End system-based safety improving method of network data

A network data and end system technology, applied in the field of network data security improvement, can solve problems such as inability to verify correctness, and achieve the effect of being flexible, easy to implement, and ensuring correctness

Active Publication Date: 2016-05-11
XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the field of computer communication, the scale of data is growing at a high speed, and there are generally quality problems in the data. Many data errors have occurred at the data source. At present, the communication data between mainstream nodes is based on adding CRC to the data frame, and the data is proce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End system-based safety improving method of network data
  • End system-based safety improving method of network data
  • End system-based safety improving method of network data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention proposes a method for improving network data security based on an end system, such as figure 1 As shown, including FPGA internal integrated processor core, externally mounted SDRAM and DPRAM dual-port chips, SDRAM is used as a buffer for the application data of the communication port, used to buffer the sending data of the host end and the receiving data of the end system, and the DPRAM dual-port As the sending buffer of the link layer of the end system; by increasing the data copy CRC and the internal data format between the host and the end system to improve data security indicators. Application data format such as figure 2 As shown, for the standard A664 network, the longest application data is 8192 bytes. In order to increase data security, the integrity message header MIH field and two 16-bit CRC fields are added to the application data; the MIH field is composed of It consists of 2-byte message sequence number MSN and 6-byte source time sta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of computer communication, and discloses an end system-based safety improving method of network data. To-be-sent data is sent from a sending end to a receiving end via processes of host-to-end system copy, end system protocol stack processing, end system scheduling, physical layer and link transmission, receiving end scheduling, receiving end protocol stack processing and copy to a receiving host. According to the invention, without changing an existing hardware circuit, CRC verification is added to each stage of the data transmission, so safety of the network data is improved; and the method is characterized by simple realization, flexible use and low cost.

Description

technical field [0001] The invention relates to a method for improving network data security, in particular to a method for improving network data security based on an end system. Background technique [0002] In the field of computer communication, the scale of data is growing at a high speed, and there are generally quality problems in the data. Many data errors have occurred at the data source. At present, the communication data between mainstream nodes is based on adding CRC to the data frame, and the data is processed at the receiving end. Check, but this method can only check out some errors that occur after the CRC check is generated and before the data frame is received, and cannot check the correctness of the entire process of data transmission from the sending host to the receiving host. Ensure the correctness of the data. Contents of the invention [0003] The present invention proposes a method for improving data security based on an end system network, which ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/04H04L63/12
Inventor 张旭刘智武陈长胜王晨博张志平
Owner XIAN AVIATION COMPUTING TECH RES INST OF AVIATION IND CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products