Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption strategy matching algorithm module verification platform and realizing method thereof

An encryption strategy and matching algorithm technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of large and complex UVM verification platforms, and achieve the effect of a simple and easy-to-understand environment

Inactive Publication Date: 2014-09-24
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for developers and verification personnel who have no SystemVerilog language foundation and no experience in using UVM, the UVM verification platform is too large and complex
Although some logic designs are suitable for verification using UVM, engineers often give up trying because they are afraid of new things that are too complicated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption strategy matching algorithm module verification platform and realizing method thereof
  • Encryption strategy matching algorithm module verification platform and realizing method thereof
  • Encryption strategy matching algorithm module verification platform and realizing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0024] like figure 1 , the input of the strategy matching module mainly has two parts. On the left is the header information of the IP packet, including the protocol type, destination address, source address, destination port, and source port of the packet. The input on the right is a policy list, which is composed of many policies, and each policy is composed of multiple fields such as protocol type, destination address, source address, encryption direction, and encryption policy. The policy list is loaded into the module after the power-on reset is completed. After the header information of each IP message appears, the module starts to compare the policies in it one by one until the policy matching the header information of the IP m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of IPsec communication encryption and logic verification, in particular to an encryption strategy matching algorithm module verification platform and a realizing method of the encryption strategy matching algorithm module verification platform. According to the technical scheme, an encryption strategy is configured automatically and randomly, various IP package message readers are sent to a detected algorithm module randomly, and strategies matched out by a detected object are automatically collected and compared with a reference model of an encryption strategy matching algorithm module. By means of the encryption strategy matching algorithm module verification platform and the realizing method of the encryption strategy matching algorithm module verification platform, a UVM verification environment for the encryption strategy matching algorithm module in Ethernet communication encryption is achieved, the structure of a standard UVM verification platform is modified and simplified, the complexity of the verification platform is lowered on the premise of not affecting verification quality, and the development efficiency of the verification platform is improved.

Description

technical field [0001] The invention relates to the fields of IPsec communication encryption and logic verification, in particular to an encryption strategy matching algorithm module verification platform and an implementation method thereof. Background technique [0002] The Internet Protocol (Internet Protocol) is a data-oriented protocol for packet switching networks. It is the main protocol of the network layer in the TCP / IP protocol, and its task is to transmit data according to the addresses of the source host and the destination host. For this purpose, IP defines addressing methods and encapsulation structures for data. The first major version of the architecture, now known as IPv4, is the most dominant Internet protocol. [0003] IPsec (Internet Protocol Security—Internet Protocol Security), is a network transmission protocol family (a collection of some interrelated protocols) that protects the IP protocol by encrypting and authenticating IP protocol (Internet Pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 耿介李岩孙大军李传忠
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD