CN205787791U - Network relay and network system - Google Patents

Network relay and network system Download PDF

Info

Publication number
CN205787791U
CN205787791U CN201620719418.2U CN201620719418U CN205787791U CN 205787791 U CN205787791 U CN 205787791U CN 201620719418 U CN201620719418 U CN 201620719418U CN 205787791 U CN205787791 U CN 205787791U
Authority
CN
China
Prior art keywords
circuit
count value
deciphering
receiving terminal
network relay
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201620719418.2U
Other languages
Chinese (zh)
Inventor
张宇翔
印奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Beijing Maigewei Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Beijing Aperture Science and Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd, Beijing Aperture Science and Technology Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201620719418.2U priority Critical patent/CN205787791U/en
Application granted granted Critical
Publication of CN205787791U publication Critical patent/CN205787791U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

Embodiment of the present utility model provides a kind of network relay and a kind of network system.This network relay includes: receiving terminal enumerator, is used for arranging receiving terminal count value;Circuit is identified in deciphering, it is connected to receiving terminal enumerator, for being decrypted from the encryption data bag controlling end, to obtain the control instruction comprised in encryption data bag and to control end count value, relatively receiving terminal count value and control end count value, and the output of control instruction is controlled according to comparative result;Drive circuit, is connected to deciphering and identifies circuit, be used for receiving control instruction, and generate control signal;And relay element, it is connected to drive circuit, under the driving of the control signal exported at described drive circuit, generates on-off model.The effectiveness of control instruction can be verified by above-mentioned network relay, it is ensured that network relay only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from the attack of assailant.

Description

Network relay and network system
Technical field
This utility model relates to circuit field, more particularly, to a kind of network relay and network system.
Background technology
" network relay " (or claiming " network switching ") is a kind of device, has network interface and output switch parameter to connect above Mouthful.When after network relay access network, can be in the control of other network equipment (such as computer, flush bonding processor etc.) Under be switched on or switched off its relay element and export corresponding on-off model, and then open or close coupled to be controlled Control equipment.Network relay be usually used in by existing, without the scrap build of remote control function for network remote control can be passed through The equipment of system, such as remote controlled light devices, remotely controls firing equipment, remotely controls electric control door lock etc..In a lot of application Under occasion, network relay is had higher safety requirements.
But, existing network relay is typically based on relatively simple control protocol work, and control security is poor.
A kind of situation be microprocessor in network relay connect based on the plaintext control protocol entirely without encryption or Disconnect relay element, such as: character string " on " represents connects relay element, and character string " off " expression disconnects relay unit Part.For such network relay, assailant can forge control instruction easily, as long as and assailant know net The network address of network relay, it is possible to the control instruction of forgery is sent to network relay to control its switch.
Another kind of situation is that the microprocessor in network relay is switched on or switched off relay based on encrypted control protocol Device element, its control instruction received is through default key encryption.The microprocessor of network relay is to encrypted Control instruction be decrypted after according to deciphering obtain control instruction be switched on or switched off relay element.Due to assailant not Know key, just cannot forge control instruction.But several the instructions being usually fixed due to control instruction, the most encrypted Control instruction be also fixing, if assailant certain intercepted and captured transmission in control instruction (encrypted), if reset These instructions, can play the effect controlling network relay equally.
Utility model content
In view of the problems referred to above, this utility model provides the network relay that a kind of control security is higher.
According to this utility model on the one hand, it is provided that a kind of network relay.This network relay includes: receiving terminal counts Device, is used for arranging receiving terminal count value;Circuit is identified in deciphering, is connected to described receiving terminal enumerator, for from controlling end Encryption data bag be decrypted, to obtain the control instruction that comprises in described encryption data bag and to control end count value, compare Described receiving terminal count value and described control end count value, and the output of described control instruction is controlled according to comparative result;Drive Galvanic electricity road, is connected to described deciphering and identifies circuit, be used for receiving described control instruction and generating control signal;And relay unit Part, is connected to described drive circuit, generates on-off model under the driving of the control signal exported at described drive circuit.
Exemplarily, the one or more realization during described deciphering is listd under identifying circuit employing: special IC (ASIC), field programmable logic array (FPGA), CPLD (CPLD) and microcontroller (MCU).
Exemplarily, described deciphering identifies that circuit includes: deciphering circuit, is used for utilizing preset-key to described encryption data Bag is decrypted, and exports described control end count value via the first outfan and export described control via the second outfan System instruction;Comparator, is connected to outfan and first outfan of described deciphering circuit of described receiving terminal enumerator, and being used for will Described receiving terminal count value compares with described control end count value, to obtain described comparative result;And logic gates, It is connected to outfan and second outfan of described deciphering circuit of described comparator, is used for when described comparative result is virtual value Time conducting described control instruction to be exported described drive circuit, and when described comparative result is invalid value turn off.
Exemplarily, described deciphering circuit uses single circuit realiration, described comparator and described logic gates collection Become to realize together.
Exemplarily, described deciphering circuit, described comparator and described logic gates are respectively adopted single circuit in fact Existing.
Exemplarily, described deciphering circuit uses ASIC, FPGA, CPLD or MCU to realize.
Exemplarily, the first input end of described receiving terminal enumerator connects the outfan of described comparator, described reception Second input of end enumerator connects the first outfan of described deciphering circuit, and described receiving terminal enumerator is further used for working as When described comparative result is virtual value, described receiving terminal count value is updated to consistent with described control end count value.
Exemplarily, described network relay farther includes network interface chip, is connected to described deciphering and identifies circuit, For receiving described encryption data bag from described control end and described encryption data bag being exported described deciphering qualification circuit.
Exemplarily, described network interface chip includes radio network interface chip and/or wired network interface chip.
Exemplarily, described network interface chip and described deciphering identify that circuit integrates realization.
According to another aspect of the present utility model, it is provided that a kind of network relay.Comprising: any one network described above Relay and for controlling the control end of open and close of described network relay, wherein, described control end includes controlling End enumerator, generates described control end count value for the count value according to storage, and sends described encryption at described control end After packet, adjust the count value of described storage.
The effectiveness of control instruction can be verified by the network relay that this utility model provides, it is ensured that network relay Device only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from assailant's Attack.
Accompanying drawing explanation
By combining accompanying drawing, this utility model embodiment is described in more detail, of the present utility model above-mentioned and its Its purpose, feature and advantage will be apparent from.Accompanying drawing is used for providing being further appreciated by this utility model embodiment, and And a part for composition description, it is used for explaining this utility model together with this utility model embodiment, is not intended that this reality With novel restriction.In the accompanying drawings, identical reference number typically represents same parts or step.
Fig. 1 illustrates the schematic block diagram of the network relay according to one embodiment of this utility model;
Fig. 2 illustrates the schematic block diagram of a kind of network system according to one embodiment of this utility model;And
Fig. 3 illustrates that circuit and the schematic frame of receiving terminal enumerator are identified in the deciphering according to one embodiment of this utility model Figure.
Detailed description of the invention
So that the purpose of this utility model, technical scheme and advantage become apparent from, retouch the most in detail State according to example embodiment of the present utility model.Obviously, described embodiment is only that a part of the present utility model is implemented Example rather than whole embodiment of the present utility model, it should be appreciated that this utility model is not limited by example embodiment described herein System.Based on this utility model embodiment described in this utility model, those skilled in the art are not paying creative work Within all other embodiments obtained by the case of all should fall into protection domain of the present utility model.
Embodiment of the present utility model provides a kind of network relay.This network relay can be to the encryption number received Verify according to bag, to generate on-off model safely.The on-off model generated may be used for various control field, example Such as Lighting control, environmental Kuznets Curves, safety-protection system control, home appliance control etc..
The network relay that the utility model proposes is described below with reference to Fig. 1.Fig. 1 illustrates according to one reality of this utility model Execute the schematic block diagram of the network relay 100 of example.As it is shown in figure 1, this network relay 100 include receiving terminal enumerator 110, Circuit 120, drive circuit 130 and relay element 140 are identified in deciphering.
Receiving terminal enumerator 110 is used for arranging receiving terminal count value.Receiving terminal enumerator 110 can use suitable numeral Circuit or analog circuit realize.The receiving terminal count value that receiving terminal enumerator 110 is arranged is mainly used in verifying network relay 100 The encryption data bag received is the most effective.
Deciphering identifies that circuit 120 is connected to receiving terminal enumerator 110, for carrying out from the encryption data bag controlling end Deciphering, to obtain the control instruction comprised in encryption data bag and to control end count value, compares receiving terminal count value and controls end Count value, and the output of described control instruction is controlled according to comparative result.
In one example, deciphering identifies that circuit 120 can use down the one or more realization in lising: special integrated Circuit (ASIC), field programmable logic array (FPGA), CPLD (CPLD) and microcontroller (MCU). Illustrate, can be by pre-designed logical block, such as with door or door, variable connector, trigger etc., according to presetting The ASIC of the regularly arranged function being capable of deciphering qualification circuit 120 with composition.Certainly, deciphering identifies that circuit 120 can be Independent integrated circuit, it is also possible to include multiple discrete circuit realizing difference in functionality.
Deciphering identifies that circuit 120 can utilize the control end count value comprised in receiving terminal count value and encryption data bag to test Card encryption data bag is the most effective.If by checking, it may be determined that encryption data bag is effective, illustrates in encryption data bag Control instruction from authorized control end equipment (authorized control end), in such a case, it is possible to according to control instruction Perform corresponding operating;If not verified, it may be determined that encryption data bag is invalid, the control in this encryption data bag is described Instruction processed is from the assailants such as hacker, in such a case, it is possible to do not perform any operation.
To achieve these goals, can be prespecified how according to controlling between end count value and receiving terminal count value Relation judges that encryption data bag is the most effective, and identifies circuit 120 according to default rule design deciphering.For example, it is possible in advance Specify to think that encryption data bag is effective when controlling end count value more than receiving terminal count value, otherwise it is assumed that encryption data bag It is invalid.Based on this, deciphering identifies that circuit 120 can include comparator, will control the first of end count value input comparator Input, by the second input of receiving terminal count value input comparator, in regulation when controlling end count value more than receiving terminal meter Think during numerical value encryption data bag be effective in the case of, say when comparator exports the first level (such as, high level) when Bright encryption data bag is effective, and when comparator output second electrical level (such as, low level), explanation encryption data bag is invalid 's.
Drive circuit 130 is connected to deciphering and identifies circuit 120, is used for receiving control instruction and generating control signal to drive Relay element 140 works.As example, drive circuit 130 can be NPN or PNP transistor drive circuit.Such as, adopting In the case of driving relay element 140 with NPN transistor drive circuit, when the control instruction instruction of input is connected, brilliant Body pipe saturation conduction so that the coil electricity of relay element 140, contact adhesive;When the control instruction instruction of input disconnects, Transistor cutoff so that the coil blackout of relay element 140, contact disconnects.
Relay element 140 is connected to drive circuit 130, for the driving of the control signal in drive circuit 130 output Lower generation on-off model.The outfan of relay element 140 can directly be connected with equipment to be controlled.Work as relay element 140 contact adhesive time, on-off model can be high level, represents " ON " state, for the equipment to be controlled that will be connected Open;When the contact of relay element 140 disconnects, on-off model can be low level, represents " OFF " state, and being used for will Equipment to be controlled is closed.
The network relay of this utility model embodiment, by increasing receiving terminal enumerator, can be in conjunction with controlling end counting It is worth (correspondingly, need to increase at the control end being connected with network relay and arrange control end enumerator) checking network relay to receive The encryption data bag arrived is the most effective, such that it is able to introduce in network relay by OTP (disposal password) technology, improves network The safety controlled.
In order to describe the implementation of the network relay understanding that this utility model provides, below in conjunction with a kind of network system The operation principle of network relay is described, as shown in Figure 2.Network system 200 includes that controlling end 210, network 220 and network continues Electrical equipment 100.In one embodiment, described control end 210 is the control end authorized, and described authorized control end 210 is permissible Be can via network 220 to network relay 100 send control instruction with realize to equipment to be controlled (such as, smart mobile phone, Notebook computer, panel computer, desktop computer etc.) long-range control.
In one example, authorized control end 210 includes controlling end enumerator 211, is used for generating control end count value; Control instruction signal generating unit 212, is used for generating control instruction;Encrypting module 213 and Key generating unit 215, described encryption mould Block 213 receives from the control instruction of control instruction signal generating unit 212 with from the control end counting controlling end enumerator 211 Value, and the key encryption generated according to Key generating unit 215, it is thus achieved that encryption data bag;And network interface chip 214, institute State control end 210 to be sent encryption data bag to network relay 100 by network via network interface 214, it is achieved to network The control of relay 100.Therefore network interface chip 214 can use special network interface core with built-in network protocols stack Sheet communicates the high efficiency of transmission that can realize data, alleviates the burden processing circuit, improves systematic function and stability.One In individual embodiment, described control end enumerator 211 generates described control end count value for the count value according to storage, and in institute After stating control end 210 sending described encryption data bag, adjust the count value of described storage.The control that authorized control end 210 generates The receiving terminal count value that end count value processed can initially be set to than network relay 100 is arranged is big.Such as, in original state Under, controlling end count value can be 1, and receiving terminal count value can be 0.When sending control instruction every time, authorized control end 210 Current control end count value and control instruction preset-key are encrypted, it is thus achieved that encryption data bag, and by encryption data bag It is sent to network relay.After described control end 210 sends described encryption data bag, described control end enumerator 211 is adjusted The count value of whole deposit storage, such as, adds 1 by the count value of storage, for generating next encryption data bag.
After network relay 100 receives encryption data bag, first with preset-key, the encryption data bag received is entered Row deciphering.Then the receiving terminal count value that control end count value and the receiving terminal enumerator 110 deciphering obtained stores compares Relatively, if the control end count value that deciphering obtains is less than or equal to receiving terminal count value, then the control that deciphering obtains can be referred to Order is considered as illegal command, does not perform any operation;Otherwise, corresponding operating can be performed according to the control instruction that deciphering obtains, and Control end count value receiving terminal count value being updated to and decipher acquisition is consistent and is stored in receiving terminal enumerator 110, or Person adjusts receiving terminal count value according to the method identical with controlling end enumerator 211 and is stored in receiving terminal enumerator 110, example As, when controlling end enumerator 211 and the count value of storage being added 1, receiving terminal count value is also added 1 also by receiving terminal enumerator 110 Storage.So, authorized control end 210 the control end counting comprised it is sent in the encryption data bag of network relay 100 Value should be always greater than receiving terminal count value, if the control end count value that deciphering obtains counts less than or equal to receiving terminal Value, illustrates that the encryption data bag now received is not that authorized control end 210 sends, and it is invalid therefore can be regarded as.
In above process, owing to there is encryption so that assailant can not directly forge control instruction and control end counting Value.On the other hand, owing to each control end count value only uses once, (control end count value after sending control instruction can every time Be adjusted, such as, add 1), and network relay 100 can by deciphering obtain control end count value according to the method described above with from Receiving terminal count value in body receiving terminal enumerator 110 compares, and checks whether the control end count value being to be previously used. If the most used control end count value does not the most perform operation.Therefore the control instruction intercepted and captured before resetting also can not have Effect controls network relay 100.The most authorized (holding preset-key) control end could produce and comprise new control end meter The encryption data bag of numerical value and effective control instruction.
It is to be understood that the working method of above-mentioned network relay is only exemplary rather than restrictive, this utility model The network relay 100 provided can have other rational implementations.Such as, the control that authorized control end 210 generates The receiving terminal count value that end count value can initially be set to than network relay 100 generates is little, and transmission control refers to every time When making, authorized control end 210 can subtract 1 by controlling end count value.Correspondingly, in network relay 100 one end, if deciphering The control instruction that deciphering obtains more than or equal to receiving terminal count value, then can be considered as invalid finger by the control end count value obtained Order, does not perform any operation;Otherwise, corresponding operating can be performed according to the control instruction that deciphering obtains.
The effectiveness of control instruction can be verified by the network relay that this utility model provides, it is ensured that network relay Device only works under the control of authorized control end, therefore has higher control security, it is possible to be prevented effectively from assailant's Attack.
Fig. 3 illustrates that circuit and the signal of receiving terminal enumerator 110 are identified in the deciphering according to one embodiment of this utility model Property block diagram.As it is shown on figure 3, deciphering identifies that circuit can include deciphering circuit 322, comparator 324 and logic gates 326.
Deciphering circuit 322 is used for utilizing preset-key to be decrypted encryption data bag, and defeated via the first outfan Go out to control end count value and via the second outfan output control instruction.
Deciphering circuit 322 can be decrypted based on default decipherment algorithm, and it should be with the AES phase controlling end Coupling.Control end 210 use AES can be any conventional algorithm, its can be symmetric cryptography can also be asymmetric Encryption, such as data encryption standards (DES), Advanced Encryption Standard (AES), public key encryption algorithm (RSA) etc..Can be according to demand Select suitable AES that control instruction and control end count value are encrypted.Correspondingly, deciphering circuit 322 can use Encryption data bag is decrypted by the decipherment algorithm corresponding with AES.When using symmetric encipherment algorithm, control end 210 He Network relay 100 uses identical key to encrypt and decrypt.When using rivest, shamir, adelman, control end 210 He Network relay 100 uses a pair public and private key, controls end 210 and utilizes private key to be encrypted, and network relay 100 utilizes PKI to enter Row deciphering.
Comparator 324 is connected to first outfan on the outfan reconciliation cipher telegram road 322 of receiving terminal enumerator 110, is used for Receiving terminal count value is compared with controlling end count value, to obtain comparative result.
Comparator 324 can use such as conventional voltage comparator to realize.In one example, circuit 322 is deciphered First outfan may be coupled to the first input end of comparator 324, and the outfan of receiving terminal enumerator 310 may be coupled to ratio Second input of relatively device 324.When controlling end count value more than receiving terminal count value, comparator 324 exports high level, at this In the case of Zhong, determine that encryption data bag is effective;When controlling end count value less than or equal to receiving terminal count value, comparator During 324 output low level, in this case, determine that encryption data bag is invalid.
Logic gates 326 is connected to second outfan on the outfan reconciliation cipher telegram road 322 of comparator 324, for working as When comparative result is virtual value, conducting to export drive circuit by control instruction, and closes when comparative result is invalid value Disconnected.
Logic gates 326 is a kind of gate-controlled switch circuit, and it can be discrete by resistance, electric capacity, diode, audion etc. Element is constituted, it is also possible to be the integration logic gate circuit being made up of the multiple gate circuit with difference in functionality.
The control instruction that deciphering obtains is input to the data signal input of logic gates 326 by deciphering circuit 322, than Comparative result is input to the control end of logic gates by relatively device 324, when comparative result is virtual value (such as high level), patrols Collect gate circuit 326 can turn on so that the value of its outfan and the value of data signal input are consistent, thus export control and refer to Order.As example, when comparative result is invalid value (such as low level), the outfan of logic gates 326 may be at height Resistance state, is equivalent to open circuit, and drive circuit 130 the most to the back-end exports control instruction.In this case, drive circuit 130 Input keeps initial condition.
In one example, deciphering circuit 322 can use single circuit realiration, comparator 324 and logic gates 326 can integrate realization.Such as, deciphering circuit 322 can use special decipherment algorithm chip to realize, comparator 324 and logic gates 326 can realize in the integrated circuit of such as single-chip microcomputer.In another example, deciphering circuit 322, Comparator 324 and logic gates 326 are respectively adopted single circuit realiration.Such as, deciphering circuit 322 can use special Decipherment algorithm chip realizes, and comparator 324 and logic gates 326 can be respectively adopted single logic gates and realize.
Deciphering circuit 322 uses the independent circuit realiration of the most special decipherment algorithm chip, owing to this kind of chip uses Specially designed hardware realizes specific enciphering and deciphering algorithm, therefore can complete the deciphering of encryption data bag with speed faster, The performance of network relay can be improved, reduce response time.
According to an embodiment, deciphering circuit 322 can use various has data-handling capacity and/or instruction performs energy The processing apparatus of power and the existing software run in processing apparatus realize.As example, deciphering circuit 222 can use The circuit realiration such as ASIC, FPGA, CPLD or MCU.The customization of such as ASIC, FPGA, CPLD or MCU or semi-custom circuit have can By the advantage such as property height, fast operation, volume be little, it is highly suitable as special deciphering circuit.
In one example, receiving terminal enumerator 110 can include depositor, the first input of receiving terminal enumerator 110 End connects the outfan of comparator 324, and the second input of receiving terminal enumerator 110 connects the first output of deciphering circuit 322 End, receiving terminal enumerator 110 is further used for when comparative result is virtual value, receiving terminal count value is updated to and controls end Count value unanimously and stores in a register.
As example, the comparative result of comparator 324 output can have two states, i.e. high level and low level.? In one embodiment, virtual value can be high level, and invalid value can be low level.Include depositing at receiving terminal enumerator 110 In the case of device, the first input end of receiving terminal enumerator 110 can be the clock signal input terminal of described depositor, receiving terminal Second input of enumerator 110 can be the data signal input of depositor.When comparative result is high level, triggering is posted The value of receiving terminal enumerator 110 is updated to consistent with the value of data signal input by storage, namely makes receiving terminal count value The control end count value being updated to and receive is consistent.
Owing to there may be data-bag lost when transmitting data between authorized control end 210 and network relay 100 Situation (referring back to Fig. 2), therefore network relay 100 receives the encryption data from authorized control end 210 every time After bag, receiving terminal count value can be updated to consistent with the control end count value deciphering acquisition, be so able to ensure that for The achievement data of access control instruction validity is accurately, improves the safety of network relay 100 further.
In another example, receiving terminal enumerator 110 can be up counter, and the first of receiving terminal enumerator 110 is defeated Entering end and connect the outfan of comparator 324, the first of the second input connection deciphering circuit 322 of receiving terminal enumerator 110 is defeated Going out end, receiving terminal enumerator 110 is further used for when comparative result is virtual value, according to identical with control end enumerator 211 Adjustment mode adjust receiving terminal count value, such as, receiving terminal count value is added 1.Send at authorized control end 210 every time and add In the case of control end count value being added 1 after ciphertext data bag, can by use receiving terminal count value is progressively added 1 in the way of come with The control end count value that network relay 100 is currently received keeps consistent.It is referred to above for network relay 100 The description of operation principle understands the present embodiment, does not repeats them here.
It is understood that control end count value is subtracted 1 after authorized control end 210 sends encryption data bag every time In the case of, receiving terminal enumerator 110 can also is that subtraction count device, in the way of by progressively subtracting 1 by receiving terminal count value To keep consistent with the control end count value that network relay 100 is currently received.
Should be appreciated that above-mentioned implementation is only example, this utility model is not limited to this.
According to an embodiment, network relay 100 may further include network interface chip 150 (referring back to figure 1), it is connected to deciphering and identifies circuit 120, for receiving encryption data bag from control end 210 and exported by encryption data bag Circuit 120 is identified in deciphering.Therefore network interface chip can use special network interface chip to enter with built-in network protocols stack Row communication can realize the high efficiency of transmission of data, alleviates the burden of other process circuit of network relay, improves systematic function And stability.
According to an embodiment, network interface chip 150 can include that radio network interface chip and/or cable network connect Mouth chip.Radio network interface chip can include wifi interface chip, blue tooth interface chip, mobile communication (such as GSM) interface Chip etc..Wireline interface chip can include Ethernet chip etc..
According to an embodiment, with deciphering, network interface chip 150 can identify that circuit 120 integrates realization.Will The two integrates realization can improve integrated level, reduces the volume of network relay, improves its portability.
Although describing example embodiment by reference to accompanying drawing here, it should be understood that above-mentioned example embodiment is merely exemplary , and be not intended to scope of the present utility model is limited to this.Those of ordinary skill in the art can carry out various wherein Change and amendment, without departing from scope and spirit of the present utility model.All such changes and modifications are intended to be included in appended Within the scope of this utility model required by claim.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that it is of the present utility model Embodiment can be put into practice in the case of not having these details.In some instances, be not shown specifically known method, Structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify this utility model and help to understand in each utility model aspect Or at least two, in the description to exemplary embodiment of the present utility model, each feature of the present utility model is sometimes by one Rise and be grouped in single embodiment, figure or descriptions thereof.But, this method of the present utility model should be construed to Reflect an intention that this utility model requirement the most required for protection than the feature being expressly recited in each claim more Many features.More precisely, as corresponding claims reflect, its practical novel point is can be with being less than The feature of all features of single embodiment disclosed in certain solves corresponding technical problem.Therefore, it then follows specific embodiment party Claims of formula are thus expressly incorporated in this detailed description of the invention, and the most each claim itself is new as this practicality The independent embodiment of type.
It will be understood to those skilled in the art that in addition to mutually exclusive between feature, any combination can be used right All features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and the disclosedest any method Or all processes of equipment or device are combined.Unless expressly stated otherwise, this specification (includes that adjoint right is wanted Ask, make a summary and accompanying drawing) disclosed in each feature can be replaced by providing identical, equivalent or the alternative features of similar purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include other embodiments Some feature included by rather than further feature, but the combination of the feature of different embodiment means to be in this practicality newly Within the scope of type and form different embodiments.Such as, in detail in the claims, embodiment required for protection is any One of can mode use in any combination.
It should be noted that this utility model is illustrated rather than by above-described embodiment this utility model is limited, And those skilled in the art can design alternative embodiment without departing from the scope of the appended claims.In right In requirement, any reference marks that should not will be located between bracket is configured to limitations on claims.Word " comprises " not to be arranged Except there is the element or step not arranged in the claims.Word "a" or "an" before being positioned at element do not exclude the presence of to Few two such elements.This utility model can be by means of including the hardware of some different elements and by means of suitably compiling The computer of journey realizes.If in the device claim listing equipment for drying, several in these devices can be logical Cross same hardware branch specifically to embody.Word first, second and third use do not indicate that any order.Can be by this A little word explanations are title.
The above, detailed description of the invention the most of the present utility model or the explanation to detailed description of the invention, this practicality is new The protection domain of type is not limited thereto, the technology model that any those familiar with the art discloses at this utility model In enclosing, change can be readily occurred in or replace, all should contain within protection domain of the present utility model.Protection of the present utility model Scope should be as the criterion with scope of the claims.

Claims (11)

1. a network relay, it is characterised in that including:
Receiving terminal enumerator, is used for arranging receiving terminal count value;
Circuit is identified in deciphering, is connected to described receiving terminal enumerator, for being decrypted from the encryption data bag controlling end, To obtain in described encryption data bag the control instruction comprised and to control end count value, relatively described receiving terminal count value and described Control end count value, and control the output of described control instruction according to comparative result;
Drive circuit, is connected to described deciphering and identifies circuit, be used for receiving described control instruction and generating control signal;And
Relay element, is connected to described drive circuit, raw under the driving of the control signal exported at described drive circuit Become on-off model.
2. network relay as claimed in claim 1, it is characterised in that in lising under circuit employing is identified in described deciphering Item or multinomial realization: special IC, field programmable logic array, CPLD and microcontroller.
3. network relay as claimed in claim 1, it is characterised in that described deciphering identifies that circuit includes:
Deciphering circuit, is used for utilizing preset-key to be decrypted described encryption data bag, and via the first outfan output Described control end count value and via second outfan export described control instruction;
Comparator, is connected to outfan and first outfan of described deciphering circuit of described receiving terminal enumerator, for by institute State receiving terminal count value to compare with described control end count value, to obtain described comparative result;And
Logic gates, is connected to outfan and second outfan of described deciphering circuit of described comparator, for when described When comparative result is virtual value, conducting to export described drive circuit by described control instruction, and when described comparative result is Turn off during invalid value.
4. network relay as claimed in claim 3, it is characterised in that described deciphering circuit uses single circuit realiration, Described comparator and described logic gates integrate realization.
5. network relay as claimed in claim 3, it is characterised in that described deciphering circuit, described comparator and described patrol Collect gate circuit and be respectively adopted single circuit realiration.
6. the network relay as described in any one of claim 3 to 5, it is characterised in that described deciphering circuit uses special collection Become circuit, field programmable logic array, CPLD or microcontroller implementation.
7. network relay as claimed in claim 3, it is characterised in that the first input end of described receiving terminal enumerator connects The outfan of described comparator, the second input of described receiving terminal enumerator connects the first outfan of described deciphering circuit, Described receiving terminal enumerator is further used for when described comparative result is virtual value, described receiving terminal count value is updated to Described control end count value is consistent.
8. network relay as claimed in claim 1, it is characterised in that described network relay farther includes network interface Chip, is connected to described deciphering and identifies circuit, for receiving described encryption data bag and by described encryption number from described control end Circuit is identified to described deciphering according to bag output.
9. network relay as claimed in claim 8, it is characterised in that described network interface chip includes radio network interface Chip and/or wired network interface chip.
10. network relay as claimed in claim 8 or 9, it is characterised in that described network interface chip and described deciphering mirror Determine circuit and integrate realization.
11. 1 kinds of network systems, it is characterised in that include the network relay as described in any one of claim 1 to 10 and For controlling the control end of the open and close of described network relay, wherein, described control end includes controlling end enumerator, uses Generate described control end count value in the count value according to storage, and after described control end sends described encryption data bag, adjust The count value of whole described storage.
CN201620719418.2U 2016-07-08 2016-07-08 Network relay and network system Active CN205787791U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201620719418.2U CN205787791U (en) 2016-07-08 2016-07-08 Network relay and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201620719418.2U CN205787791U (en) 2016-07-08 2016-07-08 Network relay and network system

Publications (1)

Publication Number Publication Date
CN205787791U true CN205787791U (en) 2016-12-07

Family

ID=58124110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201620719418.2U Active CN205787791U (en) 2016-07-08 2016-07-08 Network relay and network system

Country Status (1)

Country Link
CN (1) CN205787791U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978071A (en) * 2017-12-20 2018-05-01 远瞳(上海)智能技术有限公司 Intelligent goods selling equipment and its implementation
CN109684146A (en) * 2018-12-28 2019-04-26 北京旷视科技有限公司 Upper and lower electric test method, device, system and processing equipment
CN111934763A (en) * 2020-08-13 2020-11-13 中达安(福建)科技有限公司 Remote starting system and method based on space optical transmission equipment
CN113665632A (en) * 2021-08-23 2021-11-19 中车南京浦镇车辆有限公司 Emergency traction method suitable for unmanned train

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107978071A (en) * 2017-12-20 2018-05-01 远瞳(上海)智能技术有限公司 Intelligent goods selling equipment and its implementation
CN109684146A (en) * 2018-12-28 2019-04-26 北京旷视科技有限公司 Upper and lower electric test method, device, system and processing equipment
CN111934763A (en) * 2020-08-13 2020-11-13 中达安(福建)科技有限公司 Remote starting system and method based on space optical transmission equipment
CN113665632A (en) * 2021-08-23 2021-11-19 中车南京浦镇车辆有限公司 Emergency traction method suitable for unmanned train
CN113665632B (en) * 2021-08-23 2024-04-02 中车南京浦镇车辆有限公司 Emergency traction method suitable for unmanned train

Similar Documents

Publication Publication Date Title
US10841759B2 (en) Securely providing a password using an internet of things (IoT) system
CN107710216B (en) Apparatus and method for establishing a secure communication channel in an internet of things (IoT) system
CN107710718B (en) Systems and methods for virtual internet of things (IoT) devices and centers
CN205787791U (en) Network relay and network system
CN202856452U (en) Power distribution network system
CN102111265B (en) Method for encrypting secure chip of power system acquisition terminal
SG190152A1 (en) Physically secured authorization for utility applications
AU2017100661A4 (en) An information security method of distributed electric vehicle controllers
US11469957B2 (en) System and method for managing and configuring attributes of internet of things (IoT) devices
CN107094138B (en) A kind of smart home safe communication system and communication means
CN102565527A (en) Power meter arrangement
CN103986582A (en) Data encryption transmission method, device and system based on dynamic encryption technology
CN208675215U (en) Secure communication module
CN207782851U (en) A kind of secure communication device and system of gas meter, flow meter
CN110932951B (en) Intelligent household control method and device
CN107241291A (en) Internet of Things network security access device, internet-of-things terminal equipment and Internet of things system
CN104333547A (en) Safety protection method of two-way interaction intelligent ammeter
CN101359423A (en) Remote control method and device for permanent magnet operating mechanism
CN204559616U (en) ID card information obtains system
CN112750654B (en) Circuit breaker
Ayday et al. Secure device authentication mechanisms for the smart grid-enabled home area networks
CN107196928A (en) Cloud lock encryption method, cloud lock administration system and the cloud lock of a kind of high security
CN202979018U (en) Secure network isolation device
CN105162253A (en) Wireless communication system for intellectualization of primary equipment
CN202949436U (en) Electric energy data encryption equipment

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100190 A block 2, South Road, Haidian District Academy of Sciences, Beijing 313

Co-patentee after: Beijing maigewei Technology Co., Ltd.

Patentee after: MEGVII INC.

Address before: 100190 A block 2, South Road, Haidian District Academy of Sciences, Beijing 313

Co-patentee before: Beijing aperture Science and Technology Ltd.

Patentee before: MEGVII INC.

CP01 Change in the name or title of a patent holder