Supercharge Your Innovation With Domain-Expert AI Agents!

A method and system for collaborative dynamic scheduling of cryptographic resources

A resource scheduling and dynamic scheduling technology, applied in the field of information security, can solve the problems of low utilization rate of cryptographic resources, poor cryptographic service efficiency, inability to dynamically schedule and optimize the configuration of cryptographic resources, etc. Optimize the effect of fair use

Active Publication Date: 2022-01-25
CHINA ELECTRIC POWER RES INST
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problems existing in the prior art that cryptographic resources cannot be dynamically scheduled and optimally configured, resulting in low utilization of cryptographic resources and poor cryptographic service efficiency, the present invention provides a collaborative dynamic scheduling method and system for cryptographic resources, which can be used in cryptographic resources In the service application, dynamic calculation is performed according to the real-time usage status of cryptographic resources, and the scheduling and allocation of cryptographic resources is automatically realized, which effectively solves the problem of dynamic scheduling of cryptographic resources. Utilization of password resources, optimize the rational use of password resources, and improve the efficiency of password services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for collaborative dynamic scheduling of cryptographic resources
  • A method and system for collaborative dynamic scheduling of cryptographic resources
  • A method and system for collaborative dynamic scheduling of cryptographic resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] Hereinafter, exemplary embodiments according to the present invention will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some embodiments of the present invention, rather than all embodiments of the present invention, and it should be understood that the present invention is not limited by the exemplary embodiments described here.

[0087] It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0088] Those skilled in the art can understand that terms such as "first" and "second" in the embodiments of the present invention are only used to distinguish different steps, devices or modules, etc. necessary logical sequence.

[0089] It should also be understood that in the embodiments of the present invention, "plurality" may...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for collaborative dynamic scheduling of cryptographic resources. Wherein, the method includes: obtaining the cryptographic resource demand information corresponding to the target application system; calculating the load value of the cryptographic resources currently used by the target application system based on a preset decision-making algorithm, and judging whether the cryptographic resources of the target application system need to be modified according to the load value; Scheduling: In the case that cryptographic resource scheduling for the target application system is required, according to the cryptographic resource demand information, load value and preset scheduling strategy, the cryptographic resource scheduling for the target application system is performed as needed. Therefore, in the application of cryptographic services, dynamic calculations can be performed according to the real-time usage status of cryptographic resources, which can realize the dynamic allocation or release of cryptographic resources according to the increase or decrease of business demand, automatically realize the scheduling and allocation of cryptographic resources, and optimize cryptographic resources. The rational use of resources improves the utilization rate of password resources and service efficiency of password resources.

Description

technical field [0001] The present invention relates to the technical field of information security, and more specifically, to a method and system for collaborative dynamic scheduling of cryptographic resources, storage media and electronic equipment. Background technique [0002] The power system is related to the national economy and the people's livelihood. With the increasingly severe international network security situation, the information security risks faced by the power grid are increasing, and there are security risks such as sensitive data leakage, illegal data tampering, and identity fraud. Passwords are the basis for building a power network security protection system. In order to solve the problem of secure and efficient cryptographic computing of massive concurrent services, it is urgent to study the cooperative dynamic scheduling technology of cryptographic resources, so as to realize the dynamic allocation and adjustment of cryptographic resources according ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/50G06F21/60
CPCG06F9/505G06F21/604
Inventor 翟峰许海清樊涛雷民徐英辉孙炜付义伦梁晓兵曹永峰岑炜李智虎徐萌赵兵刘鹰吕英杰李保丰冯云赵英杰郑旖旎卢艳
Owner CHINA ELECTRIC POWER RES INST
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More