Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtual device based on multiple encryption cards

A virtual device and encryption card technology, which is applied in the field of encryption cards, can solve the problems of encryption card load balancing, multi-card redundancy backup, etc., and achieve the effects of improving availability and ease of use, improving processing capacity, and improving reliability

Inactive Publication Date: 2011-04-20
DAWNING CLOUD COMPUTING TECH CO LTD
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a virtual encryption card based on multiple encryption cards, which can be mapped into a single card by virtual technology for managers and applications to solve the management, load balancing and multi-card redundancy of existing encryption cards backup problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual device based on multiple encryption cards
  • Virtual device based on multiple encryption cards

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0015] Each functional module and module communication of the virtual encryption card are as follows:

[0016] Among them, the load balancing module, the redundancy module, the work scheduling module and the monitoring module are modules that are always running, and the other modules are interface modules (interfaces for application and management calls).

[0017] Load balancing is only responsible for the load balancing of each encryption card. The current load of each encryption card is recorded based on the amount of requests being processed by the encryption card. Each request will be distributed to one or several encryption cards with the smallest load in parallel according to whether it can be processed in parallel. (job scheduling module).

[0018] The work scheduling module schedules and completes the requested processing work according to the allocated card resources (which encryption cards), keeps the results that need to be kept and intermediate results, such as key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a virtual encryption card based on multiple encryption cards, which comprises a plurality of encryption cards, a load balancing module, a monitoring module, a management module, a redundancy module and a work scheduling module. The invention simplifies the management of the virtual encryption cards, and can concurrently process the concurrent requests among the encryption cards, thereby greatly enhancing the processing capacity; in the aspect of load balancing, the invention realizes load balanced allocation among the cards for each request; by using the multiple card redundancy, the request can switch among multiple cards in a seamless way, thereby greatly enhancing the availability and usability; and in the aspect of multiple card scheduling, the invention completely differs from the traditional request and card binding relation, realizes the independence of requests from cards, reduces the coupling property between requests and cards, greatly enhances the reliability of the encryption card, and can not influence the processing of the application requests due to the abnormity of a certain encryption card.

Description

technical field [0001] The invention relates to the field of encryption cards, in particular to a virtual device based on multiple encryption cards. Background technique [0002] With the continuous deepening and development of computer security, the application of encryption cards is becoming more and more extensive. There are more and more cases of multiple cards in one machine, and the management and use are becoming more and more complicated, and the scalability is not ideal. The switching of multi-card load balancing and multi-card redundant backup also requires application participation, which greatly increases the complexity of application development. [0003] The traditional approach is to put encryption card management, load balancing, and redundant backup in the underlying API, but application support is required, and management is very inconvenient. Contents of the invention [0004] The purpose of the present invention is to provide a virtual encryption card ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455
Inventor 郭旭孙国忠宋辉叶丞曹振南
Owner DAWNING CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products