Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Teaching and testing device for network information security

A technology of network information and experimental equipment, which is applied in the field of network information security teaching experiment equipment, can solve problems such as difficulty in learning for students, lack of teaching experiment system, and lack of network information security teaching facilities, so as to achieve increased security and comprehensive content of network information security Effect

Inactive Publication Date: 2008-05-28
吉林中软吉大信息技术有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still the following problems in the network information security teaching experiment: the lack of network information security teaching facilities, the unpopular network information security experiment environment, the lack of specific experimental guidance, and the lack of a complete teaching experiment system, which leads to students' lack of learning network information security. Practical application, the disconnection between theory and practice brings difficulty for students to learn network information security related knowledge

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Teaching and testing device for network information security
  • Teaching and testing device for network information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] hardware system

[0022] The group control device consists of six 5-port / 100M hubs. The central equipment is a 24-port / 100M switch, and the security equipment is composed of public control PC and Endian Firewall release2 Linux open source operating system. Among them, the public control PC adopts Taiwan SYS-7464VEA motherboard, built-in 1 Intel Mobile PIII 650MHz CPU, 4 onboard 10Base / 100Base TX network cards and 2 USB2.0 interfaces, and the public control PC adopts 256M DDR333 notebook memory and 80G easy extension hard drive,

[0023] The network information security teaching experiment system takes 6 people as an experimental group, and allocates a security device and 3 hubs, and a group control device can support up to two experimental groups.

[0024] As shown in Figure 1: The hardware connection method of the experimental device is an example of connecting one group control device, one security device (one experimental group) and the central device. The role nam...

Embodiment 2

[0038] The working principle of the device will be further explained with an experiment of learning an asymmetric encryption algorithm (RSA encryption algorithm).

[0039] Before carrying out the experiment, you can learn the preparatory knowledge through the experimental teaching materials or related topics provided by the experimental platform. The experiment requires two experimental hosts (experimental roles are defined as host A and host B) to work together under the same shared module. Both hosts A and B start the network information security experiment platform in the Windows virtual machine, open the network information security toolbox, and enter the [RSA encryption algorithm] interface from the tool wizard; host A generates public and private keys in the public key tab ( You can observe the RSA public and private key generation and encryption and decryption process in the demonstration area), use the generated private key to perform RSA encryption on a piece of plain...

Embodiment 3

[0041] Assuming that two remote hosts want to carry out safe and reliable information transmission in the network, they transmit files in the network through the combination of symmetric key encryption and asymmetric key encryption.

[0042] Take host A sending and host B receiving as an example to illustrate the implementation:

[0043] Host A generates an RSA public-private key pair, and informs host B of the public key, and keeps the private key by itself; similarly, host B generates an RSA public key pair, informs host A of the public key, and keeps the private key by itself; host A enters the network information On the security experiment platform, open the toolbox and select the "encryption and decryption" tool. Use the public key tab in the RSA encryption algorithm to generate a public-private key pair, and then send the public key to host B in the form of an email, and keep the private key by yourself; host A uses the encryption tab in the DES encryption algorithm to g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network information security teaching test device which is composed of a software platform and a hardware system that comprises an center device, a batch control device and a security device; wherein, the center device is used for providing services for the communication of a management machine and the security device as well as a student machine; and for the construction of a network topological structure that can be built up with a variety of types for network physical connection, the security device connects with the sharing module of the batch control device, and has two work modes of a switch mode and a fireproof wall mode; the batch control device consists of six sharing modules, each of which includes five communication ports, and the port mark is from Port1 to Port5; the sharing module is provided with the function of data collection, and a lab host machine exchanges data via the sharing module. The network information security of the invention has comprehensive content, and the virtual machine technology is adopted in the lab to effectively control and simulate the real lab environment and to enable the students to learn the real knowledge about information security, and to reduce the maintenance work of the lab.

Description

Technical field: [0001] The invention provides a network information security teaching experiment device, which is used in teaching experiment systems developed by colleges and universities for information security and related majors, and belongs to the technical field of network information teaching. Background technique: [0002] The network information security involved in the present invention is a comprehensive subject field formed by gathering knowledge of many subjects such as computer, communication, microelectronics and mathematics. At the same time, network information security is also a complex system engineering, which involves information infrastructure construction, network and system structure, network information transmission, information system and business application system development, information security laws and regulations, security management system, etc. aspect. [0003] At present, major colleges and universities are gradually turning network info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L12/28
Inventor 张洪海郭东伟蒋一州王陈章尚中飞曹岩
Owner 吉林中软吉大信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products