Check patentability & draft patents in minutes with Patsnap Eureka AI!

A virtualized cloud cipher system based on cloud computing and its implementation method

A virtual cryptographic machine and virtualized cloud technology, applied in the field of virtualized cloud cryptographic machine system, can solve the problems of low computing performance, cryptographic card does not support multi-thread encryption mode, low performance, etc., to ensure independence and save equipment resources The effect of investment and high availability

Active Publication Date: 2021-09-07
西安得安信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The cipher machine is the basis of the security of the entire business system. Due to the requirements of security compliance, it has always appeared in the form of a black box, and its management and use have a set of established models. The existing cipher machine is aimed at enterprises or governments. Designed by the department, it can no longer meet the needs of cloud computing, and the existing cipher machine is implemented by using a general-purpose computer to encrypt a cipher card. This method has the following disadvantages: the calculation performance is low, and the CPU of a general-purpose computer is not designed for communication and encryption. Optimize; the existing encryption card usually does not support multi-threaded encryption mode, and in the environment where multiple users frequently switch encryption requests, the performance is very low, usually below 1Gbps; it does not support online replacement of encryption algorithm, if it is applied in a cloud computing environment , will greatly increase the time and cost of system upgrade and maintenance; only simple stacking can be used for expansion, there is no task scheduling during stacking, and there is no state synchronization and switching between multiple encryption machines or multiple encryption cards, and linearity cannot be achieved expand

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtualized cloud cipher system based on cloud computing and its implementation method
  • A virtualized cloud cipher system based on cloud computing and its implementation method
  • A virtualized cloud cipher system based on cloud computing and its implementation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] Such as figure 1 As shown, the implementation method of a virtualized cloud cipher machine system based on cloud computing disclosed by the present invention includes the following steps:

[0045] (1) Stored in the database, exit the management program after the configuration is completed;

[0046] (2) The virtual cipher machine receives the instruction to start the background service program, starts the cipher card of the agent service module, and cyclically verifies the identity of the administrator or operator until the verification is passed, and then starts the business service waiting process and starts the system monitoring program, and enter the business waiting state;

[0047] (3) The virtual cipher machine receives an instruction to start the management program, uses remote management to configure the management program of the virtual cipher machine, and stores it in the database, and exits the management program after the configuration is completed;

[0048...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virtualized cloud cipher machine system based on cloud computing, which includes a physical module, a proxy service module, a virtual cipher machine and a security API interface. One end of the proxy service module establishes a bidirectional communication connection with the physical module, and the other end communicates with the physical module. Two-way communication connections are established between several independent virtual cipher machines isolated by virtualization technology. The secure API interface is used to encapsulate cryptographic operations and internal key management, thereby providing a virtual cipher machine client for invoking cryptographic operations. aisle. The invention realizes the combination of cryptographic algorithm operation, resource management and key management mechanism, which makes the use of cryptographic technology more concentrated, standardized, and easier to manage. At the same time, it remotely allocates cryptographic machine resources to users through the network, and utilizes encryption technology once One secret guarantees the security of transmission, thus ensuring the highest security of customer data and the security of keys.

Description

technical field [0001] The invention relates to the technical field of information security ciphers, in particular to a virtualized cloud cipher system based on cloud computing and its implementation method. Background technique [0002] Cloud computing is the product of the development and integration of traditional computer and network technologies such as distributed computing, parallel computing, network storage, virtualization, and load balancing. Computing resources provided in the cloud are part of society's infrastructure compared to other models, and will have a profound impact on information technology and applications. The continuous development of cloud computing is changing the resource allocation of software engineering, network core and terminal, and the merger of information and knowledge. Cloud computing is regarded as the third wave of IT after the revolution of personal computers and the revolution of the Internet. It will bring Fundamental changes in the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/08H04L29/06G06F21/60G06F21/34
CPCG06F21/34G06F21/604H04L9/0894H04L9/14H04L63/0272H04L63/0281H04L63/045H04L63/105
Inventor 王泉景宋博周晓刚陈能白志强宋靖
Owner 西安得安信息技术有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More