Ethernet controller security enhancement design method

A design method, Ethernet technology, applied in the field of electronic information, can solve problems such as high CPU usage and occupation of system resources, and achieve the effect of not occupying system overhead

Active Publication Date: 2016-04-06
JIANGNAN INST OF COMPUTING TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, network terminal devices usually use special protection wall software, anti-virus software, or data encryption and decryption software to achieve secure communication. This method needs to analyze and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ethernet controller security enhancement design method
  • Ethernet controller security enhancement design method
  • Ethernet controller security enhancement design method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the content of the present invention clearer and easier to understand, the content of the present invention will be described in detail below in conjunction with specific embodiments and accompanying drawings.

[0027] The working mode of the Ethernet controller is pre-configured through the security control module (for example, the working mode includes normal mode, disabled mode and encryption and decryption mode).

[0028] Wherein, the Ethernet controller does not perform encryption and decryption processing of the network protocol in the normal mode.

[0029] In an example where there is a disabled mode, the Ethernet controller may only support system IO access in the disabled mode and not respond to other configuration operations issued by the system.

[0030] Moreover, under the encryption and decryption mode, the Ethernet controller carries out control flow and data flow communication with the external host system through the AMBA bus interface m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an Ethernet controller security enhancement design method. An Ethernet controller performs the following operations in an encryption and decryption mode: carrying out control flow and data flow communication with an external host system through an AMBA bus interface module; realizing transmission of data used for access configuration of different buses in the sending and receiving directions through a DMA engine module; parsing and filtering Ethernet frame data in the sending and receiving directions through a protocol filtering and encapsulating module; sending link layer or network layer protocol data needing encryption and decryption to a data encryption and decryption module, and re-encapsulating the returned data; using a hardware algorithm to process the data through the data encryption and decryption module; sending and receiving data buffer through an MAC transaction module; and carrying out data communication with an external PHY chip through a PHY interface module.

Description

technical field [0001] The invention relates to the field of electronic information, and relates to a safety enhancement design method for a Gigabit Ethernet controller IP core oriented to the safety processing of link layer, network layer and transport layer protocols. Background technique [0002] At present, network terminal devices usually use special protection wall software, anti-virus software, or data encryption and decryption software to achieve secure communication. This method needs to analyze and process various protocols transmitted by the network controller, which has the advantages of occupying system resources and lower CPU usage. High disadvantages, and may cause security risks due to software design flaws. Contents of the invention [0003] In order to overcome the above-mentioned shortcomings of the existing network security protection software mechanism, the present invention provides an enhanced design method of the Gigabit Ethernet controller IP core ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0428H04L63/16
Inventor 徐毅韩文燕张琦滨汪争叶维刘亮毕小建张亮
Owner JIANGNAN INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products