Method for optimizing performance of encryption card based on DEVICE MAPPER

An encryption card and encryption algorithm technology, applied in the protection of internal/peripheral computer components, instruments, electrical digital data processing, etc., to achieve the effects of saving CPU time, increasing speed, and reasonable design

Inactive Publication Date: 2015-01-07
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, most of these national secret algorithms exist in the chip of the hardware encryption card in the form of IP core. How to use the API interface of these encryption cards, which layer of the traditional block device driver to add the encryption module and what method to use Interfaces to call cryptographic modules present challenges

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for optimizing performance of encryption card based on DEVICE MAPPER
  • Method for optimizing performance of encryption card based on DEVICE MAPPER
  • Method for optimizing performance of encryption card based on DEVICE MAPPER

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] A DEVICE MAPPER-based encryption card performance optimization method of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0018] Such as Figure 1-4 As shown, a method for optimizing the performance of an encryption card based on DEVICE MAPPER of the present invention, the API of the encryption card in its structure is integrated into the general block device kernel framework of Device Mapper to realize the dm-crypt encryption block device suitable for the encryption card Module, which in turn can create an encrypted file system to protect confidential data at the disk storage level;

[0019] The encryption block device module adopts the synchronous block encryption and asynchronous block encryption of the domestic encryption algorithm sm1, and provides a method for registering the sm1 algorithm to the kernel password manager.

[0020] By adding modules suitable for encryption card drivers to the Device Mapper ker...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for optimizing the performance of an encryption card based on DEVICE MAPPER. The API of the encryption card is integrated into the universal block device kernel framework Device Mapper so that a dm-crypt encryption block device module suitable for the encryption card can be realized, and furthermore, an encrypted file system can be established for protecting confidential data at a disk storage level; the encryption block device module comprises two modes, namely synchronous block encryption and asynchronous block encryption of the domestic encryption algorithm sm1, and a method for registering the algorithm sm1 to a kernel password manager is provided. Compared with the prior art, the method for optimizing the performance of the encryption card based on DEVICE MAPPER is characterized in that the increase of the speed is realized by virtue of parallel operating of a plurality of cards, and in the aspect of system resource utilization rate, principally, the previous encryption card working pattern is changed from waiting mode into an asynchronous working mode, and therefore, the time of the cpu is greatly saved.

Description

technical field [0001] The invention relates to the technical field of computer storage, in particular to a method for optimizing the performance of an encryption card based on DEVICE MAPPER. Background technique [0002] Transparent encryption technology is a file encryption technology that has emerged in recent years to meet the needs of enterprise file confidentiality. The so-called transparency means that it is unknown to the user. When the user opens or edits the specified file, the system will automatically encrypt the unencrypted file and automatically decrypt the encrypted file. The file is ciphertext on the hard disk and plaintext in memory. Once you leave the usage environment, the application cannot be opened because it cannot get the automatic decryption service, thus protecting the file content. [0003] In order to encrypt the data stored on the disk, it is necessary to select a robust and secure encryption algorithm. The encryption algorithm is some formula...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/78
CPCG06F21/80G06F2221/2107
Inventor 施培任边泽明张彦哲
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products