CN109840431A - Secure network chip and Safety net card and network-termination device - Google Patents

Secure network chip and Safety net card and network-termination device Download PDF

Info

Publication number
CN109840431A
CN109840431A CN201711215142.XA CN201711215142A CN109840431A CN 109840431 A CN109840431 A CN 109840431A CN 201711215142 A CN201711215142 A CN 201711215142A CN 109840431 A CN109840431 A CN 109840431A
Authority
CN
China
Prior art keywords
network
data packet
termination device
chip
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711215142.XA
Other languages
Chinese (zh)
Inventor
汪家祥
张春龙
陈宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongtian Aetna (beijing) Information Technology Co Ltd
Original Assignee
Zhongtian Aetna (beijing) Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongtian Aetna (beijing) Information Technology Co Ltd filed Critical Zhongtian Aetna (beijing) Information Technology Co Ltd
Priority to CN201711215142.XA priority Critical patent/CN109840431A/en
Publication of CN109840431A publication Critical patent/CN109840431A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of secure network chip and Safety net card and network-termination device, secure network chip is applied to network-termination device, comprising: envelope/solution arrangement, enciphering/deciphering component and MAC chip;Envelope/solution arrangement, the first data packet that network-termination device generates is reassembled as second data packet with one or more features data, and the second data packet for being sent to network-termination device is reassembled as to lack the first data packet of one or more of characteristics;Enciphering/deciphering component is encrypted the data segment of the second data packet obtained after recombination, and before reassembling into the first data packet, the data segment for the second data packet for being sent to the network-termination device is decrypted;MAC chip realizes the conversion of the data frame and data packet between network-termination device and network side.The present invention reconstructs data packet and encryption by increasing characteristic, and routine data packet is transformed into dedicated packet, dedicated packet is avoided to flow through the safety issue in journey in network.

Description

Secure network chip and Safety net card and network-termination device
Technical field
The invention belongs to field of information security technology more particularly to a kind of secure network chip and network interface card and the network terminal to set It is standby.
Background technique
Network (cable network and wireless network) is to calculate to carry out most attaching most importance to for data interaction between equipment in modern technologies Channel is wanted, in order to guarantee the safety of interaction data, encryption software is mostly used to carry out the mode of security strategy processing in the market, this Kind mode is affected to the interactive performance of computer, and processing speed is slow, and CPU overhead is bigger, in addition current security strategy Spininess processes (such as encryption) to anti-information leakage aspect, in the prior art shortage while compatible anti-network attack and anti-net The technology that network is divulged a secret.
Summary of the invention
In view of this, it is an object of the present invention to propose a kind of secure network core on network-termination device Piece, to solve the problems, such as the safety of prior art interaction data, interactive device.
In some illustrative embodiments, the secure network chip on network-termination device, is applied to network Terminal device, comprising: envelope/solution arrangement, enciphering/deciphering component and MAC chip;The envelope/solution arrangement is used for the network The first data packet that terminal device generates is reassembled as second data packet with one or more features data, and will be sent to institute The second data packet for stating network-termination device is reassembled as lacking the first data packet of one or more of characteristics;It is described Enciphering/deciphering component is encrypted for the data segment to the second data packet obtained after recombination, and is reassembling into Before first data packet, the data segment for the second data packet for being sent to the network-termination device is decrypted;The MAC Chip, for realizing the conversion of data frame and data packet between the network-termination device and network side.
In some preferred embodiments, the secure network chip, further includes: audit component, for reassembling into the Before two data packets, the IP head for the first data packet that the network-termination device generates is audited, and to the second number Before being decrypted according to the data segment of packet, the IP head for the second data packet for being sent to the network-termination device is examined Core.
In some preferred embodiments, the characteristic is following one or more: customized nonstandard protocol number; Sequence number value and the sequence number field for storing sequence number value;The verification of data field and and storage verification sum inspection field.
In some preferred embodiments, the envelope/solution arrangement is also used to before reassembling into the first data packet, according to The characteristic carries out legitimacy certification to the second data packet after decryption processing.
In some preferred embodiments, the enciphering/deciphering component, comprising: randomizer, for responding the first letter Number to generating unpredictable encoded radio;Burning unit, for executing the behaviour of the burned OTP memory cell of the encoded radio Make;OTP memory cell, for solidifying the encoded radio using as private key;Cryptologic unit, for respond second signal to Cured private key in the OTP memory cell is read, generates corresponding public key, and response third signal to read institute Cured private key in OTP memory cell is stated, encryption/decryption process and fourth signal are carried out to read to the data packet of input Cured private key in the OTP memory cell is taken, signature/sign test processing is carried out to the data packet of input.
It is another object of the present invention to propose a kind of Safety net card on network-termination device, have described Secure network chip, the PHY chip being connect with the MAC chip and the network interface being connect with PHY chip.
Another object of the present invention is to propose a kind of safe wireless network interface card on network-termination device have institute The secure network chip stated, the PHY chip being connect with the MAC chip and the less radio-frequency mould being connect with the PHY chip Block.
Another object of the present invention is to propose a kind of network-termination device, assemble/be integrated with the Safety net card or The safe wireless network interface card.
Compared with prior art, the invention has the following advantages that
The present invention reconstructs data packet and encryption by increasing characteristic, and routine data packet is transformed into exclusive data Packet, so that dedicated packet be avoided to flow through the safety issue in journey in network, and by data packet when receiving Characteristic carries out repeatedly audit certification, guarantees that private network receiving device can only receive dedicated packet, with can preventing spoofed IP The network attacks such as location, DOS flood attack.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes part of this application, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is the structural schematic diagram of secure network chip in the present invention;
Fig. 2 is the structural schematic diagram of Safety net card in the present invention;
Fig. 3 is the structural schematic diagram of safe wireless network interface card in the present invention;
Fig. 4 is the logical schematic of secure network chip in the present invention;
Fig. 5 is the first exemplary structural schematic diagram of key generation component in the present invention;
Fig. 6 is the second exemplary structural schematic diagram of key generation component in the present invention;
Fig. 7 is the exemplary structural schematic diagram of third of key generation component in the present invention;
Specific embodiment
The following description and drawings fully show specific embodiments of the present invention, to enable those skilled in the art to Practice them.Other embodiments may include structure, logic, it is electrical, process and other change.Embodiment Only represent possible variation.Unless explicitly requested, otherwise individual components and functionality is that optionally, and the sequence operated can be with Variation.The part of some embodiments and feature can be included in or replace part and the feature of other embodiments.This hair The range of bright embodiment includes equivalent obtained by the entire scope of claims and all of claims Object.Herein, these embodiments of the invention can individually or generally be indicated that this is only with term " invention " For convenience, and if in fact disclosing the invention more than one, the range for being not meant to automatically limit the application is to appoint What single invention or inventive concept.
And in the following detailed description, a large amount of specific details can be proposed, in order to provide a thorough understanding of the present invention. It will be understood by those skilled in the art, however, that implementable present invention without these specific details.In addition, in order to avoid Unnecessarily obscure main thought of the invention, be not described in well-known method, process, component, structure, circuit and Other feature.
As used in claims, unless otherwise noted, for describing elements/structures/signal/data The uses of ordinal adjectives " first ", " second ", " third " etc. be only used for indicator elment/structure/signal/data tool Body example or similar elements/structure/signal/data different instances, and be not intended to imply that element that these so describe/ Structure/signal/data must in a specific sequence (either temporally, spatially sequence or in any other manner)
Term " communication uplink data ", " communication downlink data " are for the independent network equipment (such as terminal PC machine, service Device etc. has the non-intermediate equipment of the support communication for the functions such as data transmit-receive, data store, data use) for, " in communication Row data " refer to the data that equipment is sent out, and " communication downlink data " refer to the data that equipment receives.Term " dedicated network " Be for the network equipment of interaction data, such as between terminal PC machine and server through the embodiment of the present invention shown in Method out interacts, then between terminal PC machine and server for just constitute the dedicated network of two equipment.
Term " upstream data channel " refers to that " communication uplink data " carry out the path of every processing, " downlink data channel " Refer to that " communication downlink data " carry out the path of every processing.
Referring now to fig. 1, Fig. 1 shows in the present invention and shows for first of the secure network chip on network intermediary device The structural schematic diagram of example, as shown in the drawing, the secure network chip 100 on network-termination device is applied to network Terminal device, comprising: envelope/solution arrangement 110, enciphering/deciphering component 120 and MAC chip 130;The envelope/solution arrangement 110 is used It is reassembled as in the first data packet (such as conventional data packet) for generating the network-termination device with one or more features number According to the second data packet (such as dedicated packet), and the second data packet for being sent to the network-termination device is reassembled as lacking First data packet of one or more of characteristics;The enciphering/deciphering component 120, for being obtained to after recombination The data segment of second data packet is encrypted, and before reassembling into the first data packet, to being sent to the network terminal The data segment of second data packet of equipment is decrypted;The MAC chip 130, for realizing the network-termination device The conversion of data frame and data packet between network side.
The secure network chip, further includes: audit component 140, for before reassembling into the second data packet, to described I P of the first data packet that network-termination device generates are audited, and are solved in the data segment to the second data packet Before close processing, I P of the second data packet for being sent to the network-termination device are audited.
Wherein, the dedicated packet (i.e. the second data packet) being packaged into above-described embodiment by envelope/solution arrangement 110 In increased characteristic be following one or more: customized nonstandard protocol number;Sequence number value and the sequence for storing sequence number value Number field;The verification of data field and and storage verification sum inspection field.
Wherein, customized nonstandard protocol number can be used for distinguishing dedicated packet and routine data packet, and sequence number value can be used for The repeatability of data packet is detected, verify and can be used for detecting the integrality of data packet.
The present invention reconstructs data packet and encryption by increasing characteristic, and routine data packet is transformed into exclusive data Packet, so that dedicated packet be avoided to flow through the safety issue in journey in network, and by data packet when receiving Characteristic carries out repeatedly audit certification, guarantees that private network receiving device can only receive dedicated packet, can prevent from forging I P The network attacks such as address, DOS flood attack.
In some preferred embodiments, the enciphering/deciphering component, comprising: randomizer, for responding the first letter Number to generating unpredictable encoded radio;Burning unit, for executing the behaviour of the burned OTP memory cell of the encoded radio Make;OTP memory cell, for solidifying the encoded radio using as private key;Cryptologic unit, for respond second signal to Cured private key in the OTP memory cell is read, generates corresponding public key, and response third signal to read institute Cured private key in OTP memory cell is stated, encryption/decryption process and fourth signal are carried out to read to the data packet of input Cured private key in the OTP memory cell is taken, signature/sign test processing is carried out to the data packet of input.
As shown in Fig. 2, also proposed a kind of Safety net card on network-termination device in the embodiment of the present invention, have The secure network chip 100, PCI/PCIe interface contact pin 700, the PHY chip 300 being connect with the MAC chip 200, with And the network interface 500 (such as RJ45 slot) being connect with PHY chip 300.
As shown in figure 3, also proposed a kind of safe wireless network interface card on network-termination device in the embodiment of the present invention, With the secure network chip 100, PCI/PCIe interface contact pin 700, the PHY chip being connect with the MAC chip 200 300 and the wireless radio frequency modules 600 that are connect with the PHY chip 300.
It also proposed a kind of network-termination device in the embodiment of the present invention, assemble/be integrated with the Safety net card or described Safe wireless network interface card.
As shown in figure 4, each component in the present invention in embodiment shown in Fig. 1 is, it can be achieved that following steps/function/behaviour Make:
Audit component
Audit component can be used for realizing network unit access control function.
Uplink handles direction: audit component parses upstream data packet, and searches access control list, judges destination IP Whether address is in table.If tabling look-up hit, data packet is passed into package assembling, and read the close of corresponding purpose IP address Key passes to rear class encrypted component;If tabling look-up miss, data cached packet, and CPU is notified to start verification process.
Downlink processing direction: audit component parses downlink data packet, and searches access control list, judges source IP Whether address is in table.If tabling look-up hit, data packet is passed into deblocking arrangement, and read the close of corresponding source IP address Key passes to rear class decryption component;If tabling look-up miss, packet discard.
Encapsulation/deblocking arrangement
Encapsulation/deblocking arrangement is for realizing data integrity inspection, anti-duplicate packages, anti-network attack function.
Uplink handles direction: package assembling is by increasing a sequence number field come anti-duplicate packages, first according to destination IP Serial number table is searched in location, and sequence number value is read from table and adds a serial number as this bag data, is then written to this packet sequence number value In serial number table.Package assembling calculates the HASH value of data packet IP and sequence number field, and the HASH value is added in data packet, And data packet is exported to encrypted component.
Downlink processing direction: deblocking arrangement is extracted from data packet from the data packet after decryption component receiving and deciphering Then serial number and HASH field value search serial number table according to purpose IP address, if the sequence number value read from table with from data The sequence number field value extracted in packet is identical, then may determine that this bag data is duplicate packages, then abandon this packet, on the contrary then calculate data The HASH value of packet IP and sequence number field, and be compared with the HASH field extracted in data packet, this is abandoned if different Data packet, it is on the contrary then data packet is transmitted to next stage.Anti- network attack function can also be by judging that serial number and HASH field value are real It is existing, unauthenticated device data packet, extensive aggression packet, IP spoofing packet etc. may filter that.
Encryption/decryption component
Uplink handles direction: for encrypted component for encrypting to upstream data packet, Encryption Algorithm uses 128bit AES Algorithm, encryption key are looked into key list by audit component and are obtained.
Downlink processing direction: for decryption component for downlink data packet to be decrypted, decipherment algorithm uses 128bit AES Algorithm, decruption key are looked into key list by audit component and are obtained.
For above-mentioned encryption/decryption component, the invention also provides a kind of preferred embodiments-in phy chip Key generation component.
It shows in the present invention referring now to Fig. 5, Fig. 5 for the first exemplary of the key generation component in phy chip Structural schematic diagram discloses a kind of key generation component 400 in phy chip, which can as shown in the drawing It is single including randomizer 410, burning unit 420, OTP (One Time Programmable, One Time Programmable) storage Member 430 and cryptologic unit 440.Key generation component 400 may also include any other circuit not shown in FIG. 1, Structure or logic.The other embodiments of component 400 may include whole, certain in the unit for being shown in FIG. 1 or describing or not have Have.
Randomizer 410 can be indicated for receiving enable signal (the first signal) and generating one or more groups of random Several any circuit, structure or other hardware, for example, generator 110 enable port receive high level signal after start, produce Raw one group 128 or 256 binary system random numbers, i.e., such as 010101011001 ....Preferably, generator 410 generates The digit of random number is chosen between 32-256.
Burning unit 420 can be indicated for executing the operation of the burned OTP module of random number caused by generator 410 Any circuit, structure or other hardware;Preferably, the dedicated core of X-FAB manufacturer burning produced can be used in burning unit 420 Piece.
OTP memory cell 430 may include several fuses or other one time programmings storage equipment, it may include any quantity Position, these positions can by special fuse OTP technique carry out assignment solidification, can be used for solidifying produced by randomizer 410 Encoded radio and/or other values for indicating data or state.Preferably, the fuse of 0.18um or less unit can be used in fuse.
Cryptologic unit 440 is represented by by any circuit, the knot of rivest, shamir, adelman (such as ECC algorithm) hypostazation Structure or other hardware, the interface for having access OTP memory cell 430, receiving control signal, transmitting-receiving data flow, externally export Data flow may include data flow after decryption, encrypted data flow, the data flow after signature, after sign test data flow and The public key used is matched with private key.Further, the executable following operation of cryptologic unit 440:
Control signal (second signal) is received, access OTP module obtains private key, generates and match the public affairs used with the private key Key, and export the public key;
Control signal (third signal) is received, access OTP module obtains private key and selects corresponding encryption/decryption algorithm, right The data flow received carries out encryption/decryption process;
Wherein, it may include Encryption Control Signal and decryption control signal in the control signal, believe when receiving control extension After number, access OTP module obtains private key and constitutes corresponding encryption logic, carries out at encryption to the data flow of input Reason, and export encrypted data flow;After receiving decryption control signal, access OTP module obtains private key and constitutes phase The data flow of input is decrypted in the decryption logic answered, and exports the data flow after decryption.
Control signal (fourth signal) is received, access OTP module obtains private key and carries out signature/sign test processing;
Wherein, it may include signature control signal and sign test control signal in the control signal, control letter when receiving signature After number, access OTP module obtains private key and carries out signature processing to the data flow of input, and exports the data flow after signature. After receiving sign test control signal, access OTP module obtains private key and carries out sign test processing to the data flow of input, and defeated Data flow after sign test out.
Portion is generated the private key in key generation component in the present invention by unpredictable random number in the chip, then In burned OTP module, private key value and chip exterior without any relationship and interaction, guarantee private key exclusive property and can not the property found out, Component external, which either develops designer or attack personnel, can not know private key, to ensure the safety of private key and reliable Property.Furthermore OTP module is only exported to cryptologic unit, and cryptologic unit only to component external output public key, plaintext, Ciphertext, signature and sign test data, private key are from start to finish exported without normal direction component external during use, are further ensured The safety and reliability of private key.It is more again exactly that can prevent attacker from passing through by choosing 0.18um unit fuse below Reverse engineering cracks, and further increases safety.
Fig. 6 shows the second example in the present invention for the key generation component in phy chip, and the example is Fig. 5's On the basis of increase converting unit 450, converting unit 450 can be indicated for carrying out again to private key cured in OTP module 430 Any circuit, structure or other hardware of variation, can be by the original of private key cured in OTP module 430 by the converting unit 450 Initial value is converted into the actual value of private key used in cryptologic unit 440, and the variation logic of converting unit 450 is one Fixed, therefore the actual value of private key used in cryptologic unit 440 is also unique and constant.The present invention passes through increasing Add converting unit 450 to change private key again, the cost that private key is cracked can be improved again.
Fig. 7 shows the third example in the present invention for the key generation component in phy chip, and the example is Fig. 5's On the basis of increase volatile memory cell 460, volatile memory cell 460 can be indicated for storing randomizer for the first time 410 generate encoded radios any kind of storage equipment, may include any amount of data register, command register, Status register, configuration register, control register, other programmable or hard coded register or register group or it is any its His storage organization.Volatile memory cell 460 can temporarily store the encoded radio of the generation of randomizer 410, such as random number Generator 410 sequentially generates multiple groups random coded value, and volatile memory cell 460 then can gradually cache randomizer The 410 every group of random coded values generated include the final complete coding of acquisition to calculating and shifting processing in the process Value.The present invention can reduce the requirements of type selecting of randomizer by the way that volatile memory cell 460 is added, to reduce seniority top digit Randomizer space size, reduce the actual physics area of entire component and phy chip on the whole.
It should also be appreciated by one skilled in the art that various illustrative logical boxs, mould in conjunction with the embodiments herein description Electronic hardware, computer software or combinations thereof may be implemented into block, circuit and algorithm steps.In order to clearly demonstrate hardware and Interchangeability between software surrounds its function to various illustrative components, frame, module, circuit and step above and carries out It is generally described.Hardware is implemented as this function and is also implemented as software, depends on specific application and to entire The design constraint that system is applied.Those skilled in the art can be directed to each specific application, be realized in a manner of flexible Described function, still, this realization decision should not be construed as a departure from the scope of protection of this disclosure.
The above description of the embodiment is only used to help understand the method for the present invention and its core ideas;Meanwhile for this The those skilled in the art in field, according to the thought of the present invention, there will be changes in the specific implementation manner and application range, In conclusion the contents of this specification are not to be construed as limiting the invention.

Claims (8)

1. a kind of secure network chip on network-termination device, which is characterized in that be applied to network-termination device, packet It includes: envelope/solution arrangement, enciphering/deciphering component and MAC chip;
The envelope/solution arrangement, the first data packet for generating the network-termination device are reassembled as having one or more Second data packet of a characteristic, and be reassembled as the second data packet for being sent to the network-termination device to lack described one First data packet of a or multiple characteristics;
The enciphering/deciphering component is encrypted for the data segment to the second data packet obtained after recombination, and Before reassembling into the first data packet, place is decrypted to the data segment for the second data packet for being sent to the network-termination device Reason;
The MAC chip, for realizing the conversion of data frame and data packet between the network-termination device and network side.
2. secure network chip according to claim 1, which is characterized in that further include: audit component, for reassembling into Before second data packet, I P of the first data packet that the network-termination device generates are audited, and to second I P progress before the data segment of data packet is decrypted, to the second data packet for being sent to the network-termination device Audit.
3. secure network chip according to claim 1, which is characterized in that the characteristic is with next or more It is a:
Customized nonstandard protocol number;
Sequence number value and the sequence number field for storing sequence number value;
The verification of data field and and storage verification sum inspection field.
4. secure network chip according to claim 1, which is characterized in that the enciphering/deciphering component, comprising:
Randomizer, for responding the first signal to generate unpredictable encoded radio;
Burning unit, for executing the operation of the burned OTP memory cell of the encoded radio;
OTP memory cell, for solidifying the encoded radio using as private key;
Cryptologic unit reads cured private key in the OTP memory cell for responding second signal, generate and its Corresponding public key, and response third signal is to read cured private key in the OTP memory cell, to the data packet of input Encryption/decryption process and fourth signal are carried out to read cured private key in the OTP memory cell, to the number of input Signature/sign test processing is carried out according to packet.
5. secure network chip according to claim 1, which is characterized in that the envelope/solution arrangement is also used to recombinating Before the first data packet, legitimacy certification is carried out to the second data packet after decryption processing according to the characteristic.
6. a kind of Safety net card on network-termination device, which is characterized in that have safety net as described in claim 1 Network chip, the PHY chip being connect with the MAC chip and the network interface being connect with PHY chip.
7. a kind of safe wireless network interface card on network-termination device, which is characterized in that have peace as described in claim 1 Whole network chip, the PHY chip being connect with the MAC chip and the wireless radio frequency modules being connect with the PHY chip.
8. a kind of network-termination device, which is characterized in that assemble/be integrated with Safety net card as claimed in claim 6 or as weighed Benefit require 7 described in safe wireless network interface card.
CN201711215142.XA 2017-11-28 2017-11-28 Secure network chip and Safety net card and network-termination device Pending CN109840431A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711215142.XA CN109840431A (en) 2017-11-28 2017-11-28 Secure network chip and Safety net card and network-termination device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711215142.XA CN109840431A (en) 2017-11-28 2017-11-28 Secure network chip and Safety net card and network-termination device

Publications (1)

Publication Number Publication Date
CN109840431A true CN109840431A (en) 2019-06-04

Family

ID=66880932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711215142.XA Pending CN109840431A (en) 2017-11-28 2017-11-28 Secure network chip and Safety net card and network-termination device

Country Status (1)

Country Link
CN (1) CN109840431A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117539509A (en) * 2024-01-09 2024-02-09 成都本原聚能科技有限公司 Burning method of OTP module and data frame

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007121641A1 (en) * 2006-04-24 2007-11-01 Beijing E-Henxen Authentication Technologies Co., Ltd. A cpk credibility authentication system using chip
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101409619A (en) * 2008-11-25 2009-04-15 普天信息技术研究院有限公司 Flash memory card and method for implementing virtual special network key exchange
CN104579679A (en) * 2014-12-10 2015-04-29 国家电网公司 Wireless public network data forwarding method for rural power distribution network communication equipment
CN105656883A (en) * 2015-12-25 2016-06-08 冶金自动化研究设计院 Unidirectional transmission internal and external network secure isolating gateway applicable to industrial control network
CN106779636A (en) * 2016-11-29 2017-05-31 北京乐酷达网络科技有限公司 A kind of block chain digital cash wallet based on earphone interface of mobile phone

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007121641A1 (en) * 2006-04-24 2007-11-01 Beijing E-Henxen Authentication Technologies Co., Ltd. A cpk credibility authentication system using chip
CN101183938A (en) * 2007-10-22 2008-05-21 华中科技大学 Wireless network security transmission method, system and equipment
CN101409619A (en) * 2008-11-25 2009-04-15 普天信息技术研究院有限公司 Flash memory card and method for implementing virtual special network key exchange
CN104579679A (en) * 2014-12-10 2015-04-29 国家电网公司 Wireless public network data forwarding method for rural power distribution network communication equipment
CN105656883A (en) * 2015-12-25 2016-06-08 冶金自动化研究设计院 Unidirectional transmission internal and external network secure isolating gateway applicable to industrial control network
CN106779636A (en) * 2016-11-29 2017-05-31 北京乐酷达网络科技有限公司 A kind of block chain digital cash wallet based on earphone interface of mobile phone

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117539509A (en) * 2024-01-09 2024-02-09 成都本原聚能科技有限公司 Burning method of OTP module and data frame
CN117539509B (en) * 2024-01-09 2024-03-22 成都本原聚能科技有限公司 Burning method of OTP module and data frame

Similar Documents

Publication Publication Date Title
Bernstein et al. The security impact of a new cryptographic library
CN103595530B (en) Software secret key updating method and device
Chim et al. PASS: Privacy-preserving authentication scheme for smart grid network
CN101926188B (en) Security policy distribution to communication terminal
CN106688204A (en) Generating cryptographic checksums
CN105281909A (en) Encryption and decryption mechanism and internet of things lock system using encryption and decryption mechanism
US8667283B2 (en) Soft message signing
US11463242B2 (en) Padding oracle elimination in RSA encryption
Esiner et al. F-pro: a fast and flexible provenance-aware message authentication scheme for smart grid
US11368319B2 (en) Integrated circuit performing authentication using challenge-response protocol and method of using the integrated circuit
JP2013131868A (en) Temperature sensor, encryption device, encryption method, and individual information generation device
Saxena et al. Efficient signature scheme for delivering authentic control commands in the smart grid
King Investigating and securing communications in the Controller Area Network (CAN)
CN109842488A (en) For the key generation component in phy chip
US10491570B2 (en) Method for transmitting data, method for receiving data, corresponding devices and programs
Li et al. Efficient and fault‐diagnosable authentication architecture for AMI in smart grid
CN110049045B (en) Safety certification system for power line carrier
CN110191467A (en) A kind of method for authenticating of internet of things equipment, unit and storage medium
Smekal et al. Comparative analysis of different implementations of encryption algorithms on FPGA network cards
Wang et al. EasiSec: a SoC security coprocessor based on fingerprint–based key management for WSN
CN109840431A (en) Secure network chip and Safety net card and network-termination device
Esiner et al. Message authentication and provenance verification for industrial control systems
Jolfaei et al. A lightweight integrity protection scheme for fast communications in smart grid
Fazzat et al. A comparative performance study of cryptographic algorithms for connected vehicles
CN105306437A (en) Network security encryption and verification method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190604

WD01 Invention patent application deemed withdrawn after publication