On-demand password service method, apparatus and device

A technology of cryptographic services and cryptographic equipment, applied in the field of cryptographic on-demand services, can solve the problems of online concurrent random crossing, cryptographic computing resources cannot be dynamically configured, managed and scheduled, etc.

Active Publication Date: 2017-12-12
广州天宁信息技术有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing cryptographic systems, cryptographic equipment, and various cryptographic computing resources cannot be dynamically configured, managed, and scheduled according to requirements, and do not have the ability to meet differentiated dynamic on-demand cryptographic services and the online concurrency of tens of millions of business systems. Random Crossover Requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • On-demand password service method, apparatus and device
  • On-demand password service method, apparatus and device
  • On-demand password service method, apparatus and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] refer to figure 1 As shown in FIG. 1 , it is a schematic flowchart of the password on-demand service method in Embodiment 1 of the present invention. In this embodiment, the password on-demand service method includes:

[0045] Step 101: Analyze cryptographic service requirements and generate cryptographic computing resource configuration requirements or cryptographic job scheduling policies according to cryptographic service requirements;

[0046] Step 102: Cryptographic service configuration management generates cryptographic computing resource configuration instructions according to cryptographic computing resource configuration requirements;

[0047] Step 103: The flexible reconstruction of cryptographic computing resources generates cryptographic reconstruction instructions according to the cryptographic computing resource configuration instructions and / or sends cryptographic reconstruction resources to the cryptographic computing pool, and the cryptographic comput...

Embodiment 2

[0058] refer to figure 2As shown, it is a flow chart of the password on-demand service method in Embodiment 2 of the present invention. In this embodiment, the password on-demand service method includes:

[0059] Step 201: Analyze cryptographic service requirements Receive cryptographic service requirements, and generate cryptographic jobs when it is determined that existing cryptographic computing resources meet cryptographic service requirements based on any combination of cryptographic service requirements, cryptographic computing resource attributes, and cryptographic computing resource usage The scheduling policy is sent to the password job management, and the configuration and management of the password resources required by the password service are completed, and the process is directly transferred to step 208 to perform password job management and scheduling;

[0060] Optionally, when it is determined that the existing cryptographic computing resources do not meet th...

Embodiment 3

[0130] This embodiment is used to illustrate a process of cryptographic service requirement analysis, cryptographic service configuration management, and cryptographic computing resource flexible reconstruction to realize cryptographic service requirement analysis and cryptographic computing resource configuration. refer to Figure 4 As shown, the password on-demand service method of this embodiment includes:

[0131] Step 301: Analyze cryptographic service requirements and receive cryptographic service requirements from upper layer cryptographic applications;

[0132] Step 302: Analysis of cryptographic service requirements According to any combination of cryptographic service requirements, cryptographic computing resource attributes, and cryptographic computing resource usage, analyze whether the existing cryptographic computing resources meet the cryptographic service requirements. If they meet, go to step 303; otherwise, go to Step 304;

[0133] Step 303: The cryptograph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an on-demand password service method, apparatus and device used for analyzing password service demand, performing on-demand configuration and reconstruction on password computing resources and performing on-demand scheduling of password working. The method comprises the following steps: a password service demand analysis method, namely, receiving the password service demand, when it is judged that the existing password computing resource satisfies the password service demand, generating a password work scheduling strategy; when it is judged that the existing password computing resource cannot satisfy the password service demand, generating a password computing resource configuration demand; generating a new password work scheduling strategy according to the received new password computing resource attribute; and the method further comprises: a password service configuration and management step, a password computing resource flexible reconstruction step, a password work management step and a password computing resource operation state management step. By adoption of the on-demand password service method, apparatus and device, dynamic configuration, management and scheduling of the password computing resources can be performed according to the demand, and higher than millions and millions of levels of online and random crossing demands of all kinds of service systems are satisfied.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method, device and equipment for password on-demand services. Background technique [0002] With the continuous advancement of the Internet + strategy, the Internet economy is continuously integrated with all walks of life, and various new formats and service models are emerging, especially cloud services, e-commerce, electronic payment, sharing economy, big data centers, and social networks. The rapid development has directly led to a substantial increase in the number of users and types of services. For Internet services, the typical characteristics are facing huge challenges such as diverse business types, personalized resource requirements, multiple rounds of service interactions, high concurrency of online links, random crossover of requests, and large peak differences. Therefore, it is urgent to realize efficient and differentiated management and dynamic utilization...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L12/24H04L12/911
CPCH04L41/0803H04L47/70H04L67/60
Inventor 李凤华谢绒娜李晖史国振
Owner 广州天宁信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products