CN110012014A - A kind of encipher-decipher method, system, device and medium - Google Patents
A kind of encipher-decipher method, system, device and medium Download PDFInfo
- Publication number
- CN110012014A CN110012014A CN201910276974.5A CN201910276974A CN110012014A CN 110012014 A CN110012014 A CN 110012014A CN 201910276974 A CN201910276974 A CN 201910276974A CN 110012014 A CN110012014 A CN 110012014A
- Authority
- CN
- China
- Prior art keywords
- encryption
- data
- decryption
- network interface
- party device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of encipher-decipher method, system, device and media.The step of this method includes: to receive the incoming pending data of third party device by network interface;Encryption and decryption processing is carried out to pending data, generates result data;Result data is transmitted to third party device by network interface.Since this method receives the incoming pending data of third party device by the network interface of encryption apparatus, and the result data after encryption and decryption is returned into third party device by network interface, without carrying out the transmitting of data by host equipment, ensure the whole efficiency of encryption process, in addition, the opposite overall security for ensuring encryption process.In addition, the present invention also provides a kind of encrypting and deciphering system, device and medium, beneficial effect is same as above.
Description
Technical field
The present invention relates to information security fields, more particularly to a kind of encipher-decipher method, system, device and medium.
Background technique
With the arrival of big data era, the safety of information data is increasingly becoming the current weight of interest in the communications field
Point.
Current encryption and decryption mechanism, often through the corresponding I/O resource of host equipment assignment of password device, for receiving
Pending data that third party is passed to simultaneously is passed to encryption apparatus by PCI-E interface, and then by encryption apparatus to pending data
Carry out corresponding encryption and decryption processing, and the result data of generation be transmitted to by host equipment by PCI-E interface, and further by
Host equipment is transmitted to third party device.However, currently needing to occupy host in such a way that encryption apparatus carries out encryption and decryption and setting
Standby I/O resource, and host equipment takes into account the sound to other business toward contact when responding the pending data that third party is passed to
It answers, therefore, it is difficult to ensure that host equipment has enough I/O resources for responding pending data, and then is difficult to ensure encryption and decryption mistake
The whole efficiency of journey;On the other hand, since host equipment itself may have security risk, it is difficult to guarantee encryption process
Overall security.
It can be seen that a kind of encipher-decipher method is provided, while the whole efficiency for ensuring encryption process, to guarantee to add
The overall security of decrypting process is those skilled in the art's problem to be solved.
Summary of the invention
The object of the present invention is to provide a kind of encipher-decipher method, system, device and media, to ensure encryption process
While whole efficiency, guarantee the overall security of encryption process.
In order to solve the above technical problems, the present invention provides a kind of encipher-decipher method, it is applied to encryption apparatus, comprising:
The incoming pending data of third party device is received by network interface;
Encryption and decryption processing is carried out to pending data, generates result data;
Result data is transmitted to third party device by network interface.
Preferably, encryption and decryption processing is being carried out to pending data, before generating result data, this method comprises:
The incoming encryption and decryption requirement command of third party device is received by network interface;
Correspondingly, carrying out encryption and decryption processing to pending data, generating result data includes:
Enciphering and deciphering algorithm corresponding with encryption and decryption requirement command is called to carry out plus solve pending data by main control chip
Close processing generates result data.
Preferably, by main control chip call corresponding with encryption and decryption requirement command enciphering and deciphering algorithm to pending data into
The processing of row encryption and decryption, generating result data includes:
Call enciphering and deciphering algorithm corresponding with encryption and decryption requirement command to number to be processed by CPU or DSP or FPGA or ARM
According to encryption and decryption processing is carried out, result data is generated.
Preferably, encryption apparatus is based on PCI-E interface by host equipment powered operation.
Preferably, encryption apparatus is based on external power interface powered operation.
In addition, the present invention also provides a kind of encrypting and deciphering systems, comprising:
Data afferent module, for receiving the incoming pending data of third party device by network interface;
Data processing module generates result data for carrying out encryption and decryption processing to pending data;
Data spread out of module, for result data to be transmitted to third party device by network interface.
In addition, the present invention also provides a kind of encryption apparatus, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned encipher-decipher method.
In addition, being stored with meter on computer readable storage medium the present invention also provides a kind of computer readable storage medium
Calculation machine program is realized when computer program is executed by processor such as the step of above-mentioned encipher-decipher method.
Encipher-decipher method provided by the present invention is applied to encryption apparatus, is passed first by network interface interface third party device
The pending data entered, and then corresponding encryption and decryption processing is carried out to pending data, result data is generated, finally by number of results
It is back in third party device according to by the network interface.It is passed to since this method receives third party device by the network interface of encryption apparatus
Pending data, and the result data after encryption and decryption is returned into third party device by network interface, without by host equipment into
The transmitting of row data, therefore the I/O resource of host equipment can will not influence being normally carried out for encryption process with degree, it is ensured that
The whole efficiency of encryption process, in addition, due to the data not being related between host equipment and encryption apparatus in encryption process
Interaction, therefore encryption apparatus not will receive the influence of host equipment security risk that may be present itself, it is opposite to ensure plus solve
The overall security of close process.In addition, beneficial effect is same as above institute the present invention also provides a kind of encrypting and deciphering system, device and medium
It states.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly, attached drawing needed in the embodiment will be done simply below
It introduces, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill people
For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the encipher-decipher method applied to encryption apparatus provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another encipher-decipher method provided in an embodiment of the present invention;
Fig. 3 is a kind of structure chart of encrypting and deciphering system provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are without making creative work, obtained every other
Embodiment belongs to the scope of the present invention.
Core of the invention is to provide a kind of encipher-decipher method, with while the whole efficiency for ensuring encryption process,
Guarantee the overall security of encryption process.Another core of the invention is to provide a kind of encrypting and deciphering system, device and medium.
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.
Embodiment one
Fig. 1 is a kind of flow chart of the encipher-decipher method applied to encryption apparatus provided in an embodiment of the present invention.It please refers to
The specific steps of Fig. 1, the encipher-decipher method applied to encryption apparatus include:
Step S10: the incoming pending data of third party device is received by network interface.
It should be noted that the encryption apparatus that focuses on of this step is passed to by the approach reception third party device of network interface
Pending data, that is to say, that third party device pending data is directly passed to by way of telecommunication to password fill
It sets and is handled, do not need to first pass through host equipment and receive the incoming pending data of third party device, then by number to be processed
According to being transmitted to encryption apparatus by way of bus.Wherein, encryption apparatus is can be incited somebody to action by executing certain encryption and decryption fortune-telling
Clear data is encrypted as ciphertext data, or is the device of clear data by ciphertext data deciphering, not according to actual use scene
Together, the over all Integration degree of encryption apparatus is there is also difference, and it may be single-chip microcontroller that specific form, which can be chip, due to being used for
The encryption apparatus for carrying out encryption and decryption to data belongs to technique device known in those skilled in the art, and emphasis of the invention
It is not the improvement carried out to encryption apparatus, therefore the function realization principle of encryption apparatus is not repeated herein, and not right
The concrete type of encryption apparatus is specifically limited;In addition, third party device is pair of the carried out encryption and decryption service of encryption apparatus
As.
Step S11: encryption and decryption processing is carried out to pending data, generates result data.
Carrying out encrypting and decrypting processing to pending data in this step is carried out in accordance with the set working principle of encryption apparatus,
Specific encryption and decryption treatment process is not specifically limited herein.
Step S12: result data is transmitted to third party device by network interface.
After carrying out encryption and decryption processing to pending data, the result data of generation is transmitted back to third party still through network interface
Equipment completes data encrypting and deciphering service of the encryption apparatus to third party device with this.
Encipher-decipher method provided by the present invention is applied to encryption apparatus, is passed first by network interface interface third party device
The pending data entered, and then corresponding encryption and decryption processing is carried out to pending data, result data is generated, finally by number of results
It is back in third party device according to by the network interface.It is passed to since this method receives third party device by the network interface of encryption apparatus
Pending data, and the result data after encryption and decryption is returned into third party device by network interface, without by host equipment into
The transmitting of row data, therefore the I/O resource of host equipment can will not influence being normally carried out for encryption process with degree, it is ensured that
The whole efficiency of encryption process, in addition, due to the data not being related between host equipment and encryption apparatus in encryption process
Interaction, therefore encryption apparatus not will receive the influence of host equipment security risk that may be present itself, it is opposite to ensure plus solve
The overall security of close process.
Embodiment two
On the basis of the above embodiments, the present invention also provides a series of preferred embodiments.
Fig. 2 is the flow chart of another encipher-decipher method provided in an embodiment of the present invention.Step S10 and step in Fig. 2
S12 is identical as Fig. 1, and details are not described herein.
As shown in Fig. 2, as a preferred embodiment, before step S11, this method comprises:
Step S20: the incoming encryption and decryption requirement command of third party device is received by network interface.
It should be noted that due to consideration that encryption and decryption mode required for third party device may be different, therefore connecing
After third party device is received by the incoming pending data of network interface, and before carrying out encryption and decryption processing to pending data,
Need further to receive the incoming encryption and decryption requirement command of third party device, encryption and decryption requirement command characterization, third party sets
For concrete mode used when requiring encryption apparatus to pending data progress encryption and decryption, that is to say, that in encryption apparatus pair
When the incoming pending data of third party device carries out encryption and decryption processing, the encryption and decryption requirement command according to third party device is needed
It carries out.
Correspondingly, step S11 includes:
Step S21: call enciphering and deciphering algorithm corresponding with encryption and decryption requirement command to pending data by main control chip
Encryption and decryption processing is carried out, result data is generated.
Main control chip in this step is equivalent to the controller of encryption apparatus, has certain operational capability, is receiving
When the incoming encryption and decryption requirement command of third party device and pending data, by main control chip according to decryption requirement command tune
Used concrete mode, carries out encryption and decryption to pending data with this when with corresponding enciphering and deciphering algorithm, i.e. progress encryption and decryption
Processing generates result data.In present embodiment, encryption apparatus is treated according to the encryption and decryption requirement command that third party device is passed to
It handles data and carries out encryption and decryption processing, it is opposite to ensure the overall flexibility that encryption and decryption operation is carried out for pending data.
On the basis of the above embodiment, as a preferred embodiment, being called by main control chip and adding solution
The corresponding enciphering and deciphering algorithm of close requirement command carries out encryption and decryption processing to pending data, generates result data and includes:
Call enciphering and deciphering algorithm corresponding with encryption and decryption requirement command to number to be processed by CPU or DSP or FPGA or ARM
According to encryption and decryption processing is carried out, result data is generated.
It should be noted that CPU (central processing unit, Central Processing Unit) is one piece ultra-large
Integrated circuit, its function are mainly response computation instruction and processing data.It being capable of more flexible response third by CPU
The incoming encryption and decryption requirement command of method, apparatus, and call enciphering and deciphering algorithm corresponding with encryption and decryption requirement command to pending data
Encryption and decryption processing is carried out, result data, the opposite whole efficiency improved when carrying out encryption and decryption to pending data are generated.
DSP (digital singnal processor) is a kind of unique microprocessor, there is the complete instruction system of oneself
System, is the device that bulk information is handled with digital signal.One digital signal processor includes in one piece of little chip
There are control unit, arithmetic element, various registers and a certain number of storage units etc., if can also connect in its periphery
Dry memory, and can be communicated with each other with a certain number of external equipments, there is the full functionality of soft and hardware, itself is a
Microcomputer.It can just can be taken off next instruction while executing a upper instruction, and be decoded, this is greatly
Improve the speed of microprocessor.In addition also allow to be transmitted between the program space and data space, because increasing device
The flexibility of part, being capable of the opposite execution efficiency for improving encryption and decryption.
FPGA (Field-Programmable Gate Array), i.e. field programmable gate array, have quick finished product,
The features such as scalability is high and at low cost, reduces the cost of implementation and expansion efficiency of encryption and decryption.
ARM (Advanced RISC Machine) is capable of providing 16 and 32 arithmetic operation capabilities of enhancing, improves
Efficiency and flexibility when encryption and decryption executes.
On the basis of a series of above-mentioned embodiments, as a preferred embodiment, encryption apparatus is based on PCI-E
Interface is by host equipment powered operation.
In present embodiment, encryption apparatus be based on PCI-E interface connect with host equipment, and then be based on PCI-E interface by
Host equipment powered operation can be direct since current password device has had the PCI-E interface connecting with host equipment
It is powered by PCI-E interface from host equipment to encryption apparatus, and then supports the work of encryption apparatus, ensuring powered stable
While property, without adding new power supply interface, reduce the design overhead for encryption apparatus.
On the basis of a series of above-mentioned embodiments, as a preferred embodiment, encryption apparatus is based on outside
Power interface powered operation.
In present embodiment, encryption apparatus is based on external power interface powered operation, therefore encryption apparatus can be detached from master
Machine equipment is completely independent work, the opposite independence for improving encryption apparatus.
Embodiment three
Hereinbefore the embodiment of encipher-decipher method is described in detail, the present invention also provides a kind of and party
The corresponding encrypting and deciphering system of method, since the embodiment of components of system as directed is corresponded to each other with the embodiment of method part, Account Dept
The embodiment divided refers to the description of the embodiment of method part, wouldn't repeat here.
Fig. 3 is a kind of structure chart of encrypting and deciphering system provided in an embodiment of the present invention.Provided in an embodiment of the present invention plus solution
Close system, comprising:
Data afferent module 10, for receiving the incoming pending data of third party device by network interface.
Data processing module 11 generates result data for carrying out encryption and decryption processing to pending data.
Data spread out of module 12, for result data to be transmitted to third party device by network interface.
Encrypting and deciphering system provided by the present invention is applied to encryption apparatus, is passed first by network interface interface third party device
The pending data entered, and then corresponding encryption and decryption processing is carried out to pending data, result data is generated, finally by number of results
It is back in third party device according to by the network interface.It is passed to since this system receives third party device by the network interface of encryption apparatus
Pending data, and the result data after encryption and decryption is returned into third party device by network interface, without by host equipment into
The transmitting of row data, therefore the I/O resource of host equipment can will not influence being normally carried out for encryption process with degree, it is ensured that
The whole efficiency of encryption process, in addition, due to the data not being related between host equipment and encryption apparatus in encryption process
Interaction, therefore encryption apparatus not will receive the influence of host equipment security risk that may be present itself, it is opposite to ensure plus solve
The overall security of close process.
Example IV
The present invention also provides a kind of encryption apparatus, comprising:
Memory, for storing computer program;
Processor is realized when for executing computer program such as the step of above-mentioned encipher-decipher method.
Ciphering and deciphering device provided by the present invention, the pending data being passed to first by network interface interface third party device,
And then corresponding encryption and decryption processing is carried out to pending data, result data is generated, finally returns result data by the network interface
It is back in third party device.Since the present apparatus receives the incoming pending data of third party device by the network interface of encryption apparatus,
And the result data after encryption and decryption is returned into third party device by network interface, without carrying out the transmitting of data by host equipment,
Therefore the I/O resource of host equipment can will not influence being normally carried out for encryption process with degree, it is ensured that encryption process it is whole
Body efficiency, in addition, due to the data interaction not being related between host equipment and encryption apparatus in encryption process, password dress
The influence that not will receive host equipment security risk that may be present itself is set, the opposite general safety for ensuring encryption process
Property.
In addition, being stored with meter on computer readable storage medium the present invention also provides a kind of computer readable storage medium
Calculation machine program is realized when computer program is executed by processor such as the step of above-mentioned encipher-decipher method.
Computer readable storage medium provided by the present invention is passed by network interface interface third party device first at runtime
The pending data entered, and then corresponding encryption and decryption processing is carried out to pending data, result data is generated, finally by number of results
It is back in third party device according to by the network interface.Since this computer readable storage medium is received by the network interface of encryption apparatus
The incoming pending data of third party device, and the result data after encryption and decryption is returned into third party device by network interface, it is not necessarily to
The transmitting of data is carried out by host equipment, therefore the I/O resource of host equipment can will not influence encryption process with degree just
Often carry out, it is ensured that the whole efficiency of encryption process, in addition, being filled due to not being related to host equipment and password in encryption process
Data interaction between setting, therefore encryption apparatus not will receive the influence of host equipment security risk that may be present itself, phase
To the overall security for ensuring encryption process.
A kind of encipher-decipher method provided by the present invention, system, device and medium are described in detail above.Explanation
Each embodiment is described in a progressive manner in book, the highlights of each of the examples are it is different from other embodiments it
Place, the same or similar parts in each embodiment may refer to each other.For the device disclosed in the embodiment, due to itself and reality
It is corresponding to apply method disclosed in example, so being described relatively simple, reference may be made to the description of the method.It should refer to
It out, for those skilled in the art, without departing from the principle of the present invention, can also be to the present invention
Some improvement and modification can also be carried out, and these improvements and modifications also fall within the scope of protection of the claims of the present invention.
It should also be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (8)
1. a kind of encipher-decipher method, which is characterized in that be applied to encryption apparatus, comprising:
The incoming pending data of third party device is received by network interface;
Encryption and decryption processing is carried out to the pending data, generates result data;
The result data is transmitted to the third party device by the network interface.
2. encipher-decipher method according to claim 1, which is characterized in that the pending data is carried out plus solved described
Close processing, before generating result data, this method comprises:
The incoming encryption and decryption requirement command of third party device is received by the network interface;
Correspondingly, described carry out encryption and decryption processing to the pending data, generating result data includes:
Enciphering and deciphering algorithm corresponding with the encryption and decryption requirement command is called to carry out the pending data by main control chip
The encryption and decryption processing, generates the result data.
3. encipher-decipher method according to claim 2, which is characterized in that described to be called and described plus solution by main control chip
The corresponding enciphering and deciphering algorithm of close requirement command carries out the encryption and decryption processing to the pending data, generates the result data
Include:
Call the enciphering and deciphering algorithm corresponding with the encryption and decryption requirement command to described by CPU or DSP or FPGA or ARM
Pending data carries out the encryption and decryption processing, generates the result data.
4. according to claim 1 to encipher-decipher method described in 3 any one, which is characterized in that the encryption apparatus is based on
PCI-E interface is by host equipment powered operation.
5. according to claim 1 to encipher-decipher method described in 3 any one, which is characterized in that the encryption apparatus is based on outer
Portion's power interface powered operation.
6. a kind of encrypting and deciphering system characterized by comprising
Data afferent module, for receiving the incoming pending data of third party device by network interface;
Data processing module generates result data for carrying out encryption and decryption processing to the pending data;
Data spread out of module, for the result data to be transmitted to the third party device by the network interface.
7. a kind of encryption apparatus characterized by comprising
Memory, for storing computer program;
Processor is realized when for executing the computer program such as encipher-decipher method as claimed in any one of claims 1 to 6
Step.
8. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the step such as encipher-decipher method as claimed in any one of claims 1 to 6 when the computer program is executed by processor
Suddenly.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910276974.5A CN110012014A (en) | 2019-04-08 | 2019-04-08 | A kind of encipher-decipher method, system, device and medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910276974.5A CN110012014A (en) | 2019-04-08 | 2019-04-08 | A kind of encipher-decipher method, system, device and medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110012014A true CN110012014A (en) | 2019-07-12 |
Family
ID=67170251
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910276974.5A Pending CN110012014A (en) | 2019-04-08 | 2019-04-08 | A kind of encipher-decipher method, system, device and medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110012014A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113542309A (en) * | 2021-09-16 | 2021-10-22 | 渔翁信息技术股份有限公司 | Data processing system and method |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030046563A1 (en) * | 2001-08-16 | 2003-03-06 | Dallas Semiconductor | Encryption-based security protection for processors |
| CN102082660A (en) * | 2010-11-17 | 2011-06-01 | 北京曙光天演信息技术有限公司 | Method for implementing network communication on encryption card and encryption card with network interface |
| CN201993768U (en) * | 2010-11-17 | 2011-09-28 | 北京曙光天演信息技术有限公司 | Encryption card with network interfaces |
| CN102882856A (en) * | 2012-09-10 | 2013-01-16 | 广东电网公司电力科学研究院 | Terminal password device based on system on chip (SoC) |
| CN202872813U (en) * | 2012-08-17 | 2013-04-10 | 中国电力科学研究院 | Novel dual-network interface security access terminal |
| CN203982391U (en) * | 2013-10-31 | 2014-12-03 | 中国大唐集团财务有限公司 | A kind of PCI-E encrypted card with network interface |
| CN204066121U (en) * | 2013-10-31 | 2014-12-31 | 中国大唐集团财务有限公司 | A kind of PCI-E encrypted card |
| CN109104275A (en) * | 2018-07-28 | 2018-12-28 | 杭州电子科技大学 | A kind of HSM equipment |
| CN109325356A (en) * | 2018-07-28 | 2019-02-12 | 杭州电子科技大学 | An encryption card architecture |
-
2019
- 2019-04-08 CN CN201910276974.5A patent/CN110012014A/en active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030046563A1 (en) * | 2001-08-16 | 2003-03-06 | Dallas Semiconductor | Encryption-based security protection for processors |
| CN102082660A (en) * | 2010-11-17 | 2011-06-01 | 北京曙光天演信息技术有限公司 | Method for implementing network communication on encryption card and encryption card with network interface |
| CN201993768U (en) * | 2010-11-17 | 2011-09-28 | 北京曙光天演信息技术有限公司 | Encryption card with network interfaces |
| CN202872813U (en) * | 2012-08-17 | 2013-04-10 | 中国电力科学研究院 | Novel dual-network interface security access terminal |
| CN102882856A (en) * | 2012-09-10 | 2013-01-16 | 广东电网公司电力科学研究院 | Terminal password device based on system on chip (SoC) |
| CN203982391U (en) * | 2013-10-31 | 2014-12-03 | 中国大唐集团财务有限公司 | A kind of PCI-E encrypted card with network interface |
| CN204066121U (en) * | 2013-10-31 | 2014-12-31 | 中国大唐集团财务有限公司 | A kind of PCI-E encrypted card |
| CN109104275A (en) * | 2018-07-28 | 2018-12-28 | 杭州电子科技大学 | A kind of HSM equipment |
| CN109325356A (en) * | 2018-07-28 | 2019-02-12 | 杭州电子科技大学 | An encryption card architecture |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113542309A (en) * | 2021-09-16 | 2021-10-22 | 渔翁信息技术股份有限公司 | Data processing system and method |
| CN113542309B (en) * | 2021-09-16 | 2022-01-11 | 渔翁信息技术股份有限公司 | Data processing system and method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP3319032B1 (en) | Method for processing data, wearable electronic equipment and system | |
| CN109726598A (en) | Embedded-type security encryption chip based on Cloud Server | |
| CN109145568A (en) | A kind of full algorithm cipher card and its encryption method based on PCI-E interface | |
| JPH10320191A (en) | Programmable cipher processing system and its method | |
| JP7775382B2 (en) | Communication method and device | |
| CN109104275A (en) | A kind of HSM equipment | |
| CN114035907B (en) | Privacy computing system based on super computing center Slurm job scheduling and secure virtual machine container | |
| CN105306576A (en) | Scheduling method and system for password arithmetic units | |
| CN108829529A (en) | Virutal machine memory sharing method, device, computer equipment and storage medium | |
| CN110889123A (en) | Authentication method, key pair processing method, device and readable storage medium | |
| JP2023533319A (en) | FIRMWARE DATA VERIFICATION APPARATUS AND METHOD AND FIRMWARE UPDATE APPARATUS, METHOD AND SYSTEM | |
| CN112749812A (en) | Joint learning system, training result aggregation method and equipment | |
| CN107426193A (en) | For hardware-accelerated novel I/O paths design in a kind of https applications | |
| CN111787534A (en) | A data encryption and decryption method, device and electronic device | |
| CN107155184B (en) | WIFI module with secure encryption chip and communication method thereof | |
| CN110012014A (en) | A kind of encipher-decipher method, system, device and medium | |
| CN113572591B (en) | Real-time high-concurrency secure access device and access method for smart energy service system | |
| CN118337388B (en) | Data security protection method, system, equipment and product based on Internet of things | |
| CN103701589A (en) | Information transmission method and device based on virtual desktop system and relevant equipment | |
| CN106888448A (en) | Using method for down loading, safety element and terminal | |
| CN105654168B (en) | Embedded intelligence security module, secure hardware device, system and working method | |
| CN109450899A (en) | Key management method and device, electronic equipment, storage medium | |
| CN110708154B (en) | A virtual machine migration method, system, terminal and storage medium | |
| CN107979608A (en) | The data encrypting and deciphering Transmission system and transmission method that a kind of interface can configure | |
| CN116527257B (en) | Heterogeneous computing system and resource processing method based on same |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB02 | Change of applicant information | ||
| CB02 | Change of applicant information |
Address after: 264200 No. 12-1, Chuhe North Road, torch high tech Industrial Development Zone, Weihai City, Shandong Province Applicant after: Yuweng Information Technology Co.,Ltd. Address before: No.12, Chuhe North Road, gaoqu District, Weihai City, Shandong Province Applicant before: SHANDONG FISHERMAN INFORMATION TECHNOLOGY CO.,LTD. |
|
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190712 |