System and method for providing cryptographic service through virtual cryptographic equipment cluster

A technology for cryptographic services and cryptographic devices, which is applied in the field of providing cryptographic services through virtualized cryptographic device clusters, can solve problems such as the inability to detect the busyness of the host machine in real time, the low utilization rate of cryptographic device resources, and the low work efficiency of the host machine. Overcome the inability to detect the busyness of the host in real time, protect security, and overcome inefficiencies

Active Publication Date: 2017-08-11
XIDIAN UNIV
View PDF10 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technology allows for better control over how much space an encryption key can be used without wasting any valuable hardware or requiring expensive maintenance. It also uses a special type called a quantum computer (QC) instead of traditional computers which have limited capabilities due to their limitations like energy consumption and storage capacity. By doing this, they provide more efficient ways to manage keys while ensuring reliable communication between devices.

Problems solved by technology

This patented technical problem addressed in the patents relates to improving the use of cryptography hardware resources while minimizing power consumption during computation tasks without sacrificing speed or accuracy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for providing cryptographic service through virtual cryptographic equipment cluster
  • System and method for providing cryptographic service through virtual cryptographic equipment cluster
  • System and method for providing cryptographic service through virtual cryptographic equipment cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The invention will be further described below in conjunction with the accompanying drawings.

[0052] Refer to attached figure 1 , the system of the present invention is composed of a cloud cryptographic service interface, a task scheduler, a plurality of cryptographic machines and a state detector. in:

[0053] The cloud cryptography service interface is used to generate a service request message and send it to the task scheduler.

[0054] The task scheduler includes a load balancing module, an information processing module, a virtual resource pool module, and a state feedback module, wherein the load balancing module is used to calculate the occupancy rate of the commercial secret algorithm of each encryption machine, and calculate the utilization rate of each encryption machine According to the quick sort method, the load value of each cipher machine and its corresponding cipher machine serial number are arranged into a group of increasing sequences according to the a

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and method for providing cryptographic service through a virtual cryptographic equipment cluster. The system is composed of a cloud cryptographic service interface, a task scheduler, multiple cryptographic machines, and a state detector. The method provided by the invention comprises the following steps: (1) detecting load information of each cryptographic machine; (2) computing a commercial cryptographic algorithm occupancy rate of each cryptographic machine; (3) computing a load value of each cryptographic machine; (4) ordering the load values; (5) initiating a service request; (6) processing the service request; (7) selecting the cryptographic machine; (8) judging whether the working state of each cryptographic machine is normal; (9) processing a service request and responding; (11) receiving a service response; (12) feeding back the load information; (13) judging whether the cryptographic service request is finished; and (14) finishing the cryptographic service. By use of the system and method disclosed by the invention, the virtual cryptographic equipment cluster can be satisfied so as to provide the actual demand of the cryptographic operation service.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products