CN102970142A - Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment - Google Patents
Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment Download PDFInfo
- Publication number
- CN102970142A CN102970142A CN2012105309845A CN201210530984A CN102970142A CN 102970142 A CN102970142 A CN 102970142A CN 2012105309845 A CN2012105309845 A CN 2012105309845A CN 201210530984 A CN201210530984 A CN 201210530984A CN 102970142 A CN102970142 A CN 102970142A
- Authority
- CN
- China
- Prior art keywords
- encrypted card
- packet
- encryption
- card
- sequence number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of multi-encryption-card concurrent processing and discloses a method for concurrently encrypting and decrypting virtual private network (VPN) equipment in a multi-encryption-card environment. The method comprises the following steps of: setting a corresponding encryption card queue for each encryption card, wherein a data packet required for performing encryption card processing is saved in the encryption card queue; and selecting a relatively idlest encryption card from load of the encryption card queue (obtained based on the number of data packets in the queue and length calculation) when a novel data packet is received, and adding the novel data packet into the encryption card queue of the encryption card. The invention also discloses a data packet in-and-out sequence protection method in the process of concurrently encrypting and decrypting the VPN equipment in the multi-encryption-card environment. Once the novel data packet is received, the current idlest queue is calculated according to the load of the encryption card queue in the system, the novel data packet is processed by the queue, and the utilization rate of each encryption card is greatly improved, so that the load of each encryption card is balanced; and meanwhile, the problem that the data packet is disordered during concurrent encryption and decryption is solved.
Description
Technical field
The present invention relates to the multi-card parallelism processing technology field, relate in particular to a kind of VPN equipment in the method and system of adding concurrent encryption and decryption under the close snap ring border.
Background technology
VPN (virtual private network) (Virtual Private Network is called for short VPN) refers to the technology of setting up dedicated network in common network.Why it is called virtual net, mainly be because the connection between any two nodes of whole VPN network does not have the required end to end physical link of traditional private network, but the network platform that framework provides in common network service provider, as Internet, ATM (asynchronous transfer mode 〉, logical network on the Frame Relay (frame relay) etc., user data transmits in logical links.It has contained the expansion of the dedicated network of encapsulation, encryption and the authentication link of striding shared network or public network.VPN has mainly adopted tunneling technique, encryption and decryption technology, key management technology and user and equipment identities authentication techniques.
For improving the throughput of VPN equipment, in high-performance VPN equipment, extensively adopted hardware encryption card to replace traditional CPU to carry out the encryption and decryption computing.Along with the development and maturation of CPU multi-core technology, many encrypted cards are used also must become trend.Yet how many encrypted cards reach load balance, the general employing is averagely allocated to different encrypted card processing with packet by quantity in the prior art, but the length of each packet is not identical, encrypted card also is different to the processing time of each packet, the encrypted card that causes having needs the data queue time to be processed long, the encrypted card that has then is in idle condition, has greatly wasted the hardware resource of encrypted card.The above-mentioned method of salary distribution exists the IP message of same information source to be processed by different encrypted cards simultaneously, the order that sends after encrypting can not get ensureing, might cause data packet disorder, increase average delay, delay variation, packet loss and overtime number of retransmissions, network performance and utilization rate are descended.
Summary of the invention
Add the inhomogeneous technical problem of encrypted card load under the close snap ring border for what exist in the prior art, providing a kind of VPN equipment in the method for adding concurrent encryption and decryption under the close snap ring border.Another one goal of the invention of the present invention is that the packet after encrypting for a plurality of encrypted cards that prior art exists exists out of order technical problem, provides a kind of VPN equipment in the method for adding concurrent encryption and decryption under the close snap ring border.The invention also discloses the correspondence system of said method.
Purpose of the present invention realizes by following technical proposals:
A kind of VPN equipment is in the method for adding concurrent encryption and decryption under the close snap ring border, and it specifically comprises following steps: each encrypted card arranges the encrypted card formation of a correspondence, preserves the packet that needs encrypted card to process in the encrypted card formation; When receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending packet number of each encrypted card formation relatively, number is minimum is the most idle encrypted card.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending total length of data packets of each encrypted card formation relatively, total length of data packets is the shortest is the most idle encrypted card.
Further, said method is further comprising the steps of: whenever receive a new packet, then distribute to an one unique sequence number of the overall situation, packet enters buffering area after processing through encrypted card, according to the order of sequence number packet is positioned at last the correspondence position of buffering area by sequence number.
Further, method described above is further comprising the steps of: the sequence number of packet according to its order that enters system successively+1, buffering area is divided into the buffer circle of total several groove positions of encrypted card queue size, a packet is deposited in each groove position, sequence number K to be sent in the log buffer, i.e. minimum sequence number, new sequence of data packet number are X, and then new packet is deposited in X-K groove position with respect to minmal sequence K groove position; After any encrypted card is finished encryption and decryption, check the packet that whether has encrypted card to finish dealing with in the groove position K, be then to send this packet, be sent completely rear K=K+1.
The invention also discloses a kind of VPN equipment in the system that adds concurrent encryption and decryption under the close snap ring border, it specifically comprises: module is set in formation and encrypted card is selected module; Described formation arranges the encrypted card formation that module is used for arranging a correspondence to each encrypted card, preserves the packet that needs encrypted card to process in the encrypted card formation; When described encrypted card selects module to be used for receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending packet number of each encrypted card formation relatively, number is minimum is the most idle encrypted card.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending total length of data packets of each encrypted card formation relatively, total length of data packets is the shortest is the most idle encrypted card.
Further, said system also comprises serial number assignment module and buffer zone module, described serial number assignment module is used for whenever receiving a new packet, then distribute to an one unique sequence number of the overall situation, packet enters buffer zone module after processing through encrypted card, according to the order of sequence number packet is positioned at last the correspondence position of buffering area by sequence number.
Further, above-mentioned serial number assignment module with the sequence number of packet according to its order that enters system successively+1, buffering area is divided into the buffer circle of total several groove positions of encrypted card queue size, a packet is deposited in each groove position, sequence number K to be sent in the log buffer, i.e. minimum sequence number, new sequence of data packet number are X, and then new packet is deposited in X-K groove position with respect to minmal sequence K groove position; After any encrypted card is finished encryption and decryption, check the packet that whether has encrypted card to finish dealing with in the groove position K, be then to send this packet, be sent completely rear K=K+1.
By adopting above technical scheme, beneficial effect of the present invention: when at every turn receiving new packet, all rejudge the most idle current encrypted card, and process to this encrypted card the new allocation of packets, greatly improved the utilance of each encrypted card, made the load balancing of each encrypted card.Wherein the most idle encrypted card can be for waiting for the minimum encrypted card of packet number of processing, perhaps wait the pending the shortest encrypted card of total length of data packets, also can be by the end of no encrypted card of present maximum duration etc., can set as required.Also solved simultaneously the out of order problem of packet.
Description of drawings
Fig. 1 is that VPN equipment of the present invention is at the method flow diagram of adding concurrent encryption and decryption under the close snap ring border.
Embodiment
In order to make purpose of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The invention discloses a kind of VPN equipment in the method for adding concurrent encryption and decryption under the close snap ring border, it specifically comprises following steps: each encrypted card arranges the encrypted card formation of a correspondence, preserves the packet that needs encrypted card to process in the encrypted card formation; When receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.When receiving new packet, all rejudge the most idle current encrypted card at every turn, and process to this encrypted card new allocation of packets, greatly improved the utilance of each encrypted card, make the load balancing of each encrypted card.Wherein the most idle encrypted card can be for waiting for the minimum encrypted card of packet number of processing, perhaps wait the pending the shortest encrypted card of total length of data packets, also can be by the end of no encrypted card of present maximum duration etc., can set as required.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and may further comprise the steps: the medium pending packet number of each encrypted card formation relatively, number is minimum is the most idle encrypted card.Just can judge fast the most idle encrypted card and call it and process by the medium pending packet number of encrypted card formation relatively, the simple and system of such method realizes easily.
Further, above-mentionedly select a most idle relative encrypted card according to all encrypted card formations and may further comprise the steps: the medium pending total length of data packets of each encrypted card formation relatively, total length of data packets is the shortest is the most idle encrypted card.Just can judge fast the most idle encrypted card and call it and process by the medium pending total length of data packets of encrypted card formation relatively.Time and data length that encrypted card is processed packet are directly proportional, such mode more scientifically estimates each encrypted card and needs the time to be processed, find the most idle encrypted card, new packet is directly distributed to really the encrypted card that can the fastest processing arrives, the balanced load of each encrypted card has also improved system effectiveness.Under above-mentioned dual mode, as long as when finding a medium pending packet number of encrypted card formation to be 0, can not need to continue again to finish complete judgement, directly process to this encrypted card new allocation of packets, no longer carry out the judgement of other encrypted cards, reduced overhead.
Further, above-mentioned VPN equipment is in the method for adding concurrent encryption and decryption under the close snap ring border, further comprising the steps of: as whenever to receive a new packet, then distribute to an one sequence number, packet enters buffering area after processing through encrypted card, sends successively according to the order of the sequence number packet with buffering area at last.By setting up buffering area, and the data of encrypted card after processing are kept in the buffer area Packet Generation in according to the order of sequence number buffering being gone again.So that the order of packet does not have is out of order, the IP message sequence can access good assurance.
Further, above-mentioned VPN equipment is in the method for adding concurrent encryption and decryption under the close snap ring border, further comprising the steps of: the sequence number of packet sequentially+1, for example buffering area is divided into the buffer circle of at least 4 groove positions, a packet is deposited in each groove position, sequence number minimum in the log buffer is sequence number K to be sent, new sequence of data packet number is X, then new packet is deposited in X-K groove position with respect to minmal sequence K groove position, sequentially send out the packet that deposit each groove position, be sent completely rear K+1.For example, after the 3rd packet enters buffer area, sequence number minimum in the current cache district is 2, then the 3rd packet leaves the 1st groove position of the back, packet groove position of minimum sequence number 2 in, the 4th packet then leaves the 2nd groove position of the back, packet groove position of minimum sequence number 2 in, the like.Be placed on packet in the buffering area according to such mode, when data send, only need to just sequentially send according to the groove bit position and can not produce data packet disorder.Under the groove position is empty situation, wait for that then the groove position has in the situation of data and directly sends, and does not need to judge the sequence number of packet, really realizes two thread parallel fast processing.All the time record a K value in the system as the baseline of data sequence number to be sent, when there being special situation, the minmal sequence of the packet in the buffering area is during number greater than K, wait for that new packet adds buffering area, if this moment, new sequence of data packet number was less than the minmal sequence of the packet in the buffering area number, then new packet is deposited in respect to X-K groove position before the minmal sequence N groove position.
VPN equipment of the present invention as shown in Figure 1 is at the method flow diagram of adding concurrent encryption and decryption under the close snap ring border.All the time record a K value in the system as the baseline of data sequence number to be sent, and the gained sequence number of each IP message is determined by the order that the ICP/IP protocol stack sends the IP message, so system can be after adding the Parallel Hardware encryption and decryption operation of close snap ring border, the IP message sequence can access good assurance, and system can make the performance that a load balancing improves VPN equipment complete machine between the polylith encrypted card.
The invention also discloses a kind of VPN equipment in the system that adds concurrent encryption and decryption under the close snap ring border, it specifically comprises: module is set in formation and encrypted card is selected module, described formation arranges the encrypted card formation that module is used for arranging a correspondence to each encrypted card, preserves the packet that needs encrypted card to process in the encrypted card formation; When described encrypted card selects module to be used for receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.When receiving new packet, all rejudge the most idle current encrypted card at every turn, and process to this encrypted card new allocation of packets, greatly improved the utilance of each encrypted card, make the load balancing of each encrypted card.Wherein the most idle encrypted card can be for waiting for the minimum encrypted card of packet number of processing, perhaps wait the pending the shortest encrypted card of total length of data packets, also can be by the end of no encrypted card of present maximum duration etc., can set as required.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the disclosed form of this paper, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can in invention contemplated scope described herein, change by technology or the knowledge of above-mentioned instruction or association area.And the change that those skilled in the art carry out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of claims of the present invention.
Claims (10)
1. a VPN equipment is in the method for adding concurrent encryption and decryption under the close snap ring border, and it specifically comprises following steps: each encrypted card arranges the encrypted card formation of a correspondence, preserves the packet that needs encrypted card to process in the encrypted card formation; When receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.
2. VPN equipment as claimed in claim 1 is in the method for adding concurrent encryption and decryption under the close snap ring border, it is characterized in that describedly selecting a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending packet number of each encrypted card formation relatively, number is minimum is the most idle encrypted card.
3. VPN equipment as claimed in claim 1 is in the method for adding concurrent encryption and decryption under the close snap ring border, it is characterized in that describedly selecting a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending total length of data packets of each encrypted card formation relatively, total length of data packets is the shortest is the most idle encrypted card.
Such as claim 2 or 3 described VPN equipment in the method for adding concurrent encryption and decryption under the close snap ring border, it is characterized in that described method is further comprising the steps of: whenever receive a new packet, then distribute to an one unique sequence number of the overall situation, packet enters buffering area after processing through encrypted card, according to the order of sequence number packet is positioned at last the correspondence position of buffering area by sequence number.
As claimed in claim 4 VPN equipment in the method for adding concurrent encryption and decryption under the close snap ring border, it is characterized in that described method is further comprising the steps of: the sequence number of packet according to its order that enters system successively+1, buffering area is divided into the buffer circle of total several groove positions of encrypted card queue size, a packet is deposited in each groove position, sequence number K to be sent in the log buffer, i.e. minimum sequence number, new sequence of data packet number is X, and then new packet is deposited in X-K groove position with respect to minmal sequence K groove position; After any encrypted card is finished encryption and decryption, check the packet that whether has encrypted card to finish dealing with in the groove position K, be then to send this packet, be sent completely rear K=K+1.
6. a VPN equipment is characterized in that specifically comprising in the system that adds concurrent encryption and decryption under the close snap ring border: module is set in formation and encrypted card is selected module; Described formation arranges the encrypted card formation that module is used for arranging a correspondence to each encrypted card, preserves the packet that needs encrypted card to process in the encrypted card formation; When described encrypted card selects module to be used for receiving new packet, select a most idle relative encrypted card according to all encrypted card formations, and new packet is joined in the encrypted card formation of this encrypted card.
7. VPN equipment as claimed in claim 6 is in the system that adds concurrent encryption and decryption under the close snap ring border, it is characterized in that describedly selecting a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending packet number of each encrypted card formation relatively, number is minimum is the most idle encrypted card.
8. VPN equipment as claimed in claim 6 is in the system that adds concurrent encryption and decryption under the close snap ring border, it is characterized in that describedly selecting a most idle relative encrypted card according to all encrypted card formations and specifically may further comprise the steps: the medium pending total length of data packets of each encrypted card formation relatively, total length of data packets is the shortest is the most idle encrypted card.
Such as claim 7 or 8 described VPN equipment in the system that adds concurrent encryption and decryption under the close snap ring border, it is characterized in that described system also comprises serial number assignment module and buffer zone module, described serial number assignment module is used for whenever receiving a new packet, then distribute to an one unique sequence number of the overall situation, packet enters buffer zone module after processing through encrypted card, according to the order of sequence number packet is positioned at last the correspondence position of buffering area by sequence number.
10. VPN equipment as claimed in claim 9 is in the system that adds concurrent encryption and decryption under the close snap ring border, it is characterized in that described serial number assignment module with the sequence number of packet according to its order that enters system successively+1, buffering area is divided into the buffer circle of total several groove positions of encrypted card queue size, a packet is deposited in each groove position, sequence number K to be sent in the log buffer, i.e. minimum sequence number, new sequence of data packet number is X, and then new packet is deposited in X-K groove position with respect to minmal sequence K groove position; After any encrypted card is finished encryption and decryption, check the packet that whether has encrypted card to finish dealing with in the groove position K, be then to send this packet, be sent completely rear K=K+1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210530984.5A CN102970142B (en) | 2012-12-11 | 2012-12-11 | A kind of VPN device is adding the method and system of concurrent encryption and decryption under close snap ring border |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210530984.5A CN102970142B (en) | 2012-12-11 | 2012-12-11 | A kind of VPN device is adding the method and system of concurrent encryption and decryption under close snap ring border |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102970142A true CN102970142A (en) | 2013-03-13 |
CN102970142B CN102970142B (en) | 2016-03-02 |
Family
ID=47800035
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210530984.5A Active CN102970142B (en) | 2012-12-11 | 2012-12-11 | A kind of VPN device is adding the method and system of concurrent encryption and decryption under close snap ring border |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102970142B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179206A (en) * | 2013-03-15 | 2013-06-26 | 成都卫士通信息产业股份有限公司 | Method of dynamic feedback for enhancing cypher machine load balance |
CN104426654A (en) * | 2013-08-29 | 2015-03-18 | 国家电网公司 | Encryption card encryption and decryption method based on multi-buffer mode |
CN106302699A (en) * | 2016-08-11 | 2017-01-04 | 广州慧睿思通信息科技有限公司 | A kind of method processing many deciphering machines PC end task of decryption |
CN106788975A (en) * | 2016-12-28 | 2017-05-31 | 北京天融信网络安全技术有限公司 | Ciphering and deciphering device based on SM4 cryptographic algorithms |
CN106921607A (en) * | 2015-12-24 | 2017-07-04 | 航天信息股份有限公司 | Crypto-operation management method and system under a kind of cipher server cluster |
CN110086751A (en) * | 2018-01-26 | 2019-08-02 | 北京数盾信息科技有限公司 | A kind of 1,100,000,000 network cryptographic machine encipher-decipher methods of high speed, low time delay |
CN110569677A (en) * | 2019-09-02 | 2019-12-13 | 江苏云涌电子科技股份有限公司 | Method for identifying multiple encryption cards |
CN111555950A (en) * | 2020-03-26 | 2020-08-18 | 厦门网宿有限公司 | Message processing method, device, server and storage medium |
CN113177213A (en) * | 2021-04-29 | 2021-07-27 | 杭州迪普科技股份有限公司 | Encryption card and processing method of encrypted message thereof |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102023888A (en) * | 2010-11-04 | 2011-04-20 | 北京曙光天演信息技术有限公司 | Virtual device based on multiple encryption cards |
CN102137027A (en) * | 2011-05-03 | 2011-07-27 | 厦门市美亚柏科信息股份有限公司 | Reliable data transmission method and device thereof |
US20120106406A1 (en) * | 2009-07-13 | 2012-05-03 | Zte Corporation | Time division duplexing (TDD) style-based data transmission method and apparatus |
-
2012
- 2012-12-11 CN CN201210530984.5A patent/CN102970142B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120106406A1 (en) * | 2009-07-13 | 2012-05-03 | Zte Corporation | Time division duplexing (TDD) style-based data transmission method and apparatus |
CN102023888A (en) * | 2010-11-04 | 2011-04-20 | 北京曙光天演信息技术有限公司 | Virtual device based on multiple encryption cards |
CN102137027A (en) * | 2011-05-03 | 2011-07-27 | 厦门市美亚柏科信息股份有限公司 | Reliable data transmission method and device thereof |
Non-Patent Citations (1)
Title |
---|
李之棠,吴锋,林晓: "一种基于软硬结合加密的VPN系统结构的研究与实现", 《计算机工程与科学》 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103179206B (en) * | 2013-03-15 | 2016-04-06 | 成都卫士通信息产业股份有限公司 | A kind of dynamical feedback method strengthening cipher machine load balancing |
CN103179206A (en) * | 2013-03-15 | 2013-06-26 | 成都卫士通信息产业股份有限公司 | Method of dynamic feedback for enhancing cypher machine load balance |
CN104426654A (en) * | 2013-08-29 | 2015-03-18 | 国家电网公司 | Encryption card encryption and decryption method based on multi-buffer mode |
CN106921607A (en) * | 2015-12-24 | 2017-07-04 | 航天信息股份有限公司 | Crypto-operation management method and system under a kind of cipher server cluster |
CN106302699B (en) * | 2016-08-11 | 2019-12-27 | 广州慧睿思通信息科技有限公司 | Method for processing decryption tasks of PC (personal computer) ends of multiple decryptors |
CN106302699A (en) * | 2016-08-11 | 2017-01-04 | 广州慧睿思通信息科技有限公司 | A kind of method processing many deciphering machines PC end task of decryption |
CN106788975A (en) * | 2016-12-28 | 2017-05-31 | 北京天融信网络安全技术有限公司 | Ciphering and deciphering device based on SM4 cryptographic algorithms |
CN106788975B (en) * | 2016-12-28 | 2019-12-13 | 北京天融信网络安全技术有限公司 | encryption and decryption device based on SM4 cryptographic algorithm |
CN110086751A (en) * | 2018-01-26 | 2019-08-02 | 北京数盾信息科技有限公司 | A kind of 1,100,000,000 network cryptographic machine encipher-decipher methods of high speed, low time delay |
CN110569677A (en) * | 2019-09-02 | 2019-12-13 | 江苏云涌电子科技股份有限公司 | Method for identifying multiple encryption cards |
CN110569677B (en) * | 2019-09-02 | 2020-10-09 | 江苏云涌电子科技股份有限公司 | Method for identifying multiple encryption cards |
CN111555950A (en) * | 2020-03-26 | 2020-08-18 | 厦门网宿有限公司 | Message processing method, device, server and storage medium |
CN111555950B (en) * | 2020-03-26 | 2022-05-13 | 厦门网宿有限公司 | Message processing method, device, server and storage medium |
CN113177213A (en) * | 2021-04-29 | 2021-07-27 | 杭州迪普科技股份有限公司 | Encryption card and processing method of encrypted message thereof |
CN113177213B (en) * | 2021-04-29 | 2022-06-24 | 杭州迪普科技股份有限公司 | Encryption card and processing method of encrypted message thereof |
Also Published As
Publication number | Publication date |
---|---|
CN102970142B (en) | 2016-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102970142A (en) | Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment | |
US11601359B2 (en) | Resilient network communication using selective multipath packet flow spraying | |
US7337314B2 (en) | Apparatus and method for allocating resources within a security processor | |
US7661130B2 (en) | Apparatus and method for allocating resources within a security processing architecture using multiple queuing mechanisms | |
Wang et al. | PRSFC-IoT: A performance and resource aware orchestration system of service function chaining for Internet of Things | |
US9166862B1 (en) | Distributed caching system | |
CN101771627B (en) | Equipment and method for analyzing and controlling node real-time deep packet on internet | |
US9064124B1 (en) | Distributed caching system | |
CN103412786B (en) | High performance server architecture system and data processing method thereof | |
CN102857414B (en) | A kind of forwarding table write-in, message forwarding method and device | |
US9621399B1 (en) | Distributed caching system | |
US20040205331A1 (en) | Apparatus and method for allocating resources within a security processing architecture using multiple groups | |
EP3891955B1 (en) | Detecting attacks using handshake requests systems and methods | |
CN104917680B (en) | For executing the computer system of the parallel hash of stream of packets | |
CN102143088B (en) | Method and equipment for forwarding data based on security socket layer (SSL) virtual private network (VPN) | |
US20150055474A1 (en) | Virtual Machine Traffic Engineering | |
CN101394362A (en) | Method for load balance to multi-core network processor based on flow fragmentation | |
CN102891809A (en) | Interface order-preserving method and system of messages of multi-core network device | |
US10642738B1 (en) | Distributed caching system | |
CN105321121A (en) | Power cloud platform based power utilization information acquisition system | |
CN113810397B (en) | Protocol data processing method and device | |
CN102868636A (en) | Method and system for stream-based order preservation of multi-core network equipment packet | |
US9344384B2 (en) | Inter-packet interval prediction operating algorithm | |
Wang et al. | A locality-aware shuffle optimization on fat-tree data centers | |
CN102541633A (en) | System and method for arranging data panels and control panels based on multi-core CPU (Central Processing Unit) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |