System and method for providing cryptographic services through virtualized cryptographic device clusters

A technology of cryptographic services and cryptographic devices, which is applied in the field of cryptographic services provided by virtualized cryptographic device clusters, can solve problems such as the inability to detect the busyness of the host machine in real time, low utilization of cryptographic device resources, and lower overall system performance, and achieve the goal of overcoming Cannot detect the busyness of the host in real time, protect security, and overcome the effect of low utilization

Active Publication Date: 2019-10-25
XIDIAN UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the shortcomings of this system are that the computing resource layer has a low utilization rate of cryptographic device resources, and the system consumes a lot of energy. When a cryptographic device fails, the cryptographic service cannot be switched to another cryptographic device.
However, the disadvantage of this method is that the guest virtual machine only manages a single host machine, and cannot detect the busyness of the host machine in real time, resulting in low work efficiency of the host machine and reducing the overall performance of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing cryptographic services through virtualized cryptographic device clusters
  • System and method for providing cryptographic services through virtualized cryptographic device clusters
  • System and method for providing cryptographic services through virtualized cryptographic device clusters

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The invention will be further described below in conjunction with the accompanying drawings.

[0054] Refer to attached figure 1 , the system of the present invention is composed of a cloud cryptographic service interface, a task scheduler, a plurality of cryptographic machines and a state detector. in:

[0055] The cloud cryptography service interface is used to generate a service request message and send it to the task scheduler.

[0056] The task scheduler includes a load balancing module, an information processing module, a virtual resource pool module, and a state feedback module, wherein the load balancing module is used to calculate the occupancy rate of the commercial secret algorithm of each encryption machine, and calculate the utilization rate of each encryption machine According to the quick sort method, the load value of each cipher machine and its corresponding cipher machine serial number are arranged into a group of increasing sequences according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for providing cryptographic services through virtualized cryptographic equipment clusters. The system is composed of a cloud cryptographic service interface, a task scheduler, multiple cryptographic machines and a state detector. The method of the present invention comprises the following steps: (1) detecting the load information of the cipher machine; (2) calculating the commercial secret algorithm occupancy rate of the cipher machine; (3) calculating the load value of the cipher machine; (4) sorting the load values; (5) Initiate a service request; (6) Process a service request; (7) Select a cipher machine; (8) Determine whether the working status of the cipher machine is normal; (9) Process business requests and responses; (11) Receive service responses; ( 12) Feedback load information; (13) Judging whether the password service request is over; (14) The password service is over. The invention can meet the actual requirement of virtualizing cryptographic device clusters to provide cryptographic computing services.

Description

technical field [0001] The invention belongs to the technical field of communication, and further relates to a system and method for providing cryptographic services through virtualized cryptographic device clusters in the technical field of information security. The invention can efficiently provide cryptographic operation services in the fields of online banking, industrial and commercial taxation, e-commerce and the like. Background technique [0002] With the continuous development of cloud computing, virtualization technology has been widely used. Traditional cipher computing services are generally provided directly by cipher machines, and the cipher machines directly return the calculation results after making calculations. However, since cryptographic devices at home and abroad come from different manufacturers, there are differences in the interfaces, operation types, and speeds of cryptographic devices. Through virtualization technology, uniform and balanced schedu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L12/26H04L12/24G06F9/50G06F21/60H04L29/06
CPCH04L41/0663H04L43/0817H04L67/1008H04L67/1029G06F9/5077G06F21/602H04L63/06H04L67/1001H04L67/60
Inventor 李凤华张鑫朱辉李晖李莉苏雅迪
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products