Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for processing cryptographic tasks

A cryptography and task technology, applied in the direction of user identity/authority verification, transmission system, electrical components, etc., can solve the problems of inability to reasonably schedule encryption machine resources, high load of encryption machine equipment, increase use cost, etc., and achieve flexible allocation scheme. Changeable, conducive to rational distribution, and the effect of improving distribution efficiency

Active Publication Date: 2021-03-23
BEIJING SENSESHIELD TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The application of encryption equipment is more and more extensive. An encryption equipment can have one or more encryption machines. However, in the process of using an encryption machine, one encryption machine performs the tasks of the same user or the same type of business, which is not conducive to encryption. The reasonable allocation of computer resources increases the cost of use and causes waste of resources, for example, in the following usage scenarios:
[0003] 1. The company has less business and different key systems are used in different business lines. At this time, the company also has to use multiple encryption machines, resulting in waste of resources and increase in costs
[0004] 2. The company has a lot of business, and the load of an encryption machine is too high
[0005] 3. Encryption machine manufacturers provide external encryption machine rental services in the PaaS mode, which cannot reasonably schedule limited encryption machine resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for processing cryptographic tasks
  • A method and device for processing cryptographic tasks
  • A method and device for processing cryptographic tasks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0041] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.

[0042] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.

[0043] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a device for processing cryptography tasks, and the method comprises the steps: receiving a service request, analyzing the service request, and obtaining the service attribute of the service request; and according to the service attribute, allocating a cryptography task corresponding to the service request to a corresponding task group comprising at least one encryption module, the task group being configured in at least one encryption machine, the encryption machine comprising at least one encryption module, and the task group being associated with an administrator lock. According to the method, corresponding cryptography tasks are correspondingly allocated according to different service attributes. The distribution scheme is flexible and variable, thereasonable distribution of encryption machine resources is facilitated, the same task group can provide complete service and can be logically isolated from other task groups, the distribution efficiency can be effectively improved, and the limited encryption machine resources can be reasonably dispatched.

Description

technical field [0001] The invention relates to the field of information security of electronic equipment, in particular to a method and device for processing cryptography tasks. Background technique [0002] The application of encryption equipment is more and more extensive. An encryption equipment can have one or more encryption machines. However, in the process of using an encryption machine, one encryption machine performs the tasks of the same user or the same type of business, which is not conducive to encryption. The reasonable allocation of computer resources increases the cost of use and causes waste of resources, for example, in the following usage scenarios: [0003] 1. The company has less business and different key systems are used for different business lines. At this time, the company has to use multiple encryption machines, resulting in waste of resources and increase in costs. [0004] 2. The company has a lot of business, and the equipment load of an encry...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 孙吉平钟灵剑
Owner BEIJING SENSESHIELD TECH