CN113285972A - Encryption and decryption equipment, system and method based on embedded cluster architecture - Google Patents

Encryption and decryption equipment, system and method based on embedded cluster architecture Download PDF

Info

Publication number
CN113285972A
CN113285972A CN202110235847.8A CN202110235847A CN113285972A CN 113285972 A CN113285972 A CN 113285972A CN 202110235847 A CN202110235847 A CN 202110235847A CN 113285972 A CN113285972 A CN 113285972A
Authority
CN
China
Prior art keywords
encryption
decryption
service node
data
load balancing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110235847.8A
Other languages
Chinese (zh)
Inventor
庞起超
贾旭光
邢胜帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Six Zhida Beijing Technology Co ltd
Original Assignee
Six Zhida Beijing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Six Zhida Beijing Technology Co ltd filed Critical Six Zhida Beijing Technology Co ltd
Priority to CN202110235847.8A priority Critical patent/CN113285972A/en
Publication of CN113285972A publication Critical patent/CN113285972A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of encryption and decryption equipment, and particularly relates to encryption and decryption equipment, a system and a method based on an embedded cluster architecture. The whole system comprises a load balancing component, a front-end interconnection component and a service node group, wherein the load balancing component is respectively connected with an upper host and the front-end interconnection component through a data bus; the service node group comprises a plurality of service nodes, and each service node is respectively connected with the front-end interconnection assembly through a data bus; the service node, the front-end interconnection component and the load balancing component are respectively connected to an upper host through a management bus; distributing the encryption and decryption requests and the encryption and decryption data to a plurality of service nodes with operation functions according to a given balance strategy; and respectively configuring each service node according to the specific distribution conditions of the decryption request and the encryption and decryption data, so that each node can implement corresponding encryption and decryption application services. The invention provides a standardized and generalized high-performance basic computing platform for different encryption and decryption systems.

Description

Encryption and decryption equipment, system and method based on embedded cluster architecture
Technical Field
The invention belongs to the technical field of encryption and decryption equipment, and particularly relates to encryption and decryption equipment, a system and a method based on an embedded cluster architecture.
Background
The narrow information security is established in the field of computer security based on cryptography, and is assisted by technologies such as computers, communication, networks, software and the like to realize information confidentiality, integrity and security. In the embedded application field, the design and deployment of the link cipher machine are all embedded into a communication data link system in a special module form and are limited by strict space, power consumption, processing capacity, reliability, guarantee and the like.
Taking the traditional avionics application field as an example, the communication system relates to various wireless communication links, and the wave band covers long wave, medium wave, short wave, ultra-short wave to microwave; the frequency band allocation is used for various communications, including time frequency broadcasting, navigation and positioning, satellite communication, Beidou short messages, trunking communication, microwave relay and the like; and military data chains under different systems, such as tactical public data chains, finger control, voice, graph transmission and the like, and the data chains with various types and different performances cause the need of adapting various cipher machine modules or units in the avionic communication system, which brings problems in various aspects such as weight, power consumption, cost and the like, and simultaneously introduces a plurality of more troublesome problems such as reliability, guarantee and the like.
Disclosure of Invention
The present application is directed to a generalized, standardized architecture scheme for encryption/decryption devices and systems, which combines all encryption/decryption operations in a single module, so as to effectively solve the above-mentioned problems.
The encryption and decryption equipment based on the embedded cluster architecture comprises a load balancing component, a front-end interconnection component and at least one service node group,
the load balancing component is respectively connected with an upper host machine and the front-end interconnection component through a data bus;
the service node group comprises a plurality of service nodes, and each service node is respectively connected with the front-end interconnection component through a data bus;
the service node, the front-end interconnection component and the load balancing component are respectively connected to an upper host machine through a management bus;
the load balancing component is configured to distribute the encryption and decryption requests and the encryption and decryption data received from the host computer to the service nodes according to a certain load balancing strategy;
the front-end interconnection component is configured to be used for realizing data exchange between the load balancing component and the service node;
the load balancing component is also configured to feed back the specific distribution condition of the encryption and decryption request among the service nodes to an upper host through a management bus;
the service node is configured to acquire encryption and decryption configuration information corresponding to the encryption and decryption request distributed by the service node from an upper host through a management bus, and further provide corresponding encryption and decryption application services.
In a further embodiment, the load balancing component is further configured to obtain the load balancing policy from the host over the management bus.
In a further embodiment, the service node is further configured to feed back self-failure information upwards through the management bus.
In a further embodiment, the load balancing component is further configured to exclude the failed node from the distribution of the encryption/decryption request and the encryption/decryption data according to the received failure information.
In a preferred embodiment, full mesh interconnection is adopted among the service nodes in each service node group.
In a further embodiment, the front-end interconnect assembly includes an intra-group switching module and a central switching interconnect module;
the group switching module is respectively connected with each service node in a service node group through a data bus;
the intra-group switching module of the service node group is also connected with the central switching interconnection module through data bus connection;
the intra-group switching module is configured to implement data switching between each service node in a service node group and the outside world and direct data switching between each service node group;
the central exchange interconnection module is configured to be used for realizing data exchange between each service node group and the outside.
The encryption and decryption system based on the embedded cluster architecture comprises an upper host and the encryption and decryption equipment based on the embedded cluster architecture;
in a further embodiment, the upper host further includes an upper centralized management and control module configured to issue a balancing policy to the front-end balancing component;
and issuing corresponding encryption and decryption configuration files to the service nodes according to the encryption and decryption request distribution condition fed back by the front-end balancing component.
The invention also provides an encryption and decryption method based on the embedded cluster architecture, which comprises the following steps:
distributing the encryption and decryption requests and the encryption and decryption data to a plurality of service nodes with operation functions according to a given balance strategy;
and respectively configuring each service node according to the specific distribution conditions of the decryption request and the encryption and decryption data, so that each node can implement corresponding encryption and decryption application services.
Preferably, the balancing policy includes that the service nodes are divided into a plurality of groups, each service node group is assigned with a priority, and the encryption/decryption data and the encryption request are assigned to the highest priority group.
Preferably, the balancing policy further includes that different nodes in the same group are assigned a fixed weighted value proportion, and the encryption/decryption data and the encryption/decryption request are assigned to each node in the group according to the fixed assignment proportion.
Further, the policy of all nodes also includes that, if a node in the group fails, the failed node does not participate in the subsequent distribution of the encryption and decryption data and the encryption and decryption request until the failed node returns to normal.
Further, the fair policy may include selecting a secondary priority packet if all nodes in the highest priority packet fail.
The invention is based on the load balancing cluster composed of service nodes with operational capability, utilizes the idea of software defined password to combine all encryption and decryption operations in a module component, dynamically configures each service node according to application requirements to complete specific encryption and decryption functions, can integrate all encryption and decryption processing operations required in a centralized processing communication system, and is beneficial to the integrated and miniaturized design of the communication system; the system upgrading and upgrading is limited to be applied to the software level of an upper host, and a standardized and generalized high-performance basic computing platform can be provided for different encryption and decryption systems in various applications.
The invention adapts and solves a plurality of communication data chains in the application of commercial comprehensive cipher machines, military and civil novel CNI (communication, navigation and identification) comprehensive avionic communication systems, multiband comprehensive radar systems, 5G communication to be deployed in networking and the like, has increasingly increased communication speed, real-time performance and high reliability requirements, and is suitable for the fields of communication, comprehensive avionic, electronic commerce, electronic government affairs, electronic finance and the like.
Drawings
Fig. 1 is a schematic logic block diagram of a cryptographic accelerator board card in an embodiment of the present invention.
Fig. 2 is a schematic logic block diagram of an encryption and decryption system based on an embedded cluster architecture in an embodiment of the present invention.
Fig. 3 is a schematic logic block diagram of an intra-group node interconnection structure in the embodiment of the present invention.
Fig. 4 is a schematic logic block diagram of an inter-group node interconnection structure in an embodiment of the present invention.
FIG. 5 is a schematic logic block diagram of a priority algorithm implemented in an embodiment of the present invention.
Fig. 6 is a schematic logic block diagram of a weighting algorithm implemented in an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided for illustrative purposes, and other advantages and effects of the present invention will become apparent to those skilled in the art from the present disclosure.
It should be understood that the structures, ratios, sizes, and the like shown in the drawings and described in the specification are only used for matching with the disclosure of the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions of the present invention, so that the present invention has no technical significance. In addition, the terms such as "upper", "lower", "left", "right", "middle" and "one" used in the present specification are for clarity of description, and are not intended to limit the scope of the present invention, and changes or modifications in the relative relationship may be made without substantial technical changes and modifications.
One specific embodiment of the present invention is basically as shown in fig. 1, in which an encryption and decryption device based on an embedded cluster architecture in this embodiment adopts a single group node scheme, and includes a load balancing component, a front-end interconnection component and a service node group, where the load balancing component is connected to an upper computer host (upper host) and the front-end interconnection component through a data bus respectively;
the service node group comprises four service nodes, and each service node is respectively connected with the front-end interconnection assembly through a data bus;
the service node, the front-end interconnection component and the load balancing component are respectively connected to an upper computer host through a management bus;
the load balancing component is configured to distribute the encryption and decryption requests and the encryption and decryption data received from the upper computer host to the service nodes according to a set load balancing strategy;
the front-end interconnection component is configured to be used for realizing data exchange between the load balancing component and the service node;
the load balancing component is also configured to feed back the specific distribution condition of the encryption and decryption request among the service nodes to the host machine through the management bus;
the service node is configured to acquire encryption and decryption configuration information corresponding to the encryption and decryption request distributed by the service node from the upper computer host through the management bus, and further provide corresponding encryption and decryption application services.
In practical application, a person skilled in the art can expand the number of node groups as needed; in this embodiment, the front-end equalization component is implemented by using an FPGA (field programmable gate array), the back-end (service) node is implemented by using a multi-core digital signal processor, and the encryption and decryption requests from the host computer of the upper computer can be evenly distributed to four nodes, or dynamically and unevenly distributed according to the equalization strategy from the host computer of the upper computer; the system scheme framework adopts a star topology structure as a central node of the star topology, the exchange interconnection component adopts a PCIe exchange chip to realize data exchange between the load balancing chip and the multi-core digital signal processor of each node and between any two nodes, and correspondingly, the data bus in the embodiment adopts a PCIe data bus; the service node hardware adopts a multi-core DSP (digital signal processor) chip, and each node simultaneously supports symmetric encryption algorithms such as SM1/SM4/3DES/AES and the like, hash algorithms such as SM3/SHA1/SHA256/SHA512 and the like, and SM2/RSA asymmetric algorithms.
In the invention, all the back-end nodes form a load balancing cluster, all the back-end nodes are in an active state in the load balancing cluster, all the back-end nodes provide services to the outside and share the working load of the system, according to different application occasions, an upper computer host can distribute an encryption and decryption algorithm configuration file (encryption and decryption configuration information) and a balancing strategy through an Ethernet management bus, the encryption and decryption algorithm configuration file comprises an algorithm module and algorithm parameters, and the encryption and decryption functions of the whole password acceleration board card can be further realized by software definition.
On the other hand, in the encryption and decryption process, if a certain node fails, the node is deleted from the node queue, and further the failed node does not participate in next encryption and decryption data request distribution, and reports the failure state through the management bus.
Fig. 2 shows an embodiment of an encryption and decryption system of an embedded cluster architecture in the present invention, where the system includes an upper host and an encryption and decryption device based on the embedded cluster architecture in the present invention, the upper host is connected to the encryption and decryption device based on the embedded cluster architecture through a parallel data bus and a management bus, and the upper host is configured with an upper centralized control module through software codes; different from the previous implementation, the load balancing cluster of this embodiment includes a plurality of sets of backend (service) nodes, each set includes, but is not limited to, four backend (service) nodes, and the front-end interconnection component includes an intra-group switching module and a central switching interconnection module.
The interconnection structure of the back-end node in this embodiment adopts two methods:
four nodes in the same group are interconnected by using Full Mesh (Full Mesh), as shown in fig. 3. The full-mesh interconnection structure in the group enables interconnection channels among all nodes to work independently and parallelly. Any one node can access the resources of other three nodes on the network, and the resource sharing of all the nodes is realized. And the intra-group switching module provides a unique path for the communication outside the group. According to the characteristics of different task processing, Full Mesh interconnection can be flexibly configured into a daisy chain topology, a single star topology and the like, and the dynamic reconfigurability is high in different encryption and decryption data processing applications.
The nodes between different groups are interconnected using a star Switch (Switch), as shown in fig. 3. The star-shaped exchange interconnection topology is convenient for centralized control, the communication between the nodes passes through the central exchange interconnection module, the data delay is small, and the reliability is high. The central exchange interconnection module provides a plurality of groups of unique paths for external communication of the back-end nodes, and realizes information exchange of control flow and data flow with the load balancing component.
The back-end node groups are interconnected by adopting a switching structure, so that the deployment mode of the load balancing component in the embodiment is a routing mode. The uplink and downlink flows of the encryption and decryption data pass through the load balancing component, and the whole load balancing cluster is externally represented as an encryption and decryption computing node, namely only one access address is provided.
For different encryption and decryption processing tasks, the back-end node needs to deal with burst encryption and decryption data traffic and provide stable and reliable encryption and decryption services, so the front-end load balancing component in the embodiment adopts a dynamic load balancing algorithm. As an embedded platform, the scheme also needs to balance the relationship between performance and power consumption, and thus, the balancing strategy in this embodiment adopts a scheme combining a weighting (minimum connection) algorithm and a priority algorithm.
The priority algorithm provides a hot-standby approach, as shown in fig. 4, the priority algorithm assigns the priorities of different packets, requests for encrypted and decrypted data are preferentially assigned by the front-end equalization component to the highest priority packet, and secondary priority packets are selected if all nodes in the highest priority fail.
As shown in fig. 5, the weighting algorithm assigns a fixed weight ratio to different nodes in the same group, for example, the weight ratio of each of the four nodes in a certain node group in this embodiment is 0.3, 0.2, 0.1 and 0.4, and the sum thereof is 1, so that the assignment ratio of the encryption/decryption request among the four nodes is 3:2:1:4, according to the fixed assignment ratio, the encryption/decryption request is assigned to each node in the group, if a node in the group fails, it is deleted from the node queue, and the failed node will not participate in the subsequent encryption/decryption data request assignment until it returns to normal.
The priority algorithm architecture under the load balancing architecture provides an inter-group hot standby function and guarantees uninterrupted encryption and decryption services. If a single node in the group fails, the front-end load balancing component marks the node as unavailable, extracts the weighted list and does not participate in next data distribution, and other normal nodes can ensure that the application program provides uninterrupted encryption and decryption services.
Through the management bus as shown in the system architecture of fig. 2, the upper centralized control block also implements centralized control and fault alarm functions on node states, node traffic, and the like.
In different encryption and decryption data processing applications, the adopted algorithms are different and various. The scheme has high dynamic reconfigurability, and the algorithm module and the algorithm parameters are distributed to each node as configuration files through a management bus to realize the software definition encryption and decryption functions.
As an embedded encryption and decryption platform scheme, power consumption management of a design scheme is an important problem to be solved.
In the scheme, a dynamic voltage frequency adjustment (DVFS) technology is adopted, and the operating frequency and the voltage of the chip are dynamically adjusted according to different requirements of encryption and decryption application services on computing capacity, so that the energy-saving purpose is achieved.
The DVFS technology requires a software and hardware collaborative design, the hardware level adopts the existing mature technology, such as the SpeedStep technology of Intel, the AVS technology of ARM, and the like, and the power supply circuit adopts the power management chip (PMIC) and the Voltage Regulation Module (VRM) module to supply power, as shown in fig. 6, the present embodiment can dynamically adjust the power supply voltage of the CPU at each node according to the control instruction of the software level, and properly reduce the power supply voltage in the node with low load to reduce the power dissipation. The software layer obtains the current load state of the system through an interface exposed to the user by the operating system according to the configuration strategy of the user, thereby dynamically adjusting the CPU frequency.
It should be noted that, the system provided in the foregoing embodiment is only illustrated by dividing the functional units, and in practical applications, the functions may be distributed by different functional units according to needs, that is, the units or steps in the embodiments of the present invention are further decomposed or combined, for example, the units in the foregoing embodiment may be combined into one unit, or may be further decomposed into multiple sub-units, so as to complete all or part of the functions described above. The names of the units and steps involved in the embodiments of the present invention are only for distinguishing the units or steps, and are not to be construed as unduly limiting the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes and related descriptions of the storage device and the processing device described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
Those of skill in the art would appreciate that the various illustrative elements, method steps, and steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the software elements, method steps, and corresponding programs may be located in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. To clearly illustrate this interchangeability of electronic hardware and software, various illustrative components and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as electronic hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The terms "first," "second," and the like are used for distinguishing between similar elements and not necessarily for describing or implying a particular order or sequence.
The terms "comprises," "comprising," or any other similar term are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
So far, the technical solutions of the present invention have been described in connection with the preferred embodiments shown in the drawings, but it is easily understood by those skilled in the art that the scope of the present invention is obviously not limited to these specific embodiments. Equivalent changes or substitutions of related technical features can be made by those skilled in the art without departing from the principle of the invention, and the technical scheme after the changes or substitutions can fall into the protection scope of the invention.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (13)

1. The encryption and decryption equipment of the embedded cluster architecture is characterized by comprising a load balancing component, a front-end interconnection component and at least one service node group,
the load balancing component is respectively connected with an upper host machine and the front-end interconnection component through a data bus;
the service node group comprises a plurality of service nodes, and each service node is respectively connected with the front-end interconnection component through a data bus;
the service node, the front-end interconnection component and the load balancing component are respectively connected to an upper host machine through a management bus;
the load balancing component is configured to distribute the encryption and decryption requests and the encryption and decryption data received from the host computer to the service nodes according to a certain load balancing strategy;
the front-end interconnection component is configured to be used for realizing data exchange between the load balancing component and the service node;
the load balancing component is also configured to feed back the specific distribution condition of the encryption and decryption request among the service nodes to an upper host through a management bus;
the service node is configured to acquire encryption and decryption configuration information corresponding to the encryption and decryption request distributed by the service node from an upper host through a management bus, and further provide corresponding encryption and decryption application services.
2. The encryption and decryption device of embedded cluster architecture of claim 1, wherein the load balancing component is further configured to obtain a load balancing policy from a host via a management bus.
3. The encryption and decryption device of embedded cluster architecture according to claim 1, wherein the service node is further configured to feed back self failure information upwards through the management bus.
4. The encryption and decryption device of embedded cluster architecture of claim 3, wherein the load balancing component is further configured to exclude a failed node from the distribution of encryption and decryption requests and encryption and decryption data according to the received failure information.
5. The encryption and decryption apparatus of embedded cluster architecture as claimed in claim 1, wherein the service nodes in each service node group are interconnected in a full mesh.
6. The encryption and decryption device of embedded cluster architecture of claim 1, wherein the front-end interconnection component comprises an intra-group switching module and a central switching interconnection module;
the group switching module is respectively connected with each service node in a service node group through a data bus;
the intra-group switching module of the service node group is also connected with the central switching interconnection module through data bus connection;
the intra-group switching module is configured to implement data switching between each service node in a service node group and the outside world and direct data switching between each service node group;
the central exchange interconnection module is configured to be used for realizing data exchange between each service node group and the outside.
7. Encryption and decryption system based on embedded cluster architecture, characterized in that, it comprises host and encryption and decryption device based on embedded cluster architecture as claimed in any of claims 1-6.
8. The encryption and decryption system of embedded cluster architecture of claim 7, wherein the upper host further comprises an upper centralized management and control module configured to issue a balancing policy to the front-end balancing component;
and issuing corresponding encryption and decryption configuration files to the service nodes according to the encryption and decryption request distribution condition fed back by the front-end balancing component.
9. The encryption and decryption method based on the embedded cluster architecture is characterized by comprising the following steps:
distributing the encryption and decryption requests and the encryption and decryption data to a plurality of service nodes with operation functions according to a given balance strategy;
and respectively configuring each service node according to the specific distribution conditions of the decryption request and the encryption and decryption data, so that each node can implement corresponding encryption and decryption application services.
10. The encryption and decryption method of embedded cluster architecture defined in claim 9 wherein the balancing policy includes the service nodes being divided into groups and giving priority to each service node packet, encryption and decryption data and encryption requests being assigned to the highest priority packet.
11. The encryption and decryption method of embedded cluster architecture defined in claim 10 wherein the balancing policy further comprises different nodes in the same group being assigned a fixed weight ratio, and the encryption and decryption data and the encryption and decryption request are assigned to each node in the group according to the fixed assignment ratio.
12. The encryption and decryption method of embedded cluster architecture of claim 11, wherein the policy of averaging further comprises that, if a node in the group fails, the failed node will not participate in the subsequent distribution of the encryption and decryption data and the encryption and decryption request until the failed node returns to normal.
13. The encryption and decryption method for embedded cluster architecture of claim 12, wherein the fair policy further comprises selecting a secondary priority packet if all nodes in the highest priority packet fail.
CN202110235847.8A 2021-03-03 2021-03-03 Encryption and decryption equipment, system and method based on embedded cluster architecture Pending CN113285972A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110235847.8A CN113285972A (en) 2021-03-03 2021-03-03 Encryption and decryption equipment, system and method based on embedded cluster architecture

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110235847.8A CN113285972A (en) 2021-03-03 2021-03-03 Encryption and decryption equipment, system and method based on embedded cluster architecture

Publications (1)

Publication Number Publication Date
CN113285972A true CN113285972A (en) 2021-08-20

Family

ID=77276113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110235847.8A Pending CN113285972A (en) 2021-03-03 2021-03-03 Encryption and decryption equipment, system and method based on embedded cluster architecture

Country Status (1)

Country Link
CN (1) CN113285972A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034792A1 (en) * 2000-03-10 2001-10-25 Swildens Eric Sven-Johan Decrypting load balancing array system
CN101290569A (en) * 2008-05-06 2008-10-22 国网南京自动化研究院 Method for parallel data processing adopting multi- password chip
CN102023888A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Virtual device based on multiple encryption cards
CN109729135A (en) * 2018-05-14 2019-05-07 网联清算有限公司 Load-balancing method and intermediate server based on intermediate server
CN110113399A (en) * 2019-04-24 2019-08-09 华为技术有限公司 Load balancing management method and relevant apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010034792A1 (en) * 2000-03-10 2001-10-25 Swildens Eric Sven-Johan Decrypting load balancing array system
CN101290569A (en) * 2008-05-06 2008-10-22 国网南京自动化研究院 Method for parallel data processing adopting multi- password chip
CN102023888A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Virtual device based on multiple encryption cards
CN109729135A (en) * 2018-05-14 2019-05-07 网联清算有限公司 Load-balancing method and intermediate server based on intermediate server
CN110113399A (en) * 2019-04-24 2019-08-09 华为技术有限公司 Load balancing management method and relevant apparatus

Similar Documents

Publication Publication Date Title
US11601359B2 (en) Resilient network communication using selective multipath packet flow spraying
US7436775B2 (en) Software configurable cluster-based router using stock personal computers as cluster nodes
US10015098B2 (en) Systems and methods to create highly scalable network services
Ma et al. Profit maximization for admitting requests with network function services in distributed clouds
Guo et al. On nonblocking multicast fat-tree data center networks with server redundancy
Yue et al. Throughput optimization and delay guarantee VNF placement for mapping SFC requests in NFV-enabled networks
Al-Tarazi et al. Performance-aware energy saving for data center networks
Koshibe et al. Towards distributed hierarchical SDN control plane
Wang et al. Application of virtualization and software defined network in satellite network
Chen et al. Enterprise visor: A Software-Defined enterprise network resource management engine
CN113285972A (en) Encryption and decryption equipment, system and method based on embedded cluster architecture
Yedder et al. Comparison of virtualization algorithms and topologies for data center networks
CN110300073A (en) Cascade target selecting method, polyplant and the storage medium of port
US20220321403A1 (en) Programmable network segmentation for multi-tenant fpgas in cloud infrastructures
Cao et al. Threshold-based routing-topology co-design for optical data center
CN111400238B (en) Data processing method and device
Guo et al. Experimental Demonstration of SDN-enabled Reconfigurable Disaggregated Data Center Infrastructure
Li et al. Multicast scheduling algorithm in software defined fat-tree data center networks
Nguyen et al. Saco: A service chain aware SDN controller-switch mapping framework
CN116132195B (en) Security transmission guaranteeing system and method for computing power network
Khaleel et al. Effective routing algorithm based on software defined networking for big data applications in data centre network
Luo et al. Design and implementation of a scalable sdn-of controller cluster
Shetabi et al. SAHAR: a control plane architecture for high available software-defined networks
Mamushiane et al. Resilient SDN Controller Placement Optimization applied to and emulated on South African National Research Network (SANReN)
US11683672B2 (en) Distributed ledger control over wireless network slices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210820