Scheduling method and system for multiple encryption cards and medium

A scheduling method and encryption card technology, applied in the field of systems and media, multi-encryption card scheduling method, can solve the problems of frequent concurrent processing, transient function abnormality of encryption card, amplifying performance loss of encryption card, etc., so as to improve encryption and decryption performance and Effectiveness of data throughput, enhanced system robustness and data security, improved overall performance and system stability

Pending Publication Date: 2022-05-10
湖南麒麟信安科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, due to differences in hardware between multiple encryption cards, there may be differences in encryption and decryption performance, and even due to hardware failures, the encryption card’s instantaneous function is abnormal or directly damaged. These situations will have an impact on encryption and decryption performance and data throughput. , it is difficult to give full play to the processing advantages of multi-encryption card deployment. In addition, the data traffic processed by the encryption card is huge and the concurrent processing is frequent, which will further amplify the performance loss caused by the encryption card being dispatched to the faulty card.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scheduling method and system for multiple encryption cards and medium
  • Scheduling method and system for multiple encryption cards and medium
  • Scheduling method and system for multiple encryption cards and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] Such as figure 1 As shown, the scheduling method of multiple encryption cards in this embodiment includes the steps of scheduling multiple available encryption cards and selecting an encryption card when an encryption and decryption request is received:

[0035] 1) Determine the projection interval of each available encryption card;

[0036] 2) Form the projection intervals of all available encryption cards into a continuous total projection interval J;

[0037] 3) Generate a random number R, and map the random number R to a certain projection interval J in the total projection interval J i , so that the encryption card corresponding to the projection interval mapped to is taken as the encryption card selected by scheduling.

[0038] In this embodiment, the calculation function expression of the projection interval of each available encryption card is:

[0039] J i =W a *A i +W s *S i

[0040] In the above formula, W a and W sRespectively weight parameters (c...

Embodiment 2

[0050] This embodiment is basically the same as Embodiment 1, and its main differences are as follows: image 3 As shown, on the basis of Embodiment 1, this embodiment adds the reliability parameter A of each encryption card i to be automatically updated based on the set period i and based on the set period to automatically update the encryption and decryption rate parameter S of each encryption card i i A step of. The reliability parameter A is recalculated every cycle according to the statistical increment i And the encryption and decryption rate parameter S i , the statistical feedback with smaller granularity can reflect the operation status of encryption cards in real time, and then automatically adjust and optimize the scheduling of encryption cards, which can maximize the reliability of system encryption and decryption, and make full use of the processing of multi-encryption card deployment performance. It should be noted that the reliability parameter A of each enc...

Embodiment 3

[0085] This embodiment is basically the same as Embodiment 2, and its main difference is: when collecting the statistical indicators of each encryption card i in the current period in this embodiment, it also includes first performing a feedback check on the operation error of the encryption card that is in error. If the error is not eliminated, mark the encryption card with the error as unusable. Through the above method, the feedback check for the error in the operation of the encryption card is added, which not only avoids the repeated scheduling of the faulty encryption card, but also prevents If the failure occurs, the encryption card is removed, which further ensures the reliability and processing performance of the system.

[0086] In addition, this embodiment also provides a scheduling system for multiple encryption cards, including computer equipment with multiple encryption cards, the computer equipment includes interconnected microprocessors and memory, and the micro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a scheduling method and system for multiple encryption cards and a medium. The method comprises the steps that the projection interval of each available encryption card is determined; forming a continuous total projection interval J from the projection intervals of all the available encryption cards; generating a random number R, and mapping the random number R into a certain projection interval Ji in the total projection interval J, thereby taking the encryption card corresponding to the mapped projection interval as the encryption card selected by scheduling; the method further comprises the step of dynamically updating the reliability parameter and the encryption and decryption rate parameter to dynamically adjust the projection interval of each encryption card. According to the invention, the scheduling management of the encryption cards can be realized, the high-performance and high-reliability encryption cards are fully utilized, the encryption and decryption performance and the data throughput rate under the deployment of multiple encryption cards are improved, and the system robustness and the data security under the hardware card fault environment are enhanced.

Description

technical field [0001] The present invention relates to computer data security technology, including multi-encryption card scheduling technology, parallel processing technology, etc., and specifically relates to a multi-encryption card scheduling method, system and medium. Background technique [0002] In order to ensure data security, reduce the risk of leakage and attack under networking conditions, and improve encryption and decryption performance, many major enterprises and special departments use hardware encryption cards to encrypt and decrypt data. Encryption cards are usually deployed on key data processing nodes. All data flowing through this node is encrypted and decrypted, which is very sensitive to performance and throughput. In order to enhance the reliability of the system, ensure data security, and improve processing performance, multiple encryption cards are generally deployed at the same time. Data can be processed in parallel between the encryption cards, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/77
CPCG06F21/602G06F21/77
Inventor 袁柱龚溪东彭勇申锟铠刘文清杨涛
Owner 湖南麒麟信安科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products