Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for efficiently calling hardware encryption equipment in UNIX/LINUX environment

A technology of hardware encryption and application system, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve the problems of high system maintenance cost, high risk, low system portability, etc., and achieve the effect of convenient replacement

Inactive Publication Date: 2013-01-16
WUXI CINSEC INFORMATION TECH
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different types of hardware encryption machines have different calling interfaces. Different application systems of an enterprise often use hardware encryption machines with different interfaces. Most application systems are bundled with hardware encryption machines. The hardware encryption machine model changes It is necessary to modify the application system, resulting in low system portability, high system maintenance costs and increased risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for efficiently calling hardware encryption equipment in UNIX/LINUX environment
  • Method and system for efficiently calling hardware encryption equipment in UNIX/LINUX environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0024] Such as figure 1 As shown, the method for efficiently calling a hardware encryption machine in the UNIX / LINUX environment of the present invention may further comprise the steps:

[0025] Step S1, read parameters such as hardware encryption machine model, log level, request message queue and response message queue key value, hardware encryption machine IP address and port number from the configuration file;

[0026] Step S2, check whether the request message queue and the response message queue exist; if they exist, execute step S4; if they do not exist, execute step S3;

[0027] Step S3, respectively establishing a request message queue and a response message queue;

[0028] Step S4, establishing SOCKET communication with the hardware encryption machine specified in the configuration file, and the port number is taken from the conf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for efficiently calling hardware encryption equipment in a UNIX / LINUX environment. The method comprises the following steps of: reading configuration from a configuration file, establishing a request message queue and an acknowledgement message queue respectively, establishing connection with the hardware encryption equipment, writing messages for which the hardware encryption equipment is required to be called into the request message queue by using other application systems; reading the messages from the request message queue, transmitting the read messages to the hardware encryption equipment, receiving messages from the hardware encryption equipment, writing the messages of the hardware encryption equipment into the acknowledgement message queue, and receiving the messages from the acknowledgement message queue by using the other application systems. Application program interfaces (API) of different types of hardware encryption equipment are arranged in different modules, the same interface is called by the application systems, and is stored in a dynamic link library, and an encryption server is independent from the application systems, so that efficiency is improved, and the application systems can be conveniently maintained. Different types of hardware encryption equipment can be called by modifying information in the configuration file, so that different types of hardware encryption equipment can be conveniently replaced.

Description

technical field [0001] The invention relates to the field of computer applications, in particular to a method and system for efficiently and conveniently calling a hardware encryption machine in a UNIX / LINUX environment. Background technique [0002] Military, financial, telecommunications and other industries generally use hardware encryption machines to ensure system security, but there are several hardware encryption machine manufacturers, and each company has multiple models. Different types of hardware encryption machines have basically different calling interfaces. Different application systems of an enterprise often use hardware encryption machines with different interfaces. Most application systems are bundled with hardware encryption machines. The hardware encryption machine model changes It is necessary to modify the application system, resulting in low system portability, high system maintenance costs and increased risks. Contents of the invention [0003] The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50G06F21/71
Inventor 耿振民吴海生
Owner WUXI CINSEC INFORMATION TECH