Virtual private network applying hardware encipher/decipher

A virtual private network, encryption and decryption technology, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as difficult implementation and heavy workload

Inactive Publication Date: 2003-10-15
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method of modifying the protocol by software to re

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual private network applying hardware encipher/decipher
  • Virtual private network applying hardware encipher/decipher
  • Virtual private network applying hardware encipher/decipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] Such as figure 1 and figure 2 As shown, the present invention has a built-in PCI card 9 in the computer 1 used as a gateway, and uses the PCI card 9 to realize the encryption algorithm, decryption algorithm, digital signature, identity authentication, etc. in the virtual private network technology. When the users between the subnets access each other, the PCI plug-in card 9 adopts any mature data stream encryption and decryption algorithm solidified in the policy library memory 5 and the program memory 6, and passes the data through the PCI controller 2 and the PCI configuration memory 4 by the microprocessor. Received by the device 3 and temporarily stored in the data memory 7, the data stream is encrypted by the microprocessor 3 and then output through the network card module 8, so as to achieve safe and efficient communication between computers in the virtual private network environment.

[0010] PCI plug-in card 9 is a circuit board, and this plug-in card is made ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The hardware enciphering and deciphering virtual private network belongs to the field of information safety. Built-in PCI card is inserted into computer used as gateway to realize enciphering algorithm, deciphering algorithm, digital signature, identity confirmation, etc. During the mutual access among users in different subnetwork in virtual private network, the data passing through PCI controller, in which some available data flow enciphering algorithm cured in the card memory is adopted, is received by microprocessor and stored temporarily in memory, and the enciphered data are output via network card to reach safe and efficient communication among computers under VPN environment. The present invention is even safer than software realized VPN function.

Description

technical field [0001] The invention relates to a network security system, in particular to a virtual private network using hardware encryption and decryption, and belongs to the field of information security. Background technique [0002] The emergence of the Internet has continuously improved the information construction of enterprises and institutions, and the interconnection between different departments of enterprises and institutions across regions has become convenient and economical. However, how to ensure the security and confidentiality of internal data transmission through the public network, and how to manage the different nodes of the enterprise network on the public network have become issues of great concern to enterprises. Virtual private network technology adopts special network encryption and communication protocols, which can enable enterprises to establish virtual encrypted channels on the public network and build their own safe virtual channels. The cro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/14
Inventor 张申生王来瑞肖少君李磊朱翔飞
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products