US 12,341,752 B2
Hierarchical system firewall and configuration method
Lihang Zhang, Shanghai (CN); Mingle Sun, Shanghai (CN); and Jun Xie, Shanghai (CN)
Appl. No. 17/634,979
Filed by NANJING SEMIDRIVE TECHNOLOGY CO. LTD., Jiangsu (CN)
PCT Filed Sep. 17, 2020, PCT No. PCT/CN2020/115765
§ 371(c)(1), (2) Date Feb. 13, 2022,
PCT Pub. No. WO2021/027976, PCT Pub. Date Feb. 18, 2021.
Claims priority of application No. 201910743535.0 (CN), filed on Aug. 13, 2019.
Prior Publication US 2022/0329568 A1, Oct. 13, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0263 (2013.01) [H04L 63/0236 (2013.01); H04L 63/105 (2013.01); H04L 63/20 (2013.01)] 11 Claims
OG exemplary drawing
 
1. A System-on-a-Chip (SoC) comprising:
computing resources configured to implement a root security manager, the computing resources comprising at least a first processor and a second processor;
system resources comprising hosts and devices, each of the devices having a firewall;
a virtualized first domain cluster comprising a plurality of first domains, a virtualized second domain cluster comprising a plurality of second domains;
the root security manager configured to:
assign the first processor to the first domain cluster to implement a first second-level security manager and the second processor to the second domain cluster to implement a second second-level security manager;
assign system resources to the first domain cluster and the second domain cluster; and
provide a domain cluster firewall configuration scheme between the first domain cluster and the second domain cluster;
the first second-level security manager and the second second-level security manager each configured to:
assign domain identifiers to each of the hosts and devices assigned to the first domain cluster and the second domain cluster respectively; and
provide a domain firewall configuration scheme for each of the first domains and second domains respectively;
a firewall controller implemented by the computing resources; the firewall controller configured to:
assign a domain cluster identification index to each of the hosts and the devices;
assign identifications to each of the first second-level security manager and the second second-level security manager;
assign domain identifications to the hosts and devices; and
configure firewall access permissions for each of the firewalls.