Security network chip, a security network card and network terminal equipment

A network terminal and secure network technology, applied in the field of secure network chips, network cards and network terminal equipment, to avoid security problems and prevent forged IP addresses

Pending Publication Date: 2019-06-04
ANTAIOS (BEIJING) INFORMATION TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, one of the purposes of the present invention is to propose a secure network chip used on net

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security network chip, a security network card and network terminal equipment
  • Security network chip, a security network card and network terminal equipment
  • Security network chip, a security network card and network terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0022] The following description and drawings illustrate specific embodiments of the invention sufficiently to enable those skilled in the art to practice them. Other embodiments may incorporate structural, logical, electrical, process, and other changes. The examples merely represent possible variations. Individual components and functions are optional unless explicitly required, and the order of operations may vary. Portions and features of some embodiments may be included in or substituted for those of other embodiments. The scope of embodiments of the present invention includes the full scope of the claims, and all available equivalents of the claims. These embodiments of the present invention may be referred to herein, individually or collectively, by the term "invention", which is for convenience only and is not intended to automatically limit the application if in fact more than one invention is disclosed The scope is any individual invention or inventive concept.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security network chip, a security network card and network terminal equipment, and the security network chip is applied to the network terminal equipment and comprises a packaging/unpackaging assembly, an encryption/decryption assembly and an MAC chip. The packaging/unpackaging component recombines the first data packet generated by the network terminal equipment into a second data packet with one or more pieces of feature data, and recombines the second data packet sent to the network terminal equipment into a first data packet lacking the one or more pieces of feature data; The encryption/decryption component is used for encrypting the data segment of the second data packet obtained after recombination, and decrypting the data segment of the second data packet sent to the network terminal equipment before the data segment is recombined into the first data packet; And the MAC chip is used for realizing conversion of data frames and data packets between the network terminal equipment and the network side. According to the method, the conventional data packet is transformed into the special data packet by adding the feature data to reconstruct the data packet and performing encryption processing, so that the security problem of the special data packet in a network flow process is avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a security network chip, a network card and network terminal equipment. Background technique [0002] In modern technology, the network (wired network and wireless network) is the most important channel for data interaction between computing devices. In order to ensure the security of interactive data, encryption software is often used in the market for security policy processing. This method is harmful to computers. The interaction performance is greatly affected, the processing speed is slow, and the CPU overhead is relatively large. In addition, the current security strategies are mostly aimed at preventing information leakage (such as encryption processing), and there is a lack of compatible anti-network attack and anti-network leakage in the existing technology. technology. Contents of the invention [0003] In view of this, one of the objectives ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/72G06F21/70H04L29/06
Inventor 汪家祥张春龙陈宁
Owner ANTAIOS (BEIJING) INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products