Network safe content processing card based on FPGA

A network security and content technology, applied in electrical components, transmission systems, etc., can solve the contradiction between network security and network speed, network management and network cost contradiction, etc., to achieve high-performance results

Inactive Publication Date: 2009-07-15
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The contradiction between network security and network speed;
[0006] 2) The contradiction between network management and network cost;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safe content processing card based on FPGA
  • Network safe content processing card based on FPGA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The function implementation of the board card of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] Such as figure 1 As shown, the present invention is composed of a dedicated FPGA security chip, a Gigabit Ethernet port module (88E1145), a PCI interface (PEX8311), a power supply module, and an SRAM. Main module function of the present invention is as follows:

[0019] FPGA chip: It mainly implements logical functions such as intrusion prevention, content filtering, traffic monitoring, security audit, and security policy scheduling.

[0020] Gigabit Ethernet port module (88E1145): Complete the receiving and sending of Ethernet data packets by means of 1000baseT interface. At the same time, it can communicate with a remote computer through an Ethernet network connection, receive security policy management commands, and complete remote management.

[0021] PCI interface (PEX8311): Complete the data communicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network safety content processing card based on FPGA (field programmable gate array). The invention provides a method for solving the problem that contradiction between network safety and network speed and contradiction between network management and network cost are becoming serious. The method comprises giving first place to an FPGA safety chip, adopting a PCI card inserted into a PCI slot of a server, performing data communication with the server by using a PCI express interface protocol, connecting with an outer network through kilomega network ports for completing data receiving and sending, realizing byte-by-byte content detection, content labeling, and flow recombination of the server data under a kilomega line speed, and at the same time, realizing functions of network flow real-time controlling, blocking, inbreak detecting and log auditing. By adopting the invention, networking cost can be reduced, CPU resources of servers can be saved, a CPU can focus on completing other functions, and therefore, the integral performance of the system is improved.

Description

technical field [0001] The invention relates to the technical field of network security content processing, in particular to a server network security content processing PCI board based on a dedicated FPGA security chip. Background technique [0002] With the rapid development of network technology, network security issues have become more and more important. Security incidents such as viruses, worms, hacker attacks, and harmful information on the Internet frequently occur. Virus technology is constantly developing. Viruses use the loopholes in operating systems and applications to spread. At the same time, they integrate technologies such as hackers and Trojan horses. They spread quickly, have strong destructive power, and are highly intelligent. As a result, virus protection cannot rely on a single anti-virus system. Hackers’ attack methods also integrate multiple technologies and use multiple methods. Some network attacks cover a wide range of content. When hackers and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 支阿龙周海波
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products