In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-29 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
The encrypted video camera loads the security module on the basis of the traditional camera, so that the data stream through the camera is encrypted by hardware to form a ciphertext data stream, which is transmitted to the back end for decryption before it can be played. Thus, the hidden danger of video content leakage in the process of transmission is solved, and the security of video transmission is greatly improved. In the security industry, in order to improve the security performance of security products and increase the competitiveness of security products, in the next generation of cloud surveillance video camera products, encrypted video cameras with Tongfang TF32A09 encryption chip as the core application arises at the historic moment.
The specific form of encrypted video camera solution: 1. The encryption security module is provided, on the basis of which the customer carries on the secondary application development, and loads the security module in the back end of the camera. Description of the security module: through the complete and complex encryption and decryption operation of the mass storage device class protocol, the use of the encryption module is as simple as using a U disk. Rich in functions, no need to have in-depth understanding of the bottom, good expansibility. The chip is converted from a special chip to a functional black box accessed through the standard SCSI protocol. Provide windows and LINUX demo code to meet most customer demo needs. Provide calling api for customers to develop for 2 times
1. Provide TF32A09FDL1 encryption chip and underlying development programs, customers develop independently according to the needs of encrypted video cameras. Characteristic description of high-speed encrypted stream chip: TF32A09 is a high-speed and high-performance information security chip independently designed by Tongfang Co., Ltd. using domestic master 32-bit CPU. The security chip integrates high-speed security encryption algorithm and communication interface, adopts unique data stream encryption and decryption mechanism, realizes the function of synchronous encryption and decryption of high-speed data stream, and surpasses the domestic similar chip in encryption and decryption speed. At the same time, the security chip also integrates keyboard control module, which can be widely used in the design of high-end keyboard and security keyboard. The TF32A09 security chip supports symmetric cryptographic algorithms, asymmetric cryptographic algorithms and hash algorithms specified by × ×, as well as other international cryptographic algorithms. The security chip has the advantages of high integration, strong security, rich interfaces, fast encryption and decryption speed, low power consumption, and high cost performance. The security chip can be widely used in finance, e-government, e-commerce, smart grid and other security fields. Chip features l CPU processor 32-bit CPU core external bus support 8-bit / 16-bit / 32-bit access l-on-chip memory cell 20KB SRAM 64KB ROM 512KB FLASH l DES/3DES encryption algorithm supports DES, 3DES algorithm supports ECB mode and CBC mode DES encryption and decryption speed 27MByte/s @ 80MHz 3DES encryption and decryption speed 11.5MByte/s @ 80MHz l RSA/SM2 coprocessor implements 192-bit 2048-bit modular addition, modular subtraction, modular multiplication, modular inversion, Modular idempotent basic arithmetic operations l RSA asymmetric algorithm supports 1024 RSA operations 1024 bit RSA signatures 32 times per second @ 80MHz The number of validations is 32 / s @ 80MHz l SM1 algorithm packet length is 128 bits, key length is 128 to 256 bits encryption speed 43.7MByte/s@80MHz l SM2 algorithm encryption algorithm packet length 128Byte Key length 256bit signature algorithm packet length 256bit, key length 256bit l SM3 algorithm summary value length 256bit l SM4 algorithm encryption and decryption speed 29.5MByte/s@80MHz l random number generator hardware random number generator, pass the international standard FIPS140-2 test generation speed 9.2MByte/s@80MHz l keyboard control interface (KPP) 20x10 array scan, support 200keys Including 73 custom keys to support arbitrary 4 keys simultaneously press l 2 USB2.0 OTG interfaces to support high-speed 480Mbps and full-speed 12Mbps transmission mode USB1 support 6 EndPoint,USB2 support 3 EndPoint l 2 SPI master / slave interfaces can transmit 8-bit, 16-bit or 32-bit data per interruption Transmission speed 400KByte/s l 6 external interrupt I NFC O can be used as 6 independent programmable Imax O multiplex l NFC (Nandflash) interfaces with ECC check module Can be corrected to 8-bit or 16-bit support 4 pieces of NandFlash l other interfaces 2-way ISO-7816 (T0) master / slave interface 2-way UART master-slave mode 1-I2C-1 16-bit PWM 32 highlights of ordinary IO products l high-speed data stream encryption: integrated a variety of high-speed hardware encryption algorithm modules, encryption steps are implemented by proprietary modules, so that the speed of data stream encryption can be as high as 25MB/s, there is a qualitative leap. The first domestic company with USB master interface: two USB-OTG interfaces, which can be set to Host, Device or OTG; to support up to 6 endpoints according to application requirements, and can be set as multiple composite devices to meet the design needs of users as much as possible. Comprehensive algorithm: integrate a variety of communication interfaces and a variety of information security algorithms (SM1, SM2, SM3, SM4, 3DES, RSA, etc.) to achieve a highly integrated single chip solution. L support online debugging: IDE debugging environment adopts CodeWarrior, which is powerful and easy to use. Product serialization: a variety of product models are available for customers to choose from. Resource comparison table Resource / Model TF32A9FAL0 (LQFP-176) TF32A9FBL1 (LQFP-100) TF32A9FCL1 (LQFP-80) TF32A9FDL1 (LQFP-64) encryption algorithm / hardware Random number SM1 ●●●● SM2 ●●●● SM3 ●●●● SM4 DES ●●●● RSA ●●●● ●●●● Storage ROM (64K) ●●●● RAM (20K) ●●●● FLASH (512K) ●●●● communication interface USB2. 0 (OTG) ● * 2 ● * 2 ● * 1 ● * 2SPI ● * 2 ● * 1 ● * 1 ● * 17816 ● * 2 ● * 1 ● * 1--UATR ● * 2 ● * 1 ● * 2 ● * 1IIC ●●●● NANDFLASH ●-●-KPP ●●-PMW GPIO (without reuse) * 32 * 1 en22# * en23# * 2 other resources DMA INT (external interruption) * en26# * en27# * en27 * 6PIT ●●●● Wrapper ●●●● emulation JTAG ●-
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.