Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for implementing a pseudo-secure network architecture based on hardware reconfiguration

A security network and system implementation technology, which is applied in the field of implementation system of mimic security network architecture, can solve the problems of not considering the security and reliability of system hardware, and the protection has little effect, so as to achieve the effect of improving system reliability and defense

Inactive Publication Date: 2018-09-25
大连梯耐德网络技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, people pay more and more attention to network security, and the corresponding improvement methods are constantly updated and perfected, such as firewall, dynamic IP, network topology transformation and other methods, but the above methods are all implemented from the software level, without considering the need to improve the system hardware Safety and reliability, if the hardware we use has a "back door", then the protection at the software level may have little effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for implementing a pseudo-secure network architecture based on hardware reconfiguration
  • A system and method for implementing a pseudo-secure network architecture based on hardware reconfiguration

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0042] Specific embodiment 1: as figure 2 As shown, the system includes two mutually independent CPU chips (CPU1 and CPU2), two TCAM chips, FPGA chip and memory flash;

[0043] Among them, 4 reconstructed hardware architecture forms are stored in flash, including hardware architecture 1: using CPU1 and TCAM1 for hardware combination; hardware architecture 2: using CPU1 and TCAM2 for hardware combination; hardware architecture 3: using Hardware combination of CPU2 and TCAM1; and hardware architecture 4: use CPU2 and TCAM2 for hardware combination, in which CPU1 and CPU2 can use products from different manufacturers, and the FPGA reconfiguration method uses dynamic reconfiguration, which is reconfigured within the CPU chip settings. The structural control mechanism is to select one of the four hardware architectures sequentially or randomly every day for combined use of hardware. In this way, the system hardware level can be randomly switched and used in different hardware arc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for implementing a mimic security network architecture based on hardware reconfiguration. The system comprises a CPU chip for initializing each hardware in the system and regularly invoking reconfiguration logic programs in a memory to control an FPGA chip to re-structure the hardware architecture form of the system, a plurality of TCAM chips for pre-storing a plurality of characteristic value information entries different in types, searching according to the characteristic value information entries extracted by the FPGA chip and feeding back the searched information to the FPGA chip, and the FPGA chip for re-structuring the hardware architecture form of the system according to logic reconstruction commands distributed by the CPU chip and the memory for storing the reconfiguration logic programs of a plurality of system hardware architectures. According to the system for implementing the mimic security network architecture based on hardware reconfiguration, the system hardware is reselected and structured by use of the reconstruction characteristics of the FPGA in combination with the CPU and the TCAM chips, and then has the uncertainty of the hardware architectures, and therefore, the active defense characteristics of the hardware level can be effectively realized.

Description

technical field [0001] The invention relates to a method for realizing a network security framework, in particular to a system and method for realizing a mimic security network framework based on hardware reconstruction. Background technique [0002] With the continuous maturity of network technology, the application of the network has become pervasive. In many cases, personal and even national confidential data also need to be transmitted on the network. If the network environment is not safe, it will cause harm to network users. Huge loss, so network security technology is an important technology that must accompany the growth of the network. [0003] At present, people pay more and more attention to network security, and the corresponding improvement methods are constantly updated and perfected, such as firewall, dynamic IP, network topology transformation and other methods, but the above methods are all implemented from the software level, without considering the need to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1441
Inventor 江逸茗安涛官福山徐天赐陈琨张晓雷徐亮亮王军陈旭
Owner 大连梯耐德网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products