Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and device for sharing encrypted cards in a virtual environment

A virtual environment and encryption card technology, applied in the field of hardware sharing, can solve the problem of wasting encryption card resources and unable to apply for hardware resources, etc., and achieve the effect of improving use efficiency

Inactive Publication Date: 2011-12-07
DAWNING INFORMATION IND BEIJING
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current VMM allocation scheme for virtualization technology is: after an encryption card hardware resource is allocated to a virtual machine, other virtual machines cannot apply for the hardware resource
[0004] This mode of using the encryption card greatly wastes the resources of the encryption card, so we need to find a way to enable the encryption card to be shared by multiple virtual machines to improve the efficiency of the encryption card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for sharing encrypted cards in a virtual environment
  • A method and device for sharing encrypted cards in a virtual environment
  • A method and device for sharing encrypted cards in a virtual environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0029] In order to realize multi-virtual machines sharing the encryption card in the virtual environment, it is necessary to add a resource mapping module and a queue processing module on the basis of the existing common encryption card driver.

[0030] The main function of the resource mapping module is to map an encryption card hardware into multiple independent encryption card resource files, such as image 3 A physical encryption card shown is mapped to three independent resource files, but each resource file ultimately accesses a physical encryption card. Therefore, requests for different resource files need to be managed within the driver. In order to solve the above problems, the queue management module is introduced.

[0031] The main function of the queue management module is to establish two processing queues for each resource file, one is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption card sharing method in a virtual environment, which maps a hardware encryption card into an independent encryption card resource file; establishes a processing queue for each resource file and schedules processing requests. In the present invention, by mapping the same encryption card into multiple different resource files, multiple different encryption card resources can be allocated to each virtual machine for use, but each virtual machine still uses the same encryption card on the physical level , greatly improving the use efficiency of the encryption card.

Description

technical field [0001] The invention relates to hardware sharing, in particular to a method and device for sharing an encryption card in a virtual machine environment. Background technique [0002] With the rapid development of cloud application models in recent years, cloud security has become the most concerned issue for the majority of users. At present, encryption cards are widely used in the field of information security to authenticate user identities and ensure user data security, so using encryption cards to ensure the security of cloud environments has become the first choice. Virtualization technology is widely used in the cloud environment, and the current virtualization technology causes the virtual machine to be exclusive to the encryption card, that is, if virtual machine A uses the encryption card, other virtual machines cannot use the encryption card until A releases it. Encrypted card resources. [0003] Under the Linux system, the driver of the normal enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F21/22G06F21/34
Inventor 唐焕焕石旭叶丞
Owner DAWNING INFORMATION IND BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products