A method for controlling internal and external network access for a network security chip and the network security chip
A technology of network security and access control, which is applied in the field of internal and external network access control and network security chips, and can solve the problems of large white list and occupied storage space, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] The embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings and examples.
[0058] For IP address whitelisting, use data summaries (e.g. bloom filters, machine learning based bloom filters
[0061] (3) The data outline can achieve high query accuracy with a small storage space.
[0062] Based on the whitelist verification of the data summary, first, the IP address whitelist is compressed and stored using the data summary.
[0069] Element insertion: For each connection address x in the IP address whitelist, Bloom filter B uses k hash functions
[0073] The data security unit provides a secure encryption and decryption algorithm and an interactive protocol.
[0080] (4) Unique identification number: After the chip leaves the factory, it cannot be changed once programmed, so that the chip cannot be copied. broken on the outside
[0082] The network security control unit includes four main modules:
[0085] (3) the s...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


