Solve the safety problem of new energy vehicles!Autoliv upgrades power failure safety protection solution

From October 25th to October 26th, 2019, the China Bodywork Conference and Anxing China Leaders Summit was held in Macau. Autoliv, as the current rotating chairman, was invited to attend the summit. At the meeting, Autoliv put forward a solution for the safety problem of new energy vehicles, starting from a new generation of “power-off safety protection switch”.

Safety Challenges of New Energy Vehicles

At present, my country’s new energy vehicle production and sales have ranked first in the world for four consecutive years, and gradually entered the “overtaking lane” of new energy development. However, the frequent incidents of new energy vehicle fires in the past two years have brought its battery safety issues to the forefront.

In order to meet consumers’ requirements for cruising range and charging speed, in the case of limited battery system space, companies mostly increase the voltage and current by squeezing the battery density. In the event of a collision, the risk of current overload will be more likely to occur. Therefore, new energy vehicles Battery protection becomes critical.

Current power failure safety protection scheme

The key to automobile current overload protection is to cut off the short-circuit power supply in the shortest time, so as to prevent the high current from damaging the circuit components and causing the components to overheat and catch fire.

  Solve the safety problem of new energy vehicles!Autoliv upgrades power failure safety protection solution

At present, most new energy vehicles in the market use high-voltage relays and high-voltage fuses (fuses) to prevent the risk of fire caused by overloading of circuit circuits. When the current is within a certain range, the on-off of the circuit can be controlled by the relay; only when the fault current is relatively high, the fuse starts to work, and the circuit current is cut off by fusing the body.

When the current is higher than the working range of the relay, but has not yet reached the fuse energy or the response time is long, it is enough to damage the circuit components such as the relay and cause high temperature fire. For the gray area that fuses and relays cannot meet, the market urgently needs new solutions.

The new power-off safety protection switch promotes the safety upgrade of new energy vehicles

Different from the fuse that needs a certain current value to trigger its action, the trigger signal of the power-off safety switch (PSS) can come from either the collision control unit or the BMS. After receiving the signal, the power output will be cut off within 1 millisecond, to prevent fire from the root cause, and reduce or eliminate the harm caused by vehicle fire to the occupants and surrounding areas.

The power-off safety switch (PSS) series, as an exclusive technology, has a number of technical patents. It can complete power-off protection within one thousandth of a second, which is much superior to similar products in sensitivity, and is not easy to age with time. Durable . In addition, different models of PSS can also meet different power models, such as PSS4 and PSS5, which are specially designed for new energy vehicles, and can also be used to protect the safety of charging stations.

  

Facing the rapid changes in the automobile industry, Autoliv adheres to the vision of “saving more lives”, and will continue to deepen the cooperation with Anxing China while continuously improving the level of automobile safety technology to adapt to the new development trend. Many people have popularized the concept of safe travel, and look forward to the realization of a “zero casualty” road safety environment in the future.

The Links:   LTM10C209H LTA104A261F IGBTMODULE

The opening of CITE 2021 is imminent, and the industry scene is about to hit

2021 is the first year of the “14th Five-Year Plan”, and it is also a key year for the Electronic information industry to move towards high-quality development. At this year’s “two sessions”, representatives and all sectors of society have paid great attention to the electronic information industry. The electronic information industry that has withstood the test of the epidemic and handed over a satisfactory answer to industrial growth in 2020 will also be responsible for the new era. More “national tasks”, further improve the level of the industrial chain, break through key core technologies, and give play to the supporting and leading role of the electronic information industry in economic and social development.

China Electronic Information Expo is world-renowned for gathering cutting-edge achievements in the development of my country’s electronic information industry and focusing on the Display of the latest products and technologies in the global electronic information industry. Facing the new wave of industrial development, CITE 2021 takes “innovation-driven high-quality development” as its theme, highlighting the country’s The high-level platform style will continue to play the role of industrial technology innovation vane. From April 9th ​​to 11th, 2021, the Shenzhen Convention and Exhibition Center will be launched with 20 professional exhibition areas in nine major exhibition halls. Dacheng.

The ace industry group gathers together

CITE 2021 gathers CITE Theme Pavilion, Ultra HD Display Pavilion, Intelligent Manufacturing and 3D Printing Pavilion, Frontier Technology Application Pavilion, E-sports Pavilion, Big Data Storage Pavilion, Internet of Things and 5G Application Pavilion, Intelligent Driving Vehicle Technology and Intelligent Technology Pavilion, Foundation The Electronic Pavilion focuses on displaying the core content of the future development of the industry and overviews the key areas of the electronic information industry.

Smart homes in the next “blue ocean” market, artificial intelligence for the core capabilities of the new generation of information infrastructure, integrated circuits for the core and foundation of the electronic information industry, information security and innovation for the new kinetic energy of the country’s economic development, upgrading new consumption and expanding the digital economy are important Powerful new Display industry, intelligent manufacturing and 3D printing, one of the core technologies leading a new round of technological revolution and industrial transformation, e-sports, an important growth point of the global consumer electronics industry, 5G and VR of strategic emerging industries, digital economy 2.0 era The big data storage of important topics, the intelligent driving car technology that has risen to the national strategy, the basic electronic components that are essential basic units in the electronic information system, and the 5G and AIoT of the key planning industries of the “14th Five-Year Plan” are all in the CITE 2021. Take your place on the stage. CITE 2021 has a global vision to cover a number of ace industries. It deserves to be the largest electronic information expo in Asia with the most complete industrial chain. A glimpse of CITE 2021 can see the whole picture of the electronic information industry.

Leading companies are coming

As an annual event in the electronic information industry with international influence, on the basis of professional and comprehensive exhibition halls and exhibition areas, the exhibitor lineup of CITE 2021 is also very promising. More than 1,500 outstanding domestic and foreign companies will join CITE 2021. The wonderful 5G+ 5G technology, industry, application, and ecology are in full bloom. High-tech companies such as CEC, Honor, TCL, Dell, Hisense, Skyworth, Tsinghua Tongfang and other high-tech companies have all appeared in the smart life exhibition area, displaying Honor V40, Dell UltraSharp 40 Curved WUHD 5K monitors and other new products The released smart terminal products build a full-scenario smart life; the leaders in the IoT field, Huawei, China Mobile, China Unicom, China Telecom, MediaTek, SIMCom, TD Tech, Thundersoft, Mega Intelligence, Yike, Guanghetong, Gizwits, etc. represent enterprises with a full-scenario intelligent IoT ecosystem to move towards a fully connected world; Zhijia and other enterprises lead the way in intelligent driving vehicle technology, bringing a new high-performance intelligent electric flagship SUV Weilai es8, Ejiawen active safety intelligent prevention and control terminal and car driving recorder, Boshijie vehicle intelligent video five-in-one monitoring terminal, etc. The latest technologies and products of the intelligent networked automobile industry, presenting the latest processes and concepts; Shenzhen’s new generation of information and communication industry clusters, Zhongrui Funing, Han’s Laser, Dark Matter Intelligence and other major forces in the industrial Internet field have made an all-out attack, and Han’s Laser’s semiconductor automatic packaging The equipment H580, AILA cute foreign teacher of dark matter intelligence, the eye of dark matter, game reasoning decision engine and other technical products, fully demonstrate the empowerment effect of the industrial Internet.

The Xinchuang exhibition area is also not to be underestimated. Leading companies such as Tianjin Feiteng, Kylin Software, Kingsoft Office, China Great Wall, Kingdee Tianyan, Youxuan Software, Yongzhong Software, Jide Technology, Jingjiawei, Fanwei, 360 and so on all appeared. Feiteng’s high-performance CPU chip Tengyun S2500 and other innovative technology products have been launched, and jointly build a new and sustainable Xinchuang security ecosystem; TCL Huaxing, Visionox, Stereo, Tianma, Hehui, Huike, Lehman, Guangxiang , Dijing, Altai, Royole and other representatives of the ultra-high-definition display industry joined CITE 2021, and key technology products such as Visionox’s flexible AMOLED dynamic sliding terminal opened the ultra-high-definition era; Xin, Jincheng Micro, Deep Love, MediaTek, Montage, Hongxinyu, CLP Port and other leaders in the integrated circuit field brought blockbuster new products. Montage PCIe 4.0 Retimer series chips and other products provide new solutions, which are displayed in Breakthroughs in the entire industry chain in terms of basic processes, equipment, materials, etc.; the luxury lineup in the field of big data storage brings together AMD, Huawei, Western Digital, Sugon, Seagate, Dell, Yihualu, Amethyst, Digital China, Lenovo, Toshiba , Guoxin, Xinwei, Shichuang, Xingzhen Tongyuan and other well-known enterprises, focusing on the latest development achievements of the new generation of information technology, big data, storage and other industries, to create a world-class cluster of China’s data storage industry.

Thematic Forum Summit Dialogue

For a long time, professional, authoritative and top-level theme forum activities have also been a major feature of China Electronic Information Expo. CITE 2021 will hold 20+ forum activities at the same time, covering many popular topics such as 5G+, information technology application innovation, display technology, basic electronics and IC technology, big data technology, smart home, industrial Internet, etc., and invite industry authoritative experts and top entrepreneurs Jointly discuss the pain points of industry development, deeply discuss the evolution of industrial market demand, explore new opportunities in the 5G era, and discuss the new development pattern of the electronic information industry.

More than 50 forums and activities are supported, authoritative industry leaders sit in the town, gather top resources in the industry, more than 400 new product and new technology releases, a highly anticipated industry exhibition, an interactive platform for global elite dialogue, a continuous emergence of business and opportunities It is a fertile soil for the electronic information industry and a focus of the times that resonates with the industry. The opening of CITE 2021 is imminent, taking the times as a bond, and seeing how the giants of the electronic information industry will break through the waves under the new wave.

The Links:   LM64C142 NL6448BC18-01

Digi-Key will participate in the 2021 Munich Shanghai Electronics Fair and launch an online event

Thief River Falls, USA, Minnesota – Digi-Key Electronics, the world’s largest and fastest in-stock Electronic component distributor, is pleased to announce its return to Electronics Fair 2021 . The show, a platform to lead innovative electronics manufacturing, will be held at the Shanghai New International Expo Center from April 14 to 16, 2021.

Registering as a WeChat member will be eligible to receive an exclusive three-in-one foldable backpack. Seats are limited, first come first served.

Registering as a WeChat member at Digi-Key’s booth will receive an exclusive three-in-one foldable backpack. WeChat members can also get other gifts as long as they participate in other games or activities. To participate in the game or receive a gift, please visit the Digi-Key booth in Hall N1, Booth 530.

This two-day Digi-Key live broadcast room will be open to both on-site and online exhibitors. The participating suppliers are all world-renowned manufacturers, including Analog Devices, DF Robot, EPC, Microchip, ON semiconductor, Seeed Studio, TE Connectivity and Texas Instruments et al. At the same time, many well-known Internet celebrities, engineers, and startup founders will attend the live broadcast room to discuss other hot topics such as AI, Internet of Things, and smart medical care. Digi-Key Moments will be broadcast live simultaneously at the Digi-Key booth and Digi-Key’s B station channel at the Shanghai Electronics Show in Munich at the same time. Members who participate in the Digi-Key Moments online live broadcast will also have the opportunity to receive gifts, and the audience will also have the opportunity to communicate face-to-face with the live booth speakers. Participants can get Digi-Key WeChat reminders by subscribing to the live event.

The Digi-Key Live Room will discuss AI, IoT, smart healthcare and other hot topics.

The Digi-Key Moments Live Room activities at the 2020 Munich Shanghai Electronics Show received a positive and enthusiastic response, and the participation was extensive and enthusiastic. Welcome to participate in this live broadcast on hot topics in the industry again this year.

Tony Ng, Vice President, Business Development, Asia Pacific, Digi-Key, said: “Digi-Key is delighted to be back at the Electronica Shanghai, a safe and secure way to communicate with colleagues from all walks of life in the global electronics manufacturing industry. At this live and online event It’s exciting to think about the many opportunities we’ll have to learn more about each other and connect with everyone in a smart, secure, and reliable way.”

Participants can subscribe to live events by scanning the QR code and receive Digi-Key WeChat reminders

Welcome to visit Digi-Key’s booth in Hall N1, Booth 1530 during Electronica Shanghai. For more information about the exhibition, please visit www.electronica-china.com.

  About Digi-Key Electronics

Digi-Key Electronics is a global comprehensive service authorized distributor of electronic components, headquartered in Thief River Falls, Minnesota, USA, distributing more than 9.9 million products from more than 1,100 quality brand manufacturers, More than 2.1 million of these are available from stock for immediate shipment. Digi-Key also offers a wide variety of online resources such as EDA and design tools, datasheets, reference designs, instructional articles and videos, multimedia libraries, and more. 24/7 technical support via email, phone and live chat. For additional information or to inquire about Digi-Key’s extensive product library, please visit www.digikey.cn and follow us on LinkedIn, WeChat, Weibo, QQ Video and Bilibili.

  

The Links:   LQ150X1DG12 G084SN03 V4

Samsung LG exits the LCD industry!Li Dongsheng: Opportunities imply challenges

Recently, some Korean companies including Samsung and LG have announced their withdrawal from LCD production. Chinese companies have to face greater competitive pressure and challenges in small and medium-sized screens. There will also be a round of PK.

Li Dongsheng, the founder and chairman of TCL, believes that the reason for the exit of the two companies is that the epidemic is only an incentive, and it is more considered from the perspective of global industrial structure adjustment. These companies in South Korea are not withdrawing from the semiconductor Display industry, they will concentrate more resources on flexible Display product technology.

Therefore, for Chinese enterprises, this is both an opportunity and a challenge. The opportunity lies in the fact that we can speed up the global industrial layout and consolidate the advantages of Chinese enterprises in the field of large-screen display industry.

The Links:   MMF200ZV040DK1 LMG7520RPFC SEMIKRONIGBT

Dr. Nerissa Draeger: Fully Surrounded Gate Structures Will Replace FinFETs

The first commercialization of FinFETs at the 22nm node revolutionized the manufacture of transistors—the tiny switches inside the chip’s “brain”. The channel formed by the “fins” in contact with the gate on three sides is easier to control than previous planar transistors. However, as the challenges facing the 3nm and 5nm technology nodes continue to accumulate, the utility of FinFETs has reached its limit.

By: Dr. Nerissa Draeger, Fanlin

The first commercialization of FinFETs at the 22nm node revolutionized the manufacture of transistors—the tiny switches inside the chip’s “brain”. The channel formed by the “fins” in contact with the gate on three sides is easier to control than previous planar transistors. However, as the challenges facing the 3nm and 5nm technology nodes continue to accumulate, the utility of FinFETs has reached its limit.

The Transistor Scaling Conundrum

At each technology node, device manufacturers can reduce device area, cost and power consumption and achieve performance improvements by shrinking transistors, also known as PPAC (power, performance, area, cost) scaling. However, further reducing the size of FinFETs limits drive current and electrostatic control capabilities.

In planar transistors, the channel width can be increased to drive more current and increase turn-on and turn-off speeds. However, with the development of CMOS design, the track height of standard cells is continuously reduced, which leads to the limitation of the size of the “fin”, and the single-fin device based on the sub-5nm node will not provide enough drive current.

Furthermore, while all three sides of the “fin” are controlled by the gate, one side is left uncontrolled. As the gate length decreases, the short-channel effect becomes more pronounced and more current leaks through the contactless part of the bottom of the device. As a result, smaller size devices cannot meet power and performance requirements.

Replacing fins with nanosheets

Gate all around (GAA) is a modified transistor structure in which all sides of the channel are in contact with the gate, allowing continuous scaling. Transistors using this structure are known as gate-all-around (GAA) transistors, and many variants of this type of transistor have already appeared.

Early GAA devices used a method of stacking nanosheets vertically, placing horizontal sheets separated from each other into the gate. Compared to FinFETs, the channels under this method are easier to control. And unlike FinFETs, which have to have multiple fins side-by-side to boost current, GAA transistors can achieve higher current-carrying capabilities by simply stacking a few more nanosheets vertically and having the gate wrap the channel. In this way, it is only necessary to scale these nanoflakes to tune the transistor dimensions to meet specific performance requirements.

However, like fins, as technology advances and feature sizes continue to decrease, the width and spacing of fins continues to shrink. When the flakes are nearly equal in width and thickness, these nanoflakes look more like “nanowires.”

Manufacturing challenges

Although the concept of nanoflakes is simple, it presents a number of new challenges for practical fabrication, some of which stem from structural fabrication and others related to new materials needed to meet PPAC scaling goals.

Specifically, the main challenge in construction stems from the complexity of the structure. The fabrication of GAA transistors first requires alternating Si and SiGe epitaxial layers to form a superlattice and use it as the basis for the nanoflake structure, and then sinking a dielectric spacer layer inside (for source/drain protection and gate width determination) ) and remove the sacrificial layer of the channel by etching. The space left after removing the sacrificial layer, including the space between the nanosheets, needs to be filled with a gate composed of dielectric and metal. Future gates are likely to use new metal materials, of which cobalt has entered the evaluation stage; ruthenium, molybdenum, nickel and various alloys have also been considered by manufacturers.

continuous progress

GAA transistors will eventually replace FinFETs, and the nanoflakes in them will gradually develop into nanowires. The GAA structure should be able to apply to all advanced process nodes that are currently planned.

Beginning with the earliest planar structures, transistor architectures have come a long way and have effectively driven the development of smart interconnections that were unimaginable by early industry pioneers. With the advent of the all-around gate transistor, we also eagerly expect it to bring even more amazing end-user devices and capabilities to the world.

The Links:   G057VN01 V2 NL8048BC24-01 BUYPART

Huanxinguwu’s statement on media coverage of Zhang Rujing’s remarks

A few days ago, some media reports published articles about some of the opinions of Zhang Rujing, founder of SMIC, when he spoke at the China Third Generation semiconductor Development Opportunity Exchange Summit.

From the title to the content of the article, the idea is too aggressive, and the theme one-sidedly emphasizes the confrontation between China and the United States, which deviates from the theme and theme of the meeting. Many people in the industry believe that such reports are inappropriate under the current environment, especially for the development of China’s semiconductor industry, and hope that everyone will treat and analyze rationally. Promote long-term international cooperation, try to turn enemies into friends, and mutual benefit is the right way!

The following are the views and statements of Luo Shizhou, founder of Panyun Technology and founder of Huanxinguwu chip community, on the report.

Huanxinguwu declares:

Recently, the media published articles with titles such as “SMIC founder Zhang Rujing made a shocking voice: the United States is not so capable of restricting China”. The title of the article attracted attention, but the title did not correspond to the focus of this article.

We understand the good intentions of the author, but it may have some adverse effects on the development of third-generation semiconductors and reviewers.

After detailed communication with friends in the industry, I decided to post a few comments to express our opinions:

The reviewers accepted the invitation to the online conference, and their original intention was to share their views on the third-generation semiconductors through the explanation of the third-generation semiconductor knowledge, in order to help friends in the industry to deepen their understanding and support for the third-generation semiconductors.

However, some media articles with excessive headlines unilaterally emphasized the confrontation between China and the United States, deviating from the theme and theme of the meeting.

The development of semiconductors has greatly changed and enriched human life, relying on the cooperation of the global industrial chain. The recent Sino-US relationship has broken this balance, but this abnormal confrontation may soon move towards rational cooperation. While Chinese semiconductors are self-reliant and striving for “internal circulation”, they should not forget to focus on the world , learn from each other’s strengths to complement each other’s weaknesses, and connect friends and strengths that can be connected.

The development of China’s semiconductors not only depends on the efforts of semiconductor people, but also needs the support of society and even the media. Whether it is Sino-US relations or the development of China’s semiconductors, I hope everyone will treat and analyze rationally. Promote long-term international cooperation, try to turn enemies into friends, and mutual benefit is the right way!

Panyun Technology Luo Shizhou

 

The Links:   FF300R12KE4 G104V1-T03

Are TSMC and Samsung’s 3nm processes really that strong?

As early as 2018, Qualcomm had a cryptic hint, meaning don’t trust the chip manufacturing process of chip foundries too much, they like to make the numbers smaller now, TSMC and Samsung have similar problems.

In 2019, TSMC also admitted this problem. Huang Hansen, deputy general manager of technology research at the time, said that the current XXnm is not absolutely related to Transistor gates, and the process node has become a marketing game.

But to be honest, although TSMC admits that the so-called process node has problems, everyone still uses the process node to evaluate the chip technology of each foundry.

For example, in 2020, TSMC and Samsung will reach 5nm, while Intel is still at 10nm. Everyone thinks that Intel must lag behind Samsung and TSMC. In 2022, Samsung and TSMC will enter 3nm, while Intel may enter 7nm, obviously Intel is 2 generations behind.

But is TSMC and Samsung’s 3nm really 3nm? Is Intel’s 7nm really 7nm again? This is really confusing.

Fortunately, the outside world has another evaluation method for chip technology, that is, transistor density. We know that chips are composed of transistors, and the improvement of technology is aimed at reducing the channel length of transistors. The more advanced the technology, the shorter the channel length and the greater the transistor density.

So for a long time, when the processes claimed by these chip manufacturers are not credible, some authoritative organizations like to use transistor density to see everyone’s technical differences. The same density, the process is basically the same.

Recently, Digitimes analyzed the semiconductor process density of Samsung, TSMC, Intel and IBM, and compared the situation of 10nm, 7nm, 5nm, 3nm and 2nm. We found that perhaps only intel is innocent, and the processes of other companies are really watery. too big.

Why do you say that? As shown in the figure above, in terms of transistor density, Intel’s 10nm process has a transistor density of 106 million per square millimeter, which is stronger than Samsung and TSMC’s 7nm.

For Intel’s 7nm, the transistor density will reach 180 million per square millimeter, which is stronger than Samsung’s 3nm (170 million) and TSMC’s 5nm (173 million).

For Intel’s 5nm, the transistor density will reach 300 million per square millimeter, which is stronger than TSMC’s 3nm (290 million), and catches up with IBM’s previously announced 2nm process (333 million).

For Intel’s 3nm, the transistor density will reach 520 million per square millimeter, which is stronger than the 2nm process (490 million) announced by TSMC.

Regarding this transistor density, we can also reversely verify that the Kirin 9000 has 15.3 billion transistors, and its area is less than 100 square millimeters, which is about 170 million transistors per square millimeter, which is similar to TSMC’s 5nm process ( 173 million) are basically consistent.

It can be said that you really don’t need to pay too much attention to the 5nm and 3nm processes. It is really watery, and it is not easy to compare horizontally between companies. For example, Intel’s 10nm must be worse than Samsung’s 7nm? It’s hard to say. . It can only be compared vertically by the same company. For example, TSMC’s 5nm is definitely stronger than 7nm, and TSMC’s 3nm is definitely stronger than 5nm.

But no matter what, this marketing game of TSMC and Samsung is really successful. At least the average netizens have been successfully washed by them, and they have long believed that 3nm is 3nm.

The Links:   LQ10W03A LQ121S1DG42

Zero Trust: Access security is just a good start

100 Years of Cybersecurity

In the borderlands, the two armies are at war.

The main generals of one party advocate the essence of zero trust and coordinate the entire army. One side will be conservative and see the border wall as a safe border. The confrontation between the two sides was deadlocked, and suddenly a small hacker country trying to take advantage of the fisherman tried to attack…

The small country of hackers is slowly drawing:

Conservative camp, strict outside and loose inside. The border defense line is heavily garrisoned, and the deployment of wolf smoke and police posts (firewalls, intrusion detection systems) varies. Strong attacks are easy to cause alarms, and confrontation is not easy. Of course, if you lure him with bribes, the insurgents will be used by themselves (the hacker country), and close-source attacks and inner ghost operations are all promising. Or sneak in or fish around the sideline to steal the general token (employee account information), replace the impersonation, and go deeper and steal the secret of the general.

On the other hand, the zero-trust camp is unclear. You can send a small team of hackers to attack at night, or sneak in to spy, and try to cooperate with each other. However, stepping into the line of defense, triggering alarms, limited espionage operations, and access to all places are subject to identity questioning and verification. They tried to counteract with coercion and enticement. They did not want zero trust to be integrated into the infrastructure. “Least privilege granting, identity-based access control” has become an unshakable military order, and terminal verification can be seen everywhere. Seemingly scattered, but solid.

In this way, the flag of zero trust can be held high in the offensive and defensive confrontation.

In 2010, John Kindervag put forward the concept of zero trust, pointing out the fact that “default trust is the Achilles heel of security”, but after several years and multiple cybersecurity crises, it was gradually understood and recognized by enterprises. At present, the perimeter security Model is still the main network security model, and it is only a matter of time before the new security infrastructure is applied, driven by opportunities and innovations.

In 2020, the demand for telecommuting caused by the epidemic blew the wind of zero trust, and then, the demand for data security compliance has also become the main driving force for the development of zero trust in China.

In the application practice of zero trust in China, the founding team of Shuipeng Technology, established in 2018, is the first batch of people to eat crabs.

According to the memory of Yang Yifei, CTO of Shuteng Technology, this founding team has accumulated and accumulated in related fields as early as 10 years ago. From the research and development of the security module of Tencent’s cloud computing platform infrastructure to the security construction of Baidu’s company-wide underlying infrastructure, they clearly realized that data-driven business and open infrastructure will be the next generation of industrial applications and industrial development. , and security is one of the key issues that must be addressed.

Under the ruins of trust, the first demand comes from “solving problems”

With the change of enterprise IT architecture and the collapse of “default trust”, when the market is hottest, everything can be trusted with zero trust.

According to the observation of the Chinese market in recent years, Wang Boda, the technical vice president of Shuteng Technology, found that some companies still have cognitive biases, stereotypes or rigid definitions for zero trust.

On the one hand, more and more manufacturers are “zero trust”. Whether it is the transformation of traditional manufacturers or the joining of startups, the domestic zero trust market has become more diversified and active; on the other hand, many companies have zero trust The understanding is not deep, and there is a tendency to “follow the trend”. It is inevitable that there is a cognitive bias that equates zero trust with a certain type of technology, such as SDP, IAM, etc. In addition, the “dynamic authorization” and “continuous verification” capabilities, which are very important in the zero trust model, do not yet have a relatively unified evaluation mechanism and standard in the market. This also allows companies to evaluate a wide range of indicators when choosing zero trust products.

Wang Boda is convinced that although the concept of zero trust is good, it must be implemented around the actual business scenarios of Party A, and solving problems is more important than “gimmicks”.

In Wang Boda’s view, the traditional infrastructure of enterprises is based on the boundary trust model, and security capabilities are often deployed within the boundaries of the enterprise network. And “security as infrastructure” means deploying “software-defined” security capabilities on traditional infrastructure, and security capabilities will be covered wherever access and application are. “Software-defined” also means that it is more friendly to enterprises in terms of cost control and business coverage.

Due to the rapid development of the domestic Internet, most traditional enterprises were squeezed into the Internet wave when the informatization was not perfect. Therefore, the IT environments of these enterprises are mostly intricate and overlapping complexes, which are simply a hybrid IT architecture with both outdated infrastructure and cutting-edge technologies. For emerging small and medium-sized enterprises and Internet companies, although the “historical burden” is relatively light, and they operate in an open Internet environment, there are also various risks due to their strong business orientation.

Therefore, all enterprises still need to adopt flexible zero-trust implementation methods according to different stages of internal IT and security construction. An enterprise’s zero-trust security strategy should be formulated based on business needs, organizational construction, technology selection, corporate culture and way of thinking.

For example, in the system reconstruction or the start-up stage of the company, a brand-new zero-trust overall architecture design can be adopted; if there is an existing system but you want to reduce risks through zero-trust, you can choose ZTNA or gateway products; when the overall transformation is difficult or you are worried about risks, you can Choose to conduct a zero trust pilot in a certain business or a certain department or a small number of employees… A step-by-step approach, starting from solving specific problems, is a safe way for zero trust to enter the enterprise.

It is precisely because the situation and needs of enterprises are different, so when choosing a zero-trust product, the configurability, efficient operation, and system connection capabilities of the product should be considered. For example, different product forms (VPN, application gateway or data security sandbox based on the zero trust concept) can be configured according to different personnel and business types; dynamic permissions can be efficiently managed and controlled through an adaptive policy engine; software-defined and open API realizes business and the docking of existing infrastructure.

Of course, there are only two directions for the deployment of zero trust at home and abroad: “network and security are carried out simultaneously”, or it is emphasized that “zero trust first, network reconstruction can lag slightly”, in Yang Yifei’s view, zero trust security The order of products and the overall network architecture is nothing more than a spiraling development trend based on the actual environment. Either way, it ultimately points to the overall zero-trust application result.

Access security is the beginning of zero trust, and data security is the future

All applications start with access, and focusing on access security is a good start. But we must also admit that access is only the beginning.

When zero-trust access security is widely used in the market, new security issues arise – the convenience of accessing internal data resources of an enterprise at any time and place means that data distribution is more dispersed, and data faces new security issues on the edge or in the cloud risk.

Solitary yin does not last long, and solitary yang does not grow. The end point of zero trust must not only solve the access security problem, but a more complete solution implemented in IT and OT. The cognitive concept of zero trust is also expanding from a single point (access security) to a larger scope.

A few years ago, the number of tents has been ready. Since its inception, when it was named DataCloak, they thought about wrapping data with a “flexible” cloak based on the concept of zero trust, that is, allowing data to generate value under a high degree of interaction and flow, while ensuring Mobile data is available unobtainably secure. In Yang Yifei’s view, data security is the key direction for the further development of zero trust.

In the past, numerous security products have been derived based on data security, ranging from encryption, desensitization, data leakage prevention to database security. With the dispersion and high-frequency flow of data, data security solutions based on the concept of zero trust are more based on sensitive data. Access control developed.

In the foreseeable future, digital transformation will allow enterprise business to run on a virtualized platform that integrates computing, storage, and transmission capabilities; from devices, networks, to applications, and data, to achieve peer-to-peer security. This will become the landing trend of zero trust products.

Zero Trust, SASE and ZTE

Zero Trust, SASE, ZTE (Zero Trust Edge)… During the market hype cycle, a large number of terms collide and intersect in the current cybersecurity environment, causing some enterprises to have questions and confusion. In fact, Forrester first proposed the concept of zero trust, then Gartner proposed SASE, and recently, Forrester proposed ZTE.

Through the dissection of these concepts, it can be found that the core is identity-based access control to achieve application and data security. It is only because the concepts are put forward in different IT environment backgrounds, so the descriptions are different. For example, in the earliest IT environment, since a large number of applications and data are concentrated in the data center, the concept of zero trust is also based on the access control of the data center. As applications are widely distributed, data flows to terminals and the cloud, and secure access to applications and data from the edge has become mainstream, which has also spawned the popularity of the concepts of SASE and ZTE.

In contrast, SASE emphasizes the tight coupling of network and security, requiring a single provider to provide a full set of SASE products, while ZTE emphasizes the decoupling of network and security, which can be integrated by multiple suppliers. But in Wang Boda’s words, “the same goal is achieved by different paths”, and realizing edge data security will be the landing direction of related products.

Interestingly, although SD-WAN is often discussed in SASE or zero-trust solutions, judging from the products launched by domestic manufacturers such as Shuteng Technology, it is better for security manufacturers to provide security capabilities, and network operators to provide security capabilities. Business to provide network capabilities and play to their strengths. With the advancement of enterprise-level SaaS application process, the market of SASE will be further opened.

In China, everyone is more in the stage of discussion and exploration of SASE. As a SASE solution that provides cross-cloud and cross-region IT infrastructure platform and security services, DACS AnyCloud?

Yang Yifei believes that the main demand for SASE comes from the demand for network optimization and security assurance capabilities in end-to-cloud access. When an enterprise has multiple (cross-regional) branches, and has multiple self-built clouds and leased clouds, the high requirements for network and security are obvious to achieve multi-cloud, multi-service, and multi-location mutual access. On this basis, Shuteng Technology solves the problems of multi-terminal to multi-cloud and cross-cloud interconnection through the superposition of its own security capabilities and third-party (GDS) backbone network capabilities. High-quality network interconnection from server to server and application and data security protection. SASE is a part of Shuteng Technology’s zero trust strategic plan, and it is also the starting point for Shuteng Technology to move towards the cloud.

“Security is infrastructure is equivalent to virtualizing security, abstracting the security features of different underlying physical infrastructures in a software-defined way.” Yang Yifei mentioned, “More and more security experts have been working on zero trust and data Research and discussion on the road to the integration of security and edge security.”

Last year, Shuteng Technology released an enhanced zero-trust security framework called HyperCloak™ (Lingjie) – the first zero-trust security framework in China. The infrastructure determines the complexity of security issues, and this way of deeply integrating the zero-trust security framework with the infrastructure provides a leapfrog supplement to the previous IT infrastructure.

Over the course of a year, a large number of enterprises have accessed HyperCloak® through the SDK, integrating this security framework with some of their internal work platforms. The practice of the framework is fed back to the framework of version 2.0, forming a positive optimization.

Today, the road to zero trust is becoming clearer. The next-generation enterprise security will be based on a zero-trust architecture, defined by software, and integrated with AI technology, forming an enterprise security space that traverses enterprise office, cloud computing, and edge computing scenarios.

Looking at the output of more and more practical zero-trust practices, the development of platformization and ecologicalization has formed a trend of horns under the collective efforts. Even if the car is in the wrong hub and short-circuited, there should be no fear.

The Links:   SP14Q002-A1 LQ070Y3DG05 MIG200J6CMB1W

Beiyang Group RFID Medical Anti-Counterfeiting System Solution

/a> Beiyang Group” title=” Beiyang Group” > Beiyang Group” title=” Beiyang Group” > Beiyang Group” title=” Beiyang Group” > Beiyang Group RFID anti-counterfeiting medicine

1. System background

Medicine is a special kind of product. Except for some medicines that focus on health care and nutrition, the main function of medicine is to cure diseases and save people. The issue of “seeing a doctor is difficult and expensive” has been raised more than once in various conferences in recent years, and the drug reform has attracted much attention.

The inflated drug prices are the focus of everyone’s attention. In the drug market, the largest forced consumption market, under the inducement of huge profits, counterfeit goods in drugs are not only the natural enemies of drug manufacturers, but also make consumers feel frightened when purchasing drugs, what anti-counterfeiting methods to use and how to eliminate the market. The counterfeit goods in China are a major proposition that the pharmaceutical industry and even the entire pharmaceutical industry are constantly discussing.

2. System overview

The drug RFID supply chain information platform constructed by RFID technology can realize real-time tracking and supervision of drugs in production, circulation, distribution and retail. Because RFID Electronic tags have technical characteristics such as large storage capacity, fast transmission speed, non-counterfeiting, and concurrent identification, through the support of the supply chain platform database, and affixing RFID electronic tags to individual pharmaceutical products, it can be reliably real-time in the tag. It can record the supply chain information related to medicines, so as to conduct real-time medicine supply chain supervision. Specific supply chain key data can be traced: from when the drug leaves the factory, through the subsequent supply chain process, and finally through the retailer or hospital to the patient.

Relevant regulatory authorities can achieve the purpose of market regulation and supervision through data verification and statistics; doctors and patients can also read the data information stored in the label to ensure drug safety; while pharmaceutical companies are in the process of realizing drug anti-counterfeiting and improving operational efficiency. At the same time, the sharing of data information such as warehousing and circulation in the supply chain can also be used to improve work efficiency and collaboration capabilities.

The use of RFID pharmaceutical anti-counterfeiting technology can prevent counterfeit products from flowing into the sales market, control product quality, supervise and manage sales personnel, formulate reasonable service strategies, strengthen market control and management, guide enterprise product design and positioning, and improve the timeliness of business decisions.

3. System flow

The use of RFID technology will optimize the production, circulation, and sales of the entire pharmaceutical product, obtain accurate information flow in real time, improve the monitoring in the circulation process, effectively achieve anti-counterfeiting, and curb the flow of counterfeit drugs into the market.

1) Pharmaceutical companies, as drug manufacturers, are responsible for affixing RFID electronic labels to drug packaging. There are two types of drug RFID electronic tags, one is the HF tag attached to the small drug packaging box of each sales unit, and the other is the UHF tag attached to the packaging carton.

2) Circulation-related units (including pharmaceutical wholesale enterprises, pharmaceutical retail enterprises, and medical institutions) are equipped with special RFID devices that can identify and read and write. Pharmaceutical business enterprises conduct product authenticity identification and circulation information writing operations during the product entry and exit links.

3) The drug administration department can use hand-held (portable) identification and reading and writing equipment to conduct on-site inspection and identification of the drugs in the warehouse and the drugs on sale in the relevant units of drug circulation.

4) Manage the identity registration and issuance of digital certificates of drug manufacturers, drug distributors, drug retailers, and medical institutions. The equipment used by enterprises and institutions is also certified and managed through appropriate mechanisms.

5) When consumers buy medicines in hospitals or pharmacies, they can identify the authenticity of the medicines through the identifiable reading and writing machines or self-service identification terminals of the hospitals or pharmacies.

6) The application software of the platform is connected with the information systems of drug production enterprises, wholesale enterprises, retail enterprises, medical institutions, etc. through the data interface to realize data exchange. Complete drug circulation records are collected on the platform to realize circulation supervision and Internet authenticity inquiry.

4. Anti-counterfeiting inquiry and sales management

1) Distributors and retailers are equipped with handheld devices to check the authenticity of drugs

The sales of medicines is the most important part of the anti-counterfeiting process. Most counterfeit medicines enter the circulation of medicines through loopholes in the sales process. It can be stipulated that pharmaceutical distributors must be equipped with hand-held devices, and the delivered medicines must be inspected to ensure that no counterfeit medicines are mixed; at the same time, the sales of high-end medicines are often sold through large shopping malls, supermarkets, specialty stores, etc., it is recommended that retailers also equip A (can be rented) handset to verify the authenticity of medicines. As consumers, when purchasing medicines, they have the right to require retailers to use handheld mobile phones to check the authenticity of medicines on the spot. If they can successfully read the data to indicate that it is genuine medicine, if they cannot read the data on the label, consumers can refuse to buy.

2) Establish an inquiry agency for medicine
The electronic tag data processed by the reader will be recorded in the server, and the data processing system is linked to the Web query system. Distributors, retailers or drug buyers can query the ID number of the electronic tag through the communication network to identify the authenticity of the drug. .

5. System Features

1) Tracking of the pharmaceutical supply process
The system can record and track the operation of pharmaceutical products in real time, accurately and completely, and can comprehensively and efficiently strengthen the management from product production, transportation, to sales, etc., and provide various comprehensive and easy-to-use queries, statistics, data analysis, etc. Features.

2) Effective anti-counterfeiting function
In the sales process of medicine, since it is not possible to open the package on the spot to check its authenticity, this provides an opportunity for counterfeiters. However, through the information in the pasted electronic label, you can clearly understand the location, year, date of manufacture, ingredients and other information of the drug, and realize the function of drug anti-counterfeiting identification.

3) Warehousing management of medicines
Paste an electronic label on each bottle of medicine to record data such as placement, product category, date, etc., according to the unique code of each product, to grasp the status of the goods and the quality of medicine at any time, so as to facilitate warehouse management and immediately understand Items that need to be replenished are convenient for out-of-stock management. And in the case of return or exchange, as long as it is poured into the system, the data can be modified.

6. Social benefits

1) It can effectively improve the level of supervision
Due to the lack of basic information, many supervision work in the field of drug circulation can only stay at the level of post-event supervision. Using RFID technology, it is possible to achieve the organic unity of pre-prevention, in-process supervision, and post-processing, and to achieve full coverage of supervision work.

2) It can prevent the manufacture and sale of counterfeit goods to the greatest extent, and improve the accident handling ability
After adopting the electronic label technology, since the information in the label is difficult to be tampered with, it is difficult for these counterfeit medicines to flow into the circulation link and into the hands of patients. Recycling and disposal is also much easier when counterfeit medicines are found.

3) It can effectively promote the upgrading of industrial energy level
If the electronic label technology is promoted in pharmaceutical enterprises, these enterprises will definitely improve their informatization level and management ability, which will undoubtedly be of great help to improve the energy level of the industry and enhance the competitiveness of enterprises.

The Links:   G121XTN01.0 SKIIP31NAB12T16

Design of home network WEB platform based on S3C2410 microprocessor and linux-2.6.18 kernel

Information appliances and next-generation broadband wireless communication are the two main application fields of IPv6. With the rapid development of the Internet and the gradual popularization of home broadband, the home network composed of microcomputers, information appliances and consumer Electronic equipment in the family has become a important consumer hotspots. IPv6 technology has unique advantages in home networks. It can make household appliances such as refrigerators and air conditioners have an independent global IPv6 address; fully support quality of service (QoS), which is very beneficial for digital entertainment and multimedia information applications. Therefore, the application of IPv6 in the home network has broad prospects.

Authors: Wang Zhongyong; An Yongshuai; Song Yuquan

1 Overview

Information appliances and next-generation broadband wireless communication are the two main application fields of IPv6. With the rapid development of the Internet and the gradual popularization of home broadband, the home network composed of microcomputers, information appliances and consumer electronic equipment in the family has become a important consumer hotspots. IPv6 technology has unique advantages in home networks. It can make household appliances such as refrigerators and air conditioners have an independent global IPv6 address; fully support quality of service (QoS), which is very beneficial for digital entertainment and multimedia information applications. Therefore, the application of IPv6 in the home network has broad prospects.

The rapid development of the network brings great convenience to people, but also brings serious network security problems. In the home network, security issues are also prominent. The wide application of various new technologies in the home improves the performance of information appliances on the one hand, and puts forward new requirements for simplified operation and management on the other hand. All these need to be set and managed through a unified home network WSB platform, and dynamic interaction with the client can be realized.

This paper proposes an IPv6-based embedded home network WEB platform solution, using the high-performance 32-bit ARM core microprocessor S3C2410 as the hardware platform, and by transplanting the new version of the embedded linux-2.6.18 kernel, to achieve home Network management platform function.

2 Home network system structure

The system consists of client, broadband access port, home network HUB, home gateway and home appliance controller. As shown in Figure 1:

Figure 1 Schematic diagram of the system structure

The system is divided into three parts.

The first part is that the clients located outside the home network, home network users and maintenance personnel of information appliance manufacturers, access the external unified platform of the home network through the Internet, that is, the WEB server embedded in the gateway.

The second part is the gateway and the PC host. The gateway is not only the unified interface of each home appliance controller inside the home network, but also responsible for unified control and management of the home appliance controllers in each information appliance. On the one hand, it receives the control information sent by the user through the Internet, and on the other hand, it collects the status of the information appliances and provides it for the user’s reference.

the third part. It is a home appliance control module, which is connected to the executive mechanism of the home appliance, receives the control commands from the gateway, operates the home appliance, and at the same time collects and uploads the information of the home appliance according to the command of the gateway.

3 Hardware Development Environment

The choice of the hardware platform of the embedded system is mainly the choice of the embedded processor. In view of the needs of developing the embedded gateway and considering the peripheral equipment of the system, the system adopts the Samsung S3C2410 processor with the embedded ARM920T core. ARM920T is a high-performance, The best general-purpose packaged microprocessor in terms of low power consumption, it adopts 5-stage pipeline, has instruction and data cache, and supports technologies such as coprocessor, on-chip debugging and MMU. In addition, it also includes some embedded peripheral devices, including storage devices (16-bit NOR Flash memory with 8MB capacity composed of one E28F640 and 32-bit SDRAM memory with 32MB capacity composed of two pieces of HY57V281620), interface devices (asynchronous serial port, Ethernet Port and USB interface), Display device (LCD and touch screen module), these together constitute the hardware development environment.

4 Software Design

Compared with other embedded operating systems, Linux has the advantages of open source, small kernel, powerful functions, stable operation and good portability. It can give full play to the powerful functions of the ARM920T core with MMU (memory unit management). Open source advantage. The Linux kernel supports IPv6 comprehensively, so this system chooses Linux as the embedded operating system.

4.1 Establishment of Linux development environment

Due to the limited resources of the embedded system, the development of embedded Linux usually adopts the method of adding a host machine and a target board, that is, a PC with Linux is required as the compilation and debugging environment of the system. Since the PC host in the home network usually uses the Windows operating system to meet the daily needs, the virtualization method is adopted to solve this contradiction.

Install the virtual machine software VMware (version 5.0.0) on the PC host. VMware runs on the operating system of the host. It adds a layer of virtual operating platform (VMware Virtual Platform) between the Guest OS and the Host OS. The system transparently runs on the virtual operating platform. Then install RedHatLinux9.0 on the virtual machine as a host to perform kernel clipping, transplanting, and compiling of the operating system used by the Japanese standard board, compiling and debugging applications, and packaging the kernel and file system into an image (image ) file, and then download it to the target board to run, and the two sides establish a connection relationship through the serial El or Ethernet interface.

4.2 Management through VMware

The PCs in the home network have two different operating systems, which need to be managed through VMware Workstation to solve the problem that the two cannot access each other, transfer programs and files, and enable Linux and Windows to operate simultaneously without affecting each other. In other cases, connect to the Internet respectively.

The first step is to install VMware Tools in Linux to get enhanced support for the X windows interface, networking, etc.

The second step is to set VMWare to host-only mode. Set the shared directory in sharefolders in options. Set the network card of the PC host to “Allow Sharing”, set the network interface to VMnetl, enter Linux, set ethO to 192.168.0.2, and default gateway to 192.168.0.1. You can achieve independent access to the Internet for Linux and Windows.

The third step is to use the smb (Server Message Block) service to realize the sharing of files between Linux and Windows. Start the samba server in Linux, modify its configuration file /etc/smb.conf, and add IPX/SPX and NETBEUI protocols in Windows.

As can be seen from the above steps, in different occasions, the Linux configuration in the virtual machine is different. For the users of the home network, such configuration is too difficult. Therefore, the system uses the virtualized “clone” technology to “clone” the configuration under different occasions in VMware. Their names are “shareholders”, “Internet” and “test”, as shown in Figure 2, so that they can be easily switched.


Figure 2 Configuration of the virtual machine

4.3 Kernel configuration, protocol stack optimization and server settings

Considering the stable and reliable requirements of embedded systems, the newer version of the Linux 2.6.18 kernel is selected, which provides better support for the IPv6 protocol stack, wireless network card and Cisco’s LEAP wireless authentication protocol, and has undergone a period of The running of time is relatively stable.

In the IPv6 network, the neighbor discovery and IP address automatic configuration implemented by the ICMPv6 (Internet Control Messages Protocol) protocol is the most practical part of the IPv6 protocol in embedded applications, and its neighbor discovery function replaces the ARP (ARP ( Address Resolution Protocol), ICMP router discovery and packet redirection functions, and automatic configuration realizes “plug and play” for devices to access the network. Therefore, this embedded system platform focuses on optimizing the ICMPv6 protocol according to actual needs. configuration.

mini_httpd is one of the few lightweight WEB servers supporting IPv6 protocol under embedded Linux. It has a small kernel and is very suitable for the home network WEB environment with limited on-board resources and generally single-tasking. Therefore, this system chooses mini_httpd-1.19 as the embedded WEB server, download it to the host, decompress it, formulate a cross compiler, and then compile it to generate a binary executable file. Add the command “mini_httpd/jffs2 cgi-bin/” to the gateway’s system configuration file /usr/etc/rc.local to automatically load the JFFS2 (Journalling Flash File System flash journal type) to the gateway’s flash storage device when the system starts. Filesystem 2nd Edition) in the filesystem.

In order to configure and test the IPv6 network environment and protocol, BusyBox also needs to be installed. This is a single executable implementation that integrates more than a hundred commonly used standard Linux tools, is very lightweight by making these tools share the same elements, and can be configured under graphical tools, known as the Switzerland of Linux tools Saber, its installation configuration is similar to the process of the aforementioned embedded server, and will not be repeated here.

4.4 Writing CGI programs for authentication and management

At present, there are CGI and server scripts, such as JSP, ASP, etc., to generate dynamic web pages in the web technology, but the latter requires the web server to have running support modules for these scripts. In the embedded Web server, considering the problem of resource limitation, only CGI (Common Gateway Interface) support is generally provided, so the Web application in the embedded device is actually a CGI-based program development.

CGI provides the interface between the client and the server. The server executes the corresponding CGI program after responding to the client’s request, and returns the execution result to the client, thus realizing the dynamic interaction based on WEB. Using the FORM mode as the input interface, the information entered by the user in the FORM is processed by URL encoding and then sent to the CGI program. This is the key to CGI. After the program finishes processing the input and ends the work, it transmits the result to the server in the form of information flow, and the server is responsible for encapsulating the information flow to be fed back in the form of HTTP and converting it to the client’s browser.

The CGI program is divided into the following parts: ① The user accesses the gateway on the client’s browser, loads the user interface, enters the ID and password in the FORM, and submits it using the get method; ② The server responds to the request and analyzes the resources requested by the browser. It is found that it is a CGI program, so it leads to the CGI program at the specified location; ③ URL encoding decoding, the program extracts information from the environment variable “QUERY_STRING (path&info)”; ④ Use the printf() function to generate the HTML source code, which will be decoded The post data is correctly returned to the browser.

5 Networking and testing of IPv6 home network

The configuration in the home network mainly includes the configuration of the PC host and the gateway.

Install the Windows XP operating system commonly used by home users on the PC host, use the command “ipv6 install” to install the IPv6 protocol stack in DOS mode, and then use the command “ipconfig /all” to check, you can find that under the local connection, in addition to the IPv4 address, there are also An IP address “fe80::20c:76ff:fe67:5832%5” is added, indicating that the interface index of the network card in the operating system is 5, so use the following command. Specify the local link IPv6 address for the PC host and the gateway respectively, that is, “ipv6 adu 5/ 3ffe::1”, etc., and then assign addresses to each home appliance controller in turn in the CGI control program of the gateway.

The last thing to note is that the IE browser does not support IPv6 access yet, and it needs to be accessed through the Firefox browser.


Figure 3 Home network login interface

6 Summary

This paper designs an embedded WEB platform based on IPv6, and optimizes the situation of home network from the aspect of virtualization management, which has certain practical value. There are still some areas worthy of improvement and further efforts in the system, such as the introduction of the Display module belonging to the gateway and the integration of the control bus, etc. The realization of these technologies will further promote the application of IPv6 in the home network.

The author’s innovation point: he designed the embedded WEB platform of home network based on IPv6 and Linux-2.6.8 kernel, and simplified the management and use from the aspects of virtualization management and so on.

The Links:   LTB190E1-L01 FP30R06W1E3 IGBTCOMPANY

Exit mobile version