Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A message security processing system and method

A security processing and message processing technology, applied in the field of network communication, can solve problems such as occupying CPU operating resources, interface bandwidth, security feature processing performance limitations, and enterprise losses.

Active Publication Date: 2022-04-05
北京物芯科技有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The improvement of computer system connection and circulation capabilities has greatly improved its ability in system business processing. At the same time, security issues based on network connections have become increasingly prominent. Once the system is attacked, it will bring huge losses to the enterprise. loss
[0004] In existing network equipment, common security features, such as IPSEC, SSL, TLS, DTLS, MACSec, and SRTP, are often implemented in the following ways: First, CPU pure software mode, mainly through the CPU to run security feature software, Realize message security processing; second, the CPU integrated with special security feature-related instruction sets runs security feature software to realize message security processing; third, CPU plus security co-processing module, mainly through the CPU will need to perform security processing The message fragments are sent to the security co-processing module to achieve message security processing, but in the above implementation methods, a part of CPU operating resources and interface bandwidth are required, and the processing performance of security features is limited by CPU performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message security processing system and method
  • A message security processing system and method
  • A message security processing system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a schematic structural diagram of a message security processing system in Embodiment 1 of the present invention. The technical solution of this embodiment is applicable to the case of message security processing through a hardware security co-processing module and a network processing module. The message security processing The system includes a processor 1 , a hardware security co-processing module 2 and a network processing module 3 , and the processor 1 is integrated with a software security protocol and a control module 4 .

[0022] The processor 1 is connected to the hardware security co-processing module 2 and the network processing module 3 respectively through a control management bus 5; the hardware security co-processing module 2 and the network processing module 3 are connected to each other through a message processing bus 6 connected.

[0023] In this embodiment, the processor 1 is respectively connected to the hardware security co-processin...

Embodiment 2

[0039] figure 2 A schematic structural diagram of a message security processing system provided by Embodiment 2 of the present invention. This embodiment is further refined on the basis of the above embodiments, providing a processor 1, a hardware security co-processing module 2 and a network processing module 3 specific functions. Combine below figure 2 A message security processing system provided in Embodiment 2 of the present invention is described:

[0040] The message security processing system includes: a processor 1 , a hardware security co-processing module 2 and a network processing module 3 , and the processor 1 is integrated with a software security protocol and a control module 4 .

[0041] The processor 1 is connected to the hardware security co-processing module 2 and the network processing module 3 respectively through a control management bus 5; the hardware security co-processing module 2 and the network processing module 3 are connected to each other throu...

Embodiment 3

[0072] image 3 It is a flow chart of a message security processing method in Embodiment 3 of the present invention. The technical solution of this embodiment is applicable to the case of message security processing through a hardware security co-processing module and a network processing module. The execution of the document security processing system specifically includes the following steps:

[0073] Step 110, when the processor establishes a secure session or refreshes the session state, the processor runs the software security protocol and the control module, and configures the hardware security co-processing module and the network processing module.

[0074] Wherein, configuring the hardware security co-processing module and the network processing module includes configuring the security session table and the module control table in the hardware security co-processing module, and configuring the switching and forwarding table and the security session diversion table in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a message security processing system and method. Among them, the message security processing system includes: a processor, a hardware security co-processing module and a network processing module, the processor is integrated with a software security protocol and a control module; the network processing module is connected to at least one network interface, and receives The message sent to the hardware security co-processing module for security processing; the message fed back after the hardware security co-processing module is processed is sent out through the network interface; the hardware security co-processing module is used to send the received network processing module After the sent message is processed safely, it is fed back to the network processing module. The technical solution of the embodiment of the present invention realizes the effect that message security processing does not need to occupy the running memory of the processor through the interaction between the hardware security co-processing module and the network processing module, so that the processing performance of the message security feature is not affected by the performance of the processor. limit.

Description

technical field [0001] The embodiments of the present invention relate to network communication technologies, and in particular to a message security processing system and method. Background technique [0002] With the rapid development of computer technology, the business processed on the computer has also developed from single-computer-based file processing or internal business processing based on simple connections to enterprise-level computer processing systems based on complex intranets, extranets and the global Internet. Worldwide information sharing and business processing. [0003] The improvement of computer system connection and circulation capabilities has greatly improved its ability in system business processing. At the same time, security issues based on network connections have become increasingly prominent. Once the system is attacked, it will bring huge losses to the enterprise. loss. [0004] In existing network equipment, common security features, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0803H04L9/40
CPCH04L41/0803H04L63/20
Inventor 唐峰
Owner 北京物芯科技有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products