Data security interaction method and device based on Ethernet switch

A technology of data security and interaction method, which is applied in the field of data security interaction method and device based on Ethernet switches, can solve the hidden dangers of the legality and security of the startup mirroring of Ethernet switches, the imperfect consideration of switch security, and the hidden dangers of switch security. and other problems, to achieve the effect of good scalability, flexible algorithm replacement, and confidentiality assurance

Active Publication Date: 2016-01-06
中电科网络安全科技股份有限公司
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]The existing Ethernet switch is based on the technical architecture of "separation of forwarding and control", and the security of the switch itself is not fully considered, and there are the following security risks: (1) There are hidden dangers in the legality and security of the boot image of the Ethernet switch; (2) The file system of the Ethernet switch is stored in plain text, and the switch file is easily exposed, which has potential security risks that the topology information in the network is exposed; (3) The Ethernet switch Most of the protocols communicate in plain text, and there is a security risk of intercepting business data by constructing false protocol messages;
[0003]This invention designs a safe and efficient two-layer key system of device key, file key and protocol key, and proposes The method of data protection solves the security risks of the above-mentioned switches

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security interaction method and device based on Ethernet switch
  • Data security interaction method and device based on Ethernet switch
  • Data security interaction method and device based on Ethernet switch

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0035] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0036] The key management of Ethernet switches manages and distributes keys through the device key, file key, and protocol key two-level system. The key system architecture is as follows: figure 1 shown.

[0037] The device key of the Ethernet switch adopts the public key system. The device key is generated by offline registration of the device. The device masters its own private key by using USBKEY, etc., encrypts the switch to start the ima...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical fields of data communication and password application, in particular to a data security interaction method and device based on an Ethernet switch. Specific to the problems in the prior art, the invention designs a secure and efficient key system consisting of equipment keys, file keys and protocol keys, provides a method for switch mirror protection, switch file protection and protocol data protection, and aims to eliminate potential safety hazards of the Ethernet switch. Encryption processing is performed in the processes of mirror startup, file configuration and data transmission through cooperation of a switch and the Ethernet switch in order to judge whether operations are valid or not, thereby fulfilling the aims of the invention.

Description

technical field [0001] The invention relates to the technical fields of data communication and password application, in particular to a data security interaction method and device based on an Ethernet switch. Background technique [0002] The existing Ethernet switches are based on the technical architecture of "separation of forwarding and control", and the security considerations of the switches themselves are not perfect, and there are the following security risks: (1) There are hidden dangers in the legality and security of the start-up image of the Ethernet switch; ( 2) The file system of the Ethernet switch is stored in plain text, and the switch file is easily exposed, and there is a security risk that the topology information in the network is exposed; (3) Most Ethernet switch protocols communicate in plain text, and there are false protocol messages constructed by constructing , the security risk of intercepting business data; [0003] The present invention designs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/931H04L12/937H04L9/28
Inventor 范科宇
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products