 B CN 111970698B
Authority
CN
China
Prior art keywords
access
equipment
access point
authorization level
access equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010785941.6A
Other languages
Chinese (zh)
Other versions
CN111970698A (en
Inventor
熊筱曼
薛明辉
袁晗
吕威
章金伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Coastline Internet Technology Co ltd
Original Assignee
Jiangsu Coastline Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Coastline Internet Technology Co ltd filed Critical Jiangsu Coastline Internet Technology Co ltd
Priority to CN202010785941.6A priority Critical patent/CN111970698B/en
Publication of CN111970698A publication Critical patent/CN111970698A/en
Application granted granted Critical
Publication of CN111970698B publication Critical patent/CN111970698B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Abstract

The invention discloses a method for optimizing the environment of a weak network in the industrial field, which comprises the following steps: s1, establishing a wireless local area network; s2, manually or automatically selecting an access point for access; s3, an authorization level module identifies the authorization level of the ID of the access equipment; and S4, the access equipment can use each authority function opened to the access equipment, and the industrial equipment records the identity ID of the access equipment and the use operation record to generate and store the operation event. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the ID of the access equipment, thereby developing the corresponding authority function, ensuring the network security, storing the operation event of the access equipment, realizing the marking and positioning, and counting various industrial production data.

Description

Industrial field weak network environment optimization method
Technical Field
The invention belongs to the technical field of networks, and particularly relates to a weak network environment optimization method in the industrial field.
Background
With the development of internet technology, wireless Local Area Network (WLAN) networking technology has been developed rapidly, and an individual WLAN Network is established by deploying a plurality of Access Points (APs), and then Wireless Access service is provided. At present, a wireless network is generally applied to an office system, but no good solution is provided for the application in the industrial field, particularly for the optimization of the weak network environment of the vehicle-mounted layer.
Disclosure of Invention
In order to overcome the defects in the prior art, the invention provides a weak network environment optimization method in the industrial field.
In order to solve the technical problems, the invention provides the following technical scheme:
the invention provides a weak network environment optimization method in the industrial field, which comprises the following steps:
s1, each industrial device deploys an access point, and the access points and adjacent access points form a wireless local area network;
s2, the access equipment acquires the addresses of all access points covered by the current wireless local area network, and then manually or automatically selects one access point to access according to the signal intensity of each access point;
s3, the industrial equipment acquires the identity ID of the access equipment, the authorization level module carries out authorization level identification on the identity ID, and if the identification is successful, the authority function of the corresponding level is opened to the access equipment; if the identification fails, an alarm is given out, and an early warning event is generated and stored by the identity ID of the access equipment and the access operation record; the authorization level module is internally provided with at least one authorization level from top to bottom, and the authorization level is from top to bottom;
and S4, the access equipment uses each authority function opened to the access equipment, and the industrial equipment generates and stores the identity ID and the use operation record of the access equipment into an access equipment operation event.
As a preferred technical solution of the present invention, when an access point is manually selected to access in step S2, if the number of access devices connected to the access point is within a set threshold, the access will be successful; if the number of the access devices connected with the access point exceeds a set threshold value, a prompt is sent out, and the access point is reselected until the access is successful.
As a preferred technical solution of the present invention, when one access point is automatically selected to access in step S2, the access point with the strongest signal and the number of access devices connected to the access point within the set threshold is selected to access.
As a preferred technical solution of the present invention, when the authorization level module performs authorization level identification on the identity ID in step S3, the identity ID is sequentially identified according to the levels from bottom to top, and the business event data is recorded and stored for later analysis. The method can identify and filter illegal access or network attack.
As a preferred technical solution of the present invention, the authority function in step S4 includes a viewing function, a demonstration function, and an operation function, the industrial device generates an access device viewing operation event, an access device demonstration operation event, and an access device operation event from the identification ID of the access device and the viewing operation record, the demonstration operation record, and the operation record, and stores the access device viewing operation event, the access device demonstration operation event, and the access device operation event, the viewing operation record including a viewing operation action and each action duration, the demonstration operation including a demonstration operation action and each action duration, and the operation including an operation action and each action duration.
Compared with the prior art, the invention has the following beneficial effects:
in the invention, each industrial device establishes a wireless local area network, when the access device selects an access point to access, the authorization level module carries out authorization level identification on the identity ID, then the authority function of the corresponding level is opened to the access device, and finally the identity ID and the use operation record of the access device are generated into an access device operation event and stored. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the ID, thereby developing the corresponding authority function, ensuring the network security, storing the operation event of the access equipment, realizing the mark positioning, and counting various industrial production data.
Drawings
FIG. 1 is a flowchart illustrating a method for optimizing an industrial field weak network environment according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
In order to achieve the object of the present invention, as shown in fig. 1, in one embodiment of the present invention, there is provided an industrial field weak network environment optimization method, including the steps of:
s1, each industrial device deploys an access point, and a wireless local area network is established between each industrial device and an adjacent access point;
s2, the access equipment acquires the address of each access point covered by the current wireless local area network, and then manually or automatically selects one access point to access according to the signal intensity of each access point;
specifically, when an access point is manually selected for access, if the number of access devices connected to the access point is within a set threshold, the access is successful; if the number of the access devices connected with the access point exceeds a set threshold value, sending a prompt, and reselecting the access point until the access is successful;
specifically, when an access point is automatically selected for access, the access point with the number of access devices connected with the access point within a set threshold and the strongest signal is selected for access;
s3, the industrial equipment acquires the identity ID of the access equipment, the authorization level module carries out authorization level identification on the identity ID, and if the identification is successful, the authority function of the corresponding level is opened to the access equipment; if the identification fails, an alarm is given out, and an early warning event is generated and stored by the identity ID of the access equipment and the access operation record; the authorization level module is internally provided with at least one authorization level from top to bottom, the level of the authorization level is from top to bottom, and the authorization level module sequentially identifies the identity ID according to the level from bottom to top when identifying the authorization level;
s4, the access equipment uses each authority function opened to the access equipment, and the industrial equipment generates and stores the identity ID and the use operation record of the access equipment into an access equipment operation event;
specifically, the authority function comprises a viewing function, a demonstration function and an operation function, the industrial equipment generates and stores an identity ID of the access equipment, a viewing operation record, a demonstration operation record and an operation record of the access equipment, the viewing operation record comprises viewing operation actions and duration of each action, the demonstration operation comprises demonstration operation actions and duration of each action, and the operation comprises operation actions and duration of each action.
The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the ID, thereby developing the corresponding authority function, ensuring the network security, storing the operation event of the access equipment, realizing the mark positioning, and counting various industrial production data.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (4)

1. A weak network environment optimization method in the industrial field is characterized by comprising the following steps:
s1, each industrial device deploys an access point, and a wireless local area network is established between each industrial device and an adjacent access point;
s2, the access equipment acquires the unique identifier of each access point covered by the current wireless local area network, and then manually or automatically selects one access point to access according to the signal intensity of each access point;
s3, the industrial equipment access point acquires the identity ID of the access equipment, the authorization level module carries out authorization level identification on the identity ID, and if the identification is successful, the authority function of the corresponding level is opened to the access equipment; if the identification fails, an alarm is given, and the identity ID of the access equipment and the access operation record are generated into an early warning event for storage; the authorization level module is internally provided with at least one authorization level from top to bottom, and the authorization level is from top to bottom;
s4, the access equipment uses each authority function opened to the access equipment, the industrial equipment generates and stores an access equipment operation event by using the identity ID and the operation record of the access equipment, the authority function comprises a viewing function, a demonstration function and an operation function, the industrial equipment respectively views the operation record, demonstrates the operation record, generates and stores the access equipment viewing operation event by using the identity ID of the access equipment, demonstrates the operation event by using the access equipment and the operation event of the access equipment, the viewing operation record comprises viewing operation actions and duration of each action, the demonstration operation comprises demonstration operation actions and duration of each action, and the operation comprises operation actions and duration of each action.
2. The method for optimizing the weak network environment in the industrial field according to claim 1, wherein when one access point is manually selected to access in step S2, if the number of access devices connected to the access point is within a set threshold, the access is successful; if the number of the access devices connected with the access point exceeds a set threshold value, a prompt is sent out, and the access point is reselected until the access is successful.
3. The method as claimed in claim 1, wherein when one access point is automatically selected for access in step S2, the access point with the strongest signal and the number of access devices connected to the access point within a set threshold is selected for access.
4. The method for optimizing the environment of the weak network in the industrial field according to claim 1, wherein the authorization level module performs the identification in the step S3 according to the order from bottom to top when performing the authorization level identification on the identity ID.
CN202010785941.6A 2020-08-07 2020-08-07 Industrial field weak network environment optimization method Active CN111970698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010785941.6A CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010785941.6A CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Publications (2)

Publication Number Publication Date
CN111970698A CN111970698A (en) 2020-11-20
CN111970698B true CN111970698B (en) 2023-04-07

Family

ID=73364744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010785941.6A Active CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Country Status (1)

Country Link
CN (1) CN111970698B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101889464A (en) * 2007-10-08 2010-11-17 高通股份有限公司 Access terminal configuration and access control
CN103415026A (en) * 2013-07-03 2013-11-27 深圳Tcl新技术有限公司 Networking method and device of wireless local area network
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
WO2015099607A1 (en) * 2013-12-26 2015-07-02 Certis Cisco Security Pte Ltd An integrated access control and identity management system
CN105873237A (en) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 Method and device for building wireless connection
CN106686754A (en) * 2016-12-06 2017-05-17 厦门中控生物识别信息技术有限公司 Data interaction method and data interaction system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
US9003196B2 (en) * 2013-05-13 2015-04-07 Hoyos Labs Corp. System and method for authorizing access to access-controlled environments

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101889464A (en) * 2007-10-08 2010-11-17 高通股份有限公司 Access terminal configuration and access control
CN103415026A (en) * 2013-07-03 2013-11-27 深圳Tcl新技术有限公司 Networking method and device of wireless local area network
WO2015099607A1 (en) * 2013-12-26 2015-07-02 Certis Cisco Security Pte Ltd An integrated access control and identity management system
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN105873237A (en) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 Method and device for building wireless connection
CN106686754A (en) * 2016-12-06 2017-05-17 厦门中控生物识别信息技术有限公司 Data interaction method and data interaction system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Duc Khai Lam ; Yasuhiro Shinozaki."A fast and safety industrial WLAN protocol for factory communication systems".《2015 IEEE International Conference on Industrial Technology (ICIT)》.2015, *
IT―Powered无线网络 WLAN在工业领域的新机遇;机械工业信息研究院;《电气应用》;20100820(第16期);第二页第三栏内容 *
适用于工厂自动化的无线网络通讯技术;倪春鹏;《自动化与仪器仪表》;20090725(第04期);全文 *

Also Published As

Publication number Publication date
CN111970698A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN107948172B (en) Internet of vehicles intrusion attack detection method and system based on artificial intelligence behavior analysis
CN107251614A (en) Access point is turned to
CN109766696A (en) The setting method and device of software permission, storage medium, electronic device
CN110225067B (en) Internet of things safety early warning system
CN107977823A (en) Accident treating method and apparatus
RU2011125590A (en) METHOD FOR PREVENTING AND IDENTIFYING MOBILE DEVICES AND FORECASTING AND NOTIFICATION SYSTEM FOR IDENTIFICATION OF MOBILE DEVICES
CN106034054A (en) Redundant access control list ACL rule file detection method and apparatus thereof
US20110191827A1 (en) Detecting Unauthorized Router Access Points or Rogue APs in the Wired Network
CN106296861A (en) Night watching recording method, device and system
KR20070104633A (en) Method and apparatus for protecting a core network
CN106162649A (en) A kind of identify the method for WAP legitimacy, terminal and system
CN109756382B (en) Fault positioning method and device
CN100536474C (en) Method and equipment for preventing network attack by using address analytic protocol
CN106507360A (en) A kind of WIFI network access control method and device
CN106713045A (en) Terminal device driving component configuration method and device
CN104079437B (en) Realize the method and terminal of rights management control
CN111970698B (en) Industrial field weak network environment optimization method
CN102595530A (en) Method and device for determining decision-making party for physical-layer cell identifier (PCI) reselection
CN113225342B (en) Communication abnormality detection method and device, electronic equipment and storage medium
CN109511153A (en) A kind of base station connection control method, device, medium, computer equipment and system
CN106028356A (en) Wireless access equipment processing method and system
CN112448963A (en) Method, device, equipment and storage medium for analyzing automatic attack industrial assets
CN111479287B (en) Simulation test method, device, equipment and storage medium for core network of non-independent networking
CN107294977A (en) The method and device of Wi Fi secure connections
CN115567258B (en) Network security situation awareness method, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210413

Address after: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Jiangsu coastline Internet Technology Co.,Ltd.

Address before: 650106 1st floor to 6th floor, No. 593, near Huapu Road, Wuhua District, Kunming City, Yunnan Province

Applicant before: Yunnan Weiyuan Intelligent Manufacturing Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Unit 8-702, creative industry park, 328 Xinghu street, Suzhou Industrial Park, Jiangsu Province, 215000

Patentee after: Jiangsu Coastline Internet Technology Co.,Ltd.

Address before: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Patentee before: Jiangsu coastline Internet Technology Co.,Ltd.

CP03 Change of name, title or address