Unlock instant, AI-driven research and patent intelligence for your innovation.

Two-stage encryption protection method for switch

A switch, encrypted authentication technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problems of authentication failure, lack of flexibility, etc., and achieve the effect of preventing illegal theft, improving reliability, and good flexibility

Inactive Publication Date: 2016-05-25
INSPUR GROUP CO LTD
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The invention provides a two-level encryption protection method for a switch, aiming at the lack of flexibility of the existing switch encryption chip and the corresponding encryption authentication program, and the danger of authentication failure caused by unreliable communication during the encryption authentication process. , to prevent the switch program from being illegally stolen, and supports custom encryption algorithms, which is simple to implement and flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-stage encryption protection method for switch
  • Two-stage encryption protection method for switch
  • Two-stage encryption protection method for switch

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In the specific implementation, for example, there is a switch main board, the board is provided with the exchange configuration chip BCM53003, the single-chip microcomputer is C8051F340, the encryption chip adopts DS28E01-100, the exchange configuration chip BCM53003 communicates with the single-chip microcomputer C8051F340 through the I2C bus, and the single-chip microcomputer C8051F340 communicates with the single-chip microcomputer C8051F340 through the 1-Wire Communicate with encryption chip DS28E01-100.

[0018] Utilize the method of the present invention to set exchange configuration chip, single-chip microcomputer and encryption chip, exchange configuration chip configures and manages the exchange chip, performs upper-layer encryption authentication between the exchange configuration chip and the single-chip computer, and executes bottom layer encryption authentication between the single-chip computer and the encryption chip;

[0019] The upper-layer encryption a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-stage encryption protection method for a switch, and belongs to the technical field of switch security management. According to the two-stage encryption protection method for the switch, the switch is provided with a switching and configuring chip, a single chip computer and an encryption chip, wherein the switching and configuring chip configures and manages a switching chip. The upper-layer encryption authentication is performed between the switching and configuring chip and the single chip computer, and bottom-layer encryption authentication is performed between the single chip computer and the encryption chip. The two-stage encryption protection method for the switch comprises the steps: in an upper-layer encryption authentication process, initiating an authentication request to trigger the bottom-layer encryption authentication; in a bottom-layer encryption authentication process, enabling the upper-layer encryption authentication according to an authentication passing situation, and judging whether the upper-layer encryption authentication succeeds; if the upper-layer encryption authentication succeeds, enabling a switch operating system kernel; if the upper-layer encryption authentication is failed, judging whether the authentication times is larger than a preset value; if the authentication times is larger than the preset value, locking the switch operating system kernel; if the authentication times is less than or equal to the preset value, continuing the encryption authentication. The two-stage encryption protection method for the switch prevents switch programs from being illegally stolen, supports a customized encryption algorithm and has the characteristics of simplicity in implementation and great flexibility.

Description

technical field [0001] The invention discloses a two-level encryption protection method for an exchange, belonging to the technical field of exchange safety management. Background technique [0002] The main functional components of the switch are composed of a switch module and a configuration module. The switch module implements data forwarding of the switch, while the configuration module provides functions such as switch VLAN configuration and SNMP management. With the introduction of technologies such as SDN, the importance of configuration modules has become more prominent. Preventing the program from being illegally stolen and protecting the program on the configuration module is a necessary work for daily maintenance of the configuration module, and using encryption chip technology is a common program protection solution. However, the encryption algorithm used in the existing encryption chip is often solidified in the chip. If the user wants to use other algorithms ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/931H04L12/24H04L29/06
CPCH04L49/10H04L41/0803H04L41/28H04L63/08
Inventor 李清石金长新刘强
Owner INSPUR GROUP CO LTD