Unlock instant, AI-driven research and patent intelligence for your innovation.

Processor For Enhancing Network Security

a network security and processor technology, applied in the field of integrated circuits, can solve the problems of poor performance long delay, and inability to meet the requirements of the conventional network security system, and achieve the effect of improving the efficiency of rule enforcement, improving network security anti-malware efficiency, and enhancing network security

Pending Publication Date: 2020-01-30
HANGZHOU HAICUN INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The present invention is a processor for enhancing network security. It uses a three-dimensional (3-D) integration of pattern-processing circuits and memory circuits, which are stacked on top of each other. The permanent and in-situ nature of the stored patterns in the processor improves network-security performance. The 3-D integration offers many benefits, including more storage capacity and more processing power, resulting in a smaller footprint and lower overall cost. The connections between the memory circuits and processing circuits are short and numerous, leading to a larger bandwidth. Overall, the processor improves network security by performing pattern matching or processing on network packets against rule / virus patterns.

Problems solved by technology

Unfortunately, a conventional network-security system cannot meet these requirements.
Furthermore, because the processor is separated from the storage in a von Neumann architecture, the “memory wall” between them would cause a long delay when the processor fetches rule / virus patterns from the storage.
As a result, the performance of the conventional network-security system is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processor For Enhancing Network Security
  • Processor For Enhancing Network Security
  • Processor For Enhancing Network Security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]Those of ordinary skills in the art will realize that the following description of the present invention is illustrative only and is not intended to be in any way limiting. Other embodiments of the invention will readily suggest themselves to such skilled persons from an examination of the within disclosure.

[0028]Referring now to FIG. 1, a preferred processor 200 for enhancing network security, i.e. a three-dimensional (3-D) security processor, is disclosed. The preferred 3-D security processor 200 not only performs pattern processing, but also permanently stores a rule / virus database. It comprises m×n storage-processing units (SPU) 100aa-100mn. Each SPU is commutatively coupled with an input 110 and an output 120. The input 110 includes at least a network packet, while the output 120 includes at least a result of the pattern processing. Storing rule / virus patterns permanently and in situ, the preferred 3-D security processor 200 avoids the “memory-wall” faced by the von Neuma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

To achieve a better overall performance, a preferred pattern processor offsets large latency with massive parallelism. It comprises a plurality of storage-processing units (SPU's), each of which comprises a single pattern-processing circuit, at least a three-dimensional memory (3D-M) array and a plurality of inter-storage-processor (ISP) connections. The ISP-connections do not penetrate through any semiconductor substrate.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation of application “Processor for Enhancing Network Security”, Application Ser. No. 15 / 729,640, filed Oct. 10, 2017, which is a continuation-in-part of application “Distributed Pattern Processor Comprising Three-Dimensional Memory”, application Ser. No. 15 / 452,728, filed Mar. 7, 2017, which claims priorities from Chinese Patent Application No. 201610127981.5, filed Mar. 7, 2016; Chinese Patent Application No. 201710122861.0, filed Mar. 3, 2017; Chinese Patent Application No. 201710130887.X, filed Mar. 7, 2017, in the State Intellectual Property Office of the People's Republic of China (CN).[0002]This application also claims priorities from Chinese Patent Application No. 201710459978.8, filed Jun. 17, 201 7; Chinese Patent Application No. 201710461239.2, filed Jun. 19, 2017; Chinese Patent Application No. 201710856318.3, filed Sep. 21, 2017, in the State Intellectual Property Office of the People's Republic o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L29/06G11C17/16G11C5/02G11C17/14G11C17/10G06F21/56G11C5/06G11C13/00G06K9/00G11C15/00H01L27/105
CPCG11C5/02H04L63/145G06F21/564G11C13/0002G06K9/00986G11C15/00G11C2213/71G11C17/14G11C5/063H01L27/105G11C17/165G11C17/143G11C5/025G11C17/10G06V10/955H10B20/00
Inventor ZHANG, GUOBIAO
Owner HANGZHOU HAICUN INFORMATION TECH