CN114629746A - Data security gateway based on hardware - Google Patents

Data security gateway based on hardware Download PDF

Info

Publication number
CN114629746A
CN114629746A CN202210274965.4A CN202210274965A CN114629746A CN 114629746 A CN114629746 A CN 114629746A CN 202210274965 A CN202210274965 A CN 202210274965A CN 114629746 A CN114629746 A CN 114629746A
Authority
CN
China
Prior art keywords
data packet
data
security gateway
network
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210274965.4A
Other languages
Chinese (zh)
Inventor
赵军安
任勋益
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Shifang Network Technology Co ltd
Original Assignee
Nanjing Shifang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Shifang Network Technology Co ltd filed Critical Nanjing Shifang Network Technology Co ltd
Priority to CN202210274965.4A priority Critical patent/CN114629746A/en
Publication of CN114629746A publication Critical patent/CN114629746A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a data security gateway based on hardware, which comprises a password preposing unit and a service processing unit. The data security gateway of the invention has no foreign high-performance CPU and no leak problem of the back door of CPU hardware; the method has the advantages that no operating system exists, the loophole problem of the operating system does not exist, and the existing environment for the survival of most viruses does not exist; a large number of third-party code bases and self-constructed codes of products are not available, and the problem of self-loophole of the traditional security software is solved; and no IP address, no mac address and invisible equipment network are provided, so that the risk of network hacker intrusion is avoided.

Description

Data security gateway based on hardware
Technical Field
The invention relates to a security gateway, and belongs to the technical field of network security.
Background
At present, with the rapid development of global informatization, the rapid rise of emerging technologies such as 5G, cloud computing, big data, Internet of things, mobile internet and industrial internet, the role of digital economy in economic development becomes more and more important, and government and enterprise data has become an important economic production element from an asset protection object. The data circulation sharing is more frequent, the data torsion amount is larger, and how to protect the safety of the data in the transmission process is more serious.
The traditional security products (VPN, application layer firewall and the like) are constructed based on a foreign high-performance CPU, an operating system, a large number of third-party code libraries and a large number of codes of the products, the overall architecture is shown in FIG. 1, the self security of the products faces the security challenge difficult to cross, bug holes brought by the self large number of codes are faced (each line of codes has bug possibility, the larger the code amount is, the larger the potential safety hazard is), and bug holes of the foreign high-performance CPU, the operating system and the third-party code libraries are inherited naturally:
CPU hardware back door: an ME module exists in main stream CPUs such as Intel and AMD, and can directly use a network port to access memory data under the condition that an operating system is not aware.
Vulnerability of operating system: TheBestVPN calculates the number of vulnerabilities of each operating system in 2019 according to the data of national vulnerability databases of National Institute of Standards and Technology (NIST):
ubuntu Linux: 190 pieces of the feed are added; debian Linux: 360 pieces of the feed are added;
windows Server 2016: 357; windows Server 2019: 351, the number of the channels is 351; and (4) Windows 7: 250, the number of the cells is 250; windows 10: 357;
vulnerability of the security software itself:
(1) in the year 2020 of 4, DarkHotel utilizes a 0day bug of a deep trust SSL VPN server to invade a Chinese government agency, 200 deep trust servers are invaded, and 100 deep trust servers are positioned in a network of the government agency;
(2) in 2020, a hacker invades an American election support system by combining a security vulnerability in Fortinet (flying tower) Fortios SSL VPN and obtains an access right;
(3) on 8/5/2021, the industrial control system of the largest oil Pipeline company, colonal Pipeline, was "hijacked" by hackers due to its own software bugs, causing 17 states and washington, d.c. in the united states to declare an emergency.
Disclosure of Invention
The technical problem to be solved by the invention is to overcome the defects of the prior art and provide a data security gateway based on hardware, thereby avoiding the loophole problem of the traditional data security product and reducing the risk.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
a data security gateway based on hardware at least comprises a central data security gateway and/or a terminal data security gateway, wherein the central data security gateway comprises a password pre-unit and a service processing unit; the terminal data security gateway comprises a password pre-unit;
the password pre-unit is connected with the service processing unit through a data port to realize data interaction;
the password pre-processing unit receives a data packet which enters a protected network/device from the outside through a WAN port, judges whether the data packet is a legal data packet or not, releases the legal and successfully decrypted data packet to the service processing unit, and discards an illegal data packet;
and the service processing unit receives the new network data packet decrypted and encapsulated by the password preposing unit, analyzes the IP address and the port of the network data packet, forwards the data packet meeting the authority from the LAN port to the protected network/equipment, and discards the network data packet if the data packet meets the authority.
Further, the password prefix unit includes:
TCP/IP protocol analysis module: the method is used for identifying and analyzing TCP/IP related protocol stacks;
a password processing module: the system comprises an HMAC algorithm module and an SM2 encryption algorithm module;
the TCP/IP protocol analysis module receives a data packet sent by a protected network/device, analyzes the IP data packet firstly, sends the IP data packet to the password processing module, and the password processing module adopts the SM2 encryption algorithm module and the HMAC algorithm module to encrypt the IP data packet by the SM2 algorithm and the HMAC algorithm, and then is packaged into a new data packet by the TCP/IP protocol analysis module to be sent to the service processing unit.
Furthermore, the password pre-unit adopts FPGA or a special password chip.
Furthermore, the service processing unit comprises a network data packet forwarding module and a permission management module;
the service processing unit receives the network data packet decrypted by the password pre-positioning unit, the authority management module analyzes the IP address and the port of the network data packet, the data packet meeting the authority is released, and otherwise, the data packet is discarded;
after the data packet meeting the authority is released, the data packet is forwarded to the protected network/equipment from the LAN port by the network data packet forwarding module.
Further, the service processing unit is implemented based on a general mainboard architecture.
Further, the password pre-processing unit determines whether the data packet is a legal data packet based on whether each data packet carries a unique identity code of the sending device, if so, the data packet is a legal data packet, and if not, the data packet is determined to be an illegal data packet.
Further, the password pre-unit judges whether the data packet is a legal data packet, and the specific judgment steps are as follows:
1) after the data packet reaches the password preposing unit, verifying whether the data packet is tampered by an HMAC algorithm;
2) and carrying out validity verification on the data packet by taking out the unique identification code of the equipment for the data packet passing the HMAC verification.
Further, the data format of the new network data packet encapsulated by the TCP/IP protocol parsing module is:
new frame header: the segment is an Ethernet protocol custom segment;
new packet IP layer, UDP header: the source end address is the IP address of the originating data security gateway, the destination address is the IP address of the opposite end data security gateway, and the rest is self-defined by a tcp/IP protocol;
encrypted original IP packet: actual IP data packets to be sent by both communication parties;
device unique authentication code: each data packet carries a unique equipment identification code;
HMAC: is the actual value calculated by using the hmac algorithm for the previous segment value.
The invention achieves the following beneficial effects:
the password preposing unit of the invention is arranged in front of the protected network or resource in series, and has the following main characteristics and well solves the corresponding problems of the traditional safety products (VPN, etc.):
1. and no foreign high-performance CPU exists, so that the problem of vulnerability of a hardware backdoor of the CPU does not exist.
2. No operating system exists, so the vulnerability problem of the operating system does not exist; and the existing environment for most viruses to live in is not available.
3. And a large number of third-party code bases and self-constructed codes of products are not available, so that the problem of self-loophole of the traditional security software is solved.
4. The data security gateway has no IP address, no mac address and no visibility on the equipment network, thereby avoiding the risk of network hacker intrusion.
Drawings
FIG. 1 is an overall architecture diagram of a conventional security product;
FIG. 2 is a diagram of the data security gateway architecture of the present embodiment;
fig. 3 is a schematic diagram of network deployment of a data security gateway according to the embodiment;
fig. 4 shows the IP packet format of the present embodiment.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
As shown in fig. 2, the hardware-based data security gateway of the present invention includes a password pre-processing unit and/or a traffic processing unit. The business processing unit receives the data decrypted by the password pre-positioning unit; the password preposition unit encrypts the data sent by the service processing unit and sends the encrypted data.
Password head unit: the method is realized by adopting an FPGA or a special password chip, and the main core service function is realized by adopting a pure hardware circuit, and comprises the following steps: encryption and decryption of network data packets, encapsulation and decapsulation of network data packets, storage of related keys, and the like.
The password front unit mainly comprises:
(1) TCP/IP protocol analysis module: the method is mainly responsible for identifying and analyzing TCP/IP related protocol stacks;
(2) a password processing module: the password encryption system mainly comprises password related functions, including an HMAC algorithm module, an SM2 encryption algorithm module/SM 4 encryption algorithm module;
the TCP/IP protocol analysis module receives a data packet sent by a protected network (or equipment), analyzes the IP data packet, sends the IP data packet to the password processing module, and the password processing module adopts an SM2 encryption algorithm module/SM 4 encryption algorithm module and an HMAC algorithm module to encrypt the IP data packet by an SM2 algorithm, an SM4 algorithm and an HMAC algorithm, and then is packaged into a new network data packet by the TCP/IP protocol analysis module to send.
As shown in fig. 4, the encapsulated new network packet data format is:
new frame header: the segment is customized with the Ethernet protocol;
new packet IP layer, UDP header: the source end address is the IP address of the originating data security gateway, the destination address is the IP address of the opposite end data security gateway, and the other part of the header is self-defined by a tcp/IP protocol;
encrypted original IP packet: actual IP data packets to be sent by both communication parties;
device unique authentication code: each data packet carries a unique identification code of the equipment;
HMAC: is the actual value calculated by using the hmac algorithm for the previous segment value.
The functional characteristics of the invention are concentrated in the password preposing unit and have the following main functional characteristics:
(1) no foreign high-performance CPU;
(2) no operating system;
(3) there are no large third party codebases;
(4) no IP address, no mac address;
(5) and (3) a national secret algorithm: SM4 and SM2 algorithms are realized by hardware, such as FPGA coding or special code chips.
A service processing unit: based on the general mainboard (X86, arm, etc.) architecture implementation, mainly include: a network data packet forwarding module, a right management module and the like.
And the service processing unit receives the new network data packet decrypted and encapsulated by the password pre-positioning unit.
The authority management module: and analyzing the IP address and the port of the network data packet, releasing the data packet meeting the authority, and otherwise, discarding the data packet. The authority is an authority strategy configured in the service processing unit, and the strategy is as follows: and if the corresponding data in the data packet is consistent with the strategy, the data is released, and if not, the data is discarded.
After the data packet meeting the authority is released, the data packet is forwarded to the protected network from the LAN port by the network data packet forwarding module.
As shown in fig. 3, the system using data security gateway networking includes a central data security gateway and a terminal data security gateway. The central data security gateway comprises a password pre-processing unit and a service processing unit. The terminal data security gateway only has a password preposing unit. The data security gateway is connected in series in front of the protected network (or device), and the data security gateway limits illegal data packets from flowing into the protected network (or device), thereby playing a role in protecting the protected network (or device).
The data circulation process of the data security gateway in this embodiment is as follows:
(1) before the data security gateway receives a data packet sent from an LAN port, whether a destination IP address of the data packet is legal is judged based on a legal export IP address table maintained by the data security gateway:
and the central data security gateway acquires the outlet IP address of the network where the terminal is positioned according to the data packet sent by the terminal data security gateway for maintenance and storage, and synchronizes the outlet IP address table to other security gateways in the system using the data security gateway for networking.
And the legal export IP address table is stored in a flash memory of the data security gateway, and is read into the memory to judge the legality of the IP address during operation.
(a) If the opposite end is legal, namely the opposite end also has a data security gateway, session key negotiation is firstly carried out with the data security gateway of the opposite end, after the key negotiation, the corresponding outlet IP address is added into an outlet IP address table, and the password preposing unit carries out hardware encryption on the data packet based on the key and then sends out the data packet;
(b) if the data packet is illegal, namely the opposite end does not deploy a corresponding data security gateway, the data packet is discarded;
(2) before the data packet enters the protected network (or device) from the WAN port, the password pre-unit is used to judge whether the data packet is legal or not, the data packet which is legal and successfully decrypted is released to the service processing unit, and the illegal data packet is discarded.
And judging whether the data packets are legal or not based on whether each data packet carries the unique equipment identification code of the equipment sending out the data packet or not, if the data packet is carried, judging the data packet to be legal, and if the data packet is not carried or the carried identity codes are not consistent, judging the data packet to be illegal. The system is built by adopting the data security gateways, and each data security gateway maintains a device unique identification code which is different from all the data security gateways in the system. And judging whether the carried identity code is consistent or not according to whether the equipment unique identification code carried in the data packet is consistent with the equipment unique identification code maintained by the equipment.
The specific judging steps are as follows:
1) after the data packet reaches the password preposing unit, verifying whether the data packet is tampered by an HMAC algorithm;
2) and carrying out validity verification on the data packet by taking out the unique identification code of the equipment for the data packet passing the HMAC verification.
The unique identification code of the equipment maintains the same legal export IP address table.
The above description is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, several modifications and variations can be made without departing from the technical principle of the present invention, and these modifications and variations should also be regarded as the protection scope of the present invention.

Claims (8)

1. A data security gateway based on hardware is characterized by at least comprising a central data security gateway and/or a terminal data security gateway, wherein the central data security gateway comprises a password pre-unit and a service processing unit; the terminal data security gateway comprises a password pre-unit;
the password pre-unit is connected with the service processing unit through a data port to realize data interaction;
the password pre-processing unit receives a data packet which enters a protected network/device from the outside through a WAN port, judges whether the data packet is a legal data packet or not, releases the legal and successfully decrypted data packet to the service processing unit, and discards an illegal data packet;
and the service processing unit receives the new network data packet decrypted and encapsulated by the password preposing unit, analyzes the IP address and the port of the network data packet, forwards the data packet meeting the authority from the LAN port to the protected network/equipment, and discards the network data packet if the data packet meets the authority.
2. A hardware-based data security gateway as claimed in claim 1, wherein the cryptographic prefix unit comprises:
TCP/IP protocol analysis module: the method is used for identifying and analyzing TCP/IP related protocol stacks;
a cryptographic processing module: the system comprises an HMAC algorithm module and an SM2 encryption algorithm module;
the TCP/IP protocol analysis module receives a data packet sent by a protected network/device, analyzes the IP data packet firstly, sends the IP data packet to the password processing module, and the password processing module adopts the SM2 encryption algorithm module and the HMAC algorithm module to encrypt the IP data packet by the SM2 algorithm and the HMAC algorithm, and then is packaged into a new data packet by the TCP/IP protocol analysis module to be sent to the service processing unit.
3. A hardware-based data security gateway as claimed in claim 1, wherein the cryptographic prefix unit is an FPGA or a dedicated cryptographic chip.
4. A hardware-based data security gateway as claimed in claim 1, wherein the service processing unit includes a network packet forwarding module and a rights management module;
the service processing unit receives the network data packet decrypted by the password pre-positioning unit, the authority management module analyzes the IP address and the port of the network data packet, the data packet meeting the authority is released, and otherwise, the data packet is discarded;
after the data packet meeting the authority is released, the data packet is forwarded to the protected network/equipment from the LAN port by the network data packet forwarding module.
5. A hardware-based data security gateway as claimed in claim 1, wherein the service processing unit is implemented based on a generic motherboard architecture.
6. The hardware-based data security gateway of claim 1, wherein the password pre-unit determines whether the data packet is a legal data packet based on whether each data packet carries a unique identity code of the sending device, if so, the data packet is a legal data packet, and if not, the data packet is an illegal data packet.
7. The hardware-based data security gateway of claim 6, wherein the password pre-unit determines whether the data packet is a legal data packet, and the specific determination step is:
1) after the data packet reaches the password preposing unit, verifying whether the data packet is tampered by an HMAC algorithm;
2) and carrying out validity verification on the data packet by taking out the unique identification code of the equipment for the data packet passing the HMAC verification.
8. A hardware-based data security gateway as claimed in claim 2, wherein the TCP/IP protocol parsing module encapsulates the new network data packet in a data format of:
new frame header: the segment is an Ethernet protocol custom segment;
new packet IP layer, UDP header: the source end address is the IP address of the originating data security gateway, the destination address is the IP address of the opposite end data security gateway, and the rest is self-defined by a tcp/IP protocol;
encrypted original IP packet: actual IP data packets to be sent by both communication parties;
device unique authentication code: each data packet carries a unique equipment identification code;
HMAC: is the actual value calculated by using hmac algorithm for the previous segment value.
CN202210274965.4A 2022-03-21 2022-03-21 Data security gateway based on hardware Pending CN114629746A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210274965.4A CN114629746A (en) 2022-03-21 2022-03-21 Data security gateway based on hardware

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210274965.4A CN114629746A (en) 2022-03-21 2022-03-21 Data security gateway based on hardware

Publications (1)

Publication Number Publication Date
CN114629746A true CN114629746A (en) 2022-06-14

Family

ID=81903826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210274965.4A Pending CN114629746A (en) 2022-03-21 2022-03-21 Data security gateway based on hardware

Country Status (1)

Country Link
CN (1) CN114629746A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118590327A (en) * 2024-08-06 2024-09-03 江苏元信网安科技有限公司 Novel high-speed encryption and decryption system and method based on FPGA unloading

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204918A (en) * 2016-03-16 2017-09-26 无锡十月中宸科技有限公司 A kind of Yunan County's full gateway and cloud security system
CN108810023A (en) * 2018-07-19 2018-11-13 北京智芯微电子科技有限公司 Safe encryption method, key sharing method and safety encryption isolation gateway
CN111770071A (en) * 2020-06-23 2020-10-13 江苏易安联网络技术有限公司 Method and device for gateway authentication of trusted device in network stealth scene
CN113194097A (en) * 2021-04-30 2021-07-30 北京数盾信息科技有限公司 Data processing method and device for security gateway and security gateway
CN113709119A (en) * 2021-08-12 2021-11-26 南京华盾电力信息安全测评有限公司 Password security gateway, system and use method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107204918A (en) * 2016-03-16 2017-09-26 无锡十月中宸科技有限公司 A kind of Yunan County's full gateway and cloud security system
CN108810023A (en) * 2018-07-19 2018-11-13 北京智芯微电子科技有限公司 Safe encryption method, key sharing method and safety encryption isolation gateway
CN111770071A (en) * 2020-06-23 2020-10-13 江苏易安联网络技术有限公司 Method and device for gateway authentication of trusted device in network stealth scene
CN113194097A (en) * 2021-04-30 2021-07-30 北京数盾信息科技有限公司 Data processing method and device for security gateway and security gateway
CN113709119A (en) * 2021-08-12 2021-11-26 南京华盾电力信息安全测评有限公司 Password security gateway, system and use method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118590327A (en) * 2024-08-06 2024-09-03 江苏元信网安科技有限公司 Novel high-speed encryption and decryption system and method based on FPGA unloading

Similar Documents

Publication Publication Date Title
US9590979B2 (en) Password constraint enforcement used in external site authentication
CN108965215B (en) Dynamic security method and system for multi-fusion linkage response
US7051365B1 (en) Method and apparatus for a distributed firewall
US8806572B2 (en) Authentication via monitoring
US9680869B2 (en) System and method for innovative management of transport layer security session tickets in a network environment
US7472414B2 (en) Method of processing data traffic at a firewall
US9843593B2 (en) Detecting encrypted tunneling traffic
US8379638B2 (en) Security encapsulation of ethernet frames
US20040098620A1 (en) System, apparatuses, methods, and computer-readable media using identification data in packet communications
EP4236206A2 (en) Actively monitoring encrypted traffic by inspecting logs
CN110971407B (en) Internet of things security gateway communication method based on quantum key
US20080162922A1 (en) Fragmenting security encapsulated ethernet frames
US8671451B1 (en) Method and apparatus for preventing misuse of a group key in a wireless network
CA2506418C (en) Systems and apparatuses using identification data in network communication
Cho et al. Securing ethernet-based optical fronthaul for 5g network
CN113904826B (en) Data transmission method, device, equipment and storage medium
US20120163383A1 (en) Method and device for transmitting data between two secured ethernet-type networks through a routed network
CN114629746A (en) Data security gateway based on hardware
Cho et al. Secure open fronthaul interface for 5G networks
CN113783868A (en) Method and system for protecting security of gate Internet of things based on commercial password
KR20060044049A (en) Security router system and method for authentication of the user who connects the system
CN108282337B (en) Routing protocol reinforcing method based on trusted password card
Yang et al. Security on ipv6
RU183015U1 (en) Intrusion detection tool
US20210092103A1 (en) In-line encryption of network data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination