Network cipher machine

A cipher machine and network technology, applied in the field of network cipher machines, to achieve the effect of enhancing client identity authentication

Inactive Publication Date: 2011-06-29
KOAL SOFTWARE CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a high-performance network encryption machine aiming at the potential safety hazards in the above-mentioned existing network and the defects in the existing network security hardware equipment. The encryption machine is a completely open hardware security platform. Based on the secure transmission of information in the network, it provides u...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network cipher machine
  • Network cipher machine
  • Network cipher machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0022] The present invention adopts VPN (Virtual Private Network) technology to set up a virtual private network on the Internet (or private network), "making networking easier and making security simpler". The invention strictly follows the IPSEC / IKE specification, integrates the advantages of IPSec VPN and SSL VPN, supports the realization of VPN based on routing, has the ability of VPN internal network access control, and realizes the real network security interconnection.

[0023] Based on the above purpose, the present invention provides as figure 1 The network cipher machine shown mainly includes the hardware part of the cipher machine, corresponding operating system, BSP module, communication module, IKE key exchange module, IPSec process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network cipher machine. A system central processing unit (CPU) in the cipher machine is in control connection with a packet encryption algorithm chip, a hardware random number generator, a memory, a casing protection monitoring circuit and a static random access memory (SRAM) device with a backup battery respectively, wherein the casing protection monitoring circuit protects the SRAM device with the backup battery; and simultaneously the system CPU is externally connected with two Ethernet ports by two physical layer transceivers, and is externally connected with a serial port by a serial port controller. The network cipher machine adopts a virtual private network (VPN) technology, constructs a virtual private network on the Internet or a private network, makes networking easier and makes security simpler to achieve.

Description

Technical field: [0001] The invention relates to a network security technology, in particular to a network cipher machine technology. Background technique: [0002] With the popularization of informatization, the network has become an important means for people to obtain, utilize and transmit information and knowledge, but it also bears the risk of sensitive information being attacked during use. Faced with this reality, information security technology has become the fundamental core of network applications and one of the important contents of national information infrastructure construction. Network security technology has now been widely used in various industries, including the use of a series of products such as anti-virus, firewall, security router, security gateway, cipher machine, and encryption server. One of the main aspects is network security hardware equipment. Network security hardware equipment has attracted more and more attention due to its characteristics o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
Inventor 杨茂江谭武征
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products