Unlock instant, AI-driven research and patent intelligence for your innovation.

Embedded electric power safety protection terminal encryption device

A technology of power security and encryption device, applied in electrical components, user identity/authority verification, transmission system, etc., can solve the problems of high hardware configuration, increased risk, large size of VPN products, etc., to simplify software and improve operating speed , the effect of high throughput and stability

Active Publication Date: 2015-03-25
中电科网络安全科技股份有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the device needs to run the linux operating system, it needs a higher hardware configuration, resulting in a larger volume and higher cost of the VPN product, but the performance is not necessarily high
Coupled with some security loopholes in the open source Linux operating system, it increases the risk of VPN being attacked by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded electric power safety protection terminal encryption device
  • Embedded electric power safety protection terminal encryption device
  • Embedded electric power safety protection terminal encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The power security terminal encryption device is composed of the underlying hardware equipment and software system. The overall composition diagrams of the network port type and GPRS type are as follows: figure 1 with figure 2 Shown.

[0027] The basic design idea of ​​the power security terminal encryption device is: adopting IKE processing + ESP processor architecture, no operating system, real-time processing of network data, and following the national "IPSec VPN Technical Specification" to achieve a secure and high-performance access gateway . Both IKE processor and ESP processor use domestic commercial secret SOC chips. By expanding different peripheral interface hardware circuits, it can support but not limited to network ports, serial ports, GPRS dial-up and other interface forms, such as image 3 Shown.

[0028] The power safety protection terminal encryption device system adopts a modular design concept, and each module is independent of each other to achieve the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded electric power safety protection terminal encryption device which comprises an IKE processor and an ESP processor, wherein the IKE processor and the ESP processor conduct communication and synchronization through a double-chip communication drive program, and two commercial cipher SOC chips are adopted for the IKE processor and the ESP processor respectively. An application program comprises an ESP module, a secret key negotiation program body, an SAD module, an SPD module, an initializer, a PPP dial program body, a network packet filtering program body, a TCP protocol stack, a local / remote management system, a certificate module and a log system. According to the encryption device, through division of labor and cooperative work of double CPUs, the device is made to have higher handling capacity and stability; meanwhile non operating system design is adopted, and the required related protocol stack is achieved autonomously, so that the risk that other people attack the device through related loopholes of an operating system is avoided; through the related protocol stack achieved according to the requirements, the software of the device is greatly simplified, and the device operation speed is greatly increased compared with other devices.

Description

Technical field [0001] The invention relates to an embedded power safety protection terminal encryption device. Background technique [0002] Virtual Private Network (Virtual Private Network, VPN for short) refers to a technology for establishing a private network on a public network. It is called a virtual network mainly because the connection between any two nodes of the entire VPN network does not have the end-to-end physical link required by a traditional private network, but is based on a network provided by a public network service provider Platforms, such as logical networks on the Internet, ATM (Asynchronous Transfer Mode), Frame Relay, etc., user data is transmitted in logical links. It covers encapsulation, encryption and identity across shared networks or public networks The extension of the private network to verify the link. VPN mainly adopts tunnel technology, encryption and decryption technology, key management technology and user and device identity authenticatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0272H04L63/0485
Inventor 熊毅袁健伯广雨魏程鹏周小川
Owner 中电科网络安全科技股份有限公司