Security chip for protecting network security system and network security system using same

A technology of network security system and security chip, which is applied in the direction of transmission system, digital transmission system, security communication device, etc., can solve problems such as difficult system security, effective control of losses, and unknown vulnerability attacks, so as to ensure absolute security and reduce Risk, effect of hardware isolation

Inactive Publication Date: 2019-11-08
XI AN JIAOTONG UNIV
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These remote devices are usually not maintained by dedicated personnel, so the system often cannot or cannot be updated in time, and is vulnerable to attacks from unknown vulnerabilities, or information leakage due to phishing attacks
Therefore, it is difficult to ensure system security only through software design, and it is also impossible to effectively control losses in the event of a security incident.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip for protecting network security system and network security system using same
  • Security chip for protecting network security system and network security system using same
  • Security chip for protecting network security system and network security system using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The implementation of the present invention will be described in detail below in conjunction with the drawings and examples.

[0032] Such as figure 1 As shown, the present invention is a security chip that protects the security of sensitive data communication at the hardware level, and the design framework of the security chip is as follows figure 2 As shown, it mainly includes two parts, the data security part and the network security part.

[0033] Among them, the data security part provides secure encryption and decryption algorithms and interactive protocols, mainly including the following modules:

[0034] Encryption and decryption algorithm control engine: firstly, it includes secure storage of private keys, supports private key ECDH operation, and ECDSA signature authentication; secondly, it provides mainstream national secret and commercial encryption and decryption algorithm control engines, including SM1 / SM2 / SM3 / SM4, RSA, AES etc., can perform high-speed e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A security chip for protecting a network security system comprises a data security part for providing a secure encryption and decryption algorithm and an interaction protocol, wherein the data security part mainly comprises an encryption and decryption algorithm control engine, an authorization counter, a true random number generator, a unique serial number and a secure EEPROM; and a network security part composed of a network white list filtering module and a network data processing module. The encryption and decryption algorithm control engine comprises private key security storage for supporting private key ECDH operation and ECDSA signature authentication. The mainstream national password and commercial password encryption and decryption algorithms perform high-speed encryption and reduction on the data stream so as to adapt to the security requirements of different scenes. The chip safety management supplies power, manages the read-write ROM on the chip, allows special equipment to write, and allows remote erasure but does not allow reading. The invention also provides a network security system using the security chip. The sensitive data communication security can be protectedfrom the hardware level, and the efficiency can be greatly improved while the system security is improved.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to the realization of hardware architecture of a network security chip and the realization in a network system, in particular to a security chip used for network security system protection and a network security system using the chip. Background technique [0002] The development of network information technology is gestating a new industrial and technological revolution, but it also brings huge security risks. Hackers have also frequently intruded on smart cars and smart home devices. The Mirai botnet and its variants have controlled tens of millions of smart cameras and smart routers around the world. Network security has become a key issue of national concern. [0003] At present, physical isolation of internal and external networks is the most commonly used network security defense mode. But this mode cannot be protected according to the security level. Since mobile of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08G06F21/78
CPCG06F21/78H04L9/0869H04L9/3226H04L9/3247H04L63/0236H04L63/10H04L2209/12
Inventor 管晓宏耿莉杨晨杨骥孙钦东李卫赵玉平张可旺王平辉
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products