Device and method for ensuring consistency of encryption behaviors of redundant executors
An executor and encryption algorithm technology, applied in secure communication devices and key distribution, can solve problems such as large system overhead and inability to guarantee security, and achieve the effect of consistent encryption behavior, consistent content, and guaranteed operation results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] Embodiment one, such as figure 1 As shown, a device for ensuring consistent encryption behavior of redundant executives is used in information control systems with high security requirements, and includes multiple redundant executives 10 , a scheduler 11 and a random number generator 12 .
[0030] The redundant execution body 10 is connected with the scheduler and is used to execute the application program. Each redundant execution body is equivalent in function and can be homogeneous or heterogeneous in structure. It runs on it including encryption algorithms in A series of applications within the scheduler perform encryption and other calculations according to the input of the scheduler, and output the calculation results to the scheduler.
[0031] The scheduler 11 is used for the management of redundant execution bodies, input and output agents and other related operations, such as receiving external input and distributing input data to each redundant execution body;...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com