Unlock instant, AI-driven research and patent intelligence for your innovation.

An embedded power security protection terminal encryption device

A technology for power security and encryption devices, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve the problems of large volume, high hardware configuration, and increased risk of VPN products, and achieve high throughput and stability , running speed improvement, and the effect of streamlining the software

Active Publication Date: 2017-10-27
中电科网络安全科技股份有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the device needs to run the linux operating system, it needs a higher hardware configuration, resulting in a larger volume and higher cost of the VPN product, but the performance is not necessarily high
Coupled with some security loopholes in the open source Linux operating system, it increases the risk of VPN being attacked by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An embedded power security protection terminal encryption device
  • An embedded power security protection terminal encryption device
  • An embedded power security protection terminal encryption device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The power security protection terminal encryption device is composed of underlying hardware equipment and software systems. The overall block diagrams of the network port type and the GPRS type are as follows: figure 1 with figure 2 shown.

[0027] The basic design idea of ​​the power security protection terminal encryption device is: adopt IKE processing + ESP processor architecture, no operating system, process network data in real time, and follow the national "IPSec VPN Technical Specifications" to realize a safe and high-performance access gateway . Both the IKE processor and the ESP processor use domestic commercial secret SOC chips. By expanding different peripheral interface hardware circuits, it can support but not limited to network port, serial port, GPRS dial-up and other interface forms, such as image 3 shown.

[0028] The power security protection terminal encryption device system adopts a modular design idea, and each module is independent of each o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedded electric power safety protection terminal encryption device which comprises an IKE processor and an ESP processor, wherein the IKE processor and the ESP processor conduct communication and synchronization through a double-chip communication drive program, and two commercial cipher SOC chips are adopted for the IKE processor and the ESP processor respectively. An application program comprises an ESP module, a secret key negotiation program body, an SAD module, an SPD module, an initializer, a PPP dial program body, a network packet filtering program body, a TCP protocol stack, a local / remote management system, a certificate module and a log system. According to the encryption device, through division of labor and cooperative work of double CPUs, the device is made to have higher handling capacity and stability; meanwhile non operating system design is adopted, and the required related protocol stack is achieved autonomously, so that the risk that other people attack the device through related loopholes of an operating system is avoided; through the related protocol stack achieved according to the requirements, the software of the device is greatly simplified, and the device operation speed is greatly increased compared with other devices.

Description

technical field [0001] The invention relates to an embedded electric power safety protection terminal encryption device. Background technique [0002] A virtual private network (Virtual Private Network, referred to as VPN) refers to the technology of establishing a private network on a public network. The reason why it is called a virtual network is mainly because the connection between any two nodes of the entire VPN network does not have the end-to-end physical link required by the traditional private network, but is structured on the network provided by the public network service provider. Platforms, such as logical networks on the Internet, ATM (Asynchronous Transfer Mode), Frame Relay (Frame Relay), etc., user data is transmitted in logical links. It covers encapsulation, encryption and identity across shared or public networks Expansion of the private network that verifies the link.VPN mainly adopts tunnel technology, encryption and decryption technology, key manageme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0272H04L63/0485
Inventor 熊毅袁健伯广雨魏程鹏周小川
Owner 中电科网络安全科技股份有限公司