Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

RSSP-I security protocol separation and deployment method

A technology that separates deployment and security protocols, applied in the field of security communications, can solve problems such as inability to meet different platform structures, and achieve the effect of protocol deployment

Active Publication Date: 2018-05-18
CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when deploying the RSSP-I secure communication protocol at present, due to the different platform structures in the actual environment, the method of the currently deployed RSSP-I secure communication protocol cannot meet the needs of different platform structures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSSP-I security protocol separation and deployment method
  • RSSP-I security protocol separation and deployment method
  • RSSP-I security protocol separation and deployment method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to further illustrate the features of the present invention, please refer to the following detailed description and accompanying drawings of the present invention. The accompanying drawings are for reference and description only, and are not intended to limit the protection scope of the present invention.

[0029] Such as Figure 3 to Figure 4 As shown, the present embodiment discloses a separate deployment method of RSSP-I security protocol, including the following steps S1 to S2:

[0030] S1. Adding different adaptation layers to the protocol stack, wherein the adaptation layer includes a D interface adaptation layer, an application adaptation layer, a network adaptation layer and a system adaptation layer;

[0031] S2. Compile all RSSP-I functional modules of the protocol stack into a static logic library and deploy the static logic library to machines A, B, and C by using the corresponding adaptation layer.

[0032] Among them, such as image 3 As shown,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RSSP-I security protocol separation and deployment method and belongs to the technical field of secure communication. The RSSP-I security protocol separation deployment method comprises the following steps of adding different adaptation layers for a protocol stack, wherein the adaptation layer comprises a D interface adaptation layer, an application adaptation layer, a network adaptation layer and a system adaptation layer; and compiling all the RSSP-I function modules of the protocol stack into a static logic library, and deploying the static logic library to an A machine, a B machine and a C machine by using the corresponding adaptation layers. According to the method in the invention, a series of adaptation layers are developed on the periphery of the RSSP-I safety communication protocol core logic layer; and then, according to the structure of the target platform and the type of the function modules, the corresponding adaptation layer is added for the protocol stack, and different function modules are compiled into a static logic library file to be deployed into the platform, so that the RSSP-I communication protocol is developed into a universal safety software protocol library with the cross-platform transportability, and protocol deployment of different architecture platforms is realized.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a method for separating and deploying RSSP-I security protocols. Background technique [0002] The RSSP-I secure communication protocol is suitable for safety-related communications in closed transmission systems to ensure the security of data interaction in a closed transmission system environment, to ensure the security of data transmission between safety-related products, and to improve data transmission reliability and availability. [0003] In the existing railway safety computer system, the two-by-two computer structure is mostly used, and the double-set redundancy design is generally implemented by two platforms: such as figure 1 As shown, the first type does not distinguish between safety functions and non-safety functions, and each series includes A / B machines. Such as figure 2 As shown, the second type distinguishes the safety function from the non-safe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/044H04L41/0803H04L67/04H04L69/08H04L69/322G06F8/60G06F8/41
Inventor 郭薇薇刘贞王一民左林黄雅倩
Owner CRSC RESEARCH & DESIGN INSTITUTE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products