Hardware encryption method, system and device based on distributed storage
A distributed storage and hardware encryption technology, applied in the field of data security, can solve the problems of data leakage, high security risks, and endless emergence, and achieve the effect of ensuring versatility, reliability, and speed.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.
[0033] Such as Figure 1-3 As shown, the hardware encryption method and system based on distributed storage proposed in the embodiment involves a client, a management node, and a storage cluster (including a primary storage node and a secondary storage node).
[0034] The client accesses the distributed storage hardware through the interface.
[0035] The management node is responsible for monitoring the distributed cluster, maintaining the health status of the cluster, and maintaining various ma...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com