CN205787791U - Network relay and network system - Google Patents
Network relay and network system Download PDFInfo
- Publication number
- CN205787791U CN205787791U CN201620719418.2U CN201620719418U CN205787791U CN 205787791 U CN205787791 U CN 205787791U CN 201620719418 U CN201620719418 U CN 201620719418U CN 205787791 U CN205787791 U CN 205787791U
- Authority
- CN
- China
- Prior art keywords
- circuit
- count value
- deciphering
- receiving terminal
- network relay
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Small-Scale Networks (AREA)
Abstract
Embodiment of the present utility model provides a kind of network relay and a kind of network system.This network relay includes: receiving terminal enumerator, is used for arranging receiving terminal count value;Circuit is identified in deciphering, it is connected to receiving terminal enumerator, for being decrypted from the encryption data bag controlling end, to obtain the control instruction comprised in encryption data bag and to control end count value, relatively receiving terminal count value and control end count value, and the output of control instruction is controlled according to comparative result;Drive circuit, is connected to deciphering and identifies circuit, be used for receiving control instruction, and generate control signal;And relay element, it is connected to drive circuit, under the driving of the control signal exported at described drive circuit, generates on-off model.The effectiveness of control instruction can be verified by above-mentioned network relay, it is ensured that network relay only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from the attack of assailant.
Description
Technical field
This utility model relates to circuit field, more particularly, to a kind of network relay and network system.
Background technology
" network relay " (or claiming " network switching ") is a kind of device, has network interface and output switch parameter to connect above
Mouthful.When after network relay access network, can be in the control of other network equipment (such as computer, flush bonding processor etc.)
Under be switched on or switched off its relay element and export corresponding on-off model, and then open or close coupled to be controlled
Control equipment.Network relay be usually used in by existing, without the scrap build of remote control function for network remote control can be passed through
The equipment of system, such as remote controlled light devices, remotely controls firing equipment, remotely controls electric control door lock etc..In a lot of application
Under occasion, network relay is had higher safety requirements.
But, existing network relay is typically based on relatively simple control protocol work, and control security is poor.
A kind of situation be microprocessor in network relay connect based on the plaintext control protocol entirely without encryption or
Disconnect relay element, such as: character string " on " represents connects relay element, and character string " off " expression disconnects relay unit
Part.For such network relay, assailant can forge control instruction easily, as long as and assailant know net
The network address of network relay, it is possible to the control instruction of forgery is sent to network relay to control its switch.
Another kind of situation is that the microprocessor in network relay is switched on or switched off relay based on encrypted control protocol
Device element, its control instruction received is through default key encryption.The microprocessor of network relay is to encrypted
Control instruction be decrypted after according to deciphering obtain control instruction be switched on or switched off relay element.Due to assailant not
Know key, just cannot forge control instruction.But several the instructions being usually fixed due to control instruction, the most encrypted
Control instruction be also fixing, if assailant certain intercepted and captured transmission in control instruction (encrypted), if reset
These instructions, can play the effect controlling network relay equally.
Utility model content
In view of the problems referred to above, this utility model provides the network relay that a kind of control security is higher.
According to this utility model on the one hand, it is provided that a kind of network relay.This network relay includes: receiving terminal counts
Device, is used for arranging receiving terminal count value;Circuit is identified in deciphering, is connected to described receiving terminal enumerator, for from controlling end
Encryption data bag be decrypted, to obtain the control instruction that comprises in described encryption data bag and to control end count value, compare
Described receiving terminal count value and described control end count value, and the output of described control instruction is controlled according to comparative result;Drive
Galvanic electricity road, is connected to described deciphering and identifies circuit, be used for receiving described control instruction and generating control signal;And relay unit
Part, is connected to described drive circuit, generates on-off model under the driving of the control signal exported at described drive circuit.
Exemplarily, the one or more realization during described deciphering is listd under identifying circuit employing: special IC
(ASIC), field programmable logic array (FPGA), CPLD (CPLD) and microcontroller (MCU).
Exemplarily, described deciphering identifies that circuit includes: deciphering circuit, is used for utilizing preset-key to described encryption data
Bag is decrypted, and exports described control end count value via the first outfan and export described control via the second outfan
System instruction;Comparator, is connected to outfan and first outfan of described deciphering circuit of described receiving terminal enumerator, and being used for will
Described receiving terminal count value compares with described control end count value, to obtain described comparative result;And logic gates,
It is connected to outfan and second outfan of described deciphering circuit of described comparator, is used for when described comparative result is virtual value
Time conducting described control instruction to be exported described drive circuit, and when described comparative result is invalid value turn off.
Exemplarily, described deciphering circuit uses single circuit realiration, described comparator and described logic gates collection
Become to realize together.
Exemplarily, described deciphering circuit, described comparator and described logic gates are respectively adopted single circuit in fact
Existing.
Exemplarily, described deciphering circuit uses ASIC, FPGA, CPLD or MCU to realize.
Exemplarily, the first input end of described receiving terminal enumerator connects the outfan of described comparator, described reception
Second input of end enumerator connects the first outfan of described deciphering circuit, and described receiving terminal enumerator is further used for working as
When described comparative result is virtual value, described receiving terminal count value is updated to consistent with described control end count value.
Exemplarily, described network relay farther includes network interface chip, is connected to described deciphering and identifies circuit,
For receiving described encryption data bag from described control end and described encryption data bag being exported described deciphering qualification circuit.
Exemplarily, described network interface chip includes radio network interface chip and/or wired network interface chip.
Exemplarily, described network interface chip and described deciphering identify that circuit integrates realization.
According to another aspect of the present utility model, it is provided that a kind of network relay.Comprising: any one network described above
Relay and for controlling the control end of open and close of described network relay, wherein, described control end includes controlling
End enumerator, generates described control end count value for the count value according to storage, and sends described encryption at described control end
After packet, adjust the count value of described storage.
The effectiveness of control instruction can be verified by the network relay that this utility model provides, it is ensured that network relay
Device only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from assailant's
Attack.
Accompanying drawing explanation
By combining accompanying drawing, this utility model embodiment is described in more detail, of the present utility model above-mentioned and its
Its purpose, feature and advantage will be apparent from.Accompanying drawing is used for providing being further appreciated by this utility model embodiment, and
And a part for composition description, it is used for explaining this utility model together with this utility model embodiment, is not intended that this reality
With novel restriction.In the accompanying drawings, identical reference number typically represents same parts or step.
Fig. 1 illustrates the schematic block diagram of the network relay according to one embodiment of this utility model;
Fig. 2 illustrates the schematic block diagram of a kind of network system according to one embodiment of this utility model;And
Fig. 3 illustrates that circuit and the schematic frame of receiving terminal enumerator are identified in the deciphering according to one embodiment of this utility model
Figure.
Detailed description of the invention
So that the purpose of this utility model, technical scheme and advantage become apparent from, retouch the most in detail
State according to example embodiment of the present utility model.Obviously, described embodiment is only that a part of the present utility model is implemented
Example rather than whole embodiment of the present utility model, it should be appreciated that this utility model is not limited by example embodiment described herein
System.Based on this utility model embodiment described in this utility model, those skilled in the art are not paying creative work
Within all other embodiments obtained by the case of all should fall into protection domain of the present utility model.
Embodiment of the present utility model provides a kind of network relay.This network relay can be to the encryption number received
Verify according to bag, to generate on-off model safely.The on-off model generated may be used for various control field, example
Such as Lighting control, environmental Kuznets Curves, safety-protection system control, home appliance control etc..
The network relay that the utility model proposes is described below with reference to Fig. 1.Fig. 1 illustrates according to one reality of this utility model
Execute the schematic block diagram of the network relay 100 of example.As it is shown in figure 1, this network relay 100 include receiving terminal enumerator 110,
Circuit 120, drive circuit 130 and relay element 140 are identified in deciphering.
Receiving terminal enumerator 110 is used for arranging receiving terminal count value.Receiving terminal enumerator 110 can use suitable numeral
Circuit or analog circuit realize.The receiving terminal count value that receiving terminal enumerator 110 is arranged is mainly used in verifying network relay 100
The encryption data bag received is the most effective.
Deciphering identifies that circuit 120 is connected to receiving terminal enumerator 110, for carrying out from the encryption data bag controlling end
Deciphering, to obtain the control instruction comprised in encryption data bag and to control end count value, compares receiving terminal count value and controls end
Count value, and the output of described control instruction is controlled according to comparative result.
In one example, deciphering identifies that circuit 120 can use down the one or more realization in lising: special integrated
Circuit (ASIC), field programmable logic array (FPGA), CPLD (CPLD) and microcontroller (MCU).
Illustrate, can be by pre-designed logical block, such as with door or door, variable connector, trigger etc., according to presetting
The ASIC of the regularly arranged function being capable of deciphering qualification circuit 120 with composition.Certainly, deciphering identifies that circuit 120 can be
Independent integrated circuit, it is also possible to include multiple discrete circuit realizing difference in functionality.
Deciphering identifies that circuit 120 can utilize the control end count value comprised in receiving terminal count value and encryption data bag to test
Card encryption data bag is the most effective.If by checking, it may be determined that encryption data bag is effective, illustrates in encryption data bag
Control instruction from authorized control end equipment (authorized control end), in such a case, it is possible to according to control instruction
Perform corresponding operating;If not verified, it may be determined that encryption data bag is invalid, the control in this encryption data bag is described
Instruction processed is from the assailants such as hacker, in such a case, it is possible to do not perform any operation.
To achieve these goals, can be prespecified how according to controlling between end count value and receiving terminal count value
Relation judges that encryption data bag is the most effective, and identifies circuit 120 according to default rule design deciphering.For example, it is possible in advance
Specify to think that encryption data bag is effective when controlling end count value more than receiving terminal count value, otherwise it is assumed that encryption data bag
It is invalid.Based on this, deciphering identifies that circuit 120 can include comparator, will control the first of end count value input comparator
Input, by the second input of receiving terminal count value input comparator, in regulation when controlling end count value more than receiving terminal meter
Think during numerical value encryption data bag be effective in the case of, say when comparator exports the first level (such as, high level) when
Bright encryption data bag is effective, and when comparator output second electrical level (such as, low level), explanation encryption data bag is invalid
's.
Drive circuit 130 is connected to deciphering and identifies circuit 120, is used for receiving control instruction and generating control signal to drive
Relay element 140 works.As example, drive circuit 130 can be NPN or PNP transistor drive circuit.Such as, adopting
In the case of driving relay element 140 with NPN transistor drive circuit, when the control instruction instruction of input is connected, brilliant
Body pipe saturation conduction so that the coil electricity of relay element 140, contact adhesive;When the control instruction instruction of input disconnects,
Transistor cutoff so that the coil blackout of relay element 140, contact disconnects.
Relay element 140 is connected to drive circuit 130, for the driving of the control signal in drive circuit 130 output
Lower generation on-off model.The outfan of relay element 140 can directly be connected with equipment to be controlled.Work as relay element
140 contact adhesive time, on-off model can be high level, represents " ON " state, for the equipment to be controlled that will be connected
Open;When the contact of relay element 140 disconnects, on-off model can be low level, represents " OFF " state, and being used for will
Equipment to be controlled is closed.
The network relay of this utility model embodiment, by increasing receiving terminal enumerator, can be in conjunction with controlling end counting
It is worth (correspondingly, need to increase at the control end being connected with network relay and arrange control end enumerator) checking network relay to receive
The encryption data bag arrived is the most effective, such that it is able to introduce in network relay by OTP (disposal password) technology, improves network
The safety controlled.
In order to describe the implementation of the network relay understanding that this utility model provides, below in conjunction with a kind of network system
The operation principle of network relay is described, as shown in Figure 2.Network system 200 includes that controlling end 210, network 220 and network continues
Electrical equipment 100.In one embodiment, described control end 210 is the control end authorized, and described authorized control end 210 is permissible
Be can via network 220 to network relay 100 send control instruction with realize to equipment to be controlled (such as, smart mobile phone,
Notebook computer, panel computer, desktop computer etc.) long-range control.
In one example, authorized control end 210 includes controlling end enumerator 211, is used for generating control end count value;
Control instruction signal generating unit 212, is used for generating control instruction;Encrypting module 213 and Key generating unit 215, described encryption mould
Block 213 receives from the control instruction of control instruction signal generating unit 212 with from the control end counting controlling end enumerator 211
Value, and the key encryption generated according to Key generating unit 215, it is thus achieved that encryption data bag;And network interface chip 214, institute
State control end 210 to be sent encryption data bag to network relay 100 by network via network interface 214, it is achieved to network
The control of relay 100.Therefore network interface chip 214 can use special network interface core with built-in network protocols stack
Sheet communicates the high efficiency of transmission that can realize data, alleviates the burden processing circuit, improves systematic function and stability.One
In individual embodiment, described control end enumerator 211 generates described control end count value for the count value according to storage, and in institute
After stating control end 210 sending described encryption data bag, adjust the count value of described storage.The control that authorized control end 210 generates
The receiving terminal count value that end count value processed can initially be set to than network relay 100 is arranged is big.Such as, in original state
Under, controlling end count value can be 1, and receiving terminal count value can be 0.When sending control instruction every time, authorized control end 210
Current control end count value and control instruction preset-key are encrypted, it is thus achieved that encryption data bag, and by encryption data bag
It is sent to network relay.After described control end 210 sends described encryption data bag, described control end enumerator 211 is adjusted
The count value of whole deposit storage, such as, adds 1 by the count value of storage, for generating next encryption data bag.
After network relay 100 receives encryption data bag, first with preset-key, the encryption data bag received is entered
Row deciphering.Then the receiving terminal count value that control end count value and the receiving terminal enumerator 110 deciphering obtained stores compares
Relatively, if the control end count value that deciphering obtains is less than or equal to receiving terminal count value, then the control that deciphering obtains can be referred to
Order is considered as illegal command, does not perform any operation;Otherwise, corresponding operating can be performed according to the control instruction that deciphering obtains, and
Control end count value receiving terminal count value being updated to and decipher acquisition is consistent and is stored in receiving terminal enumerator 110, or
Person adjusts receiving terminal count value according to the method identical with controlling end enumerator 211 and is stored in receiving terminal enumerator 110, example
As, when controlling end enumerator 211 and the count value of storage being added 1, receiving terminal count value is also added 1 also by receiving terminal enumerator 110
Storage.So, authorized control end 210 the control end counting comprised it is sent in the encryption data bag of network relay 100
Value should be always greater than receiving terminal count value, if the control end count value that deciphering obtains counts less than or equal to receiving terminal
Value, illustrates that the encryption data bag now received is not that authorized control end 210 sends, and it is invalid therefore can be regarded as.
In above process, owing to there is encryption so that assailant can not directly forge control instruction and control end counting
Value.On the other hand, owing to each control end count value only uses once, (control end count value after sending control instruction can every time
Be adjusted, such as, add 1), and network relay 100 can by deciphering obtain control end count value according to the method described above with from
Receiving terminal count value in body receiving terminal enumerator 110 compares, and checks whether the control end count value being to be previously used.
If the most used control end count value does not the most perform operation.Therefore the control instruction intercepted and captured before resetting also can not have
Effect controls network relay 100.The most authorized (holding preset-key) control end could produce and comprise new control end meter
The encryption data bag of numerical value and effective control instruction.
It is to be understood that the working method of above-mentioned network relay is only exemplary rather than restrictive, this utility model
The network relay 100 provided can have other rational implementations.Such as, the control that authorized control end 210 generates
The receiving terminal count value that end count value can initially be set to than network relay 100 generates is little, and transmission control refers to every time
When making, authorized control end 210 can subtract 1 by controlling end count value.Correspondingly, in network relay 100 one end, if deciphering
The control instruction that deciphering obtains more than or equal to receiving terminal count value, then can be considered as invalid finger by the control end count value obtained
Order, does not perform any operation;Otherwise, corresponding operating can be performed according to the control instruction that deciphering obtains.
The effectiveness of control instruction can be verified by the network relay that this utility model provides, it is ensured that network relay
Device only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from assailant's
Attack.
Fig. 3 illustrates that circuit and the signal of receiving terminal enumerator 110 are identified in the deciphering according to one embodiment of this utility model
Property block diagram.As it is shown on figure 3, deciphering identifies that circuit can include deciphering circuit 322, comparator 324 and logic gates 326.
Deciphering circuit 322 is used for utilizing preset-key to be decrypted encryption data bag, and defeated via the first outfan
Go out to control end count value and via the second outfan output control instruction.
Deciphering circuit 322 can be decrypted based on default decipherment algorithm, and it should be with the AES phase controlling end
Coupling.Control end 210 use AES can be any conventional algorithm, its can be symmetric cryptography can also be asymmetric
Encryption, such as data encryption standards (DES), Advanced Encryption Standard (AES), public key encryption algorithm (RSA) etc..Can be according to demand
Select suitable AES that control instruction and control end count value are encrypted.Correspondingly, deciphering circuit 322 can use
Encryption data bag is decrypted by the decipherment algorithm corresponding with AES.When using symmetric encipherment algorithm, control end 210 He
Network relay 100 uses identical key to encrypt and decrypt.When using rivest, shamir, adelman, control end 210 He
Network relay 100 uses a pair public and private key, controls end 210 and utilizes private key to be encrypted, and network relay 100 utilizes PKI to enter
Row deciphering.
Comparator 324 is connected to first outfan on the outfan reconciliation cipher telegram road 322 of receiving terminal enumerator 110, is used for
Receiving terminal count value is compared with controlling end count value, to obtain comparative result.
Comparator 324 can use such as conventional voltage comparator to realize.In one example, circuit 322 is deciphered
First outfan may be coupled to the first input end of comparator 324, and the outfan of receiving terminal enumerator 310 may be coupled to ratio
Second input of relatively device 324.When controlling end count value more than receiving terminal count value, comparator 324 exports high level, at this
In the case of Zhong, determine that encryption data bag is effective;When controlling end count value less than or equal to receiving terminal count value, comparator
During 324 output low level, in this case, determine that encryption data bag is invalid.
Logic gates 326 is connected to second outfan on the outfan reconciliation cipher telegram road 322 of comparator 324, for working as
When comparative result is virtual value, conducting to export drive circuit by control instruction, and closes when comparative result is invalid value
Disconnected.
Logic gates 326 is a kind of gate-controlled switch circuit, and it can be discrete by resistance, electric capacity, diode, audion etc.
Element is constituted, it is also possible to be the integration logic gate circuit being made up of the multiple gate circuit with difference in functionality.
The control instruction that deciphering obtains is input to the data signal input of logic gates 326 by deciphering circuit 322, than
Comparative result is input to the control end of logic gates by relatively device 324, when comparative result is virtual value (such as high level), patrols
Collect gate circuit 326 can turn on so that the value of its outfan and the value of data signal input are consistent, thus export control and refer to
Order.As example, when comparative result is invalid value (such as low level), the outfan of logic gates 326 may be at height
Resistance state, is equivalent to open circuit, and drive circuit 130 the most to the back-end exports control instruction.In this case, drive circuit 130
Input keeps initial condition.
In one example, deciphering circuit 322 can use single circuit realiration, comparator 324 and logic gates
326 can integrate realization.Such as, deciphering circuit 322 can use special decipherment algorithm chip to realize, comparator
324 and logic gates 326 can realize in the integrated circuit of such as single-chip microcomputer.In another example, deciphering circuit 322,
Comparator 324 and logic gates 326 are respectively adopted single circuit realiration.Such as, deciphering circuit 322 can use special
Decipherment algorithm chip realizes, and comparator 324 and logic gates 326 can be respectively adopted single logic gates and realize.
Deciphering circuit 322 uses the independent circuit realiration of the most special decipherment algorithm chip, owing to this kind of chip uses
Specially designed hardware realizes specific enciphering and deciphering algorithm, therefore can complete the deciphering of encryption data bag with speed faster,
The performance of network relay can be improved, reduce response time.
According to an embodiment, deciphering circuit 322 can use various has data-handling capacity and/or instruction performs energy
The processing apparatus of power and the existing software run in processing apparatus realize.As example, deciphering circuit 222 can use
The circuit realiration such as ASIC, FPGA, CPLD or MCU.The customization of such as ASIC, FPGA, CPLD or MCU or semi-custom circuit have can
By the advantage such as property height, fast operation, volume be little, it is highly suitable as special deciphering circuit.
In one example, receiving terminal enumerator 110 can include depositor, the first input of receiving terminal enumerator 110
End connects the outfan of comparator 324, and the second input of receiving terminal enumerator 110 connects the first output of deciphering circuit 322
End, receiving terminal enumerator 110 is further used for when comparative result is virtual value, receiving terminal count value is updated to and controls end
Count value unanimously and stores in a register.
As example, the comparative result of comparator 324 output can have two states, i.e. high level and low level.?
In one embodiment, virtual value can be high level, and invalid value can be low level.Include depositing at receiving terminal enumerator 110
In the case of device, the first input end of receiving terminal enumerator 110 can be the clock signal input terminal of described depositor, receiving terminal
Second input of enumerator 110 can be the data signal input of depositor.When comparative result is high level, triggering is posted
The value of receiving terminal enumerator 110 is updated to consistent with the value of data signal input by storage, namely makes receiving terminal count value
The control end count value being updated to and receive is consistent.
Owing to there may be data-bag lost when transmitting data between authorized control end 210 and network relay 100
Situation (referring back to Fig. 2), therefore network relay 100 receives the encryption data from authorized control end 210 every time
After bag, receiving terminal count value can be updated to consistent with the control end count value deciphering acquisition, be so able to ensure that for
The achievement data of access control instruction validity is accurately, improves the safety of network relay 100 further.
In another example, receiving terminal enumerator 110 can be up counter, and the first of receiving terminal enumerator 110 is defeated
Entering end and connect the outfan of comparator 324, the first of the second input connection deciphering circuit 322 of receiving terminal enumerator 110 is defeated
Going out end, receiving terminal enumerator 110 is further used for when comparative result is virtual value, according to identical with control end enumerator 211
Adjustment mode adjust receiving terminal count value, such as, receiving terminal count value is added 1.Send at authorized control end 210 every time and add
In the case of control end count value being added 1 after ciphertext data bag, can by use receiving terminal count value is progressively added 1 in the way of come with
The control end count value that network relay 100 is currently received keeps consistent.It is referred to above for network relay 100
The description of operation principle understands the present embodiment, does not repeats them here.
It is understood that control end count value is subtracted 1 after authorized control end 210 sends encryption data bag every time
In the case of, receiving terminal enumerator 110 can also is that subtraction count device, in the way of by progressively subtracting 1 by receiving terminal count value
To keep consistent with the control end count value that network relay 100 is currently received.
Should be appreciated that above-mentioned implementation is only example, this utility model is not limited to this.
According to an embodiment, network relay 100 may further include network interface chip 150 (referring back to figure
1), it is connected to deciphering and identifies circuit 120, for receiving encryption data bag from control end 210 and exported by encryption data bag
Circuit 120 is identified in deciphering.Therefore network interface chip can use special network interface chip to enter with built-in network protocols stack
Row communication can realize the high efficiency of transmission of data, alleviates the burden of other process circuit of network relay, improves systematic function
And stability.
According to an embodiment, network interface chip 150 can include that radio network interface chip and/or cable network connect
Mouth chip.Radio network interface chip can include wifi interface chip, blue tooth interface chip, mobile communication (such as GSM) interface
Chip etc..Wireline interface chip can include Ethernet chip etc..
According to an embodiment, with deciphering, network interface chip 150 can identify that circuit 120 integrates realization.Will
The two integrates realization can improve integrated level, reduces the volume of network relay, improves its portability.
Although describing example embodiment by reference to accompanying drawing here, it should be understood that above-mentioned example embodiment is merely exemplary
, and be not intended to scope of the present utility model is limited to this.Those of ordinary skill in the art can carry out various wherein
Change and amendment, without departing from scope and spirit of the present utility model.All such changes and modifications are intended to be included in appended
Within the scope of this utility model required by claim.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that it is of the present utility model
Embodiment can be put into practice in the case of not having these details.In some instances, be not shown specifically known method,
Structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify this utility model and help to understand in each utility model aspect
Or at least two, in the description to exemplary embodiment of the present utility model, each feature of the present utility model is sometimes by one
Rise and be grouped in single embodiment, figure or descriptions thereof.But, this method of the present utility model should be construed to
Reflect an intention that this utility model requirement the most required for protection than the feature being expressly recited in each claim more
Many features.More precisely, as corresponding claims reflect, its practical novel point is can be with being less than
The feature of all features of single embodiment disclosed in certain solves corresponding technical problem.Therefore, it then follows specific embodiment party
Claims of formula are thus expressly incorporated in this detailed description of the invention, and the most each claim itself is new as this practicality
The independent embodiment of type.
It will be understood to those skilled in the art that in addition to mutually exclusive between feature, any combination can be used right
All features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and the disclosedest any method
Or all processes of equipment or device are combined.Unless expressly stated otherwise, this specification (includes that adjoint right is wanted
Ask, make a summary and accompanying drawing) disclosed in each feature can be replaced by providing identical, equivalent or the alternative features of similar purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments
Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in this practicality newly
Within the scope of type and form different embodiments.Such as, in detail in the claims, embodiment required for protection is any
One of can mode use in any combination.
It should be noted that this utility model is illustrated rather than by above-described embodiment this utility model is limited,
And those skilled in the art can design alternative embodiment without departing from the scope of the appended claims.In right
In requirement, any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " not to be arranged
Except there is the element or step not arranged in the claims.Word "a" or "an" before being positioned at element do not exclude the presence of to
Few two such elements.This utility model can be by means of including the hardware of some different elements and by means of suitably compiling
The computer of journey realizes.If in the device claim listing equipment for drying, several in these devices can be logical
Cross same hardware branch specifically to embody.Word first, second and third use do not indicate that any order.Can be by this
A little word explanations are title.
The above, detailed description of the invention the most of the present utility model or the explanation to detailed description of the invention, this practicality is new
The protection domain of type is not limited thereto, the technology model that any those familiar with the art discloses at this utility model
In enclosing, change can be readily occurred in or replace, all should contain within protection domain of the present utility model.Protection of the present utility model
Scope should be as the criterion with scope of the claims.
Claims (11)
1. a network relay, it is characterised in that including:
Receiving terminal enumerator, is used for arranging receiving terminal count value;
Circuit is identified in deciphering, is connected to described receiving terminal enumerator, for being decrypted from the encryption data bag controlling end,
To obtain in described encryption data bag the control instruction comprised and to control end count value, relatively described receiving terminal count value and described
Control end count value, and control the output of described control instruction according to comparative result;
Drive circuit, is connected to described deciphering and identifies circuit, be used for receiving described control instruction and generating control signal;And
Relay element, is connected to described drive circuit, raw under the driving of the control signal exported at described drive circuit
Become on-off model.
2. network relay as claimed in claim 1, it is characterised in that in lising under circuit employing is identified in described deciphering
Item or multinomial realization: special IC, field programmable logic array, CPLD and microcontroller.
3. network relay as claimed in claim 1, it is characterised in that described deciphering identifies that circuit includes:
Deciphering circuit, is used for utilizing preset-key to be decrypted described encryption data bag, and via the first outfan output
Described control end count value and via second outfan export described control instruction;
Comparator, is connected to outfan and first outfan of described deciphering circuit of described receiving terminal enumerator, for by institute
State receiving terminal count value to compare with described control end count value, to obtain described comparative result;And
Logic gates, is connected to outfan and second outfan of described deciphering circuit of described comparator, for when described
When comparative result is virtual value, conducting to export described drive circuit by described control instruction, and when described comparative result is
Turn off during invalid value.
4. network relay as claimed in claim 3, it is characterised in that described deciphering circuit uses single circuit realiration,
Described comparator and described logic gates integrate realization.
5. network relay as claimed in claim 3, it is characterised in that described deciphering circuit, described comparator and described patrol
Collect gate circuit and be respectively adopted single circuit realiration.
6. the network relay as described in any one of claim 3 to 5, it is characterised in that described deciphering circuit uses special collection
Become circuit, field programmable logic array, CPLD or microcontroller implementation.
7. network relay as claimed in claim 3, it is characterised in that the first input end of described receiving terminal enumerator connects
The outfan of described comparator, the second input of described receiving terminal enumerator connects the first outfan of described deciphering circuit,
Described receiving terminal enumerator is further used for when described comparative result is virtual value, described receiving terminal count value is updated to
Described control end count value is consistent.
8. network relay as claimed in claim 1, it is characterised in that described network relay farther includes network interface
Chip, is connected to described deciphering and identifies circuit, for receiving described encryption data bag and by described encryption number from described control end
Circuit is identified to described deciphering according to bag output.
9. network relay as claimed in claim 8, it is characterised in that described network interface chip includes radio network interface
Chip and/or wired network interface chip.
10. network relay as claimed in claim 8 or 9, it is characterised in that described network interface chip and described deciphering mirror
Determine circuit and integrate realization.
11. 1 kinds of network systems, it is characterised in that include the network relay as described in any one of claim 1 to 10 and
For controlling the control end of the open and close of described network relay, wherein, described control end includes controlling end enumerator, uses
Generate described control end count value in the count value according to storage, and after described control end sends described encryption data bag, adjust
The count value of whole described storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620719418.2U CN205787791U (en) | 2016-07-08 | 2016-07-08 | Network relay and network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201620719418.2U CN205787791U (en) | 2016-07-08 | 2016-07-08 | Network relay and network system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN205787791U true CN205787791U (en) | 2016-12-07 |
Family
ID=58124110
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201620719418.2U Active CN205787791U (en) | 2016-07-08 | 2016-07-08 | Network relay and network system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN205787791U (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107978071A (en) * | 2017-12-20 | 2018-05-01 | 远瞳(上海)智能技术有限公司 | Intelligent goods selling equipment and its implementation |
CN109684146A (en) * | 2018-12-28 | 2019-04-26 | 北京旷视科技有限公司 | Upper and lower electric test method, device, system and processing equipment |
CN111934763A (en) * | 2020-08-13 | 2020-11-13 | 中达安(福建)科技有限公司 | Remote starting system and method based on space optical transmission equipment |
CN113665632A (en) * | 2021-08-23 | 2021-11-19 | 中车南京浦镇车辆有限公司 | Emergency traction method suitable for unmanned train |
-
2016
- 2016-07-08 CN CN201620719418.2U patent/CN205787791U/en active Active
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107978071A (en) * | 2017-12-20 | 2018-05-01 | 远瞳(上海)智能技术有限公司 | Intelligent goods selling equipment and its implementation |
CN109684146A (en) * | 2018-12-28 | 2019-04-26 | 北京旷视科技有限公司 | Upper and lower electric test method, device, system and processing equipment |
CN111934763A (en) * | 2020-08-13 | 2020-11-13 | 中达安(福建)科技有限公司 | Remote starting system and method based on space optical transmission equipment |
CN113665632A (en) * | 2021-08-23 | 2021-11-19 | 中车南京浦镇车辆有限公司 | Emergency traction method suitable for unmanned train |
CN113665632B (en) * | 2021-08-23 | 2024-04-02 | 中车南京浦镇车辆有限公司 | Emergency traction method suitable for unmanned train |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10841759B2 (en) | Securely providing a password using an internet of things (IoT) system | |
CN107710216B (en) | Apparatus and method for establishing a secure communication channel in an internet of things (IoT) system | |
CN107710718B (en) | Systems and methods for virtual internet of things (IoT) devices and centers | |
CN205787791U (en) | Network relay and network system | |
CN202856452U (en) | Power distribution network system | |
CN102111265B (en) | Method for encrypting secure chip of power system acquisition terminal | |
SG190152A1 (en) | Physically secured authorization for utility applications | |
AU2017100661A4 (en) | An information security method of distributed electric vehicle controllers | |
US11469957B2 (en) | System and method for managing and configuring attributes of internet of things (IoT) devices | |
CN107094138B (en) | A kind of smart home safe communication system and communication means | |
CN102565527A (en) | Power meter arrangement | |
CN103986582A (en) | Data encryption transmission method, device and system based on dynamic encryption technology | |
CN208675215U (en) | Secure communication module | |
CN207782851U (en) | A kind of secure communication device and system of gas meter, flow meter | |
CN110932951B (en) | Intelligent household control method and device | |
CN107241291A (en) | Internet of Things network security access device, internet-of-things terminal equipment and Internet of things system | |
CN104333547A (en) | Safety protection method of two-way interaction intelligent ammeter | |
CN101359423A (en) | Remote control method and device for permanent magnet operating mechanism | |
CN204559616U (en) | ID card information obtains system | |
CN112750654B (en) | Circuit breaker | |
Ayday et al. | Secure device authentication mechanisms for the smart grid-enabled home area networks | |
CN107196928A (en) | Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security | |
CN202979018U (en) | Secure network isolation device | |
CN105162253A (en) | Wireless communication system for intellectualization of primary equipment | |
CN202949436U (en) | Electric energy data encryption equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100190 A block 2, South Road, Haidian District Academy of Sciences, Beijing 313 Co-patentee after: Beijing maigewei Technology Co., Ltd. Patentee after: MEGVII INC. Address before: 100190 A block 2, South Road, Haidian District Academy of Sciences, Beijing 313 Co-patentee before: Beijing aperture Science and Technology Ltd. Patentee before: MEGVII INC. |
|
CP01 | Change in the name or title of a patent holder |