Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Container virtualization technology based cipher machine, implementation method and working method therefor

A technology of virtualization technology and implementation method, applied in the direction of instruments, software simulation/interpretation/simulation, program control design, etc., can solve problems such as non-reusability, waste of resources, low resource utilization, etc., to improve availability and reduce cost input , Enhance the effect of on-demand service capabilities

Active Publication Date: 2016-01-13
中电科网络安全科技股份有限公司
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the actual application process of cipher machine, a single cipher device provides limited cipher services in a specific production environment, the service type is single, and the resource utilization rate is low
When other cryptographic services are needed, usually the service can only be provided by adding corresponding cryptographic devices instead of reusing the original cryptographic devices, resulting in further waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Container virtualization technology based cipher machine, implementation method and working method therefor
  • Container virtualization technology based cipher machine, implementation method and working method therefor
  • Container virtualization technology based cipher machine, implementation method and working method therefor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] All features disclosed in this specification, or steps in all methods or processes disclosed, may be combined in any manner, except for mutually exclusive features and / or steps.

[0041] Any feature disclosed in this specification (including any appended claims, abstract and drawings), unless expressly stated otherwise, may be replaced by alternative features which are equivalent or serve a similar purpose. That is, unless expressly stated otherwise, each feature is one example only of a series of equivalent or similar features.

[0042] A method for implementing a cryptographic machine based on container virtualization technology includes:

[0043] Step 1: Lunix system tools make the root file system and cipher machine application required by the vHSM user mode environment, and compress them to form a vHSM image;

[0044] Step 2: Copy the vHSM image to the target physical cipher machine, decompress it by the vHSM management module and install it into the directory of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security codes, and in particular provides a container virtualization technology based cipher machine, an implementation method and a working method therefor. The invention, aims to solve the problems existing in the prior art, by providing the container virtualization technology based cipher machine, the implementation method and the working method therefor, used for improving resource utilization rate of equipment, improving high availability of the cipher equipment, and enhancing the on-demand service ability of the equipment. The implementation method for the container virtualization technology based cipher machine comprises the steps of decompressing and installing a vHSM mirror image to a catalogue of an assigned target physical cipher machine through a vHSM management module; performing vHSM container configuration and application configuration, assigning the hardware resource quota for the vHSM; performing vHSM application configuration through the vHSM management module, and assigning the operation setting of the vHSM cipher machine application; and establishing the vHSM by the vHSM management module based on the vHSM container configuration and the application configuration, and operating the vHSM.

Description

technical field [0001] The invention belongs to the technical field of information security encryption, in particular to an encryption machine based on container virtualization technology, its implementation and its working method. Background technique [0002] Container virtualization technology is a lightweight operating system virtualization method supported by the Linux kernel. It provides virtualization functions with operating efficiency close to physical machines. Compared with traditional virtualization technologies, it has the ability to share the kernel with the host machine, start Fast speed, minimal performance loss and so on. Container virtualization technology uses technologies such as NameSpace and CGroup provided by the Linux kernel to provide an independent virtual operating environment for applications, and realizes security isolation between containers and resource control of each container. Among them, the NameSpace technology realizes the security isola...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F9/455
CPCG06F9/45504G06F21/44
Inventor 唐伟熊文杰
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products