An embedded information security platform

An information security and embedded technology, applied in the field of communication, can solve the problems of unfavorable middle and low-end user promotion, low scalability, high hardware cost, etc., and achieve the effect of strong anti-attack ability, wide applicability and high versatility

Inactive Publication Date: 2005-06-01
上海极毅信息科技有限公司
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the high performance of the CPU, this kind of equipment can achieve high encryption and decryption efficiency, but at the same time, the hardware cost of this kind of equipment is also high, which is not conducive to the promotion of low-end users. In fact, the wide promotion of information security products is very large. To a certain extent, it depends on the popularity a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An embedded information security platform
  • An embedded information security platform
  • An embedded information security platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Embodiments of the present invention are described in detail in conjunction with the accompanying drawings.

[0019] Depend on figure 2 As shown, an embedded information security platform is composed of a CPU microcontroller, an encryption and decryption hardware chip, an input and output interface, a power conversion circuit, and a security protection circuit. It is characterized in that the CPU microcontroller is a network processing Chip, select S3C2510A in the present embodiment, on-chip processor is ARM940T core, and an embedded real-time operating system is placed in this core; Encryption and decryption hardware chip is made up of IPSec algorithm chip, symmetric algorithm chip as cryptographic algorithm coprocessor, IPSec algorithm chip is such as figure 2 The one shown above is the highly integrated encryption and decryption coprocessor SafeXcel1741, and the symmetric algorithm chip is the algorithm chip SSP02A of the State Secret Office; the input and output ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embedded information safety platform features the CPU micro controller as one network processing chip with ARM940T kernel containing real-time embedded operation system; enciphering and deciphering hardware chip comprising IPSec algorithm chip and symmetric algorithm chip; I/O interface including two 10/100 M adaptive Ethernet interfaces, one USB main control interface and one serial interface. The present invention is one opening hardware safety platform enclosed inside one casing and with relaxed application environment, powerful attack resistance and high reliability. The present invention has several enciphered algorithms, supports several kinds of application service, has high versatility, and may be used also in ciphering server, VPN ciphering gateway, SSL safety gateway, safety router, hardware fire wall and other safety devices.

Description

technical field [0001] The invention relates to a hardware device in the security field mainly used for information security transmission in a network, and belongs to the technical field of communication. Background technique [0002] At present, domestic network security hardware equipment is far behind the market demand in terms of function, performance and technology. Although the performance indicators of foreign equipment are relatively high, due to security restrictions and other reasons, even security products imported from abroad have technical problems. There are many deficiencies, so it is imminent to develop safety products with independent intellectual property rights in our country. At present, domestic network security hardware products have a single variety, low versatility, and are expensive. The current hardware encryption equipment is basically a structure of industrial computer + network card + PCI encryption card, and then applied in different packaging ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F3/00H04L9/00H04L12/24
Inventor 周玉洁陆海涛邓忠红
Owner 上海极毅信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products