Scheduling method and system for password arithmetic units

A technology of computing units and scheduling methods, applied in transmission systems, electrical components, etc., can solve the problems of limited processing capacity of cryptographic computing units, low utilization rate of cryptographic computing units, inconvenient dynamic adjustment and expansion, etc., to improve utilization rate Effect

Inactive Publication Date: 2016-02-03
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the cloud environment, when the traditional physical host is migrated to the cloud platform to become a cloud host, the traditional cryptographic computing unit can be deployed in the cloud environment to provide cryptographic computing services for the cloud host; however, due to the limited processing capacity of the cryptographic computing unit limit, it is not convenient for dynamic adjustment and expansion, therefore, there is a situation that the utilization rate of the cryptographic operation unit is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method and system for password arithmetic units
  • Scheduling method and system for password arithmetic units
  • Scheduling method and system for password arithmetic units

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] The core of the present invention is to provide a scheduling method and system for a cryptographic operation unit, so as to realize the dynamic scheduling of a server encryption machine for a cryptographic operation task, and further improve the utilization rate of the server encryption machine.

[0037] In order to enable those skilled in the art to better understand the solution of the present invention, the present invention will be further described ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a scheduling method and a scheduling system for password arithmetic units. The scheduling method comprises the steps of: obtaining an arithmetic request about a password arithmetic task from a user; and selecting the password arithmetic unit matched with the password arithmetic task according to the password arithmetic content of the password arithmetic task and referring to the running status of each password arithmetic unit in a password service pool. The password service pool includes the plurality of password arithmetic units, so that password arithmetic resources are virtualized, the password arithmetic units in the password service pool are dynamically scheduled aiming at the different password arithmetic tasks, and thereby use ratio of the password arithmetic unit is improved.

Description

technical field [0001] The invention relates to the technical field of implementing data encryption operations, in particular to a scheduling method and system for encryption operation units. Background technique [0002] In traditional environments, physical hosts are usually assigned an independent cryptographic unit, such as a server cipher machine, to complete cryptographic tasks. The cryptographic unit is used to encrypt and protect the transmission and storage of sensitive information on the physical host. The server password Machines such as encryption cards, USB encryption machines, etc. [0003] In the cloud environment, when the traditional physical host is migrated to the cloud platform to become a cloud host, the traditional cryptographic computing unit can be deployed in the cloud environment to provide cryptographic computing services for the cloud host; however, due to the limited processing capacity of the cryptographic computing unit It is not convenient fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0428H04L63/06H04L67/1001H04L67/60
Inventor 雷波董贵山王运兵侯建宁雷震宇冷青松刘俊波王锋唐中乾陈德勇
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products