Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virtualized cloud cipher machine system based on cloud computing, and implementing method thereof

A virtual cipher machine and virtualized cloud technology, applied in the field of virtualized cloud cipher machine system, can solve problems such as low computing performance, low performance, and cipher card does not support multi-threaded encryption mode, etc., to achieve independence, high availability, The effect of saving equipment resource investment

Active Publication Date: 2019-02-19
西安得安信息技术有限公司
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cipher machine is the basis of the security of the entire business system. Due to the requirements of security compliance, it has always appeared in the form of a black box, and its management and use have a set of established models. The existing cipher machine is aimed at enterprises or governments. Designed by the department, it can no longer meet the needs of cloud computing, and the existing cipher machine is implemented by using a general-purpose computer to encrypt a cipher card. This method has the following disadvantages: the calculation performance is low, and the CPU of a general-purpose computer is not designed for communication and encryption. Optimize; the existing encryption card usually does not support multi-threaded encryption mode, and in the environment where multiple users frequently switch encryption requests, the performance is very low, usually below 1Gbps; it does not support online replacement of encryption algorithm, if it is applied in a cloud computing environment , will greatly increase the time and cost of system upgrade and maintenance; only simple stacking can be used for expansion, there is no task scheduling during stacking, and there is no state synchronization and switching between multiple encryption machines or multiple encryption cards, and linearity cannot be achieved expand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualized cloud cipher machine system based on cloud computing, and implementing method thereof
  • Virtualized cloud cipher machine system based on cloud computing, and implementing method thereof
  • Virtualized cloud cipher machine system based on cloud computing, and implementing method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Such as figure 1 As shown, the implementation method of a virtualized cloud cipher machine system based on cloud computing disclosed by the present invention includes the following steps:

[0045] (1) Stored in the database, exit the management program after the configuration is completed;

[0046] (2) The virtual cipher machine receives the instruction to start the background service program, starts the cipher card of the agent service module, and cyclically verifies the identity of the administrator or operator until the verification is passed, and then starts the business service waiting process and starts the system monitoring program, and enter the business waiting state;

[0047] (3) The virtual cipher machine receives an instruction to start the management program, uses remote management to configure the management program of the virtual cipher machine, and stores it in the database, and exits the management program after the configuration is completed;

[0048...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtualized cloud cipher machine system based on cloud computing, comprising a physical module, a proxy service module, a virtual cipher machine and a secure API interface, wherein one end of the proxy service module establishes a two-way communication connection with the physical module, and the other end establishes a two-way communication connection with a plurality ofmutually independent virtual cipher machines isolated by the virtualization technology; and the secure API interface is used for encapsulating cryptographic operations and internal key management, thereby providing a channel for the cryptographic operation of the client of the virtual cipher machine. The virtualized cloud cipher machine system based on cloud computing realizes the combination ofthe cryptographic algorithm operation, resource management and key management mechanism, so that the use of the cryptographic technology is more centralized, standardized, and easier to manage, and atthe same time, the cryptographic machine resources are allocated to the user remotely through the network, and the encryption technology is utilized to guarantee the transmission security by one password at one time, thereby ensuring the highest security of the customer data and ensuring the security of the key.

Description

technical field [0001] The invention relates to the technical field of information security ciphers, in particular to a virtualized cloud cipher system based on cloud computing and its implementation method. Background technique [0002] Cloud computing is the product of the development and integration of traditional computer and network technologies such as distributed computing, parallel computing, network storage, virtualization, and load balancing. Computing resources provided in the cloud are part of society's infrastructure compared to other models, and will have a profound impact on information technology and applications. The continuous development of cloud computing is changing the resource allocation of software engineering, network core and terminal, and the merger of information and knowledge. Cloud computing is regarded as the third wave of IT after the revolution of personal computers and the revolution of the Internet. It will bring Fundamental changes in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/14H04L9/08H04L29/06G06F21/60G06F21/34
CPCG06F21/34G06F21/604H04L9/0894H04L9/14H04L63/0272H04L63/0281H04L63/045H04L63/105
Inventor 王泉景宋博周晓刚陈能白志强宋靖
Owner 西安得安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products