Safe and credible Ethernet interface system and implementation method

A technology of interface system and implementation method, which is applied in the field of safe and reliable Ethernet interface system, and achieves the effect of good popularization and wide application range

Pending Publication Date: 2020-06-09
INSPUR FINANCIAL INFORMATION TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical task of the present invention is to provide a safe and reliable Ethernet interface system and its implementation method to solve the problem of how to improve the security of Ethernet interface data communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and credible Ethernet interface system and implementation method
  • Safe and credible Ethernet interface system and implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] as attached figure 1 As shown, the safe and trusted Ethernet interface system of the present invention has a structure including a TCM chip, an EEPROM extended memory, a key verification module, an STM32 management chip and an Ethernet port. The TCM chip communicates with the STM32 management chip through the I2C bus, and the STM32 The management chip manages the Ethernet communication data packets through the GPIO bus. The TCM chip is embedded with a key verification module. The key verification module communicates with the Ethernet device through the I2C bus. The TCM chip manages the data communication of the Ethernet port through the I2C / SPI bus. Read and write data through PSRAM data bus and external EEPROM expansion memory. Among them, the key verification module adopts the ISO7816 module.

[0035] The TCM chip is used to read device information and determine whether the device has a security key. The specific process is as follows:

[0036] If the security key i...

Embodiment 2

[0040] as attached figure 2 As shown, the implementation method of the safe and trusted Ethernet interface of the present invention, the implementation method is to monitor and protect the communication data of the Ethernet port in real time through the TCM chip, and finally realize the safety and reliability of the data communication; the specific steps are as follows:

[0041] S1. After the TCM chip detects the data communication of the Ethernet port, it reads the internal information of the communication device through the embedded key verification module, judges that the communication device has no security key and verifies:

[0042] ①. If the communication device has a security key and the verification is passed, execute step S2;

[0043] ②. If the communication device does not have a security key or the security key has not been verified, skip to step S3;

[0044] ③. If the TCM chip detects that the computer has repeatedly used a communication device that has not been ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and credible Ethernet interface system and an implementation method, belonging to the technical field of communications. The technical problem to be solved by the invention is how to improve the data communication security of an Ethernet interface. The adopted technical scheme is as follows: the system comprises a TCM chip, an EEPROM extended memory, a key verification module, an STM32 management chip and an Ethernet port, the TCM chip is communicated with the STM32 management chip through an I2C bus, the STM32 management chip manages an Ethernet communication data packet through a GPIO bus, a secret key verification module is embedded in the TCM chip, the secret key verification module communicates through an I2C bus Ethernet device, and the TCM chip managesEthernet port data communication through an I2C / SPI bus. According to the implementation method, Ethernet port communication data is monitored and protected in real time through the TCM chip, and finally security and credibility of data communication are achieved.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a safe and reliable Ethernet interface system and its realization method. Background technique [0002] With the rapid development of the Internet era, the information security problems encountered are becoming more and more prominent, and problems such as network attacks and information leakage emerge in an endless stream. Without core information security technology, we will face a severe information security situation. Especially in the modern computer and intelligent terminal industry with big data as the medium. [0003] At present, most of the Ethernet interface management technologies used in the market are based on the software level. After the system is started, it is managed through software settings, and the security has certain limitations; moreover, there is a lack of real-time monitoring and protection of communication data. The protective effect will be grea...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06G06F13/42G06F21/34G06F21/72
CPCH04L9/3234H04L63/0428G06F21/34G06F21/72G06F13/4282
Inventor 李健王金鹏胡焱
Owner INSPUR FINANCIAL INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products