
Product Overview
With the rapid development of the Internet of Things and industrial Internet, massive data needs to be analyzed, processed and stored at the edge of the network. The edge computing data acquisition device of the Internet of Things is a product designed and developed by Cathay Pacific Netcom based on years of security technology research experience, combined with industrial Internet technology and industrial field data acquisition technology, which meets the energy consumption monitoring and edge computing 3.0 specifications. It can be applied to energy consumption monitoring, hazard source monitoring, environmental monitoring, smart factories, smart cities, petrochemicals, oil and gas production automation, power Internet of Things and other industries.
Features
Customized edge computing capability:The product can customize the computing performance, storage space, network communication performance and underlying operating system according to user needs, providing complete hardware platform support for edge computing programs provided by application system manufacturers.
Two way authentication:Based on the domestic password algorithm, the identity authentication between the Internet of Things terminal (with password capability) and edge computing devices, edge computing devices and application systems is realized. The identity authentication mechanism can be selected according to the actual situation, such as based on PKI/CA, based on symmetric encryption algorithms, etc.
Data encryption transmission:Based on the domestic cryptographic algorithm, realize the encrypted transmission of data between the Internet of Things terminal (requiring cryptographic ability) and edge computing devices, and between edge computing devices and application systems. The specific encryption mechanism can be customized according to user needs, such as IPSec VPN, application layer encryption, etc.
Instruction integrity verification:It can perform integrity verification on downstream instructions to ensure that the instruction information has not been tampered with during transmission.
Protocol filtering:Based on machine learning mechanisms, the product can automatically learn the protocol rules for normal communication between networks, form a "protocol whitelist", block or alert non whitelist protocols, and ensure communication security.
Network isolation:The built-in gigabit ferry isolation module can realize the safe isolation between the internal network side edge computing system and the external network side public network, and ensure that the internal network side industrial control data real-time collection is not infringed by the external network side public network.
Adaptation to multiple network types:Supports Ethernet, serial port, Bluetooth zigbee、LORA、 Various network protocol types such as industrial control protocol and OPC access. Network types are optional, customizable, and expandable.
Compatible with multiple authentication encryption devices:Can be paired and used to form a secure communication channel; Or it can be used in conjunction with various encryption gateway devices and third-party encryption authentication gateway devices of our company.
自身安全性保障:Based on the trusted computing system, it has built-in trusted computing chips to ensure that the core processes/services of the product itself and the core programs of the edge computing business system will not be illegally tampered with.
Container technology:Apply Docker container technology to solve the development of multi-user platform systems, dynamically supplement collection system functions, and expand compatibility capabilities.
典型部署

