摘要:
Provided is an encryption device which can effectively use a hardware encryption engine and reduce a packet processing delay of a real time application. In this device, an approval unit (230) judges whether it is possible to use an HW cipher unit (264) corresponding to a secure application requested for encryption operation, i.e., whether an encryption resource is not used. A priority processing approval unit (240) calculates a priority of a cryptographic operation in the secure application of the request source. If the HW cipher unit (264) cannot be used, the priority of a secure application currently allocated to the HW cipher unit (264) is compared to that of the secure application requesting for the cryptographic operation. If the secure application of the request source has a higher priority, the currently allocated secure application is released from the HW cipher unit and the secure application of the request source is allocated to the HW cipher unit (264). The secure application which has been released is allocated to an SW cipher unit (266).
摘要:
Provided is an encryption processing device which can effectively improve an encryption processing performance of a secure multi-media communication. The encryption processing device (100) includes: storage means (162) which stores secure processing information containing an identification condition for identifying a packet requiring an encryption/decryption process or an authentication process; transmission means (112) which transmits a multi-media packet in a plain text to a virtual network interface (140); correction means (160) which executes an encryption process or an authentication process on the multi-media packet if the multi-media packet coincides with the identification condition and corrects the payload of the secure multi-media packet so as to be matched with a security protocol; and replacement means (130) which transfers the secure multi-media packet transmitted to the virtual network interface (140) to an inherent network interface (150).
摘要:
The present invention provides an authentication method for inter-domain information communication applied to first and second domains. The method instructs a first electronic device belonging to the first domain to request, through an intermediary node device simultaneously registered in the first and second domains, to obtain a first key from a second key distribution center in the second domain for transmission to a second electronic device in the second domain, and instructs the second electronic device to request, through the intermediary node device, to obtain a second key from a first key distribution center in the first domain for transmission to the first electronic device. Therefore, the first and second electronic devices are instructed to generate a shared third key using the first and second keys to perform secure information communication authentication.
摘要:
A power management method for a portable electronic device having a battery providing operating power includes receiving a command utilized for indicating the portable electronic device to execute a function, determining electricity required by executing the function and electricity stored in the battery, comparing the electricity required by executing the function and the electricity stored in the battery, and generating an indication signal when the electricity required by executing the function is greater than the electricity stored in the battery.
摘要:
There is provided a signaling method for an IP telephony system (1) including a call terminal (10), a destination terminal having its identifier (20) and an extension terminal (30a) having its identifier and correlated to the destination terminal (20). A message having a header portion indicating the identifier of the destination terminal (20) and a payload portion indicating the identifier of the extension terminal (30a) is transmitted from the call terminal (10) to the destination terminal (20). The message transmitted is transferred from the destination terminal (20) to the extension terminal (30a). A response signal to the transferred message is returned from the extension terminal (30a) to the destination terminal (20).
摘要:
In a network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information, the method includes the following steps: subjecting a plurality of packets of a multimedia session to signaling processing so as to obtain multimedia session information contained in the multimedia session, subjecting the multimedia session to a key authentication negotiation and according to the multimedia session information, making a determination to activate one of the software cryptographic module and the hardware cryptographic module. If the hardware cryptographic module is activated, the hardware cryptographic module performs network security processing of the packets of the multimedia session. If the software cryptographic module is activated, the software cryptographic module performs the network security processing of the packets of the multimedia session.
摘要:
In a network security processing method and system for selecting one of software and hardware cryptographic modules by means of multimedia session information, the method includes the following steps: subjecting a plurality of packets of a multimedia session to signaling processing so as to obtain multimedia session information contained in the multimedia session, subjecting the multimedia session to a key authentication negotiation and according to the multimedia session information, making a determination to activate one of the software cryptographic module and the hardware cryptographic module. If the hardware cryptographic module is activated, the hardware cryptographic module performs network security processing of the packets of the multimedia session. If the software cryptographic module is activated, the software cryptographic module performs the network security processing of the packets of the multimedia session.
摘要:
The present invention provides an authentication method for inter-domain information communication applied to first and second domains. The method instructs a first electronic device belonging to the first domain to request, through an intermediary node device simultaneously registered in the first and second domains, to obtain a first key from a second key distribution center in the second domain for transmission to a second electronic device in the second domain, and instructs the second electronic device to request, through the intermediary node device, to obtain a second key from a first key distribution center in the first domain for transmission to the first electronic device. Therefore, the first and second electronic devices are instructed to generate a shared third key using the first and second keys to perform secure information communication authentication.