CN111970698A - Industrial field weak network environment optimization method - Google Patents
Industrial field weak network environment optimization method Download PDFInfo
- Publication number
- CN111970698A CN111970698A CN202010785941.6A CN202010785941A CN111970698A CN 111970698 A CN111970698 A CN 111970698A CN 202010785941 A CN202010785941 A CN 202010785941A CN 111970698 A CN111970698 A CN 111970698A
- Authority
- CN
- China
- Prior art keywords
- access
- access device
- access point
- identity
- authorization level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种工业领域弱网环境优化方法,包括以下步骤:S1、建立一个无线局域网;S2、手动或自动选择一个接入点接入;S3、授权级别模块对接入设备身份ID进行授权级别识别;S4、接入设备可以使用对其开放的各个权限功能,工业设备记录将接入设备的身份ID和使用操作记录生成操作事件并存储。本发明可以快速有效的实现网络的手动、自动接入,并根据接入设备身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。
The invention discloses a method for optimizing a weak network environment in the industrial field, comprising the following steps: S1, establishing a wireless local area network; S2, manually or automatically selecting an access point to access; S3, an authorization level module performing an identification ID of an access device. Authorization level identification; S4, the access device can use various permission functions open to it, and the industrial device record will generate and store the identity ID of the access device and the use operation record to generate and store operation events. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID of the access device, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access device to realize the mark positioning, thereby Statistics of various industrial production data.
Description
技术领域technical field
本发明属于网络技术领域,具体涉及一种工业领域弱网环境优化方法。The invention belongs to the field of network technology, and in particular relates to a method for optimizing a weak network environment in the industrial field.
背景技术Background technique
随着互联网技术的发展,无线局域网(Wireless Local Area Network,WLAN)组网技术得到了迅猛发展,通过部署多个接入点(Access Point,AP)的方式建立一个单独的WLAN网络,然后提供无线接入服务。目前,无线网络普遍应用在办公系统中,而在工业领域中的应用,特别是车间层弱网环境的优化还没有很好的解决方案。With the development of Internet technology, the wireless local area network (WLAN) networking technology has developed rapidly. A single WLAN network is established by deploying multiple access points (APs), and then provides wireless access service. At present, wireless networks are widely used in office systems, but there is no good solution for applications in the industrial field, especially the optimization of the weak network environment in the workshop layer.
发明内容SUMMARY OF THE INVENTION
为解决现有技术存在的缺陷,本发明提供一种工业领域弱网环境优化方法。In order to solve the defects existing in the prior art, the present invention provides a method for optimizing a weak network environment in the industrial field.
为了解决上述技术问题,本发明提供了如下的技术方案:In order to solve the above-mentioned technical problems, the present invention provides the following technical solutions:
本发明提供一种工业领域弱网环境优化方法,包括以下步骤:The invention provides a method for optimizing a weak network environment in the industrial field, comprising the following steps:
S1、每个工业设备部署接入点,与相邻的接入点一起组成无线局域网;S1. Each industrial device deploys an access point to form a wireless local area network with adjacent access points;
S2、接入设备获取当前无线局域网覆盖的各个接入点的地址,然后根据各个接入点的信号强度手动或自动选择一个接入点接入;S2, the access device obtains the addresses of each access point covered by the current wireless local area network, and then manually or automatically selects an access point to access according to the signal strength of each access point;
S3、工业设备获取接入设备的身份ID,授权级别模块对身份ID进行授权级别识别,若识别成功,则将对应等级的权限功能向接入设备开放;若识别失败,则发出报警,并将接入设备的身份ID和接入操作记录生成预警事件存储;其中,授权级别模块中由上至下设有至少一个授权级别,授权级别的等级由上至下为由高到低;S3. The industrial device obtains the identity ID of the access device, and the authorization level module identifies the authorization level of the identity ID. If the identification is successful, the corresponding level of authority function is opened to the access device; if the identification fails, an alarm is issued and an alarm is sent to the access device. The identity ID of the access device and the access operation record generate early warning event storage; wherein, the authorization level module is provided with at least one authorization level from top to bottom, and the level of authorization level is from high to low from top to bottom;
S4、接入设备使用对其开放的各个权限功能,工业设备将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储。S4 , the access device uses each permission function open to it, and the industrial device generates and stores the access device's identity ID and usage operation record to generate and store the access device operation event.
作为本发明的一种优选技术方案,步骤S2中手动选择一个接入点接入时,若该接入点连接的接入设备个数在设定阈值内,则将接入成功;若该接入点连接的接入设备个数超过设定阈值,则发出提示,并重新选择接入点直至接入成功。As a preferred technical solution of the present invention, when an access point is manually selected for access in step S2, if the number of access devices connected to the access point is within the set threshold, the access will be successful; If the number of access devices connected to the access point exceeds the set threshold, a prompt will be issued, and the access point will be reselected until the access is successful.
作为本发明的一种优选技术方案,步骤S2中自动选择一个接入点接入时,选择接入点连接的接入设备个数在设定阈值内且信号最强的接入点接入。As a preferred technical solution of the present invention, when an access point is automatically selected for access in step S2, the access point with the strongest signal and the number of access devices connected to the access point is selected for access.
作为本发明的一种优选技术方案,步骤S3中授权级别模块对身份ID进行授权级别识别时按照由下至上的等级依次进行识别,记录业务事件数据存储以便进行后期分析。本方法可以识别并过滤非法访问或者网络攻击。As a preferred technical solution of the present invention, in step S3, the authorization level module identifies the authorization level of the identity ID according to the order from bottom to top, and records the business event data for later analysis. The method can identify and filter illegal access or network attacks.
作为本发明的一种优选技术方案,步骤S4中权限功能包括查看功能、演示功能和作业功能,工业设备将接入设备的身份ID分别和查看操作记录、演示操作记录、作业操作记录生成接入设备查看操作事件、接入设备演示操作事件和接入设备作业操作事件并存储,查看操作记录包括查看操作动作和每个动作时长,演示操作包括演示操作动作和每个动作时长,作业操作包括作业操作动作和每个动作时长。As a preferred technical solution of the present invention, in step S4, the authority function includes a viewing function, a demonstration function and an operation function, and the industrial equipment generates and accesses the identity ID of the access device with the viewing operation record, the demonstration operation record, and the operation operation record, respectively. Device viewing operation events, access device demonstration operation events, and access device job operation events are stored and stored. Viewing operation records includes viewing operation actions and the duration of each action. Demonstration operations include demonstrating operation actions and the duration of each action. Job operations include jobs. Actions and the duration of each action.
本发明相较于现有技术,具有以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:
本发明中每个工业设备建立一个无线局域网,接入设备选择接入点接入时,授权级别模块对身份ID进行授权级别识别,然后将对应等级的权限功能向接入设备开放,最后将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储。本发明可以快速有效的实现网络的手动、自动接入,并根据身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。In the present invention, each industrial device establishes a wireless local area network. When the access device selects the access point to access, the authorization level module identifies the authorization level of the identity ID, and then opens the corresponding level of authorization function to the access device. The identity ID of the access device and the use operation record are used to generate and store the access device operation event. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access equipment to realize the mark positioning, so as to count the various items. Industrial production data.
附图说明Description of drawings
图1是本发明一种工业领域弱网环境优化方法的工作流程图。FIG. 1 is a working flow chart of a method for optimizing a weak network environment in an industrial field according to the present invention.
具体实施方式Detailed ways
以下结合附图对本发明的优选实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本发明,并不用于限定本发明。The preferred embodiments of the present invention will be described below with reference to the accompanying drawings. It should be understood that the preferred embodiments described herein are only used to illustrate and explain the present invention, but not to limit the present invention.
为了达到本发明的目的,如图1所示,在本发明的其中一种实施方式中提供一种工业领域弱网环境优化方法,包括以下步骤:In order to achieve the purpose of the present invention, as shown in FIG. 1 , in one of the embodiments of the present invention, a method for optimizing a weak network environment in the industrial field is provided, comprising the following steps:
S1、每个工业设备部署接入点,与相邻的接入点建立一个无线局域网;S1. Each industrial device deploys an access point, and establishes a wireless local area network with adjacent access points;
S2、接入设备获取当前无线局域网覆盖的各个接入点的地址,然后根据各个接入点的信号强度手动或自动选择一个接入点接入;S2, the access device obtains the addresses of each access point covered by the current wireless local area network, and then manually or automatically selects an access point to access according to the signal strength of each access point;
具体的,手动选择一个接入点接入时,若该接入点连接的接入设备个数在设定阈值内,则将接入成功;若该接入点连接的接入设备个数超过设定阈值,则发出提示,并重新选择接入点直至接入成功;Specifically, when manually selecting an access point for access, if the number of access devices connected to the access point is within the set threshold, the access will be successful; if the number of access devices connected to the access point exceeds If the threshold is set, a prompt will be issued, and the access point will be re-selected until the access is successful;
具体的,自动选择一个接入点接入时,选择接入点连接的接入设备个数在设定阈值内且信号最强的接入点接入;Specifically, when an access point is automatically selected for access, the access point with the strongest signal and the number of access devices connected to the access point is selected for access;
S3、工业设备获取接入设备的身份ID,授权级别模块对身份ID进行授权级别识别,若识别成功,则将对应等级的权限功能向接入设备开放;若识别失败,则发出报警,并将接入设备的身份ID和接入操作记录生成预警事件存储;其中,授权级别模块中由上至下设有至少一个授权级别,授权级别的等级由上至下为由高到低,授权级别模块对身份ID进行授权级别识别时按照由下至上的等级依次进行识别;S3. The industrial device obtains the identity ID of the access device, and the authorization level module identifies the authorization level of the identity ID. If the identification is successful, the corresponding level of authority function is opened to the access device; if the identification fails, an alarm is issued and an alarm is sent to the access device. The identity ID of the access device and the access operation record generate early warning event storage; wherein, there is at least one authorization level in the authorization level module from top to bottom, and the level of authorization level is from high to low from top to bottom, and the authorization level module When identifying the authorization level of the identity ID, the identification is performed in order from the bottom to the top;
S4、接入设备使用对其开放的各个权限功能,工业设备将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储;S4. The access device uses each permission function opened to it, and the industrial device generates and stores the access device operation event by using the identity ID and use operation record of the access device;
具体的,权限功能包括查看功能、演示功能和作业功能,工业设备将接入设备的身份ID分别和查看操作记录、演示操作记录、作业操作记录生成接入设备查看操作事件、接入设备演示操作事件和接入设备作业操作事件并存储,查看操作记录包括查看操作动作和每个动作时长,演示操作包括演示操作动作和每个动作时长,作业操作包括作业操作动作和每个动作时长。Specifically, the permission functions include the viewing function, the demonstration function, and the operation function. The industrial equipment separates the identity ID of the access device from the viewing operation record, the demonstration operation record, and the operation operation record to generate the access device viewing operation event and the access device demonstration operation. Events and access device job operation events are stored. Viewing operation records includes viewing operation actions and the duration of each action. Demonstration operations include demonstration operation actions and the duration of each action. Job operations include job operation actions and the duration of each action.
本发明可以快速有效的实现网络的手动、自动接入,并根据身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access equipment to realize the mark positioning, so as to count the various items. Industrial production data.
最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, the The technical solutions described in the foregoing embodiments may be modified, or some technical features thereof may be equivalently replaced. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.
Claims (5)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010785941.6A CN111970698B (en) | 2020-08-07 | 2020-08-07 | Industrial field weak network environment optimization method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010785941.6A CN111970698B (en) | 2020-08-07 | 2020-08-07 | Industrial field weak network environment optimization method |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN111970698A true CN111970698A (en) | 2020-11-20 |
| CN111970698B CN111970698B (en) | 2023-04-07 |
Family
ID=73364744
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010785941.6A Expired - Fee Related CN111970698B (en) | 2020-08-07 | 2020-08-07 | Industrial field weak network environment optimization method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111970698B (en) |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050086346A1 (en) * | 2003-10-17 | 2005-04-21 | Meyer Jeffrey D. | Access point coupling guests to the internet |
| CN101889464A (en) * | 2007-10-08 | 2010-11-17 | 高通股份有限公司 | Access terminal configuration and access control |
| CN103415026A (en) * | 2013-07-03 | 2013-11-27 | 深圳Tcl新技术有限公司 | Networking method and device of wireless local area network |
| CN104363585A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Wireless local area network access method |
| WO2015099607A1 (en) * | 2013-12-26 | 2015-07-02 | Certis Cisco Security Pte Ltd | An integrated access control and identity management system |
| CN105873237A (en) * | 2015-08-05 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and device for building wireless connection |
| CN106686754A (en) * | 2016-12-06 | 2017-05-17 | 厦门中控生物识别信息技术有限公司 | Data interaction method and data interaction system |
| US20180260553A1 (en) * | 2013-05-13 | 2018-09-13 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
-
2020
- 2020-08-07 CN CN202010785941.6A patent/CN111970698B/en not_active Expired - Fee Related
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050086346A1 (en) * | 2003-10-17 | 2005-04-21 | Meyer Jeffrey D. | Access point coupling guests to the internet |
| CN101889464A (en) * | 2007-10-08 | 2010-11-17 | 高通股份有限公司 | Access terminal configuration and access control |
| US20180260553A1 (en) * | 2013-05-13 | 2018-09-13 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
| CN103415026A (en) * | 2013-07-03 | 2013-11-27 | 深圳Tcl新技术有限公司 | Networking method and device of wireless local area network |
| WO2015099607A1 (en) * | 2013-12-26 | 2015-07-02 | Certis Cisco Security Pte Ltd | An integrated access control and identity management system |
| CN104363585A (en) * | 2014-10-27 | 2015-02-18 | 深圳市金立通信设备有限公司 | Wireless local area network access method |
| CN105873237A (en) * | 2015-08-05 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and device for building wireless connection |
| CN106686754A (en) * | 2016-12-06 | 2017-05-17 | 厦门中控生物识别信息技术有限公司 | Data interaction method and data interaction system |
Non-Patent Citations (3)
| Title |
|---|
| DUC KHAI LAM;YASUHIRO SHINOZAKI: ""A fast and safety industrial WLAN protocol for factory communication systems"", 《2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT)》 * |
| 倪春鹏: "适用于工厂自动化的无线网络通讯技术", 《自动化与仪器仪表》 * |
| 机械工业信息研究院: "IT―Powered无线网络 WLAN在工业领域的新机遇", 《电气应用》 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111970698B (en) | 2023-04-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106452955B (en) | A kind of detection method and system of abnormal network connection | |
| CN106034054A (en) | Redundant access control list ACL rule file detection method and apparatus thereof | |
| CN110661811A (en) | Firewall policy management method and device | |
| CN100550768C (en) | An information security management platform | |
| CN109714206A (en) | Electric power monitoring system Generating Network Topology Map, network bus topological diagram | |
| JPWO2012014509A1 (en) | Unauthorized access blocking control method | |
| CN102170372B (en) | Method for network structure monitoring and boundary inspection | |
| CN119383171A (en) | A method and device for checking IP address based on port status data | |
| CN110120957B (en) | Safe disposal digital twin method and system based on intelligent scoring mechanism | |
| CN103856443B (en) | Methods of judging and blocking outlets | |
| CN113904910A (en) | Intelligent asset discovery method and device based on operation and maintenance system | |
| CN105183618A (en) | Visual abnormal event notification method and device | |
| CN109246762A (en) | A kind of local service shunt method and device | |
| CN106470203A (en) | Information getting method and device | |
| CN117082522A (en) | Dynamic IP access method, device and equipment for Internet of things equipment | |
| CN115567258A (en) | Network security situation awareness method, system, electronic device and storage medium | |
| CN107483448A (en) | A network security detection method and detection system | |
| CN111479287A (en) | Simulation test method, device, equipment and storage medium for core network of non-independent networking | |
| CN103001968A (en) | A network monitoring system and method | |
| CN106028356A (en) | Wireless access equipment processing method and system | |
| CN111970698A (en) | Industrial field weak network environment optimization method | |
| CN107563639B (en) | Information system risk assessment device and method based on fault tree | |
| CN111259383B (en) | A security management center system | |
| CN109040016A (en) | A kind of information processing method, equipment and computer readable storage medium | |
| CN105791263A (en) | Information security risk pre-warning method and management system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| TA01 | Transfer of patent application right |
Effective date of registration: 20210413 Address after: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province Applicant after: Jiangsu coastline Internet Technology Co.,Ltd. Address before: 650106 1st floor to 6th floor, No. 593, near Huapu Road, Wuhua District, Kunming City, Yunnan Province Applicant before: Yunnan Weiyuan Intelligent Manufacturing Technology Co.,Ltd. |
|
| TA01 | Transfer of patent application right | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CP03 | Change of name, title or address |
Address after: Unit 8-702, creative industry park, 328 Xinghu street, Suzhou Industrial Park, Jiangsu Province, 215000 Patentee after: Jiangsu Coastline Internet Technology Co.,Ltd. Address before: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province Patentee before: Jiangsu coastline Internet Technology Co.,Ltd. |
|
| CP03 | Change of name, title or address | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20230407 |
|
| CF01 | Termination of patent right due to non-payment of annual fee |