Scheduling method for multiple processes to preempt hardware key encryption and decryption resources

A scheduling method and encryption and decryption technology, applied in the field of information security, can solve the problems of confusion of data calculation, no process isolation of encrypted and decrypted data, resource preemption, etc., to ensure the normal operation and improve the efficiency of encryption and decryption.

Pending Publication Date: 2022-08-02
中易通科技股份有限公司
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, calls for hardware devices are usually called by multiple applications and processes of the terminal machine with a single encryption chip hardware resource, which leads to problems such as low efficiency of hardware resources and resource preemption, which leads to confusion of hardware status and encryption and decryption. There is no process isolation of data in the chip, resulting in data calculation confusion, encryption and decryption failures, etc., and even causes the smart terminal to run stuck
[0004] At present, the use of a single hardware resource by a terminal machine has problems such as low efficiency and resource preemption for multi-application and multi-process call hardware resources, which can easily lead to hardware status confusion, encryption and decryption data in the chip without process isolation, resulting in data calculation confusion, encryption and decryption failures, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method for multiple processes to preempt hardware key encryption and decryption resources
  • Scheduling method for multiple processes to preempt hardware key encryption and decryption resources
  • Scheduling method for multiple processes to preempt hardware key encryption and decryption resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The embodiments of the present invention are described in detail below with reference to the accompanying drawings, but the present invention can be implemented in many different ways as defined and covered by the claims.

[0020] like figure 1 , 2 , 4 and 5, figure 1 It is an encryption system flow chart of a scheduling method in which multiple processes preempt hardware key encryption and decryption resources. figure 2 It is a multi-process processing flow chart of hardware key resources of a scheduling method for multi-process preemption of hardware key encryption and decryption resources. Figure 4 It is a schematic diagram of process processing of a scheduling method in which multiple processes preempt hardware key encryption and decryption resources. Figure 5 It is a schematic diagram of the hardware resource multi-process scheduling pool relationship of a scheduling method in which multiple processes preempt hardware key encryption and decryption resources. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a scheduling method for multiple processes to preempt hardware key encryption and decryption resources, which comprises the following steps of: 1, starting a file encryption and decryption service, and automatically creating a performance state thread pool; 2, the hardware key waits for submission of encryption and decryption tasks, file encryption and decryption priorities are defined, and the encryption and decryption tasks are carried out according to the priorities; step 3, detecting whether there is a call or recording, pausing the encryption and decryption task, and continuing to submit the task; 4, releasing hardware key resources, and discarding a file which is being encrypted and decrypted; and step 5, after calling or video recording is completed, continuing the file encryption and decryption task. The method has the advantages that it is guaranteed that other tasks can be carried out in the file encryption and decryption process, the file encryption and decryption efficiency is improved, and normal operation of a system is guaranteed; a thread pool is created for a batch processing file encryption and decryption task, and hardware resources are allocated according to task priorities, so that on one hand, memory consumption is reduced, and on the other hand, system resource management is facilitated.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a scheduling method for multiple processes to preempt hardware key encryption and decryption resources. Background technique [0002] With the rapid development of information technology and intelligent terminals, people's life and work are more and more inseparable from intelligent terminals, data encryption technology is becoming more and more mature, and more and more encryption software and hardware devices appear. As people use smart terminals more and more frequently, smart terminals store a large number of important files. These files need to be encrypted and decrypted. In the process of file encryption and decryption, the scheduling and use of hardware key resources need to be involved. In order to better It utilizes hardware key resources to perform multi-process task operations, and the prior art usually performs multi-task concurrent operation to ensure th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/48G06F9/50G06F21/60
CPCG06F9/4881G06F9/5038G06F21/602G06F2209/5011G06F2209/5021G06F2221/2107
Inventor 刘俊
Owner 中易通科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products