The mountain and rain are coming and the building is full, and the localization of information security equipment is becoming more and more in this situation, and it is becoming more and more urgent. This is the obvious rhythm before the arrival of the mountain rain. "Guaranteeing information security and realizing the independent and controllable localization of core software and hardware" has been raised to an unprecedented level by the national level. We must take precautions in advance and not appear passive. According to Xi Jinping's recent instructions, we must take the key technologies in our own hands, be self-reliant, and innovate independently. However, in order to achieve full control, in addition to the cooperation of the government, enterprises, and the market, it is also necessary to build a domestic security "firewall" with circuit board copying boards, and to break through the "bottleneck" of the core technology of key devices in a multi-pronged manner.
The concept and use of circuit board copy board
The so-called circuit board copy board is PCB copy board, also known as PCB clone, PCB copy or PCB reverse design. It uses reverse research and development technology to reversely analyze existing electronic products or circuit boards, and convert their PCB files and bills of materials. (BOM) files, schematic files, etc. are restored 1:1, and then these materials are used to complete the process of product copying and cloning. Of course, the purpose of PCB copy board is not just to copy and clone, but to learn from foreign excellent electronic circuit design solutions, and then use it to develop and design better products. At the same time, in the process of copy board reverse design, it also includes technical services such as leak detection, chip decryption, PCB modification, and software and hardware secondary development, to conduct multi-pronged information security inspections and continuous innovation remanufacturing.
Information security starts from subdivisions
It is understood that information security involves a wide range of industries, from upstream software technology to downstream hardware manufacturing, which affects the whole body. When we research on localization, we should choose to copy PCB from subdivisions, and routers and servers may be the focus. Routers are the central link that controls the flow of network data. The early "Cisco preset backdoor" incident has aroused great concern in the industry. After the Prism Gate incident, relevant departments have even unearthed a variety of equipment "back doors" or loopholes in systems such as government, finance, telecommunications, electricity, energy, securities, railways, and military enterprises.
PCB copy board multi-pronged anti-blocking back door
From a technical perspective, the implantation field of the backdoor has the main chip, and even the various links of the motherboard are the hotbeds for implanting the backdoor. Therefore, we can effectively use reverse engineering methods, such as chip decryption encryption technology, PCB copy board conversion, software and hardware secondary development, etc., to effectively prevent backdoor loopholes, break through the core technology "bottlenecks", and achieve domestic production.化 substitution.
In the PCB copy board industry, Zhilian Technology Co., Ltd. relies on the Shenzhen Special Economic Zone and high-tech industry clusters to formulate long-term strategic plans, actively explore more high-end technical fields, strengthen forward and reverse research and development, and open up the localization of imported equipment for PCB copy boards. Alternative way. In addition, Zhilian Technology can also keenly discover some defects and shortcomings in the original equipment PCB design and wiring, use advanced experimental equipment to test all the states of the PCB board circuit signals, make up for the loopholes, and try to meet customer requirements for PCB modification. Explore the localization of PCB copy board.