Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security access architecture, method and system

An information security and access system technology, applied in the field of communication security control, can solve problems such as normal access of CPU chip PCIe devices, hidden dangers of communication security, inability to perform data exchange, etc., and achieve the effect of information security access

Inactive Publication Date: 2015-03-11
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] figure 1 Shown is the interconnection structure diagram of CPU chip and PCIe equipment in the prior art, as figure 1 Shown: The CPU chips are interconnected through the QPI (Quick Path Interconnect) bus for some data exchange, and each CPU chip will be individually interconnected with the corresponding PCIe device through the PCIe bus; but if one of the PCIe buses appears fault, the corresponding PCIe device will not be able to be accessed normally, that is, the CPU chip connected to the faulty PCIe bus will not be able to normally access the corresponding PCIe device through the faulty PCIe bus, and data exchange will not be possible, causing certain security risks to communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security access architecture, method and system
  • Information security access architecture, method and system
  • Information security access architecture, method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Hereinafter, the present invention will be described in detail with reference to the drawings and examples. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0016] figure 2 Shown is the interconnection diagram of CPU chip, PCIe switch chip, PCIe equipment of embodiment 1 of the present invention, comprises CPU chip A, CPU chip B; PCIe switch chip M (corresponding to CPU chip A), PCIe switch chip N (corresponding to CPU chip B corresponds to); PCIe device 1, PCIe device 2, PCIe device 3, PCIe device 4, PCIe device 5, PCIe device 6, PCIe device 7, and PCIe device 8.

[0017] CPU chip A and CPU chip B are interconnected through the QPI bus for data interaction; CPU chip A and CPU chip B are respectively interconnected with PCIe switch chip M and PCIe switch chip N through their respective PCIe buses; PCIe switch chip M and PCIe switch chip The switch chi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information security access architecture, method and system. The architecture comprises a CPU (central processing unit) chip, a plurality of PCIe (peripheral component interface express) exchanging chips and PCIe equipment; the CPU chip is respectively interconnected with the PCIe exchanging chips through a peripheral component express interconnection bus, i.e. a PCIe bus; the PCIe exchanging chips are interconnected with the PCIe equipment. By adopting the information security access architecture, method and system, the problem that the corresponding PCIe equipment cannot be accessed due to the failure of a communication link can be avoided, and the information security access is realized.

Description

technical field [0001] The invention belongs to the field of communication security control, and in particular relates to an information security access framework, method and system. Background technique [0002] At present, a CPU (Central Processing Unit, central processing unit) chip is interconnected with PCIe devices through the PCIe (Peripheral Component Interconnect Express, external device fast interconnection) bus. If a machine has multiple CPU chips interconnected, Each CPU chip is individually interconnected with the corresponding PCIe device through the PCIe bus. [0003] figure 1 Shown is the interconnection structure diagram of CPU chip and PCIe equipment in the prior art, as figure 1 Shown: The CPU chips are interconnected through the QPI (Quick Path Interconnect) bus for some data exchange, and each CPU chip will be individually interconnected with the corresponding PCIe device through the PCIe bus; but if one of the PCIe buses appears fault, the correspond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F13/20
CPCG06F15/17G06F13/20
Inventor 宗艳艳贡维
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products