Virtual encryptor device, financial encryptor and method of encrypting message

A technology of encryption machine and virtual machine, applied in the direction of program control device, software simulation/interpretation/simulation, electrical components, etc., can solve problems such as difficult to provide technical support, business loss, difficult high availability, etc., to achieve double load balancing, Effectively handle and optimize the effect of the optimal path

Inactive Publication Date: 2014-03-12
CHINA UNIONPAY
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, the existing centralized scheduling is based on processes, and it is difficult to achieve high availability of a physical encryption machine for a certain business. If a certain process fails, all related services on the process queue will be lost.
Second, the current centralized scheduling algorithm is mainly aimed at achieving load balancing for a specific business, and it is difficult to comprehensively achieve load balancing for physical encryption machines and different business applications. In the future cloud computing platform, encryption machine clusters will be massively distributed. For business message access, the current load balancing scheduling algorithm is difficult to provide effective technical support

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual encryptor device, financial encryptor and method of encrypting message
  • Virtual encryptor device, financial encryptor and method of encrypting message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following introduces some of the possible embodiments of the present invention, which are intended to provide a basic understanding of the present invention, but are not intended to identify key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, those skilled in the art may propose other alternative implementation manners without changing the essence and spirit of the present invention. Therefore, the following specific embodiments and drawings are only exemplary descriptions of the technical solution of the present invention, and should not be regarded as the entirety of the present invention or as a limitation or restriction on the technical solution of the present invention.

[0026] refer to figure 1 According to one aspect of the present invention, a virtual encryption machine device 100 is provided, including: one or more virtual machi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual encryptor device including one or more virtual machine modules; a configuration management module for configuring a corresponding virtual machine module for each physical encryptor; and a unified scheduling module for receiving a message to be encrypted from an external system. A key value group matrix of the message to be encrypted is generated according to a scheduling algorithm; and based on the key value group matrix, dual processing load of the physical encryptors and the message to be encrypted is determined and the virtual machine module is selected for preprocessing the message to be encrypted. The invention also discloses a financial encryptor including the virtual encryptor device and a method of encrypting a message by use of the virtual encryptor device.

Description

technical field [0001] The invention relates to the field of information security of cloud computing, in particular to a virtual encryption machine device, a financial encryption machine and a method for encrypting messages. Background technique [0002] Cloud computing is the growth, usage, and delivery model of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. Under the cloud computing platform, the unified management and centralized scheduling of encryption machine resources has gradually become an important realization goal. [0003] After research, the existing solutions have the following problems in practical application. First, the existing centralized scheduling is based on processes, and it is difficult to achieve high availability of a certain service by a physical encryption machine. If a process fails, all related services on the process queue will be lost. Second, the cu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F9/455
Inventor 任仰鹞鲁志军何朔华锦芝
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products