CN114978583A - Intelligent virtual private network system for industrial Internet of things - Google Patents

Intelligent virtual private network system for industrial Internet of things Download PDF

Info

Publication number
CN114978583A
CN114978583A CN202210378720.6A CN202210378720A CN114978583A CN 114978583 A CN114978583 A CN 114978583A CN 202210378720 A CN202210378720 A CN 202210378720A CN 114978583 A CN114978583 A CN 114978583A
Authority
CN
China
Prior art keywords
data
authorization
data source
application
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210378720.6A
Other languages
Chinese (zh)
Inventor
林苑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Kelu Software Co Ltd
Original Assignee
Shanghai Kelu Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Kelu Software Co Ltd filed Critical Shanghai Kelu Software Co Ltd
Priority to CN202210378720.6A priority Critical patent/CN114978583A/en
Publication of CN114978583A publication Critical patent/CN114978583A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses an industrial Internet of things intelligent virtual private network system, which is characterized in that firstly, data are directly stored in a local data source object node without being uploaded to a data center, the data are in a distributed state, and the difficulty of invasion and stealing of the data by the outside is enhanced while a large amount of data transmission and storage resources are saved. And secondly, because the object nodes for storing the data are distributed in the private second network and are completely isolated from the public first network, the data security is further ensured from the aspect of hardware configuration. In addition, only the management platform with the first network IP address is provided, and no data is stored on the management platform, so that an external hacker cannot acquire any data even if the external hacker attacks the management platform. The management platform is only responsible for authority verification of a data demander, and data are directly uploaded to a data demander passing the verification through the object node, so that data transmission is reduced to the minimum through the reserved nodes, the data leakage probability is reduced to the minimum, and transmission and storage resources are saved.

Description

Intelligent virtual private network system of industrial Internet of things
Technical Field
The invention relates to an industrial internet platform, in particular to an industrial Internet of things intelligent virtual private network system.
Background
With the advent of the big data age, more and more government, enterprise, etc. organizations are becoming aware that data is becoming the most important asset for an organization, and data analysis capabilities are becoming the core competitiveness of an organization and are beginning to invest in large amounts.
In the informatization development process, the system is built in different periods and is limited by different investment sources of various projects, different construction and management, scattered operation and maintenance and the like, various business application systems exist in various links in large quantity, information resources are scattered, interfaces among the business systems are complicated, and information isolated islands exist. The unified management mechanism of information resources is lacked, and the fusion degree of information construction and business management service is insufficient.
And a large amount of data are repeatedly acquired and stored, so that a large amount of information transmission and storage resources are occupied, and the data utilization rate is extremely low. According to the statistics of the utilization rate of the data collected, uploaded and stored by a pipeline company in the near-sighted years, the actual data utilization rate only accounts for 0.75% of the total data, and the collected data occupies a large amount of data transmission bandwidth resources and storage resources.
Data of the existing civil cloud platform are stored and managed by the platform, data security and privacy cannot be guaranteed, and the possibility of data leakage exists. Cannot be used in the industrial field.
The inventor of the invention finds that in the industrial field, a data control platform which can be used for various applications in an enterprise or used by multiple enterprises in public and can effectively guarantee the control right of data owners on the data is lacked.
Disclosure of Invention
The invention aims to provide an industrial Internet of things intelligent virtual private network system, which can effectively ensure the safety of industrial information, avoid repeated acquisition, transmission and processing of the industrial information, save data transmission and storage resources, effectively avoid external applications from directly contacting the industrial data, and provide a uniform and convenient data calling environment for various external applications while ensuring the safety of the industrial data.
In order to solve the above technical problem, an embodiment of the present invention provides an intelligent virtual private network system for industrial internet of things, including:
the management platform comprises a first network IP address, and each application establishes communication connection with the management platform through the first network and sends a data request to the management platform;
the management platform is connected with each data source object node through a second network, and the management platform and each data source object node respectively comprise a second network IP address; the first network and the second network are independent of each other;
the management platform comprises a data management server, the data management server is used for performing authorization authentication on the application when the management platform receives data requests from each application, if the data requests pass the authorization authentication, a second network IP address is distributed to the application, and the second network IP address and the data request content of the application are sent to a data source node to which the requested data belong; and instructing the data source object node to establish a second network security connection with the application through a second network IP address of the application, and sending the requested data to the application.
Compared with the prior art, the data are directly stored in the local data source object nodes and do not need to be uploaded to a data center, and the data are in a distributed state, so that a large amount of data transmission and storage resources are saved, and meanwhile, the difficulty of external invasion and stealing of the data is enhanced. And moreover, data source nodes for storing data are distributed in the private second network and are completely isolated from the public first network, so that the data security is further guaranteed from the aspect of hardware configuration. In addition, in the embodiment, only the management platform having the first network IP address does not store any data, and an external hacker cannot acquire any data even if the external hacker attacks the management platform. The management platform is only responsible for auditing the authority of a data demander, after the data demander passes the auditing, the data requester and the data source object node are safely connected, and data are directly uploaded to the data demander passing the auditing by the data source object node, so that data transmission is reduced to the minimum through the reserved nodes, the data leakage probability is reduced to the minimum, and transmission and storage resources are saved to the maximum extent while the safety is ensured.
As a further improvement, the first network is typically the public internet and the second network is typically the industrial internet.
As a further improvement, the second network includes an independent domain name resolution server, and when each data source object node is registered in the management platform, the domain name resolution server allocates the second network IP address to the data source object node. Through an independent domain name resolution mechanism, the second network is guaranteed to be absolutely independent of the first network physically and mechanically.
As a further improvement, the data management server of the management platform performing authorization authentication on the application at least comprises:
authenticating the identity information of the application; and/or
And performing permission examination on the data request content of the application.
As a further improvement, the data management server is further configured to store data authorization files of the data source object nodes, find a data authorization file corresponding to the data source object node to which the requested data belongs when receiving a data request from an application, and perform authorization authentication on the application according to the data authorization file. And the data authorization file of each data source object node is set to the management platform by the owner of the data source object node. The data management server is only an executive party of the data authorization file, does not have the authority for setting the data authorization file, and cannot permit or prohibit data transmission without permission, so that the possibility of data leakage in the management platform can be effectively eliminated, the fact that only a data resource owner has the transmission control authority of the data resource is ensured, and the rights and interests of the data source object node owner are effectively guaranteed.
As a further improvement, the data management server is further configured to, when receiving a data authorization file set by a data source node owner, request a data authorization backup file stored by the data source node corresponding to the data authorization file, compare the data authorization file with the received data authorization backup file, and if the data authorization file is consistent with the received data authorization backup file, store the data authorization file. Therefore, even if the data authorization file is tampered in the transmission process, the data information cannot be actually influenced, and the safety of the data information is effectively guaranteed.
As a further improvement, the data management server is further configured to, when receiving a modified data authorization file from a data source node owner, request a data transmission authorization rule backup file stored in the data source node corresponding to the data authorization file to be modified, compare the received data authorization file with the data transmission authorization rule backup file, and if the received data authorization file is consistent with the data transmission authorization rule backup file, replace the original file with the modified data authorization file.
When an asset owner needs to modify a data authorization file of a data source object node owned by the asset owner, the modified data authorization file needs to be sent to the industrial data management platform, and meanwhile, a modified data transmission authorization rule backup file needs to be stored on the data source object node; and the data management server compares the received data authorization file with a data transmission authorization rule backup file on a data source object node, and if the received data authorization file is consistent with the data transmission authorization rule backup file, the modified data authorization file is replaced by the original file. Therefore, even if a hacker attacks the industrial data management platform and tampers with the data authorization file, the data authorization file cannot be stored, and the industrial data management platform compares the tampered authorization rule file with the backup file on the data source object node to find a bug, so that modification is refused. The data information security of the data asset owner is effectively guaranteed.
As a further improvement, the data management server is further configured to request, from all data source object nodes under the owner name, data transmission authorization rule backup files stored in the data source object nodes when the number of the data source object nodes owned by the data source object node owner is more than one; and comparing the data authorization files to be stored or replaced with the received data transmission authorization rule backup files one by one, and if the matching rate is greater than a preset value, storing or replacing the data authorization files. Therefore, the difficulty of tampering the data transmission rule backup file by hackers is further increased, and the data information security of the data asset owner is enhanced.
As a further improvement, the management platform is further configured to verify the identity of the owner of the data source object node according to the identity information of the owner set during registration of the data source object node, and receive the data authorization file of the owner of the data source object node after passing the identity authentication of the owner of the data source object node.
As a further improvement, the second network security connection between the data source node and the application is: a unidirectional virtual private connection of the data source object node to the application. Therefore, even if the connection is established between the external application and the data source object node, the data which passes the authorization and the verification can only be obtained from the object node, and the data source object node cannot be operated at all, so that the safety of the data source object node in the second network is guaranteed.
As a further refinement, the application is from any of the following devices: personal PCs, mobile terminals, cloud platforms, or central servers, etc.
As a further improvement, when the management platform sends the second network IP address of the application and the data request content to the data source node to which the requested data belongs, the management platform further includes data set transmission control information; the data transmission control information includes one of the following or any combination thereof: data transmission starting time, data transmission time length, data transmission ending time, data transmission file type and connection establishing type; and instructing the data source object node to establish a second network security connection with the application within the range indicated by the transmission control information, and sending the requested data to the application. By carrying out safety limitation on the data transmission time and the transmission form, the data transmission chain can be further prevented from being cracked and stolen by lawbreakers.
As a further improvement, the data source object node at least includes a data acquisition and storage function, and is used to acquire and store industrial data information of each item of industrial control equipment, where the industrial data information at least includes one of the following:
industrial data information generated in the operation process of the industrial control equipment, detection data information obtained by monitoring the industrial control equipment, and the like.
Drawings
Fig. 1 is a block diagram of an industrial internet of things intelligent virtual private network system according to a preferred embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solutions claimed in the claims of the present application can be implemented without these technical details and with various changes and modifications based on the following embodiments.
A preferred embodiment of the present invention relates to an industrial internet of things intelligent virtual private network system, as shown in fig. 1, including:
the management platform comprises a first network IP address, and each application establishes communication connection with the management platform through the first network and sends a data request to the management platform;
the management platform is connected with each data source object node through a second network, and the management platform and each data source object node respectively comprise a second network IP address; the first network and the second network are independent of each other;
the management platform comprises a data management server, the data management server is used for performing authorization authentication on the application when the management platform receives data requests from each application, if the data requests pass the authorization authentication, a second network IP address is distributed to the application, and the second network IP address and the data request content of the application are sent to a data source node to which the requested data belong; and instructing the data source object node to establish a second network security connection with the application through a second network IP address of the application, and sending the requested data to the application.
Compared with the prior art, the data are directly stored in the local data source object nodes and do not need to be uploaded to a data center, and the data are in a distributed state, so that a large amount of data transmission and storage resources are saved, and meanwhile, the difficulty of external invasion and stealing of the data is enhanced. In addition, as the data source object nodes for storing the data are distributed in the private second network and are completely isolated from the public first network, the data security is further ensured from the aspect of hardware configuration. In addition, in the embodiment, only the management platform having the first network IP address does not store any data, and an external hacker cannot acquire any data even if he attacks the management platform. The management platform is only responsible for auditing the authority of the data demander, after the data demander passes the auditing, the data demander and the data source object node are connected safely, and the data is directly uploaded to the data demander passing the auditing by the data source object node, so that the transmission and storage resources are saved to the greatest extent while the safety is ensured.
As a further improvement, the first network is typically a public internet and the second network is typically an industrial internet.
As a further improvement, the second network includes an independent domain name resolution server, and when each data source object node is registered in the management platform, the domain name resolution server allocates the second network IP address to the data source object node. Through an independent domain name resolution mechanism, the second network is guaranteed to be absolutely independent of the first network physically and mechanically.
As a further improvement, the data management server of the management platform performing authorization authentication on the application at least comprises:
authenticating the identity information of the application; and/or
And performing permission examination on the data request content of the application.
As a further improvement, the data management server is further configured to store data authorization files of the data source object nodes, find a data authorization file corresponding to the data source object node to which the requested data belongs when receiving a data request from an application, and perform authorization authentication on the application according to the data authorization file. The data management server is only an executive party of the data authorization file, does not have the authority for setting the data authorization file, and cannot permit or prohibit data transmission without permission, so that the possibility of data leakage in the management platform can be effectively eliminated, and the rights and interests of the owner of the data source object node can be effectively guaranteed.
As a further improvement, the data authorization file of each data source object node is set to the management platform by a data source object node owner. Thereby ensuring that all and only the data resource owners have the transmission control authority of the data resources.
As a further improvement, the data management server is further configured to, when receiving a data authorization file set by a data source node owner, request a data authorization backup file stored by the data source node corresponding to the data authorization file, compare the data authorization file with the received data authorization backup file, and if the data authorization file is consistent with the received data authorization backup file, store the data authorization file. Therefore, even if the data authorization file is tampered in the transmission process, the data information cannot be actually influenced, and the safety of the data information is effectively guaranteed.
As a further improvement, the data management server is further configured to, when receiving a modified data authorization file from a data source node owner, request a data transmission authorization rule backup file stored in the data source node corresponding to the data authorization file to be modified, compare the received data authorization file with the data transmission authorization rule backup file, and if the received data authorization file is consistent with the data transmission authorization rule backup file, replace the original file with the modified data authorization file.
When an asset owner needs to modify a data authorization file of a data source object node owned by the asset owner, the modified data authorization file needs to be sent to the industrial data management platform, and meanwhile, a modified data transmission authorization rule backup file needs to be stored on the data source object node; and the data management server compares the received data authorization file with a data transmission authorization rule backup file on a data source object node, and if the received data authorization file is consistent with the data transmission authorization rule backup file, the modified data authorization file is replaced by the original file. Therefore, even if a hacker attacks the industrial data management platform and tampers with the data authorization file, the data authorization file cannot be stored, and the industrial data management platform compares the tampered authorization rule file with the backup file on the data source object node to find a bug, so that modification is refused. The data information security of the data asset owner is effectively guaranteed.
As a further improvement, the data management server is further configured to request all data source node under the owner name for a data transmission authorization rule backup file stored in the data source node when the number of the data source node owned by the data source node owner is more than one; and comparing the data authorization files to be stored or replaced with the received data transmission authorization rule backup files one by one, and if the matching rate is greater than a preset value, storing or replacing the data authorization files. Therefore, the difficulty of a hacker tampering with the data transmission rule backup file is further increased, and the data information security of the data asset owner is enhanced.
As a further improvement, the management platform is further configured to verify the identity of the owner of the data source object node according to the identity information of the owner set during registration of the data source object node, receive the data authorization file of the owner after passing the identity authentication of the owner of the data source object node, and store or replace the original file.
As a further improvement, the second network security connection between the data source node and the application is: a unidirectional virtual private connection of the data source object node to the application. Therefore, even if the connection is established between the external application and the data source object node, the data which passes the authorization and the verification can only be obtained from the object node, and the data source object node cannot be operated at all, so that the safety of the data source object node in the second network is guaranteed.
As a further refinement, the application is from any of the following devices: personal PCs, mobile terminals, cloud platforms, or central servers, etc.
As a further improvement, when the management platform sends the second network IP address of the application and the data request content to the data source node to which the requested data belongs, the management platform further includes data set transmission control information; the data transmission control information includes one of the following or any combination thereof: data transmission starting time, data transmission time length, data transmission ending time, data transmission file type and connection establishing type; and instructing the data source object node to establish a second network security connection with the application within the range indicated by the transmission control information, and sending the requested data to the application. By carrying out safety limitation on the data transmission time and the transmission form, the data transmission chain can be further prevented from being cracked and stolen by lawbreakers.
As a further improvement, the data source object node at least includes a data acquisition and storage function, and is used to acquire and store various industrial data information of the industrial control equipment, where the industrial data information at least includes one of the following:
industrial data information generated in the operation process of the industrial control equipment, detection data information obtained by monitoring the industrial control equipment, and the like.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (12)

1. The utility model provides an industry thing allies oneself with intelligent virtual private network system which characterized in that includes:
the management platform comprises a first network IP address, and each application establishes communication connection with the management platform through the first network and sends a data request to the management platform;
the management platform is connected with each data source object node through a second network, and the management platform and each data source object node respectively comprise a second network IP address; the first network and the second network are independent of each other;
the management platform comprises a data management server, the data management server is used for performing authorization authentication on the application when the management platform receives data requests from each application, if the data requests pass the authorization authentication, a second network IP address is distributed to the application, and the second network IP address and the data request content of the application are sent to a data source node to which the requested data belong; and instructing the data source object node to establish a second network security connection with the application through a second network IP address of the application, and sending the requested data to the application.
2. The intelligent virtual private network system of industrial internet of things according to claim 1, wherein the first network is a public internet and the second network is an industrial internet.
3. The intelligent virtual private network system of claim 1, wherein the second network comprises an independent domain name resolution server, and when each data source node is registered in the management platform, the domain name resolution server assigns the second network IP address to the data source node.
4. The industrial IoT intelligent VPN system according to claim 1, wherein the data management server of the management platform authorizing and authenticating the application at least comprises:
authenticating the identity information of the application; and/or
And performing permission examination on the data request content of the application.
5. The intelligent virtual private network system of the industrial internet of things according to claim 1, wherein the data management server is further configured to store data authorization files of the data source object nodes, find a data authorization file corresponding to the data source object node to which the requested data belongs when receiving a data request from an application, and perform authorization authentication on the application according to the data authorization file; and the data authorization file of each data source object node is set to the management platform by the owner of the data source object node.
6. The intelligent virtual private network system of industrial internet of things according to claim 5, wherein the data management server is further configured to, when receiving a data authorization file set by a data source node owner, request a data authorization backup file stored by the data source node corresponding to the data authorization file, compare the data authorization file with the received data authorization backup file, and if the data authorization file is consistent with the received data authorization backup file, store the data authorization file.
7. The intelligent virtual private network system of industrial internet of things according to claim 6, wherein the data management server is further configured to, when receiving the modified data authorization file from the owner of the data source object node, request the data source object node corresponding to the data authorization file to be modified for the data transmission authorization rule backup file stored therein, compare the received data authorization file with the data transmission authorization rule backup file, and if the received data authorization file is consistent with the data transmission authorization rule backup file, replace the original file with the modified data authorization file.
8. The intelligent virtual private network system of the industrial internet of things according to claim 7, wherein the data management server is further configured to request all data source node under the owner name for the backup file of the data transmission authorization rule stored in the data source node when the number of the data source node owned by the data source node owner is more than one; and comparing the data authorization files to be stored or replaced with the received data transmission authorization rule backup files one by one, and if the matching rate is greater than a preset value, storing or replacing the data authorization files.
9. The intelligent virtual private network system of industrial internet of things according to claim 5, wherein the management platform is further configured to verify the identity of the owner of the data source object node according to the identity information of the owner set during registration of the data source object node, and receive the data authorization file of the owner of the data source object node after passing the identity authentication of the owner of the data source object node.
10. The intelligent virtual private network system of the industrial internet of things as claimed in claim 1, wherein the second network security connection between the data source node and the application is: a unidirectional virtual private connection of the data source object node to the application.
11. The intelligent virtual private network system for industrial internet of things according to claim 1, wherein when the management platform sends the second network IP address of the application and the data request content to the data source object node to which the requested data belongs, the management platform further includes data set transmission control information; the data transmission control information includes one of the following or any combination thereof: data transmission starting time, data transmission time length, data transmission ending time, data transmission file type and connection establishing type; and instructing the data source object node to establish a second network security connection with the application within the range indicated by the transmission control information, and sending the requested data to the application.
12. The intelligent virtual private network system of the industrial internet of things according to claim 1, wherein the data source node at least includes data acquisition and storage functions for acquiring and storing industrial data information of each item of industrial control equipment, and the industrial data information at least includes one of the following items:
industrial data information generated in the operation process of the industrial control equipment and detection data information obtained by monitoring the industrial control equipment;
the application comes from the following devices: personal PCs, mobile terminals, cloud platforms, or central servers.
CN202210378720.6A 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things Pending CN114978583A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210378720.6A CN114978583A (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210378720.6A CN114978583A (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things
CN201810179579.0A CN110233814B (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810179579.0A Division CN110233814B (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things

Publications (1)

Publication Number Publication Date
CN114978583A true CN114978583A (en) 2022-08-30

Family

ID=67861658

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810179579.0A Active CN110233814B (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things
CN202210378720.6A Pending CN114978583A (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201810179579.0A Active CN110233814B (en) 2018-03-05 2018-03-05 Intelligent virtual private network system for industrial Internet of things

Country Status (1)

Country Link
CN (2) CN110233814B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102487383A (en) * 2010-12-02 2012-06-06 上海可鲁系统软件有限公司 Industrial internet distributed system safety access control device
US8259597B1 (en) * 2006-08-16 2012-09-04 Bally Gaming, Inc. System for managing IP addresses in a network gaming environment
CN103119907A (en) * 2010-07-21 2013-05-22 思杰系统有限公司 Systems and methods for providing a smart group
CN104767715A (en) * 2014-01-03 2015-07-08 华为技术有限公司 Network access control method and equipment
CN105871950A (en) * 2015-01-21 2016-08-17 上海可鲁系统软件有限公司 Method and system for managing industrial internet of things automatic access and data authorization
CN107231336A (en) * 2016-03-25 2017-10-03 中兴通讯股份有限公司 A kind of access control method, device and the gateway device of LAN Intranet resource
CN107426339A (en) * 2017-09-04 2017-12-01 珠海迈越信息技术有限公司 A kind of cut-in method, the apparatus and system of data interface channel

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478398B (en) * 2009-01-07 2010-12-22 中国人民解放军信息工程大学 Authorization management system oriented to resource management and establishing method
DE102010041804A1 (en) * 2010-09-30 2012-04-05 Siemens Aktiengesellschaft Method for secure data transmission with a VPN box
US9584427B2 (en) * 2014-08-19 2017-02-28 Citrix Systems, Inc. Systems and methods for providing fine grained control over MSS values of transport layer connections
US9491161B2 (en) * 2014-09-30 2016-11-08 Citrix Systems, Inc. Systems and methods for performing single sign-on by an intermediary device for a remote desktop session of a client

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8259597B1 (en) * 2006-08-16 2012-09-04 Bally Gaming, Inc. System for managing IP addresses in a network gaming environment
CN103119907A (en) * 2010-07-21 2013-05-22 思杰系统有限公司 Systems and methods for providing a smart group
CN102487383A (en) * 2010-12-02 2012-06-06 上海可鲁系统软件有限公司 Industrial internet distributed system safety access control device
CN104767715A (en) * 2014-01-03 2015-07-08 华为技术有限公司 Network access control method and equipment
CN105871950A (en) * 2015-01-21 2016-08-17 上海可鲁系统软件有限公司 Method and system for managing industrial internet of things automatic access and data authorization
CN107231336A (en) * 2016-03-25 2017-10-03 中兴通讯股份有限公司 A kind of access control method, device and the gateway device of LAN Intranet resource
CN107426339A (en) * 2017-09-04 2017-12-01 珠海迈越信息技术有限公司 A kind of cut-in method, the apparatus and system of data interface channel

Also Published As

Publication number Publication date
CN110233814B (en) 2022-05-17
CN110233814A (en) 2019-09-13

Similar Documents

Publication Publication Date Title
AU2019206006B2 (en) System and method for biometric protocol standards
US10212169B2 (en) Enforcing data security in a cleanroom data processing environment
US11930010B2 (en) Access control system and method
US9384362B2 (en) Method and system for distributing secrets
CA2955066C (en) Method and system for providing a virtual asset perimeter
US20160323323A1 (en) Method and apparatus for centralized policy programming and distributive policy enforcement
US10148637B2 (en) Secure authentication to provide mobile access to shared network resources
CN110069911B (en) Access control method, device, system, electronic equipment and readable storage medium
CN112948842A (en) Authentication method and related equipment
US20200186450A1 (en) Federated mobile device management
CN114422197A (en) Permission access control method and system based on policy management
CN114244568B (en) Security access control method, device and equipment based on terminal access behavior
US9143517B2 (en) Threat exchange information protection
US20150281281A1 (en) Identification of unauthorized application data in a corporate network
CN110233814B (en) Intelligent virtual private network system for industrial Internet of things
US20220255970A1 (en) Deploying And Maintaining A Trust Store To Dynamically Manage Web Browser Extensions On End User Computing Devices
CN111159736B (en) Application control method and system of block chain
CN110969321B (en) Industrial information asset management method and device
CN110233816A (en) A kind of industrial data assets authorization management method and equipment
US11423046B2 (en) Mechanism for replication and population of a data subset in Hadoop from a private network to a public cloud instance
US20220311777A1 (en) Hardening remote administrator access
CN105530279A (en) Data processing method and device
CN112685773A (en) Data distributed privacy protection method based on intelligent contracts and SGX
CN116800533A (en) Terminal identification method and device for accessing intranet
CN116467745A (en) Data query method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination