Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Device and method for obtaining consistent encryption and decryption results in a synchronous redundant system

A redundant system and encryption and decryption technology, which is applied in the field of devices for obtaining consistent encryption and decryption results, can solve the problems that the results cannot be compared and judged, the secret key is different, and the encryption results are different, so as to reduce the number of repeated encryption and decryption operations, reduce the System power consumption and the effect of saving computing resources

Active Publication Date: 2020-12-15
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Usually, the application of encryption technology in such a redundant system has the following difficulties: if different platforms implement the same encryption algorithm, different sources of random number seeds will result in different secret keys, resulting in different encryption results. The output result cannot be compared and judged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for obtaining consistent encryption and decryption results in a synchronous redundant system
  • Device and method for obtaining consistent encryption and decryption results in a synchronous redundant system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment one, such as figure 1 As shown, a device for obtaining consistent encryption and decryption results in a synchronous redundant system is used in an information control system with high security requirements, including several synchronously running homogeneous or heterogeneous redundant executive bodies 10 , scheduler 20 and encryption operator 30;

[0034] The redundant execution body 10 is connected with the scheduler and is used to execute the application program. Each redundant execution body is equivalent in function and can be homogeneous or heterogeneous in structure, and runs a series of application programs on it , according to the input of the scheduler, perform task processing.

[0035] The scheduler 20 is used for various management of redundant execution bodies, input and output agents, and other related operations, such as receiving external input and distributing input data to each redundant execution body; and judging the addition of redundant...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of encryption protection and the technical field of system architecture which adopts redundancy design and needs redundancy executor comparison results, inparticular to a device for obtaining consistent encryption and decryption results in a synchronous redundancy system, which comprises a plurality of isomorphic or heterogeneous redundancy executors which run synchronously, a scheduler and an encryption arithmetic unit, the redundant executor is used for executing the application program and outputting an operation result to the scheduler; the dispatcher is used for managing each item of the redundant executor and inputting and outputting an agent; and the encryption arithmetic unit is used for carrying out encryption and decryption operationon the input data stream and returning a data encryption and decryption result to the scheduler. The invention further relates to a method for obtaining the consistent encryption and decryption resultin the synchronous redundancy system. According to the invention, the consistent encryption behavior on the redundant executor is realized, and the encryption intermediate results are consistent, sothat the final output result can be compared and judged.

Description

technical field [0001] The present invention relates to the technical field of encryption protection and the technical field of system architecture that adopts redundant design and requires comparison results of redundant executives, and in particular relates to a device and method for obtaining consistent encryption and decryption results in a synchronous redundant system. Background technique [0002] In the case of high system security, system redundancy design is usually adopted, and multiple homogeneous or heterogeneous task executives are used to process tasks synchronously, and the accuracy of the overall output of the system is improved by comparing and judging the output of the executive , and improve the system's ability to resist attacks. [0003] Usually, the application of encryption technology in such a redundant system has the following difficulties: if different platforms implement the same encryption algorithm, different sources of random number seeds will r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F16/27
CPCG06F21/602G06F16/273
Inventor 于洪刘勤让张兴明宋克魏帅谭力波赵博高彦钊
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products