Method and system for efficiently calling hardware encryption equipment in UNIX/LINUX environment
A technology of hardware encryption and application system, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve the problems of high system maintenance cost, high risk, low system portability, etc., and achieve the effect of convenient replacement
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.
[0024] Such as figure 1 As shown, the method for efficiently calling a hardware encryption machine in the UNIX / LINUX environment of the present invention may further comprise the steps:
[0025] Step S1, read parameters such as hardware encryption machine model, log level, request message queue and response message queue key value, hardware encryption machine IP address and port number from the configuration file;
[0026] Step S2, check whether the request message queue and the response message queue exist; if they exist, execute step S4; if they do not exist, execute step S3;
[0027] Step S3, respectively establishing a request message queue and a response message queue;
[0028] Step S4, establishing SOCKET communication with the hardware encryption machine specified in the configuration file, and the port number is taken from the conf...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 