CN108897624B - Encryption calculation method and device for HTTPS server - Google Patents

Encryption calculation method and device for HTTPS server Download PDF

Info

Publication number
CN108897624B
CN108897624B CN201810735629.9A CN201810735629A CN108897624B CN 108897624 B CN108897624 B CN 108897624B CN 201810735629 A CN201810735629 A CN 201810735629A CN 108897624 B CN108897624 B CN 108897624B
Authority
CN
China
Prior art keywords
cpu
encryption calculation
qat
card
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810735629.9A
Other languages
Chinese (zh)
Other versions
CN108897624A (en
Inventor
丁浩
吴岩
石磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN201810735629.9A priority Critical patent/CN108897624B/en
Publication of CN108897624A publication Critical patent/CN108897624A/en
Application granted granted Critical
Publication of CN108897624B publication Critical patent/CN108897624B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5005Allocation of resources, e.g. of the central processing unit [CPU] to service a request
    • G06F9/5027Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
    • G06F9/5038Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the execution order of a plurality of tasks, e.g. taking priority or time dependency constraints into consideration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides an encryption calculation method of an HTTPS server, which is applied to an Nginx server and comprises the following steps: judging whether the current time is in the CPU application time period or not; if yes, distributing at least one encryption calculation task to the QAT card and the CPU respectively, and enabling the QAT card and the CPU to execute the respective encryption calculation tasks respectively; if not, distributing the encryption calculation task to the QAT card, and enabling the QAT card to execute the encryption calculation task. The invention avoids the problems of low QAT card processing speed and CPU resource waste caused by the fact that the QAT card is busy and only the QAT card is used for executing the encryption calculation task when the CPU is idle in the prior art, effectively utilizes the CPU resource and improves the processing efficiency of the encryption calculation task.

Description

Encryption calculation method and device for HTTPS server
Technical Field
The invention relates to the technical field of computers, in particular to an encryption calculation method and device of an HTTPS server.
Background
HTTPs (hyper Text Transfer protocol Secure Socket layer), which is an HTTP channel targeted for security, is a Secure version of HTTP.
For the server, an important problem in HTTPS deployment is the computation of symmetric and asymmetric cryptographic algorithms. The computation of encryption algorithms consumes a lot of computing resources and therefore typically deals with it using special hardware, such as the quickassist technology card (QAT card for short) from INTEL corporation. Taking the currently used application layer Nginx server as an example, the Nginx server has a ssl-engine module, and when the Nginx server needs to perform encryption calculation, the ssl-engine module is read, and the module issues a calculation task to the QAT card and uses QAT for processing.
However, in actual operation, there is a problem that: in the busy period of the QAT card, even under the condition that a CPU is idle, the ssl-engine module still gives all the calculation tasks to the QAT card for processing; the QAT is already busy, and the processing capacity is not as good as that of the CPU at that time, so that the processing speed of the encryption calculation task becomes slow.
Disclosure of Invention
In view of the above, the present invention discloses an encryption calculation method and device for an HTTPS server, which uses a CPU and a QAT card to process an encryption calculation task together in a suitable time period, thereby improving the processing efficiency of the encryption calculation task.
In order to achieve the above purpose, the invention provides the following specific technical scheme:
an encryption calculation method of an HTTPS server is applied to an Nginx server, and comprises the following steps:
judging whether the current time is in the CPU application time period or not;
if yes, distributing at least one encryption calculation task to the QAT card and the CPU respectively, and enabling the QAT card and the CPU to execute the respective encryption calculation tasks respectively;
if not, distributing the encryption calculation task to the QAT card, and enabling the QAT card to execute the encryption calculation task.
Optionally, the method further includes:
and determining the applicable time period of the CPU according to the historical log of the HTTPS server of the application layer and the historical monitoring log of the physical layer.
Optionally, the determining, according to the history log of the application layer HTTPS server and the history monitoring log of the physical layer, the CPU applicable period includes:
determining a preset number of QAT card busy time periods according to historical logs of an HTTPS server of an application layer;
according to historical monitoring logs of a physical layer, determining QAT card busy time periods meeting first preset conditions as CPU applicable time periods in QAT card busy time periods of preset quantity, wherein the first preset conditions are that the utilization rates of a CPU in time exceeding a first preset proportion are all lower than a first preset value.
Optionally, the distributing the encryption calculation tasks to the QAT card and the CPU respectively includes:
judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition, wherein the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value;
if yes, judging whether an encryption calculation task processing queue is empty, wherein the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to a CPU;
and if the number of the encryption calculation tasks is empty, respectively distributing the encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
Optionally, the method further includes:
and when the utilization rate of the CPU in the continuous N unit time periods does not meet a second preset condition or the encryption calculation task processing queue is not empty, the encryption calculation task is not distributed to the CPU.
A cryptographic computing device of an HTTPS server, comprising:
the judging unit is used for judging whether the current time is in the CPU application time interval or not;
if yes, triggering a first distribution unit for respectively distributing at least one encryption calculation task to the QAT card and the CPU, so that the QAT card and the CPU respectively execute the respective encryption calculation tasks;
if not, triggering a second distribution unit for distributing the encryption calculation task to the QAT card so that the QAT card executes the encryption calculation task.
Optionally, the apparatus further comprises:
and the determining unit is used for determining the CPU application time period according to the historical log of the application layer HTTPS server and the historical monitoring log of the physical layer.
Optionally, the determining unit is specifically configured to: determining a preset number of QAT card busy time periods according to historical logs of an HTTPS server of an application layer; according to historical monitoring logs of a physical layer, determining QAT card busy time periods meeting first preset conditions as CPU applicable time periods in QAT card busy time periods of preset quantity, wherein the first preset conditions are that the utilization rates of a CPU in time exceeding a first preset proportion are all lower than a first preset value.
Optionally, the first allocation unit is specifically configured to: judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition, wherein the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value; if yes, judging whether an encryption calculation task processing queue is empty, wherein the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to a CPU; and if the number of the encryption calculation tasks is empty, respectively distributing the encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
Optionally, the first allocating unit is further configured to not allocate the cryptographic calculation task to the CPU when the usage rate of the CPU in the consecutive N unit time periods does not satisfy the second preset condition, or the cryptographic calculation task processing queue is not empty.
Compared with the prior art, the invention has the following beneficial effects:
the encryption calculation method and the encryption calculation device of the HTTPS server disclosed by the invention have the advantages that the QAT card and the CPU are used for executing the encryption calculation task together in the applicable period of the CPU, so that the problems of low QAT card processing speed and CPU resource waste caused by the fact that the QAT card is busy and the CPU is only used for executing the encryption calculation task when the CPU is idle in the prior art are solved, the CPU resource is effectively utilized, and the processing efficiency of the encryption calculation task is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an encryption calculation method of an HTTPS server according to an embodiment of the present invention;
fig. 2 is a flowchart of another encryption calculation method of an HTTPS server according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of CPU information in a proc/stat disclosed in the embodiments of the present invention;
fig. 4 is a schematic structural diagram of an encryption computing device of an HTTPS server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present embodiment discloses an encryption calculation method for an HTTPS server, which is applied to an Nginx server, and specifically to an ssl-engine module of the Nginx server, and specifically includes the following steps:
s101: judging whether the current time is in the CPU application time period or not;
the current time is the time when the cryptographic calculation task is received.
It should be noted that the CPU application period is a fixed time in a time period of one day, one week, and the like, and the CPU application period indicates a time period in which the QAT card is busy and the CPU is idle.
Before judging whether the current computing cycle is in the CPU applicable time period, the CPU applicable time period needs to be determined according to the historical log of the application layer HTTPS server and the historical monitoring log of the physical layer.
Specifically, a preset number of QAT card busy time periods are determined according to historical logs of an HTTPS server of an application layer; according to historical monitoring logs of a physical layer, determining the QAT busy time period meeting a first preset condition in the QAT busy time periods of a preset number of QAT cards as a CPU application time period, wherein the first preset condition is that the utilization rates of the CPU are all lower than a first preset value within the time exceeding a first preset proportion.
Since the function of the QAT card is to handle the cryptographic computation task of the HTTPS, the time period when the HTTPS connection of the server is the most may be considered as the time period when the QAT card computes the most, i.e., the QAT busy time period.
Specifically, each line of the history log of the application layer HTTPS server may be considered to process one HTTPS encryption calculation task, the history log of the application layer HTTPS server is counted with a certain time interval as a statistical granularity (e.g., 1 hour), a time period with the maximum number of log lines is found, and the time period is used as a preset number of QAT card busy time period in one day, where the preset number is preset, for example, set to 3.
The utilization rates of the CPU in different times can be obtained through the historical monitoring log of the physical layer, where the first preset condition is that the utilization rates of the CPU in the time exceeding a first preset proportion are all lower than a first preset value, and for example, the utilization rates of the CPU in the case exceeding 95% are all lower than 50%.
If yes, executing S102: distributing at least one encryption calculation task to the QAT card and the CPU respectively, so that the QAT card and the CPU execute the respective encryption calculation tasks respectively;
specifically, a ssl-engine module in the Nginx server actively starts a process to generate an encryption calculation task processing queue, an encryption calculation task allocated to the CPU is placed in the encryption calculation task processing queue, the operating system obtains the encryption calculation task from the encryption calculation task processing queue, automatically determines to obtain the encryption calculation task according to the state of the CPU, then gives the encryption calculation task to the CPU for processing, and returns a result.
If not, executing S103: and distributing the encryption calculation task to the QAT card to enable the QAT card to execute the encryption calculation task.
According to the encryption calculation method of the HTTPS server, the QAT card and the CPU are used for executing the encryption calculation task together in the applicable period of the CPU, the problems that in the prior art, when the QAT card is busy and the CPU is idle, the QAT card is only used for executing the encryption calculation task, the QAT card processing speed is low, and the CPU resource is wasted are solved, the CPU resource is effectively utilized, and the processing efficiency of the encryption calculation task is improved.
In order to more accurately determine whether the current CPU is suitable for executing the cryptographic calculation task, when the current calculation cycle is in the CPU applicable period, the cryptographic calculation task is not immediately allocated to the CPU, but the usage rate of the CPU is further detected, specifically, this embodiment discloses another cryptographic calculation method for an HTTPS server, and please refer to fig. 2, where the method specifically includes the following steps:
s201: judging whether the current time is in the CPU application time period or not;
if not, S202: and distributing the encryption calculation task to the QAT card to enable the QAT card to execute the encryption calculation task.
If yes, S203: judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition or not;
the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value, for example, the utilization rate of the CPU in the time exceeding 95% in each unit time period is lower than 30% in continuous 100 unit time periods.
Referring to fig. 3, fig. 3 is a schematic diagram of CPU information in the proc/stat, where the proc/stat is a file path and a file name in the Linux system, and the CPU utilization can be calculated by reading the CPU information in the proc/stat.
Specifically, two very short time points, denoted as t1 and t2, are taken, and the first row of information in each time point/proc/stat is read. Let s1 be the sum of all values in the first row of t1, s2 be the sum of all values in the first row of t2, and total be s2-s 1. In addition, i1 is the value of the fourth column in the first row in t1, i2 is the value of the fourth column in the first row in t2, and idle is i2-i 1. The CPU utilization q (total-idle)/total.
If not, S204: not distributing encryption calculation tasks to the CPU;
if yes, S205: judging whether the encryption calculation task processing queue is empty or not;
the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to the CPU.
If not, executing S204;
if empty, S206: and respectively distributing encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
The third preset ratio may be 1: w, W may be set to 20, i.e., the encryption calculation tasks are distributed to the QAT card and the CPU in a 1:20 ratio.
It should be further noted that the encryption calculation method of the HTTPS server further includes: and monitoring the number of the tasks in the encryption calculation task processing queue, and when the tasks still exist in the encryption calculation task processing queue, not putting the encryption calculation tasks into the encryption calculation task processing queue in the unit time period.
In the encryption method for the HTTPS server disclosed in this embodiment, whether the usage rate of the CPU meets the requirement is determined by determining whether the current computing cycle is in the CPU applicable period, and whether the encryption computing task processing queue is empty is determined, and whether the current computing cycle is that the QAT card is busy and the CPU is idle is accurately determined, so that the encryption computing task is executed efficiently.
Referring to fig. 4, the present embodiment discloses an encryption calculation method for an HTTPS server according to the foregoing embodiment, which correspondingly discloses an encryption calculation apparatus for an HTTPS server, including:
a determining unit 401, configured to determine whether a current time is in a CPU applicable period;
if yes, triggering a first distributing unit 402 for distributing at least one encryption computing task to the QAT card and the CPU respectively, so that the QAT card and the CPU execute the respective encryption computing tasks respectively;
if not, a second assigning unit 403 is triggered for assigning the encryption calculation task to the QAT card, so that the QAT card performs the encryption calculation task.
Optionally, the apparatus further comprises:
and the determining unit is used for determining the CPU application time period according to the historical log of the application layer HTTPS server and the historical monitoring log of the physical layer.
Optionally, the determining unit is specifically configured to: determining a preset number of QAT card busy time periods according to historical logs of an HTTPS server of an application layer; according to historical monitoring logs of a physical layer, determining QAT card busy time periods meeting first preset conditions as CPU applicable time periods in QAT card busy time periods of preset quantity, wherein the first preset conditions are that the utilization rates of a CPU in time exceeding a first preset proportion are all lower than a first preset value.
Optionally, the first allocating unit 402 is specifically configured to: judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition, wherein the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value; if yes, judging whether an encryption calculation task processing queue is empty, wherein the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to a CPU; and if the number of the encryption calculation tasks is empty, respectively distributing the encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
Optionally, the first allocating unit 402 is further configured to not allocate the cryptographic calculation task to the CPU when the usage rate of the CPU in the consecutive N unit time periods does not satisfy the second preset condition, or the cryptographic calculation task processing queue is not empty.
The encryption computing device of the HTTPS server disclosed in this embodiment realizes improvement of the existing Nginx server, so that the ssl-engine module of the Nginx server can not only allocate an encryption computing task to the QAT card, but also actively start a process to generate an encryption computing task processing queue, and use the QAT card and the CPU to jointly execute the encryption computing task in the CPU application period, and place the encryption computing task allocated to the CPU in the queue. The problems that in the prior art, when the QAT card is busy and the CPU is idle, the QAT card is only used for executing the encryption calculation task, so that the QAT card processing speed is low and the CPU resource is wasted are solved, the CPU resource is effectively utilized, and the processing efficiency of the encryption calculation task is improved.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (6)

1. An encryption calculation method of an HTTPS server is applied to an Nginx server, and comprises the following steps:
determining the applicable time period of the CPU according to the historical log of the HTTPS server of the application layer and the historical monitoring log of the physical layer;
judging whether the current time is in the CPU application time period or not;
if yes, distributing at least one encryption calculation task to the QAT card and the CPU respectively, and enabling the QAT card and the CPU to execute the respective encryption calculation tasks respectively;
if not, distributing the encryption calculation task to the QAT card to enable the QAT card to execute the encryption calculation task;
wherein, the distributing encryption calculation tasks to the QAT card and the CPU respectively comprises:
judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition, wherein the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value;
if yes, judging whether an encryption calculation task processing queue is empty, wherein the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to a CPU;
and if the number of the encryption calculation tasks is empty, respectively distributing the encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
2. The method according to claim 1, wherein the determining the CPU applicable period according to the historical log of the application layer HTTPS server and the historical monitoring log of the physical layer comprises:
determining a preset number of QAT card busy time periods according to historical logs of an HTTPS server of an application layer;
according to historical monitoring logs of a physical layer, determining QAT card busy time periods meeting first preset conditions as CPU applicable time periods in QAT card busy time periods of preset quantity, wherein the first preset conditions are that the utilization rates of a CPU in time exceeding a first preset proportion are all lower than a first preset value.
3. The method of claim 1, further comprising:
and when the utilization rate of the CPU in the continuous N unit time periods does not meet a second preset condition or the encryption calculation task processing queue is not empty, the encryption calculation task is not distributed to the CPU.
4. An encryption computing device of an HTTPS server, comprising:
the determining unit is used for determining the applicable time period of the CPU according to the historical log of the HTTPS server of the application layer and the historical monitoring log of the physical layer;
the judging unit is used for judging whether the current time is in the CPU application time interval or not;
if yes, triggering a first distribution unit for respectively distributing at least one encryption calculation task to the QAT card and the CPU, so that the QAT card and the CPU respectively execute the respective encryption calculation tasks;
if not, triggering a second distribution unit for distributing the encryption calculation task to the QAT card to enable the QAT card to execute the encryption calculation task;
wherein the first allocation unit is specifically configured to: judging whether the utilization rate of the CPU in N continuous unit time periods meets a second preset condition, wherein the second preset condition is that the utilization rate of the CPU in the time exceeding a second preset proportion in each unit time period is lower than a second preset value; if yes, judging whether an encryption calculation task processing queue is empty, wherein the encryption calculation task processing queue is used for storing encryption calculation tasks distributed to a CPU; and if the number of the encryption calculation tasks is empty, respectively distributing the encryption calculation tasks to the QAT card and the CPU according to a third preset proportion, wherein the encryption calculation tasks distributed to the CPU are put into the encryption calculation task processing queue.
5. The apparatus according to claim 4, wherein the determining unit is specifically configured to: determining a preset number of QAT card busy time periods according to historical logs of an HTTPS server of an application layer; according to historical monitoring logs of a physical layer, determining QAT card busy time periods meeting first preset conditions as CPU applicable time periods in QAT card busy time periods of preset quantity, wherein the first preset conditions are that the utilization rates of a CPU in time exceeding a first preset proportion are all lower than a first preset value.
6. The apparatus according to claim 4, wherein the first allocating unit is further configured to not allocate the cryptographic calculation task to the CPU when the usage rate of the CPU in the consecutive N unit time periods does not satisfy the second preset condition or the cryptographic calculation task processing queue is not empty.
CN201810735629.9A 2018-07-06 2018-07-06 Encryption calculation method and device for HTTPS server Active CN108897624B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810735629.9A CN108897624B (en) 2018-07-06 2018-07-06 Encryption calculation method and device for HTTPS server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810735629.9A CN108897624B (en) 2018-07-06 2018-07-06 Encryption calculation method and device for HTTPS server

Publications (2)

Publication Number Publication Date
CN108897624A CN108897624A (en) 2018-11-27
CN108897624B true CN108897624B (en) 2021-07-20

Family

ID=64348218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810735629.9A Active CN108897624B (en) 2018-07-06 2018-07-06 Encryption calculation method and device for HTTPS server

Country Status (1)

Country Link
CN (1) CN108897624B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340438A (en) * 2007-07-03 2009-01-07 佳能株式会社 Data processing apparatus and data processing apparatus control method
CN105631343A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Password operation realization method and device based on encryption card and server
CN107395452A (en) * 2017-06-22 2017-11-24 重庆大学 A kind of method for the HTTPS application performances that WebServer is improved using software-hardware synergism technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136750A (en) * 2007-10-15 2008-03-05 胡祥义 Network real-name system implementing method
IL187043A0 (en) * 2007-10-30 2008-02-09 Sandisk Il Ltd Secure pipeline manager
CN106815110A (en) * 2017-01-22 2017-06-09 郑州云海信息技术有限公司 One kind accelerates card test method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340438A (en) * 2007-07-03 2009-01-07 佳能株式会社 Data processing apparatus and data processing apparatus control method
CN105631343A (en) * 2014-10-29 2016-06-01 航天信息股份有限公司 Password operation realization method and device based on encryption card and server
CN107395452A (en) * 2017-06-22 2017-11-24 重庆大学 A kind of method for the HTTPS application performances that WebServer is improved using software-hardware synergism technology

Also Published As

Publication number Publication date
CN108897624A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
RU2744498C1 (en) Method, apparatus and system for blockchain-consensus
CN104391749B (en) Resource allocation method and device
CN108270842B (en) Method, system and server for pushing rights and interests task
CN106453146B (en) Method, system, device and readable storage medium for allocating private cloud computing resources
US20080172671A1 (en) Method and system for efficient management of resource utilization data in on-demand computing
EP3129880A1 (en) Method and device for augmenting and releasing capacity of computing resources in real-time stream computing system
Pham et al. Performance and behavior characterization of amazon ec2 spot instances
CN106713396B (en) Server scheduling method and system
US10735342B2 (en) Dynamic buffer allocation in similar infrastructures
CN106713388B (en) Burst service processing method and device
CN110716800B (en) Task scheduling method and device, storage medium and electronic equipment
CN106936867B (en) Service request response method and device
CN105022668B (en) Job scheduling method and system
CN108664321B (en) System resource allocation adjusting method and device
CN109039953B (en) Bandwidth scheduling method and device
CN110599148A (en) Cluster data processing method and device, computer cluster and readable storage medium
CN103488538B (en) Application extension device and application extension method in cloud computing system
CN106933673B (en) Method and device for adjusting number of logical threads of component
CN109597680B (en) Task queuing response parameter estimation method and device
CN112860387A (en) Distributed task scheduling method and device, computer equipment and storage medium
CN108897624B (en) Encryption calculation method and device for HTTPS server
CN114827033B (en) Data flow control method, device, equipment and computer readable storage medium
WO2018205890A1 (en) Task assignment method and system of distributed system, computer readable storage medium and computer device therefor
Panneerselvam et al. An investigation into the impacts of task-level behavioural heterogeneity upon energy efficiency in Cloud datacentres
CN112130974B (en) Cloud computing resource configuration method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant