Unlock instant, AI-driven research and patent intelligence for your innovation.

Network safety processing equipment and method thereof

A technology of network security and processing device, applied in the field of network communication, can solve the problems of bus congestion encryption rate, system performance reduction, encryption processing performance cannot be greatly improved, etc., to achieve the effect of reducing waiting time and improving processing performance

Inactive Publication Date: 2009-06-17
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, if the bound IPSec processing is to be supported, data packets must pass through the data bus to enter and exit the chip multiple times, which will inevitably lead to a decrease in system performance
[0016] From the above description of the prior art, it can be seen that since the messages are stored in the host memory, the DMA module needs to transport the data messages and SA data through a general data bus or other buses, resulting in the bus congestion and low encryption rate
At the same time, since the content of the SA data must be read before performing operations such as encryption and authentication, and then read the data message, this often causes the encryption engine inside the hardware accelerator to be in a waiting state, and the encryption processing performance of the system cannot be greatly improved. Increase in magnitude
Moreover, since the SA data is stored in the host memory, if the system needs to support more links, more SA data needs to be stored in the host memory, and the capacity of the host memory of general network devices is limited, which will lead to system failure. Link capacity is limited by the size of host memory
[0017] In addition, the existing technology adopts the mechanism of sharing memory with system data, that is, the data sending and receiving of other service cards of the host must also be realized by accessing the host memory. At this time, frequent access to the host memory caused by encryption operations will cause the entire System performance degradation
[0018] Moreover, the prior art does not support IPComp (IP packet compression protocol). If the system needs to compress data packets, a special compression processor needs to be added.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety processing equipment and method thereof
  • Network safety processing equipment and method thereof
  • Network safety processing equipment and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The network security processing device and method thereof described in the present invention respectively adopt the memory bus and the universal data bus to read the SA data and the data message, that is, first read the SA data and the data message to the network security through the universal data bus. In the local memory of the processing device, then the network security processing device calls the corresponding SA data and data message in the local memory through the memory bus, and performs corresponding network security processing; In the decryption / Hash unit, the ESP processing and AH processing to the data message can be completed at the same time, which simplifies the network security processing process. At the same time, the network security processing device provided by the present invention is also provided with a corresponding compression processing module and a decompression processing module , so that the network security processing device can support the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to network security processing installation and its method. It adopts data bus and internal storage bus to transmit data message and the SA data, this make the access of SA data do not influence the access of the other data from the system. Thus the efficiency of the system data bus is improved, and the waiting time of the network security processor is reduced. As well as, the invention adopts local-storage to save SA data, this make the capacity of the system be adjusted flexibly according to the demand in order to support more links. In addition, two Hash arithmetic units are used in the encrypt / decrypt Hash unit, moreover, the compress process module and decompress module are also installed so that the more security IPSec binding process and compressing process can be finished in one process. Thus, the entire process ability of the net security processing installation is improved.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a network security processing device and method thereof. Background technique [0002] With the development of network communication technology, more and more users access IP (Internet Protocol) network. Therefore, ensuring the security of network communication has become an important problem to be solved in communication network. At present, in IP network security, IPSec (Internet Network Security Protocol) is widely used to realize network security. IPSec security authentication technology includes two security protocols, namely Authentication Header (AH) protocol and Encapsulating Security Payload (ESP) protocol. These two protocols and the Internet Key Exchange Protocol (IKE) can be used together to ensure the security and reliability of network communication. [0003] The function provided by the AH protocol is the authentication of the entire IP messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/56H04L29/06H04L9/00
Inventor 程明强黄勇
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More