Encryption and decryption resource scheduling and key management-based encryption database and method

A key management and encryption key technology, applied in database model, digital data protection, structured data retrieval, etc. problem, to achieve the effect of efficient distribution, improved utilization, and improved throughput

Active Publication Date: 2019-07-09
XIDIAN UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcomings of this system are: on the key management module, because the keys required by different encryption methods are different, no effective key distribution scheme is proposed; on the encryption and decryption module, for multi-user When threads

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption resource scheduling and key management-based encryption database and method
  • Encryption and decryption resource scheduling and key management-based encryption database and method
  • Encryption and decryption resource scheduling and key management-based encryption database and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments, where the schematic embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0064] refer to figure 1 As shown, it is an overall frame diagram of the encryption database of the present invention, and an agent module is established, which includes a key management module and an encryption and decryption service module.

[0065] refer to figure 2 As shown, the key management module includes two modules of key generation and key storage. The key generation module generates the encryption keys required by different encryption methods corresponding to the user according to the user identity information, and the key storage module according to a certain storage rules to store the user's identity information and the corresponding encryption key.

[0066] refer to image

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encryption and decryption resource scheduling and secret key management-based encryption database and method, and mainly relates to a secret key management module and an encryption and decryption service module, the secret key management module is used for distributing and managing user information and secret keys thereof, and the encryption and decryption service moduleis used for encrypting SQL statements and solving the scheduling problem of the SQL statements. The invention provides a scheduling method. When multiple users and multiple threads simultaneously request encryption resources, distributing a priority number to an SQL statement requested to be encrypted; and then, sequentially allocating a time slice to the SQL statements according to the prioritynumber to occupy the encryption resources, and meanwhile, waiting for searching for an appropriate SQL statement in the SQL statements occupying the encryption resources according to the remaining encryption resources, and allocating the encryption resources to the SQL statements, so that the throughput of the encryption and decryption service module is improved. The key management module stores and manages user information and keys thereof in the form of key value pairs aiming at the problem that the same user has multiple keys, so that the difficulty of key storage and distribution is reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products