Encryption strategy matching algorithm module verification platform and realizing method thereof
An encryption strategy and matching algorithm technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of large and complex UVM verification platforms, and achieve the effect of a simple and easy-to-understand environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0024] like figure 1 , the input of the strategy matching module mainly has two parts. On the left is the header information of the IP packet, including the protocol type, destination address, source address, destination port, and source port of the packet. The input on the right is a policy list, which is composed of many policies, and each policy is composed of multiple fields such as protocol type, destination address, source address, encryption direction, and encryption policy. The policy list is loaded into the module after the power-on reset is completed. After the header information of each IP message appears, the module starts to compare the policies in it one by one until the policy matching the header information of the IP m...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 