Secure transmission device for calculating checksum according to classification

A secure transmission and Ethernet technology, applied in the field of secure transmission devices, can solve the problems of lack of theoretical training and experience in dealing with system attacks, forged identity attacks, illegal access attacks, and tampering of important enterprise data. Security, the effect of solving remote disaster recovery and real-time hot backup

Inactive Publication Date: 2022-01-21
深圳深度探测科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, large-scale routers or firewalls can solve the problem of internalization of clients and servers, but few of them can solve the problems of identity forgery attacks or illegal access attacks in a targeted manner. They simply encrypt data or use VPN channels
However, many simple service programs often do not restrict this. They are the biggest source of vulnerabilities in the system, and they are also the points that attackers hope to break through.
[0007] In short, the technical personnel of enterprises and institutions lack theoretical training and experience in dealing with system attacks. Even if there are a large number of viruses and Trojan horses in various systems, the system is being accessed and logged in maliciously, and important data of the enterprise is maliciously tampered with, they are at a loss. ignorance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure transmission device for calculating checksum according to classification
  • Secure transmission device for calculating checksum according to classification
  • Secure transmission device for calculating checksum according to classification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A kind of secure transmission device for calculating the checksum according to the classification of the present embodiment comprises the following steps:

[0040] S1: Before use, directly connect the Ethernet port P0 of the safety transmission device STD-C and the safety transmission device STD-S to the management platform. The Ethernet port P0 uses a predefined management IP address and port, and the administrator sends Management command, when the Ethernet network port P0 receives a configuration message in the agreed format from the administrator, it will be configured;

[0041] S2: Define the network where the client cluster resides as network C, which connects to the Ethernet port P1 of the secure transmission device STD-C, defines the network where the server cluster resides as network S, and connects network S to the secure transmission device STD-S Ethernet network port P2;

[0042] S3: The messages sent by any client are grouped according to the source IP add...

Embodiment 2

[0050] The hardware of the secure transmission device STD in this embodiment can be any one of FPGA, ASIC, CPLD, DSP, single-chip microcomputer, ARM chip, RISC-V chip, custom chip, PC system and mobile phone system.

[0051] In this embodiment, the Ethernet network port P1 and the Ethernet network port P2 adopt any one of 10 Gigabit, Gigabit and 100M network ports, and the Ethernet network port P0 adopts a 100M network port.

[0052] The secure transmission device STD-C of this embodiment is at the client node, and receives the requests gathered by each client at a high speed, and counts and generates a specific log CMSG, and the secure transmission device STD-S is at the server node, and receives and sends to Collect requests from each server, and count and generate specific log SMSG, and submit CMSG and SMSG to the monitoring platform to check whether the real-time reported CMSG and SMSG are consistent.

[0053] The secure transmission device STD-C of this embodiment is conn...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure transmission device for calculating checksum according to classification, which comprises the following steps: S1, before use, directly connecting Ethernet ports P0 of a secure transmission device STD-C and a secure transmission device STD-S to a management platform, wherein the Ethernet ports P0 adopt predefined management IP addresses and ports, and an administrator sends a management command; and when the Ethernet port P0s receive a configuration message in an agreed format sent by the administrator, carrying out configuration. According to the secure transmission device for calculating the checksum according to the classification, the huge cost caused by adding a special high-performance firewall or introducing a large-scale router and increasing a large number of secure operation and maintenance personnel is overcome. According to the method and the system, the security can be outsourced to an enterprise with unique technology and capability as an independent service to ensure the security of a complex network of the enterprise, so that the risk of huge loss caused by attack of the enterprise is reduced at reasonable cost.

Description

technical field [0001] The invention relates to the technical fields of embedded equipment and communication, in particular to a secure transmission device for calculating checksums by classification. Background technique [0002] With the evolution of the market and the advancement of technology, the concept of client and server has become more and more general, requesting services and responding to services. This mechanism is used in many occasions. Of course, as the data becomes more and more important, the request and response mechanism is subject to more and more attacks. [0003] The most important attacks are: 1) Identity forgery attacks, for example, forging the identity of a mobile phone / account, logging in to the system, thereby stealing user money or committing fraud; 2) Illegal access attacks, for example, using special equipment to On the dedicated line link, introduce illegal equipment, attack large enterprises and implant Trojan horses, and then blackmail; 3)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/1425H04L63/126H04L63/0209
Inventor 王志东王志晓
Owner 深圳深度探测科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products