Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data encryption and decryption scheduling method based on multi-card redundancy check

A technology of redundancy check and scheduling method, applied in the direction of electrical digital data processing, multi-program device, program control design, etc., can solve problems such as task failure, encryption and decryption failure, errors, etc., to reduce data error rate, The effect of improving parallel performance and system availability

Active Publication Date: 2019-08-09
湖南麒麟信安科技股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In actual use, the encryption card may fail, resulting in the failure of encryption and decryption
For a single card system, since the failure of the encryption card is a single point of failure, it will lead to the failure of the entire system
For a multi-card system, when some encryption cards fail, using the current scheduling algorithm, when a task is allocated to a faulty encryption card, the task will fail. Overall, some tasks will fail
So even a multi-card system cannot redundantly encrypt card failures
[0005] In the actual encryption and decryption process of the encryption card, it is found that sometimes when the key and data are correct, the wrong result will appear

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data encryption and decryption scheduling method based on multi-card redundancy check
  • A data encryption and decryption scheduling method based on multi-card redundancy check
  • A data encryption and decryption scheduling method based on multi-card redundancy check

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Such as figure 1 As shown, in this embodiment, the linux operating system including 4 encryption cards is taken as an example, and the data encryption and decryption scheduling method based on the multi-card redundancy check of the present invention is further described in detail. see figure 1 , the linux operating system file system driver scheduling algorithm module containing 4 encryption cards, the file system driver is the caller of the scheduling algorithm module, the scheduling algorithm module is the caller of the encryption card driver, and the encryption card driver is the original encryption card hardware The interface requires the caller to specify the card number and port number. The scheduling algorithm module is an example of using the data encryption and decryption scheduling method based on multi-card redundancy check in this embodiment. It shields the details of the encryption card from the upper layer caller and provides a single Encryption and decry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data encryption and decryption modulating method based on multi-card redundancy check, comprising the steps: pre-maintaining an encryption card state list, and maintaining a port state list for each encryption card, wherein states of the encryption cards include normality, failure and saturation, and port states include in-use state and idle state; initiating a waiting queue for storing encryption and decryption tasks; when a current encryption-decryption task is received, allocating the current encryption-decryption task to two target ports, not in use, of two encryption cards in normal use in order to specified encryption or decryption, determining that the current encryption-decryption task is successfully executed if output is uniform, and updating and maintaining the encryption card state list and the port state list during calling. Data error, calling error and other situations of the encryption card are considered, redundancy is established in the multi-card environment by a specific scheduling algorithm, multi-encryption-card parallel performance and system availability are maximally improved, and data error rate is decreased.

Description

technical field [0001] The invention relates to computer data encryption and decryption technology based on encryption cards, in particular to a data encryption and decryption scheduling method based on multi-card redundancy check. Background technique [0002] There is a need to encrypt important data within the government, the military, and companies or organizations that require confidentiality. For security and performance considerations, existing data encryption systems generally use hardware encryption and decryption. The encryption hardware is in the form of a PCI card (hereinafter referred to as the encryption card). The encryption and decryption speed of a single encryption card has an upper limit. For a single host, sometimes a single encryption card cannot meet the needs of processing a large amount of data in speed, so multiple encryption cards can be inserted at the same time to share the task. Because the tasks of encrypting and decrypting each data block ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/50
CPCG06F9/5027G06F2209/503
Inventor 谢景飞彭勇蒋李申锟铠刘文清杨涛
Owner 湖南麒麟信安科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products