Distributed Trusted Memory Exchange Method and System

A distributed and trusted technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of complex use, hidden dangers, easy information leakage, etc., and achieve the effect of increasing system performance and increasing security.

Active Publication Date: 2021-08-10
杭州创谐信息技术股份有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above-mentioned Ethernet data exchange system has the following disadvantages: 1. The conversion efficiency of the file format is low, and there is a phenomenon of multiple conversions
2. There are multiple uplink and downlink switching and memory copy operations in one data exchange. When the network traffic is high, the above shortcomings will be more obvious, because the more packets that need to be processed per unit time, the server system will be brought Extremely high CPU load, and reduce the processing speed of other tasks and the efficiency of data exchange and transmission
Similarly, if the server has many applications, it will consume a lot of CPU resources, which will reduce the processing speed of the server and restrict the efficiency of data exchange.
3. The development of complex network protocols is difficult, and the technology involves a wide range of areas, prolonging the product development cycle, and it is relatively more difficult to guarantee product functions, performance, and stability
4. The adjustment of the exchange format will lead to the redevelopment of the data exchange server application
This traditional authentication method has many security risks, and information is easily leaked
However, the identity authentication mechanism using the PKI / CA certificate system needs to apply for a certificate in advance. This is a cumbersome application process and complicated use for users, and it is difficult for application providers to develop, deploy, and promote.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed Trusted Memory Exchange Method and System
  • Distributed Trusted Memory Exchange Method and System
  • Distributed Trusted Memory Exchange Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0078] like Figure 2-3 As shown, this distributed trusted memory switching method includes the following steps:

[0079] S1: The data exchange request party of the sender issues a data request, and the transmitting data exchange server 5 performs trusted authentication by the credit authentication registration management server 6.

[0080] S2: The data switching server 5 of the transmitting end and / or receiving end uses a remote direct memory access RDMA method to read data to the database file server 7, and the transmitting end data switching server 5 and the data exchange server 5 of the receiving end use remote direct memory. Access the RDMA method for data exchange.

[0081]The present invention first adopts a new technique to reduce data exchange to the server's CPU resource consumption, to maximize the data exchange performance of a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed trusted memory exchange method and system. It solves the problems of unreasonable design of the prior art and the like. The method includes the following steps: the data exchange requesting party at the sending end sends a data request and performs trusted authentication, the data exchange server at the sending end and / or the receiving end respectively adopts the remote direct memory access (RDMA) method to read data from the database file server, and the data exchange at the sending end The remote direct memory access (RDMA) method is used for data exchange between the server and the data exchange server at the receiving end. The advantage is that the FAENIC card is organically combined with cluster and distributed data file servers, exchange servers, and trusted authentication registration management servers to form a distributed trusted memory exchange system. It takes full advantage of the high-speed, high-efficiency, and encrypted features of the FAENIC card, incorporates trusted authentication mechanisms and audit interfaces, increases the security of data exchange access, and combines the advantages of clustering and distribution.

Description

Technical field [0001] The present invention belongs to the technical field of network equipment, and more particularly to a distributed trusted memory switching method and system. Background technique [0002] With the improvement of the overall informationization of the state and the comprehensive advancement of e-government construction, the demand for information sharing in society and government departments is increasing. In order to protect the security of all units, departmental associated business interconnection, information resource sharing, the data exchange system has been widely applied in enterprises and institutions such as e-government. The data exchange system is mainly composed of servers on both sides of the data exchange, providing a secure exchange based on a database and file. The main functions are: 1. Safety certification, support registration certification for devices within the network, and refuse access requests for non-registered devices. 2. Support th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08G06F13/28
CPCH04L9/3247H04L63/0428H04L63/08H04L63/0823H04L63/0869H04L67/10H04L67/1097H04L67/14G06F13/28H04L67/146H04L67/143H04L67/141H04L67/5681
Inventor 王兴会范毕能竺红军钱晓盼刘志慧王勇
Owner 杭州创谐信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products