Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

VPN (Virtual Private Network) device safe starting method and VPN device safe starting system

A technology for secure booting and equipment, applied in key distribution, can solve problems such as illegal access to internal networks, information leakage, attacks, private network access threats, etc., to achieve safe and reliable computing and storage, ensure information security, and ensure legality and reliability Effect

Inactive Publication Date: 2017-09-22
SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of modern network technology, network interconnection has become an irresistible trend, but this interconnection method is extremely vulnerable to various attacks, resulting in illegal access to the internal network and information leakage
The full English name of VPN is Virtual Private Network, a virtual private network, which uses a public and open network (such as the Internet) as the basic transmission medium, and protects private information transmitted on the public network from being stolen and tampered with by encrypting and verifying network traffic, thereby Provide end users with network services similar to private network (Private Network) performance, but if maliciously attacked during the start-up phase, access to the private network will be seriously threatened. Therefore, how to secure and reliable VPN equipment is an urgent task Technical issues resolved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VPN (Virtual Private Network) device safe starting method and VPN device safe starting system
  • VPN (Virtual Private Network) device safe starting method and VPN device safe starting system
  • VPN (Virtual Private Network) device safe starting method and VPN device safe starting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions protected by the present invention will be clearly and completely described below using specific embodiments and accompanying drawings. Obviously, the implementation described below Examples are only some embodiments of the present invention, but not all embodiments. Based on the embodiments in this patent, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this patent.

[0047] This embodiment provides a method for safely starting a VPN device, such as figure 1 As shown, the methods include:

[0048] S1: Power on the VPN device and start the BIOS firmware;

[0049] S2: The trusted cryptographic module performs a hash operation on the startup code of the BIOS firmware, and compares the operation result of the BIOS startup code with the first preset legal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a VPN (Virtual Private Network) device safe starting method and a VPN device safe starting system. The VPN device is power-on, and BIOS firmware is started; a trusted cryptography module carries out HASH operation on the starting code of the BIOS firmware, and the BIOS starting code operation result is compared with a first preset legal threshold; when the BIOS starting code operation result meets the first preset legal threshold, the VPN device operation system is started; the trusted cryptography module carries out HASH operation on the starting code of the operation system, and the operation system starting code operation result is compared with a second preset legal threshold; and when the operation system starting code operation result meets the second preset legal threshold, the VPN device is started normally. The VPN device can be protected from being illegally attacked in the case of starting, the legality and the reliability of private network access can be ensured, and the information safety is ensured.

Description

technical field [0001] The invention relates to the field of cryptographic algorithms of VPN equipment, in particular to a method and system for safely starting a VPN equipment. Background technique [0002] With the rapid development of modern network technology, network interconnection has become an irresistible trend, but this interconnection method is extremely vulnerable to various attacks, resulting in illegal access to internal networks and information leakage. The full English name of VPN is Virtual Private Network, a virtual private network, which uses a public and open network (such as the Internet) as the basic transmission medium, and protects private information transmitted on the public network from being stolen and tampered with by encrypting and verifying network traffic, thereby Provide end users with network services similar to private network (Private Network) performance, but if maliciously attacked during the start-up phase, access to the private network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L12/46G06F9/44
Inventor 刘强蒋海波朱书杉
Owner SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products