[go: up one dir, main page]

CN111970698A - Industrial field weak network environment optimization method - Google Patents

Industrial field weak network environment optimization method Download PDF

Info

Publication number
CN111970698A
CN111970698A CN202010785941.6A CN202010785941A CN111970698A CN 111970698 A CN111970698 A CN 111970698A CN 202010785941 A CN202010785941 A CN 202010785941A CN 111970698 A CN111970698 A CN 111970698A
Authority
CN
China
Prior art keywords
access
access device
access point
identity
authorization level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010785941.6A
Other languages
Chinese (zh)
Other versions
CN111970698B (en
Inventor
熊筱曼
薛明辉
袁晗
吕威
章金伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Coastline Internet Technology Co ltd
Original Assignee
Yunnan Weiyuan Intelligent Manufacturing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunnan Weiyuan Intelligent Manufacturing Technology Co ltd filed Critical Yunnan Weiyuan Intelligent Manufacturing Technology Co ltd
Priority to CN202010785941.6A priority Critical patent/CN111970698B/en
Publication of CN111970698A publication Critical patent/CN111970698A/en
Application granted granted Critical
Publication of CN111970698B publication Critical patent/CN111970698B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种工业领域弱网环境优化方法,包括以下步骤:S1、建立一个无线局域网;S2、手动或自动选择一个接入点接入;S3、授权级别模块对接入设备身份ID进行授权级别识别;S4、接入设备可以使用对其开放的各个权限功能,工业设备记录将接入设备的身份ID和使用操作记录生成操作事件并存储。本发明可以快速有效的实现网络的手动、自动接入,并根据接入设备身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。

Figure 202010785941

The invention discloses a method for optimizing a weak network environment in the industrial field, comprising the following steps: S1, establishing a wireless local area network; S2, manually or automatically selecting an access point to access; S3, an authorization level module performing an identification ID of an access device. Authorization level identification; S4, the access device can use various permission functions open to it, and the industrial device record will generate and store the identity ID of the access device and the use operation record to generate and store operation events. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID of the access device, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access device to realize the mark positioning, thereby Statistics of various industrial production data.

Figure 202010785941

Description

一种工业领域弱网环境优化方法A method for optimizing weak network environment in industrial field

技术领域technical field

本发明属于网络技术领域,具体涉及一种工业领域弱网环境优化方法。The invention belongs to the field of network technology, and in particular relates to a method for optimizing a weak network environment in the industrial field.

背景技术Background technique

随着互联网技术的发展,无线局域网(Wireless Local Area Network,WLAN)组网技术得到了迅猛发展,通过部署多个接入点(Access Point,AP)的方式建立一个单独的WLAN网络,然后提供无线接入服务。目前,无线网络普遍应用在办公系统中,而在工业领域中的应用,特别是车间层弱网环境的优化还没有很好的解决方案。With the development of Internet technology, the wireless local area network (WLAN) networking technology has developed rapidly. A single WLAN network is established by deploying multiple access points (APs), and then provides wireless access service. At present, wireless networks are widely used in office systems, but there is no good solution for applications in the industrial field, especially the optimization of the weak network environment in the workshop layer.

发明内容SUMMARY OF THE INVENTION

为解决现有技术存在的缺陷,本发明提供一种工业领域弱网环境优化方法。In order to solve the defects existing in the prior art, the present invention provides a method for optimizing a weak network environment in the industrial field.

为了解决上述技术问题,本发明提供了如下的技术方案:In order to solve the above-mentioned technical problems, the present invention provides the following technical solutions:

本发明提供一种工业领域弱网环境优化方法,包括以下步骤:The invention provides a method for optimizing a weak network environment in the industrial field, comprising the following steps:

S1、每个工业设备部署接入点,与相邻的接入点一起组成无线局域网;S1. Each industrial device deploys an access point to form a wireless local area network with adjacent access points;

S2、接入设备获取当前无线局域网覆盖的各个接入点的地址,然后根据各个接入点的信号强度手动或自动选择一个接入点接入;S2, the access device obtains the addresses of each access point covered by the current wireless local area network, and then manually or automatically selects an access point to access according to the signal strength of each access point;

S3、工业设备获取接入设备的身份ID,授权级别模块对身份ID进行授权级别识别,若识别成功,则将对应等级的权限功能向接入设备开放;若识别失败,则发出报警,并将接入设备的身份ID和接入操作记录生成预警事件存储;其中,授权级别模块中由上至下设有至少一个授权级别,授权级别的等级由上至下为由高到低;S3. The industrial device obtains the identity ID of the access device, and the authorization level module identifies the authorization level of the identity ID. If the identification is successful, the corresponding level of authority function is opened to the access device; if the identification fails, an alarm is issued and an alarm is sent to the access device. The identity ID of the access device and the access operation record generate early warning event storage; wherein, the authorization level module is provided with at least one authorization level from top to bottom, and the level of authorization level is from high to low from top to bottom;

S4、接入设备使用对其开放的各个权限功能,工业设备将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储。S4 , the access device uses each permission function open to it, and the industrial device generates and stores the access device's identity ID and usage operation record to generate and store the access device operation event.

作为本发明的一种优选技术方案,步骤S2中手动选择一个接入点接入时,若该接入点连接的接入设备个数在设定阈值内,则将接入成功;若该接入点连接的接入设备个数超过设定阈值,则发出提示,并重新选择接入点直至接入成功。As a preferred technical solution of the present invention, when an access point is manually selected for access in step S2, if the number of access devices connected to the access point is within the set threshold, the access will be successful; If the number of access devices connected to the access point exceeds the set threshold, a prompt will be issued, and the access point will be reselected until the access is successful.

作为本发明的一种优选技术方案,步骤S2中自动选择一个接入点接入时,选择接入点连接的接入设备个数在设定阈值内且信号最强的接入点接入。As a preferred technical solution of the present invention, when an access point is automatically selected for access in step S2, the access point with the strongest signal and the number of access devices connected to the access point is selected for access.

作为本发明的一种优选技术方案,步骤S3中授权级别模块对身份ID进行授权级别识别时按照由下至上的等级依次进行识别,记录业务事件数据存储以便进行后期分析。本方法可以识别并过滤非法访问或者网络攻击。As a preferred technical solution of the present invention, in step S3, the authorization level module identifies the authorization level of the identity ID according to the order from bottom to top, and records the business event data for later analysis. The method can identify and filter illegal access or network attacks.

作为本发明的一种优选技术方案,步骤S4中权限功能包括查看功能、演示功能和作业功能,工业设备将接入设备的身份ID分别和查看操作记录、演示操作记录、作业操作记录生成接入设备查看操作事件、接入设备演示操作事件和接入设备作业操作事件并存储,查看操作记录包括查看操作动作和每个动作时长,演示操作包括演示操作动作和每个动作时长,作业操作包括作业操作动作和每个动作时长。As a preferred technical solution of the present invention, in step S4, the authority function includes a viewing function, a demonstration function and an operation function, and the industrial equipment generates and accesses the identity ID of the access device with the viewing operation record, the demonstration operation record, and the operation operation record, respectively. Device viewing operation events, access device demonstration operation events, and access device job operation events are stored and stored. Viewing operation records includes viewing operation actions and the duration of each action. Demonstration operations include demonstrating operation actions and the duration of each action. Job operations include jobs. Actions and the duration of each action.

本发明相较于现有技术,具有以下有益效果:Compared with the prior art, the present invention has the following beneficial effects:

本发明中每个工业设备建立一个无线局域网,接入设备选择接入点接入时,授权级别模块对身份ID进行授权级别识别,然后将对应等级的权限功能向接入设备开放,最后将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储。本发明可以快速有效的实现网络的手动、自动接入,并根据身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。In the present invention, each industrial device establishes a wireless local area network. When the access device selects the access point to access, the authorization level module identifies the authorization level of the identity ID, and then opens the corresponding level of authorization function to the access device. The identity ID of the access device and the use operation record are used to generate and store the access device operation event. The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access equipment to realize the mark positioning, so as to count the various items. Industrial production data.

附图说明Description of drawings

图1是本发明一种工业领域弱网环境优化方法的工作流程图。FIG. 1 is a working flow chart of a method for optimizing a weak network environment in an industrial field according to the present invention.

具体实施方式Detailed ways

以下结合附图对本发明的优选实施例进行说明,应当理解,此处所描述的优选实施例仅用于说明和解释本发明,并不用于限定本发明。The preferred embodiments of the present invention will be described below with reference to the accompanying drawings. It should be understood that the preferred embodiments described herein are only used to illustrate and explain the present invention, but not to limit the present invention.

为了达到本发明的目的,如图1所示,在本发明的其中一种实施方式中提供一种工业领域弱网环境优化方法,包括以下步骤:In order to achieve the purpose of the present invention, as shown in FIG. 1 , in one of the embodiments of the present invention, a method for optimizing a weak network environment in the industrial field is provided, comprising the following steps:

S1、每个工业设备部署接入点,与相邻的接入点建立一个无线局域网;S1. Each industrial device deploys an access point, and establishes a wireless local area network with adjacent access points;

S2、接入设备获取当前无线局域网覆盖的各个接入点的地址,然后根据各个接入点的信号强度手动或自动选择一个接入点接入;S2, the access device obtains the addresses of each access point covered by the current wireless local area network, and then manually or automatically selects an access point to access according to the signal strength of each access point;

具体的,手动选择一个接入点接入时,若该接入点连接的接入设备个数在设定阈值内,则将接入成功;若该接入点连接的接入设备个数超过设定阈值,则发出提示,并重新选择接入点直至接入成功;Specifically, when manually selecting an access point for access, if the number of access devices connected to the access point is within the set threshold, the access will be successful; if the number of access devices connected to the access point exceeds If the threshold is set, a prompt will be issued, and the access point will be re-selected until the access is successful;

具体的,自动选择一个接入点接入时,选择接入点连接的接入设备个数在设定阈值内且信号最强的接入点接入;Specifically, when an access point is automatically selected for access, the access point with the strongest signal and the number of access devices connected to the access point is selected for access;

S3、工业设备获取接入设备的身份ID,授权级别模块对身份ID进行授权级别识别,若识别成功,则将对应等级的权限功能向接入设备开放;若识别失败,则发出报警,并将接入设备的身份ID和接入操作记录生成预警事件存储;其中,授权级别模块中由上至下设有至少一个授权级别,授权级别的等级由上至下为由高到低,授权级别模块对身份ID进行授权级别识别时按照由下至上的等级依次进行识别;S3. The industrial device obtains the identity ID of the access device, and the authorization level module identifies the authorization level of the identity ID. If the identification is successful, the corresponding level of authority function is opened to the access device; if the identification fails, an alarm is issued and an alarm is sent to the access device. The identity ID of the access device and the access operation record generate early warning event storage; wherein, there is at least one authorization level in the authorization level module from top to bottom, and the level of authorization level is from high to low from top to bottom, and the authorization level module When identifying the authorization level of the identity ID, the identification is performed in order from the bottom to the top;

S4、接入设备使用对其开放的各个权限功能,工业设备将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储;S4. The access device uses each permission function opened to it, and the industrial device generates and stores the access device operation event by using the identity ID and use operation record of the access device;

具体的,权限功能包括查看功能、演示功能和作业功能,工业设备将接入设备的身份ID分别和查看操作记录、演示操作记录、作业操作记录生成接入设备查看操作事件、接入设备演示操作事件和接入设备作业操作事件并存储,查看操作记录包括查看操作动作和每个动作时长,演示操作包括演示操作动作和每个动作时长,作业操作包括作业操作动作和每个动作时长。Specifically, the permission functions include the viewing function, the demonstration function, and the operation function. The industrial equipment separates the identity ID of the access device from the viewing operation record, the demonstration operation record, and the operation operation record to generate the access device viewing operation event and the access device demonstration operation. Events and access device job operation events are stored. Viewing operation records includes viewing operation actions and the duration of each action. Demonstration operations include demonstration operation actions and the duration of each action. Job operations include job operation actions and the duration of each action.

本发明可以快速有效的实现网络的手动、自动接入,并根据身份ID识别授权级别,从而开发相应权限功能,保证网络安全,而将接入设备操作事件存储,实现标记定位,从而统计各项工业生产数据。The invention can quickly and effectively realize the manual and automatic access of the network, and identify the authorization level according to the identity ID, so as to develop the corresponding authority function, ensure the network security, and store the operation events of the access equipment to realize the mark positioning, so as to count the various items. Industrial production data.

最后应说明的是:以上所述仅为本发明的优选实施例而已,并不用于限制本发明,尽管参照前述实施例对本发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。Finally, it should be noted that the above descriptions are only preferred embodiments of the present invention, and are not intended to limit the present invention. Although the present invention has been described in detail with reference to the foregoing embodiments, for those skilled in the art, the The technical solutions described in the foregoing embodiments may be modified, or some technical features thereof may be equivalently replaced. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.

Claims (5)

1.一种工业领域弱网环境优化方法,其特征在于,包括以下步骤:1. a weak network environment optimization method in industrial field, is characterized in that, comprises the following steps: S1、每个工业设备部署接入点,与相邻的接入点建立一个无线局域网;S1. Each industrial device deploys an access point, and establishes a wireless local area network with adjacent access points; S2、接入设备获取当前无线局域网覆盖的各个接入点的唯一识别符,然后根据各个接入点的信号强度手动或自动选择一个接入点接入;S2, the access device obtains the unique identifier of each access point covered by the current wireless local area network, and then manually or automatically selects an access point to access according to the signal strength of each access point; S3、工业设备接入点获取接入设备的身份ID,授权级别模块对身份ID进行授权级别识别,若识别成功,则将对应等级的权限功能向接入设备开放;若识别失败,则发出报警,并将接入设备的身份ID和接入操作记录生成预警事件存储;其中,授权级别模块中由上至下设有至少一个授权级别,授权级别的等级由上至下为由高到低;S3. The industrial equipment access point obtains the identity ID of the access device, and the authorization level module identifies the authorization level of the identity ID. If the identification is successful, the corresponding level of authority function is opened to the access device; if the identification fails, an alarm is issued , and the identity ID of the access device and the access operation record are generated and stored as early warning events; wherein, the authorization level module is provided with at least one authorization level from top to bottom, and the level of authorization level is from high to low from top to bottom; S4、接入设备使用对其开放的各个权限功能,工业设备将接入设备的身份ID和使用操作记录生成接入设备操作事件并存储。S4 , the access device uses each permission function open to it, and the industrial device generates and stores the access device's identity ID and usage operation record to generate and store the access device operation event. 2.根据权利要求1所述的工业领域弱网环境优化方法,其特征在于,步骤S2中手动选择一个接入点接入时,若该接入点连接的接入设备个数在设定阈值内,则将接入成功;若该接入点连接的接入设备个数超过设定阈值,则发出提示,并重新选择接入点直至接入成功。2. The method for optimizing a weak network environment in the industrial field according to claim 1, wherein when manually selecting an access point to access in step S2, if the number of access devices connected to the access point is within a set threshold If the number of access devices connected to the access point exceeds the set threshold, a prompt will be issued, and the access point will be re-selected until the access is successful. 3.根据权利要求1所述的工业领域弱网环境优化方法,其特征在于,步骤S2中自动选择一个接入点接入时,选择接入点连接的接入设备个数在设定阈值内且信号最强的接入点接入。3. The method for optimizing a weak network environment in the industrial field according to claim 1, wherein when an access point is automatically selected for access in step S2, the number of access devices connected by the access point is selected to be within a set threshold And the access point with the strongest signal is connected. 4.根据权利要求1所述的工业领域弱网环境优化方法,其特征在于,步骤S3中授权级别模块对身份ID进行授权级别识别时按照由下至上的等级依次进行识别。4. The method for optimizing a weak network environment in the industrial field according to claim 1, wherein in step S3, when the authorization level module performs authorization level identification on the identity ID, the identification is performed sequentially from bottom to top. 5.根据权利要求1所述的工业领域弱网环境优化方法,其特征在于,步骤S4中权限功能包括查看功能、演示功能和作业功能,工业设备将接入设备的身份ID分别和查看操作记录、演示操作记录、作业操作记录生成接入设备查看操作事件、接入设备演示操作事件和接入设备作业操作事件并存储,查看操作记录包括查看操作动作和每个动作时长,演示操作包括演示操作动作和每个动作时长,作业操作包括作业操作动作和每个动作时长。5. The method for optimizing a weak network environment in the industrial field according to claim 1, wherein in step S4, the authority function includes a viewing function, a demonstration function and an operation function, and the industrial equipment separates the identity ID of the access device from the viewing operation record. , Demonstration operation records, and job operation records are generated and stored for access device viewing operation events, access device demonstration operation events, and access device job operation events. Viewing operation records includes viewing operation actions and the duration of each action. Demonstration operations include demonstration operations. Actions and the duration of each action, and job operations include job action actions and the duration of each action.
CN202010785941.6A 2020-08-07 2020-08-07 Industrial field weak network environment optimization method Expired - Fee Related CN111970698B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010785941.6A CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010785941.6A CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Publications (2)

Publication Number Publication Date
CN111970698A true CN111970698A (en) 2020-11-20
CN111970698B CN111970698B (en) 2023-04-07

Family

ID=73364744

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010785941.6A Expired - Fee Related CN111970698B (en) 2020-08-07 2020-08-07 Industrial field weak network environment optimization method

Country Status (1)

Country Link
CN (1) CN111970698B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
CN101889464A (en) * 2007-10-08 2010-11-17 高通股份有限公司 Access terminal configuration and access control
CN103415026A (en) * 2013-07-03 2013-11-27 深圳Tcl新技术有限公司 Networking method and device of wireless local area network
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
WO2015099607A1 (en) * 2013-12-26 2015-07-02 Certis Cisco Security Pte Ltd An integrated access control and identity management system
CN105873237A (en) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 Method and device for building wireless connection
CN106686754A (en) * 2016-12-06 2017-05-17 厦门中控生物识别信息技术有限公司 Data interaction method and data interaction system
US20180260553A1 (en) * 2013-05-13 2018-09-13 Veridium Ip Limited System and method for authorizing access to access-controlled environments

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050086346A1 (en) * 2003-10-17 2005-04-21 Meyer Jeffrey D. Access point coupling guests to the internet
CN101889464A (en) * 2007-10-08 2010-11-17 高通股份有限公司 Access terminal configuration and access control
US20180260553A1 (en) * 2013-05-13 2018-09-13 Veridium Ip Limited System and method for authorizing access to access-controlled environments
CN103415026A (en) * 2013-07-03 2013-11-27 深圳Tcl新技术有限公司 Networking method and device of wireless local area network
WO2015099607A1 (en) * 2013-12-26 2015-07-02 Certis Cisco Security Pte Ltd An integrated access control and identity management system
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN105873237A (en) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 Method and device for building wireless connection
CN106686754A (en) * 2016-12-06 2017-05-17 厦门中控生物识别信息技术有限公司 Data interaction method and data interaction system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DUC KHAI LAM;YASUHIRO SHINOZAKI: ""A fast and safety industrial WLAN protocol for factory communication systems"", 《2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT)》 *
倪春鹏: "适用于工厂自动化的无线网络通讯技术", 《自动化与仪器仪表》 *
机械工业信息研究院: "IT―Powered无线网络 WLAN在工业领域的新机遇", 《电气应用》 *

Also Published As

Publication number Publication date
CN111970698B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN106452955B (en) A kind of detection method and system of abnormal network connection
CN106034054A (en) Redundant access control list ACL rule file detection method and apparatus thereof
CN110661811A (en) Firewall policy management method and device
CN100550768C (en) An information security management platform
CN109714206A (en) Electric power monitoring system Generating Network Topology Map, network bus topological diagram
JPWO2012014509A1 (en) Unauthorized access blocking control method
CN102170372B (en) Method for network structure monitoring and boundary inspection
CN119383171A (en) A method and device for checking IP address based on port status data
CN110120957B (en) Safe disposal digital twin method and system based on intelligent scoring mechanism
CN103856443B (en) Methods of judging and blocking outlets
CN113904910A (en) Intelligent asset discovery method and device based on operation and maintenance system
CN105183618A (en) Visual abnormal event notification method and device
CN109246762A (en) A kind of local service shunt method and device
CN106470203A (en) Information getting method and device
CN117082522A (en) Dynamic IP access method, device and equipment for Internet of things equipment
CN115567258A (en) Network security situation awareness method, system, electronic device and storage medium
CN107483448A (en) A network security detection method and detection system
CN111479287A (en) Simulation test method, device, equipment and storage medium for core network of non-independent networking
CN103001968A (en) A network monitoring system and method
CN106028356A (en) Wireless access equipment processing method and system
CN111970698A (en) Industrial field weak network environment optimization method
CN107563639B (en) Information system risk assessment device and method based on fault tree
CN111259383B (en) A security management center system
CN109040016A (en) A kind of information processing method, equipment and computer readable storage medium
CN105791263A (en) Information security risk pre-warning method and management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210413

Address after: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Applicant after: Jiangsu coastline Internet Technology Co.,Ltd.

Address before: 650106 1st floor to 6th floor, No. 593, near Huapu Road, Wuhua District, Kunming City, Yunnan Province

Applicant before: Yunnan Weiyuan Intelligent Manufacturing Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Unit 8-702, creative industry park, 328 Xinghu street, Suzhou Industrial Park, Jiangsu Province, 215000

Patentee after: Jiangsu Coastline Internet Technology Co.,Ltd.

Address before: 215000 unit 303, a7 / F, building 5, 218 Xinghu street, Suzhou Industrial Park, Suzhou City, Jiangsu Province

Patentee before: Jiangsu coastline Internet Technology Co.,Ltd.

CP03 Change of name, title or address
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20230407

CF01 Termination of patent right due to non-payment of annual fee