Unlock instant, AI-driven research and patent intelligence for your innovation.

Cluster data encryption system and its data processing method

A data encryption, clustering technology, applied in transmission systems, digital data protection, electrical components, etc., to reduce the probability of failure

Active Publication Date: 2017-03-29
AEROSPACE INFORMATION
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the electronic ticket number in each data encryption device is limited, and if the electronic ticket number is used up, data encryption will no longer be possible. In the prior art, there is no effective way to evenly distribute data among each data encryption device. Method for data encryption request from data sending device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cluster data encryption system and its data processing method
  • Cluster data encryption system and its data processing method
  • Cluster data encryption system and its data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] The processing flow of a method for allocating data encryption requests in a clustered data encryption system provided by this embodiment is as follows: figure 2 As shown, the following processing steps are included:

[0022] Step 21. Store and manage the data encryption device information list in the data server. The data encryption device information list stores information such as the state of the data encryption device, connection time with the data server, and distribution start time.

[0023] The data encryption device information list is stored and managed in the data server. Each record in the data encryption device information list uniquely corresponds to a data encryption device. The record corresponding to the data encryption device stores the basic information of the data encryption device. The basic information includes The IP address, port number, device number, status, connection time with the data server, distribution start time, and sequence number of ...

Embodiment 2

[0038] The specific structural diagram of a data encryption request distribution device of a clustered data encryption system provided by this embodiment is as follows: Figure 5 As shown, the device can be set in the data server, specifically including the following modules:

[0039] The data encryption device information list management module 51 is used to store and manage the data encryption device information list in the data server. Each record in the data encryption device information list uniquely corresponds to a data encryption device, and the corresponding record of the data encryption device stores The IP address, port number, device number, status, connection time with the data server, distribution start time and sequence number of the record of the data encryption device, the status is idle or busy, the default is idle, and the distribution start time Time indicates the start time when the data encryption device is assigned a data encryption request, which is emp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data encryption request distribution method and device in a cluster-type data encryption system. The method mainly includes: after a data server receives data encryption requests, according to a data encryption device information list stored in the data server, a data encryption device which is distributed most recently is obtained; according to position information and a set distribution rule of the data encryption device which is distributed most recently, the data encryption requests are distributed to a specific data encryption device, the state of which is idle, in the data encryption device information list. In the data encryption request distribution method and device in the cluster-type data encryption system, because a balanced load algorithm is adopted, data encryption requests from a data sending end are distributed to different data encryption devices in a balanced manner so that it is prevented that the data encryption requests from the data sending end are all sent to the same data encryption device and thus a probability that a fault happens in a small data encryption device because of overload operation is reduced.

Description

technical field [0001] The invention relates to the field of computer application technology, in particular to a cluster data encryption system and a data processing method thereof. Background technique [0002] The cluster data encryption system is a system for accurately recording various data. The structural diagram of the system is shown in figure 1 As shown, the system is composed of a data sending device, a data server, and a data encryption device cluster, where the data server is used to store summary data, and the data encryption device cluster is used to record and encrypt data, generate and return a unique identifier to the data sending device Data encryption information. [0003] The working process of the clustered data encryption system is as follows: the data sending device sends data to the data server, the data server stores the data, and at the same time selects a data encryption device in the "idle" state in the data encryption device cluster and marks it...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/60
Inventor 陈懿胡金辉王俊杰张国喜赵轶民孙国良武志鹏
Owner AEROSPACE INFORMATION