Two-stage encryption protection method for switch
A switch, encrypted authentication technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of authentication failure, lack of flexibility, etc., and achieve the effect of preventing illegal theft, improving reliability, and good flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] In the specific implementation, for example, there is a switch main board, the board is provided with the exchange configuration chip BCM53003, the single-chip microcomputer is C8051F340, the encryption chip adopts DS28E01-100, the exchange configuration chip BCM53003 communicates with the single-chip microcomputer C8051F340 through the I2C bus, and the single-chip microcomputer C8051F340 communicates with the single-chip microcomputer C8051F340 through the 1-Wire Communicate with encryption chip DS28E01-100.
[0018] Utilize the method of the present invention to set exchange configuration chip, single-chip microcomputer and encryption chip, exchange configuration chip configures and manages the exchange chip, performs upper-layer encryption authentication between the exchange configuration chip and the single-chip computer, and executes bottom layer encryption authentication between the single-chip computer and the encryption chip;
[0019] The upper-layer encryption a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 