Secure Ethernet bridge scrambling terminal based on national cryptographic algorithm

A national secret algorithm, Ethernet technology, applied in the field of network backhaul data equipment

Active Publication Date: 2018-01-19
郑州中科集成电路与系统应用研究院
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the huge risks faced by existing Ethernet distributed deployment devices or other open network backhaul data devices in data exchange and data backhaul in untrusted networks, the purpose of this invention is to provide a national secret algorithm-based The secure Ethernet bridge scrambling terminal adopts the secure Ethernet bridge scrambling technology based on the national secret algorithm to solve the risks faced by the deployed Ethernet terminal equipment and the open network data return terminal equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure Ethernet bridge scrambling terminal based on national cryptographic algorithm
  • Secure Ethernet bridge scrambling terminal based on national cryptographic algorithm
  • Secure Ethernet bridge scrambling terminal based on national cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0053] The first preferred technical solution

[0054] The structural composition diagram of the Ethernet bridge scrambling terminal based on the national secret algorithm is as follows figure 1 shown, including:

[0055] 1) Xilinx Spartan 6FPGA;

[0056] 2) Three independent Ethernet physical interfaces, including GMII PHY and RG45 socket;

[0057] 3) USB 2.0 physical interface;

[0058] 4) SD / TF card reader slot;

[0059] 5) UART interface;

[0060] 6) ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure Ethernet bridge scrambling terminal based on a national cryptographic algorithm. The terminal includes an Ethernet bridge data receiving / forwarding function, a whitelist filtering function, a scrambling function, a data tamper-proofing verification function, a terminal equipment authentication function and a user use authentication function. According to a security protection scheme that is simple and practicable, is convenient to deploy, and has high cost performance, provided by the invention, the risks of deployed Ethernet terminal equipment and open network data backhaul terminal equipment can be solved by adopting a secure Ethernet bridge scrambling technology based on the national cryptographic algorithm.

Description

technical field [0001] The invention relates to an Ethernet distributed deployment device or other open network return data devices, in particular to a secure Ethernet bridge scrambling terminal based on a national secret algorithm. Background technique [0002] The risks encountered by Ethernet distributed devices or other open network backhaul data devices are as follows: [0003] 1) The exposed data has not undergone any scrambling processing, so it can be easily intercepted and restored, and even control protocol messages can be intercepted; [0004] 2) The data processing of the remote terminal and the network data processing are realized by CPU plus operating system and application software, and there is a risk of intrusion and attack. Hackers can use DDOS attacks to directly cause the entire terminal to stop working, or even use more advanced means to invade the CPU's operating system, and directly obtain the highest authority to do whatever they want; [0005] 3) T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L12/02H04L29/06
Inventor 于哲
Owner 郑州中科集成电路与系统应用研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products