Secure communication method based on switch

A secure communication and switch technology, applied to secure communication devices and key distribution, can solve the problem of illegal interceptors being unable to steal and intercept data, and achieve the effects of increasing the risk of confidentiality, ensuring real-time updates, and strong confidentiality

Active Publication Date: 2019-11-05
中泓慧联技术有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides a security switch system based on an encryption algorithm, which solves the problem of data security exchange in the local area network, so that illegal listeners cannot steal and intercept data in the local area network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method based on switch
  • Secure communication method based on switch
  • Secure communication method based on switch

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0034] like figure 1 Shown is the hardware structural diagram of the present invention.

[0035] The security switch system based on the encryption algorithm includes the connection between the CPU and the switching chip; the switching chip and the FPGA are connected through the Serdes interface; after the FPGA performs encryption and decryption work, the encrypted message is sent to the network card of the user-side computer through the PHY chip. After the network card is decrypted, it forms a normal message and uploads it to the computer. like Image 6 shown.

[0036] FPGA implementation is mainly composed of RGMII interface MAC, SGMII interface MAC, scrambling unit, descrambling unit and MDIO control unit, such as Figure 5 shown.

[0037] After the ciphertext data is processed by the PHY module, it is transmitted to the FPGA in RGMII ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secure communication method based on a switch. A system comprises a secure switch mainboard and a network card, the security exchange mainboard normally receives/sends a common Ethernet packet in the uplink direction; the security exchange mainboard sends the downlink Ethernet data packet to an FPGA encryption processing module; the FPGA encryption module carries out encryption processing on the Ethernet data; the encryption module sends the encrypted data packet to a network card; the network card decrypts the encrypted data and converts the decrypted data into a normal Ethernet network data packet. the secure communication problem of the switch on the user access side is solved, independent encryption and secret key distribution of each Ethernet port are achieved, and illegal interception for user side communication can be completely blocked.

Description

technical field [0001] The invention relates to the field of data communication, in particular to a switch-based safe communication method. Background technique [0002] With the continuous acceleration of the pace of my country's informatization construction, the application of computer network technology is becoming more and more extensive. However, looking at the overall situation, there are still many problems in my country's network information security, and network security work is obviously lagging behind network construction. In particular, the security and reliability of confidential information transmission in the network is low. Private and confidential information is stored in the network system, which is easily collected and leaked. During the transmission process, this confidential information has to go through many external nodes and is difficult to verify. Any intermediate node may be read or maliciously modified, including data modification, retransmission...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/083H04L63/0428H04L63/0838H04L9/0891H04L9/0863
Inventor 陶林万积文孙琳琳田越辛树奇马晓华胡德环苏成鑫吴智睿杨少华
Owner 中泓慧联技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products