WO2019080478A1 - 一种rssp-ii安全协议分离部署方法 - Google Patents
一种rssp-ii安全协议分离部署方法Info
- Publication number
- WO2019080478A1 WO2019080478A1 PCT/CN2018/086259 CN2018086259W WO2019080478A1 WO 2019080478 A1 WO2019080478 A1 WO 2019080478A1 CN 2018086259 W CN2018086259 W CN 2018086259W WO 2019080478 A1 WO2019080478 A1 WO 2019080478A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- adaptation layer
- rssp
- security
- protocol stack
- layer
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/76—Adapting program code to run in a different environment; Porting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
Definitions
- the present disclosure relates to the field of secure communication technologies, and in particular, to a method for separating and deploying an RSSP-II security protocol.
- safety information needs to be transmitted between a variety of security devices, both in the closed communication network between the ground devices, and in the in-vehicle device and the ground device bracket to exchange data through the open network.
- the transmission of information in the communication network requires certain technical means to achieve certain security standards in order to ensure the security and reliability of the information itself.
- the RSSP-II secure communication protocol is a widely used secure communication transmission protocol specification based on Ethernet communication. Its structure is shown in Figure 1 to Figure 2. It can be applied to closed transmission systems and open transmission systems, and is applied to high-speed rail and intercity. Railway and urban rail traffic signal control systems.
- each unit contains an A/B machine.
- the second type distinguishes the security function from the non-security function, and each system includes a security logic processing unit A/B machine and a communication unit C machine.
- the logical processing unit A/B machine assumes the security function
- the communication unit C does not undertake the security function
- the logical processing unit and the communication unit perform data interaction through the Ethernet mode.
- the purpose of the disclosure is to provide a separate deployment method for the RSSP-II security protocol, so as to improve the diversity of the deployed RSSP-II secure communication protocol and implement separate deployment of different architecture platforms.
- the technical solution adopted by the present disclosure is to provide a method for separating and deploying an RSSP-II security protocol, including the following steps:
- the adaptation layer includes a system adaptation layer, a network adaptation layer, and an application adaptation layer.
- the function module of the RSSP-II of the protocol stack is compiled into a library file and deployed to the A, B, and C machines by using the corresponding adaptation layer, which specifically includes:
- the adaptation layer added to the protocol stack is the system adaptation layer and the network. Adaptation layer and application adaptation layer;
- the security related module of the protocol stack RSSP-II is compiled into a library file and deployed to the A/B machine, and the non-security module is compiled into a library file and deployed to the C machine, wherein, AB
- the machine adds a system adaptation layer and an application adaptation layer to the protocol stack
- the C machine adds a network adaptation layer and an application adaptation layer to the protocol stack.
- the function module of all RSSP-IIs of the protocol stack is compiled into a library file and deployed to the A, B, and C machines by using the corresponding adaptation layer, and includes:
- the security related module MASL layer of the protocol stack RSSP-II is separately compiled into the SFM module of Subset-037, and deployed in the A/B machine, wherein the system adaptation layer and the application adaptation layer are added to the protocol stack.
- the function module of all RSSP-IIs of the protocol stack is compiled into a library file and deployed to the A, B, and C machines by using the corresponding adaptation layer, and includes:
- the SFM module of Subset-037 shares the security related module MASL layer with the protocol stack RSSP-II, and the SFM module and the MASL layer are compiled into library files and deployed to the A/B machine. Among them, the system adaptation layer is added to the A/B machine. , network adaptation layer and application adaptation layer.
- the present disclosure Compared with the prior art, the present disclosure has the following technical effects: the present disclosure develops a series of adaptation layers around the core logic layer of the RSSP-II secure communication protocol, and then adds the protocol stack according to the architecture of the target platform and the types of functional modules. The corresponding adaptation layer and the different functional modules are compiled into library files for deployment to the platform, so that the RSSP-II communication protocol can be developed as a universal security software protocol library for cross-platform portability, and protocol deployment for different architecture platforms is realized. .
- FIG. 1 is a schematic structural diagram of an RSSP-II secure communication protocol as described in the background section of the present disclosure
- FIG. 2 is a schematic diagram of a core logic layer of an RSSP-II secure communication protocol stack as described in the background section of the present disclosure
- FIG. 3 is a schematic diagram showing the structure of a security computer including an A/B machine in each of the systems described in the background section of the present disclosure
- FIG. 4 is a schematic diagram showing the structure of a security computer including an A/B machine and a C machine in each of the systems described in the background section of the present disclosure
- FIG. 5 is a schematic flowchart of a method for separating and deploying an RSSP-II security protocol in the present disclosure
- FIG. 6 is a schematic diagram of a separate deployment architecture of a secure communication protocol stack module that does not distinguish between a security function and a non-security function in the present disclosure
- FIG. 7 is a schematic diagram of a module architecture for deploying a security related module in an A/B machine in the present disclosure
- FIG. 8 is a schematic diagram of a module architecture for deploying a non-secure module in a C machine in the present disclosure
- FIG. 9 is a schematic diagram of an architecture in which an SFM module that separately compiles a security-related module MASL layer of a protocol stack RSSP-II into a Subset-037 is deployed in an A/B machine;
- FIG. 10 is a schematic diagram of a software architecture of a secure communication protocol stack implemented simultaneously with the RSSP-II and Subset-037 functions in the present disclosure.
- this embodiment discloses a method for separating and deploying an RSSP-II security protocol, including the following steps S1 to S2:
- the adaptation layer added to the protocol stack in this case is a system adaptation layer, a network adaptation layer, and an application adaptation layer.
- the A/B machine adds a system adaptation layer and an application adaptation layer to the protocol stack
- the C machine adds a network adaptation layer and an application adaptation layer to the protocol stack.
- T-IF Adaption Layer shown in FIG. 8 is used to implement the T primitive cache mechanism for the MASL layer and the ALE layer, or the MASL layer and the Subset-037 CFM module. Information interaction.
- the security related module MASL layer of the protocol stack RSSP-II is separately compiled into the SFM module of Subset-037, and deployed in the A/B machine, wherein the system adaptation layer is added to the protocol stack and Apply the adaptation layer.
- the Sa-Adaption Layer (SAAL) is used to implement the Sa primitive caching mechanism for information interaction with the MASL layer and the Subset-037 application layer program; the T interface adaptation layer (T -IF Adaption Layer), used to implement the T primitive cache mechanism for implementing information exchange between Subset-037SFM and CFM modules.
- SAAL Sa-Adaption Layer
- T -IF Adaption Layer T interface adaptation layer
- the SFM module of Subset-037 and the protocol stack RSSP-II share the security related module MASL layer, and the SFM module and the MASL layer are compiled into a library file and deployed to the A/B machine, where Add a system adaptation layer, a network adaptation layer, and an application adaptation layer to the A/B machine.
- the security function module can also be deployed in the security device A/B machine, and the non-security part is deployed in the non-security device C machine, and the system adaptation layer and application need to be added for the A/B machine.
- the adaptation layer adds a system adaptation layer and a network adaptation layer to the C machine.
- the Sa-adaptive layer is used to implement the Sa primitive caching mechanism for information interaction with the MASL layer and the Subset-037 application layer program; wherein the application adaptation layer is used to implement the SAI primitive caching mechanism. It is used for information interaction between the SAI module and the application layer program; the T interface adaptation layer is used to implement the T primitive cache mechanism for implementing information exchange between the Subset-037SFM and the CFM module.
Landscapes
- Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Communication Control (AREA)
Abstract
本公开公开了一种 RSSP-I I 安全协议分离部署方法,包括为协议栈增加不同的适配层;利用相应的适配层,将协议栈所有 RSSP-I I 的功能模块编译为库文件部署至 A、B 和 C 机中。本公开实现了对不同架构平台的协议部署。
Description
本申请要求于2017年10月25日递交的中国专利申请第201711007878.8号的优先权,在此全文引用上述中国专利申请公开的内容以作为本申请的一部分。
本公开涉及安全通信技术领域,特别涉及一种RSSP-II安全协议分离部署方法。
在轨道交通信号控制系统中,安全信息需要在多种安全设备之间进行传递,既有地面设备之间在封闭通信网络中的通信,也有车载设备与地面设备支架通过开放网络交换数据。信息在通信网络中的传输,需要采取一定的技术手段,达到一定的安全标准,才能保证信息本身的安全性和可靠性。
RSSP-II安全通信协议是广泛应用的基于以太网通信的安全通信传输协议规范,其结构示意图如图1至图2所示,可应用于封闭传输系统和开放传输系统,应用于高铁、城际铁路以及城轨交通信号控制系统中。
在现有的铁路安全计算机系统中,多采用二乘二取二计算机结构,双套冗余设计,一般为两种平台实现方法:如图3所示,第一种不区分安全功能和非安全功能,每系均包含A/B机。如图4所示,第二种将安全功能与非安全功能区分开来,每系均包含安全逻辑处理单元A/B机和通信单元C机。其中,逻辑处理单元A/B机承担安全功能,通信单元C机不承担安全功能,逻辑处理单元和通信单元之间通过以太网方式进行数据交互。
但是,当前在部署RSSP-II安全通信协议的时候,由于实际环境中的平台结构不同,当前部署的RSSP-II安全通信协议的方法无法满足不同平台结构的需求。
发明内容
本公开的目的在于提供一种RSSP-II安全协议分离部署方法,以提高部署的RSSP-II安全通信协议的多样性,实现对不同架构平台的分离部署。
为实现以上目的,本公开采用的技术方案为:提供一种RSSP-II安全协议分离部署方法,包括如下步骤:
为协议栈增加不同的适配层;
利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中。
其中,适配层包括系统适配层、网络适配层和应用适配层。
其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,具体包括:
在不区分安全功能和非安全功能时,将协议栈所有RSSP-II的功能模块编译为库文件部署至A/B机中,其中,为协议栈增加的适配层为系统适配层、网络适配层和应用适配层;
在区分安全功能和非安全功能时,将协议栈RSSP-II的安全相关模块编译为库文件部署至A/B机中,以及将非安全模块编译为库文件部署至C机中,其中,AB机为协议栈增加系统适配层和应用适配层,C机为协议栈增加网络适配层和应用适配层。
其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,还包括:
将协议栈RSSP-II的安全相关模块MASL层单独编译为Subset-037的SFM模块,并部署在A/B机中,其中为协议栈增加系统适配层和应用适配层。
其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,还包括:
Subset-037的SFM模块与协议栈RSSP-II共享安全相关模块MASL层,并将SFM模块、MASL层编译为库文件部署至A/B机中,其中,为A/B机增加系统适配层、网络适配层和应用适配层。
与现有技术相比,本公开存在以下技术效果:本公开在RSSP-II安全通信协议核心逻辑层周边开发一系列适配层,然后根据目标平台的架构和功能模块的类型,为协议栈增加对应的适配层并将不同功能模块编译为库文件部署至平台中,如此可将RSSP-II通信协议开发为跨平台可移植性的通用安全软件协议库,实现了对不同架构平台的协议部署。
下面结合附图,对本公开的具体实施方式进行详细描述:
图1是本公开背景技术部分述及的RSSP-II安全通信协议结构示意图;
图2是本公开背景技术部分述及的RSSP-II安全通信协议栈核心逻辑分层示意图;
图3是本公开背景技术部分述及的每系均包括A/B机的安全计算机结构示意图;
图4是本公开背景技术部分述及的每系均包括A/B机和C机的安全计算机结构示意图;
图5是本公开中一种RSSP-II安全协议分离部署方法的流程示意图;
图6是本公开中不区分安全功能和非安全功能的安全通信协议栈模块分离部署架构示意图;
图7是本公开中将安全相关模块部署在A/B机中的模块架构示意图;
图8是本公开中将非安全模块部署在C机中的模块架构示意图;
图9是本公开中将协议栈RSSP-II的安全相关模块MASL层单独编译为Subset-037的SFM模块部署在A/B机中的架构示意图;
图10是本公开中RSSP-II与Subset-037功能同时实现的安全通信协议栈软件架构示意图。
为了更进一步说明本公开的特征,请参阅以下有关本公开的详细说明与附图。所附图仅供参考与说明之用,并非用来对本公开的保护范围加以限制。
如图5所示,本实施例公开了一种RSSP-II安全协议分离部署方法,包括如下步骤S1至S2:
S1、为协议栈增加不同的适配层;
S2、利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中。
需要说明的是,本实施例中针对目标架构平台和功能模块的不同,对软件协议栈的移植可采用如下四种方式:
(1)如图6所示,在不区分安全功能和非安全功能时,将协议栈所有RSSP-II的功能模块编译为库文件部署至A/B机中,即将RSSP-II全部的功能模块SAI层、MASL层和ALE层全部编译为库文件部署到A/B机中。
需要说明的是,在这种情况下为协议栈增加的适配层为系统适配层、网络适配层和应用适配层。
(2)在区分安全功能和非安全功能时,将协议栈RSSP-II的安全相关模块即SAI层和MASL层编译为库文件部署至A/B机中,参见图7,以及将非安全模块即ALE层编译为库文件部署至C机中,参见图8。
需要说明的是,在这种情况下,A/B机为协议栈增加系统适配层和应用适配层,C机为协议栈增加网络适配层和应用适配层。
还需要说明的是,图8中所示的T接口适配层(T-IF Adaption Layer),用于实现T原语缓存机制,用于MASL层与ALE层,或MASL层与Subset-037CFM模块间进行信息交互。
(3)如图9所示,将协议栈RSSP-II的安全相关模块MASL层单独编译为Subset-037的SFM模块,并部署在A/B机中,其中为协议栈增加系统适配层和应用适配层。
需要说明的是,Sa-适配层(SAAL,Sa-Adaption Layer)用于实现Sa原语缓存机制,用于与MASL层与Subset-037应用层程序进行信息交互;T接口适配层(T-IF Adaption Layer),用于实现T原语缓存机制,用于实现Subset-037SFM与CFM模块间的信息交互。
(4)如图10所示,将Subset-037的SFM模块与协议栈RSSP-II共享安全相关模块MASL层,并将SFM模块、MASL层编译为库文件部署至A/B机中,其中,为A/B机增加系统适配层、网络适配层和应用适配层。
需要说明的是,该种方式中也可将安全功能模块部署在安全设备A/B机中,非安全部分部署在非安全设备C机中,需要为A/B机增加系统适配层和应用适配层,为C机增加系统适配层和网络适配层。
如图10所示,Sa-适配层用于实现Sa原语缓存机制,用于与MASL层与Subset-037应用层程序进行信息交互;其中,应用适配层用于实现SAI原语缓存机制,用于SAI模块与应用层程序进行信息交互;T接口适配层,用于实现T原语缓存机制,用于实现Subset-037SFM与CFM模块间的信息交互。
需要说明的是,本实施例提供的一种RSSP-II安全协议分离部署方法,具有如下有益效果:
(1)通过开发一系列的适配层,可针对不同架构平台和功能模块,实现不同架构平台的协议部署。
(2)针对不同的应用场景,将RSSP-II通信协议的安全功能部分和非安全功能部分进行分离部署,极大的提高了RSSP-II通信协议的安全性。
以上所述仅为本公开的较佳实施例,并不用以限制本公开,凡在本公开的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本公开的保护范围之内。
Claims (5)
- 一种RSSP-II安全协议分离部署方法,其中,包括:为协议栈增加不同的适配层;利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中。
- 如权利要求1所述的RSSP-II安全协议分离部署方法,其中,所述的适配层包括系统适配层、网络适配层和应用适配层。
- 如权利要求1-2任一所述的RSSP-II安全协议分离部署方法,其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,具体包括:在不区分安全功能和非安全功能时,将协议栈所有RSSP-II的功能模块编译为库文件部署至A/B机中,其中,为协议栈增加的适配层为系统适配层、网络适配层和应用适配层;在区分安全功能和非安全功能时,将协议栈RSSP-II的安全相关模块编译为库文件部署至A/B机中,以及将非安全模块编译为库文件部署至C机中,其中,A/B机为协议栈增加系统适配层和应用适配层,C机为协议栈增加网络适配层和应用适配层。
- 如权利要求1-3任一所述的RSSP-II安全协议分离部署方法,其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,还包括:将协议栈RSSP-II的安全相关模块MASL层单独编译为Subset-037的SFM模块,并部署在A/B机中,其中为协议栈增加系统适配层和应用适配层。
- 如权利要求1-4任一所述的RSSP-II安全协议分离部署方法,其中,所述的利用相应的适配层,将协议栈所有RSSP-II的功能模块编译为库文件部署至A、B和C机中,还包括:Subset-037的SFM模块与协议栈RSSP-II共享安全相关模块MASL层,并将SFM模块、MASL层编译为库文件部署至A/B机中,其中,为A/B机增加系统适配层、网络适配层和应用适配层。
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
HRP20211475TT HRP20211475T1 (hr) | 2017-10-25 | 2018-05-10 | Postupak razdvajanja i implementacije rssp-ii sigurnosnog protokola |
EP18870869.7A EP3703328B1 (en) | 2017-10-25 | 2018-05-10 | Rssp-ii security protocol separation and deployment method |
RS20211300A RS62470B1 (sr) | 2017-10-25 | 2018-05-10 | Postupak razdvajanja i implementacije rssp-ii sigurnosnog protokola |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711007878.8 | 2017-10-25 | ||
CN201711007878.8A CN107979587B (zh) | 2017-10-25 | 2017-10-25 | 一种rssp-ii安全协议分离部署方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019080478A1 true WO2019080478A1 (zh) | 2019-05-02 |
Family
ID=62012706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/086259 WO2019080478A1 (zh) | 2017-10-25 | 2018-05-10 | 一种rssp-ii安全协议分离部署方法 |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP3703328B1 (zh) |
CN (1) | CN107979587B (zh) |
HR (1) | HRP20211475T1 (zh) |
HU (1) | HUE056071T2 (zh) |
RS (1) | RS62470B1 (zh) |
WO (1) | WO2019080478A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107979587B (zh) * | 2017-10-25 | 2020-02-14 | 北京全路通信信号研究设计院集团有限公司 | 一种rssp-ii安全协议分离部署方法 |
CN109640287A (zh) * | 2018-12-11 | 2019-04-16 | 西安理工大学 | 一种基于rssp-ii协议的时钟偏移预警方法 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1276672A (zh) * | 1999-06-08 | 2000-12-13 | 国际商业机器公司 | 基于手持设备的证券交易系统和方法 |
CN101820361A (zh) * | 2010-03-26 | 2010-09-01 | 中兴通讯股份有限公司 | 一种实现对多协议通信组件管理的方法及装置 |
CN103051616A (zh) * | 2012-12-17 | 2013-04-17 | 中国科学院信息工程研究所 | 一种基于rssp--ii协议的数据报传输方法 |
CN103984561A (zh) * | 2014-06-03 | 2014-08-13 | 烽火通信科技股份有限公司 | 统一交换平台上单盘驱动层与应用层适配的方法及系统 |
CN107979587A (zh) * | 2017-10-25 | 2018-05-01 | 北京全路通信信号研究设计院集团有限公司 | 一种rssp-ii安全协议分离部署方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101415251B (zh) * | 2008-11-25 | 2010-09-29 | 中兴通讯股份有限公司 | 基于蓝牙的数据传输实现装置 |
CN102238231B (zh) * | 2011-05-16 | 2013-12-18 | 铁道部运输局 | Ctcs-3级无线闭塞中心设备及系统 |
CN102395138A (zh) * | 2011-09-29 | 2012-03-28 | 中国科学技术大学 | 一种6LoWPAN的协议一致性测试仪表及方法 |
-
2017
- 2017-10-25 CN CN201711007878.8A patent/CN107979587B/zh active Active
-
2018
- 2018-05-10 HU HUE18870869A patent/HUE056071T2/hu unknown
- 2018-05-10 WO PCT/CN2018/086259 patent/WO2019080478A1/zh unknown
- 2018-05-10 EP EP18870869.7A patent/EP3703328B1/en active Active
- 2018-05-10 RS RS20211300A patent/RS62470B1/sr unknown
- 2018-05-10 HR HRP20211475TT patent/HRP20211475T1/hr unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1276672A (zh) * | 1999-06-08 | 2000-12-13 | 国际商业机器公司 | 基于手持设备的证券交易系统和方法 |
CN101820361A (zh) * | 2010-03-26 | 2010-09-01 | 中兴通讯股份有限公司 | 一种实现对多协议通信组件管理的方法及装置 |
CN103051616A (zh) * | 2012-12-17 | 2013-04-17 | 中国科学院信息工程研究所 | 一种基于rssp--ii协议的数据报传输方法 |
CN103984561A (zh) * | 2014-06-03 | 2014-08-13 | 烽火通信科技股份有限公司 | 统一交换平台上单盘驱动层与应用层适配的方法及系统 |
CN107979587A (zh) * | 2017-10-25 | 2018-05-01 | 北京全路通信信号研究设计院集团有限公司 | 一种rssp-ii安全协议分离部署方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP3703328A4 |
Also Published As
Publication number | Publication date |
---|---|
CN107979587A (zh) | 2018-05-01 |
EP3703328A1 (en) | 2020-09-02 |
HRP20211475T1 (hr) | 2021-12-24 |
EP3703328A4 (en) | 2020-10-28 |
HUE056071T2 (hu) | 2022-01-28 |
EP3703328B1 (en) | 2021-09-08 |
CN107979587B (zh) | 2020-02-14 |
RS62470B1 (sr) | 2021-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10814893B2 (en) | Vehicle control system | |
US20190322298A1 (en) | Locomotive control system | |
EP3987729B1 (en) | Plug and play at sites using tloc-extension | |
US10609029B2 (en) | High assurance segregated gateway interconnecting different domains | |
CN102255903B (zh) | 一种云计算虚拟网络与物理网络隔离安全方法 | |
CN107968775B (zh) | 数据处理方法、装置、计算机设备及计算机可读存储介质 | |
CN103907102B (zh) | 管理管芯上的系统组织结构中的边带路由器 | |
US10462103B2 (en) | High assurance security gateway interconnecting different domains | |
CN1761240A (zh) | 用于高度可实现性应用的智能集成网络安全设备 | |
CN116055254B (zh) | 一种安全可信网关系统、控制方法、介质、设备及终端 | |
WO2019080478A1 (zh) | 一种rssp-ii安全协议分离部署方法 | |
US11995021B2 (en) | Zoned accelerator embedded processing | |
JP2002533792A (ja) | 信頼された内部ネットワ−クの作動を保護方法およびシステム | |
CN108572638B (zh) | 用于安全系统的fpga不匹配数据包的停止 | |
CN111163004A (zh) | 服务链数据处理方法、装置和计算机设备 | |
US10992689B2 (en) | Systems and methods for relating network intrusions to passenger-owned devices | |
US11652802B2 (en) | Policy based personally identifiable information leakage prevention in cloud native enviroments | |
WO2019091073A1 (zh) | 一种rssp-i安全协议分离部署方法 | |
Ahmadian et al. | Distributed Real-Time Architecture for Mixed-Criticality Systems | |
US11991146B2 (en) | Method and transmission device for data transmission between two or more networks | |
Darragi et al. | Architecture description language for cyber physical systems analysis: a railway control system case study | |
CA3091402A1 (en) | System and method for providing a digital intersection | |
US8881260B1 (en) | High assurance guard for security applications utilizing authentication and authorization services for sources of network data | |
Hov | Design and implementation of hardware and software interfaces for a hyperspectral payload in a small | |
US20220116403A1 (en) | Telemetry restriction mechanism |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18870869 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2018870869 Country of ref document: EP Effective date: 20200525 |