Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message security processing system and method

A technology for security processing and packet processing, applied in the field of network communication, which can solve problems such as enterprise loss, performance limitation of security feature processing, and occupation of CPU operating resource interface bandwidth.

Active Publication Date: 2019-11-15
北京物芯科技有限责任公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The improvement of computer system connection and circulation capabilities has greatly improved its ability in system business processing. At the same time, security issues based on network connections have become increasingly prominent. Once the system is attacked, it will bring huge losses to the enterprise. loss
[0004] In existing network equipment, common security features, such as IPSEC, SSL, TLS, DTLS, MACSec, and SRTP, are often implemented in the following ways: First, CPU pure software mode, mainly through the CPU to run security feature software, Realize message security processing; second, the CPU integrated with special security feature-related instruction sets runs security feature software to realize message security processing; third, CPU plus security co-processing module, mainly through the CPU will need to perform security processing The message fragments are sent to the security co-processing module to achieve message security processing, but in the above implementation methods, a part of CPU operating resources and interface bandwidth are required, and the processing performance of security features is limited by CPU performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message security processing system and method
  • Message security processing system and method
  • Message security processing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a schematic structural diagram of a message security processing system in Embodiment 1 of the present invention. The technical solution of this embodiment is applicable to the case of message security processing through a hardware security co-processing module and a network processing module. The message security processing The system includes a processor 1 , a hardware security co-processing module 2 and a network processing module 3 , and the processor 1 is integrated with a software security protocol and a control module 4 .

[0022] The processor 1 is connected to the hardware security co-processing module 2 and the network processing module 3 respectively through a control management bus 5; the hardware security co-processing module 2 and the network processing module 3 are connected to each other through a message processing bus 6 connected.

[0023] In this embodiment, the processor 1 is respectively connected to the hardware security co-processin...

Embodiment 2

[0039] figure 2 A schematic structural diagram of a message security processing system provided by Embodiment 2 of the present invention. This embodiment is further refined on the basis of the above embodiments, providing a processor 1, a hardware security co-processing module 2 and a network processing module 3 specific functions. Combine below figure 2 A message security processing system provided in Embodiment 2 of the present invention is described:

[0040] The message security processing system includes: a processor 1 , a hardware security co-processing module 2 and a network processing module 3 , and the processor 1 is integrated with a software security protocol and a control module 4 .

[0041] The processor 1 is connected to the hardware security co-processing module 2 and the network processing module 3 respectively through a control management bus 5; the hardware security co-processing module 2 and the network processing module 3 are connected to each other throu...

Embodiment 3

[0072] image 3 It is a flow chart of a message security processing method in Embodiment 3 of the present invention. The technical solution of this embodiment is applicable to the case of message security processing through a hardware security co-processing module and a network processing module. The execution of the document security processing system specifically includes the following steps:

[0073] Step 110 , when a secure session is established or a session state needs to be refreshed, the processor runs the software security protocol and the control module, and configures the hardware security co-processing module and the network processing module.

[0074] Wherein, configuring the hardware security co-processing module and the network processing module includes configuring the security session table and the module control table in the hardware security co-processing module, and configuring the switching and forwarding table and the security session diversion table in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a message security processing system and a method. The message security processing system comprises a processor, a hardware security co-processing module anda network processing module, and the processor is integrated with a software security protocol and a control module; the network processing module is connected with at least one network interface, andsends the message received from the network interface to the hardware security co-processing module for security processing; a message fed back after processing of the hardware security co-processingmodule is completed is sent out through a network interface; and the hardware security co-processing module is used for performing security processing on the received message sent by the network processing module and feeding back the message to the network processing module. According to the system of the embodiment of the invention, through interaction between the hardware security co-processingmodule and the network processing module, the effect that the message security processing does not need to occupy the running memory of the processor is realized, so that the processing performance of the message security characteristic is not limited by the performance of the processor.

Description

technical field [0001] The embodiments of the present invention relate to network communication technologies, and in particular to a message security processing system and method. Background technique [0002] With the rapid development of computer technology, the business processed on the computer has also developed from single-computer-based file processing or internal business processing based on simple connections to enterprise-level computer processing systems based on complex intranets, extranets and the global Internet. Worldwide information sharing and business processing. [0003] The improvement of computer system connection and circulation capabilities has greatly improved its ability in system business processing. At the same time, security issues based on network connections have become increasingly prominent. Once the system is attacked, it will bring huge losses to the enterprise. loss. [0004] In existing network equipment, common security features, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0803H04L63/20
Inventor 唐峰
Owner 北京物芯科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products