CN116070240B - Data encryption processing method and device of multi-chip calling mechanism - Google Patents

Data encryption processing method and device of multi-chip calling mechanism Download PDF

Info

Publication number
CN116070240B
CN116070240B CN202310081573.0A CN202310081573A CN116070240B CN 116070240 B CN116070240 B CN 116070240B CN 202310081573 A CN202310081573 A CN 202310081573A CN 116070240 B CN116070240 B CN 116070240B
Authority
CN
China
Prior art keywords
data
encrypted
chip
security
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310081573.0A
Other languages
Chinese (zh)
Other versions
CN116070240A (en
Inventor
董文强
王亮
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202310081573.0A priority Critical patent/CN116070240B/en
Publication of CN116070240A publication Critical patent/CN116070240A/en
Application granted granted Critical
Publication of CN116070240B publication Critical patent/CN116070240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The embodiment of the invention discloses a data encryption processing method and a device of a multi-chip calling mechanism, wherein the method comprises the following steps: acquiring data to be encrypted, and determining the security level and transmission delay of the data to be encrypted; determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay; determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip; and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier. According to the scheme, the computing power capability is ensured, the overall processing power consumption can be reduced, and the data processing mechanism is optimized.

Description

Data encryption processing method and device of multi-chip calling mechanism
Technical Field
The embodiment of the application relates to the field of security chips, in particular to a data encryption processing method and device of a multi-chip calling mechanism.
Background
In order to improve information security, a security chip is generally integrated in a terminal device to perform encryption and decryption processing on data, so as to ensure that the data is embodied in a ciphertext form in the process of storage and transmission of the data, and ensure information privacy.
In the related art, as the data processing amount increases, there is a scheme of performing data arithmetic processing using multiple chips in one terminal device, such as performing encryption processing of data in parallel using multiple security chips. Although the data operation speed can be improved through the arrangement of hardware, how to perform multi-chip scheduling to ensure the calculation power and reduce the processing power consumption is a problem which needs to be solved at present.
Disclosure of Invention
The embodiment of the invention provides a data encryption processing method and device of a multi-chip calling mechanism, which can reduce the overall processing power consumption and optimize the data processing mechanism while ensuring the computing power capability.
In a first aspect, an embodiment of the present invention provides a data encryption processing method for a multi-chip calling mechanism, where the method includes:
acquiring data to be encrypted, and determining the security level and transmission delay of the data to be encrypted;
determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay;
determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip;
and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier.
Optionally, the determining the security level and the transmission delay of the data to be encrypted includes:
determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link;
and determining the transmission time delay of the data to be encrypted according to the data stored in the current cache queue and the time delay parameter of the opposite terminal equipment.
Optionally, the determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link includes:
determining that the security level of the data to be encrypted is a first security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is low;
determining that the security level of the data to be encrypted is a second security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is high;
determining that the security level of the data to be encrypted is a third security level under the condition that the type of the data to be encrypted is a non-private data type and the security of a current transmission link is low;
and under the condition that the type of the data to be encrypted is a non-private data type and the security of the current transmission link is high, determining the security level of the data to be encrypted to be a fourth security level, wherein the security levels of the first security level, the second security level, the third security level and the fourth security level are sequentially reduced.
Optionally, the determining the transmission delay of the data to be encrypted according to the data stored in the current buffer queue and the delay parameter of the peer device includes:
determining processing time consumption according to the data stored in the current cache queue and the data processing speed;
and determining the transmission time delay of the data to be encrypted according to the time consumption of the processing and the time delay parameter of the opposite terminal equipment.
Optionally, the determining, according to the security level and the transmission delay, an algorithm parameter when the data to be encrypted is encrypted includes:
and determining the calculation force parameters of the data to be encrypted when the data to be encrypted is encrypted based on preset calculation force values corresponding to different preset security levels and different transmission delays.
Optionally, the determining the chip identifier based on the computing power parameter and the processing computing power of each chip includes:
calculating the chips required by completing the calculation parameters according to the processing calculation forces of the chips;
and selecting a chip identifier corresponding to the required chip.
Optionally, the encrypting the data to be encrypted by using the security chip corresponding to the chip identifier includes:
creating a data processing queue for the security chip corresponding to each chip identifier;
and respectively adding different sub-data in the data to be encrypted into each data processing, and carrying out encryption processing of the corresponding data processing queue data through the corresponding security chip.
In a second aspect, an embodiment of the present invention further provides a data encryption processing apparatus of a multi-chip calling mechanism, including:
the system comprises a grade time delay determining module, a data processing module and a data processing module, wherein the grade time delay determining module is configured to acquire data to be encrypted and determine the security grade and the transmission time delay of the data to be encrypted;
the calculation force parameter determining module is configured to determine calculation force parameters when the data to be encrypted are encrypted according to the security level and the transmission delay;
the identification determining module is configured to determine chip identifications based on the calculation force parameters and the processing calculation force of each chip;
and the encryption processing module is configured to carry out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier.
In a third aspect, an embodiment of the present invention further provides a data encryption processing device of a multi-chip calling mechanism, where the device includes:
one or more processors;
a data encryption processing means storing a multi-chip call mechanism for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the data encryption processing method of the multi-chip calling mechanism according to the embodiment of the present invention.
In a fourth aspect, embodiments of the present invention further provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a data encryption processing method of the multi-chip calling mechanism according to the embodiments of the present invention.
In a fifth aspect, the embodiments of the present application further provide a computer program product, where the computer program product includes a computer program, where the computer program is stored in a computer readable storage medium, and where at least one processor of the device reads and executes the computer program from the computer readable storage medium, so that the device performs the data encryption processing method of the multi-chip calling mechanism described in the embodiments of the present application.
In the embodiment of the invention, the security level and the transmission time delay of the data to be encrypted are determined by acquiring the data to be encrypted; determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay; determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip; and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier. According to the scheme, the computing power capability is ensured, the overall processing power consumption can be reduced, and the data processing mechanism is optimized.
Drawings
FIG. 1 is a flowchart of a data encryption processing method of a multi-chip call mechanism according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for determining a security level and a transmission delay of data to be encrypted according to an embodiment of the present application;
fig. 3 is a flowchart of a method for determining a transmission delay of data to be encrypted according to an embodiment of the present application;
FIG. 4 is a flowchart of a method for determining a chip identifier according to an embodiment of the present application;
FIG. 5 is a flowchart of another data encryption processing method of a multi-chip call mechanism according to an embodiment of the present invention;
FIG. 6 is a block diagram illustrating a data encryption processing apparatus with a multi-chip call mechanism according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a data encryption processing device with a multi-chip calling mechanism according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in further detail below with reference to the drawings and examples. It should be understood that the particular embodiments described herein are illustrative only and are not limiting of embodiments of the invention. It should be further noted that, for convenience of description, only some, but not all of the structures related to the embodiments of the present invention are shown in the drawings.
Fig. 1 is a flowchart of a data encryption processing method of a multi-chip calling mechanism according to an embodiment of the present invention, where an embodiment of the present application specifically includes the following steps:
step S101, obtaining data to be encrypted, and determining the security level and the transmission delay of the data to be encrypted.
In one embodiment, a data encryption module with a security chip first obtains data to be encrypted, where the data to be encrypted is data that needs to be encrypted. After the data to be encrypted is obtained, the corresponding security level and transmission delay are correspondingly determined. The security level is a set data security level, the security level has high and low scores, and the security level is relatively higher for important sensitive data. The transmission delay is a time interval parameter for transmitting the data to be encrypted to the opposite terminal equipment.
Optionally, fig. 2 is a flowchart of a method for determining a security level and a transmission delay of data to be encrypted according to an embodiment of the present application, where as shown in fig. 2, the method specifically includes:
step S1021, determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link.
In one embodiment, in determining the security level, it is determined based on the type of data to be encrypted and the security of the current transmission link. Alternatively, four different security levels may be preset, and the corresponding security levels may be determined based on different situations.
Specifically, it may be: and determining that the security level of the data to be encrypted is a first security level when the type of the data to be encrypted is a private data type and the security of the current transmission link is low, determining that the security level of the data to be encrypted is a second security level when the type of the data to be encrypted is a non-private data type and the security of the current transmission link is low, determining that the security level of the data to be encrypted is a third security level when the type of the data to be encrypted is a non-private data type and the security of the current transmission link is high, and determining that the security level of the data to be encrypted is a fourth security level when the type of the data to be encrypted is a private data type and the security of the current transmission link is high, wherein the security levels of the first security level, the second security level, the third security level and the fourth security level are sequentially reduced. The data types of the data to be encrypted are set as private data types for sensitive data waiting for encryption such as user names, passwords and face images, and the data types of the data waiting for encryption are set as non-private data types for some operation instruction data. The security of the transmission link can be divided according to the difference of public network connection and private network connection, for example, the security corresponding to the public network is low, and the security corresponding to the private wifi network requiring password verification is high.
Step S1022, determining the transmission delay of the data to be encrypted according to the data stored in the current buffer queue and the delay parameter of the opposite terminal equipment.
Optionally, fig. 3 is a flowchart of a method for determining a transmission delay of data to be encrypted according to an embodiment of the present application, as shown in fig. 3, specifically includes:
step S10221, determining the time consumption of processing according to the data stored in the current cache queue and the data processing speed.
When encryption processing of data to be encrypted is performed, the data to be encrypted is added to a buffer queue in advance, delay is performed when transmission corresponding to the current data to be encrypted is determined, processing time is determined based on the data stored in the current buffer queue and a data processing speed, for example, the stored data size is divided by the data processing speed to obtain the processing time, the data processing speed is the speed of performing encryption processing on the data in the buffer queue, the processing time is c, the data size of the buffer data is a Kb, the processing speed is b Kb/s, and the processing time c=a/b.
Step S10222, determining the transmission delay of the data to be encrypted according to the time consumption of the processing and the delay parameter of the opposite terminal equipment.
In one embodiment, after time consumption is obtained by calculation, the transmission time delay of the data to be encrypted is further determined based on the time delay parameter of the opposite terminal device, wherein the time delay parameter of the opposite terminal device characterizes the time delay which meets the interaction requirement and can be accepted by the opposite terminal device when the opposite terminal device performs data interaction with the current device, for example, after the opposite terminal device sends an instruction to the current device, the current device responds to the instruction, encrypts the obtained data to be encrypted and sends the encrypted data to the opposite terminal device, and the opposite terminal device sends the instruction to the time delay of the corresponding encrypted data. Optionally, the transmission delay corresponding to the data to be encrypted may be the time delay parameter value of the opposite terminal device minus the processing time, if the opposite terminal device receives the response data within 1 second, and the processing time is 0.2 second at this time, the transmission delay corresponding to the data to be encrypted is within 0.8 seconds, and the transmission time includes the time of encrypting the data to be encrypted and the unidirectional link transmission time.
And step S102, determining calculation force parameters when the data to be encrypted are encrypted according to the security level and the transmission delay.
In one embodiment, the computational power parameters in the encryption process used are determined based on the determined security level and the transmission delay. Alternatively, the calculation force parameters when the data to be encrypted is encrypted are determined based on preset calculation force values corresponding to different preset security levels and different transmission delays. Namely, after the security level and the specific transmission delay are determined, the corresponding table can be searched to obtain a corresponding preset calculation force value as a calculation force parameter for encrypting the data to be encrypted.
And step 103, determining a chip identifier based on the calculation force parameters and combining the processing calculation force of each chip, and performing encryption processing on the data to be encrypted by utilizing a security chip corresponding to the chip identifier.
In one embodiment, after the calculation power parameters are obtained, the chip identification is determined in combination with the processing calculation power of each chip. Alternatively, the calculation force parameter may be any integer value with a value of 10 to 20, and each security chip corresponds to a respective calculation force due to the difference of its corresponding encryption algorithm, encryption key and self calculation force architecture, and accordingly, each available security chip may be labeled with a corresponding calculation force, for example, five security chips are included, where the corresponding calculation forces are 4, 6, 8, 10 and 12, respectively.
In an embodiment, optionally, fig. 4 is a flowchart of a method for determining a chip identifier according to an embodiment of the present application, as shown in fig. 4, including:
step S1031, calculating the chips required by completing the calculation force parameters according to the processing calculation force of each chip.
Step S1032, selecting the chip identification corresponding to the required chip.
At this time, assuming that the calculation power parameter is 20 and includes five security chips, and the corresponding calculation powers are 4, 6, 8, 10 and 12, respectively, the security chip 3 and the security chip 12 may be used to form a processing combination of the calculation power with the calculation power parameter 20, and the corresponding determined security chips are identified as 3 and 12.
Correspondingly, after the used security chip is determined, the determined security chip can be utilized to encrypt the data to be encrypted.
From the above, the security level and the transmission delay of the data to be encrypted are determined by acquiring the data to be encrypted; determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay; determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip; and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier. According to the scheme, the computing power capability is ensured, the overall processing power consumption can be reduced, and the data processing mechanism is optimized.
Fig. 5 is a flowchart of another data encryption processing method of a multi-chip calling mechanism according to an embodiment of the present application, where, as shown in fig. 5, the method specifically includes:
step S201, obtaining data to be encrypted, and determining the security level and the transmission delay of the data to be encrypted.
And step S202, determining calculation force parameters when the data to be encrypted are encrypted according to the security level and the transmission delay.
Step S203, determining chip identifiers based on the calculation power parameters and the processing calculation power of each chip, respectively creating a data processing queue for the security chip corresponding to each chip identifier, respectively adding different sub-data in the data to be encrypted to each data processing, and performing encryption processing of the data of the corresponding data processing queue through the corresponding security chip.
In one embodiment, when the data to be encrypted is encrypted, further optimization is performed, a data processing queue is created for each determined chip, different sub-data in the data to be encrypted are respectively added into each data processing, and the encryption processing of the data of the corresponding data processing queue is performed through the corresponding security chip, so that the data processing efficiency is improved, and the data processing can be ensured to be completed in the corresponding transmission time delay and sent to the opposite terminal equipment for receiving.
From the above, the data to be encrypted is obtained, and the security level and the transmission delay of the data to be encrypted are determined; determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay; determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip; and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier. According to the scheme, the computing power capability is ensured, the overall processing power consumption can be reduced, and the data processing mechanism is optimized.
Fig. 6 is a block diagram of a data encryption processing device with a multi-chip calling mechanism according to an embodiment of the present invention, where the data encryption processing device with a multi-chip calling mechanism is used for executing the data encryption processing method with a multi-chip calling mechanism according to the foregoing data receiving end embodiment, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 6, the data encryption processing device of the multi-chip calling mechanism specifically includes:
the grade delay determining module 101 is configured to acquire data to be encrypted and determine the security grade and transmission delay of the data to be encrypted;
the computing power parameter determining module 102 is configured to determine computing power parameters when the data to be encrypted is encrypted according to the security level and the transmission delay;
an identification determination module 103 configured to determine a chip identification based on the calculation power parameters in combination with the processing calculation power of each chip;
and the encryption processing module 104 is configured to perform encryption processing on the data to be encrypted by using the security chip corresponding to the chip identifier.
According to the scheme, the data to be encrypted is obtained, and the security level and the transmission time delay of the data to be encrypted are determined; determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay; determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip; and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier. According to the scheme, the computing power capability is ensured, the overall processing power consumption can be reduced, and the data processing mechanism is optimized. The corresponding functions of the modules are exemplified as follows:
in one possible embodiment, the determining the security level and the transmission delay of the data to be encrypted includes:
determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link;
and determining the transmission time delay of the data to be encrypted according to the data stored in the current cache queue and the time delay parameter of the opposite terminal equipment.
In one possible embodiment, the determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link includes:
determining that the security level of the data to be encrypted is a first security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is low;
determining that the security level of the data to be encrypted is a second security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is high;
determining that the security level of the data to be encrypted is a third security level under the condition that the type of the data to be encrypted is a non-private data type and the security of a current transmission link is low;
and under the condition that the type of the data to be encrypted is a non-private data type and the security of the current transmission link is high, determining the security level of the data to be encrypted to be a fourth security level, wherein the security levels of the first security level, the second security level, the third security level and the fourth security level are sequentially reduced.
In one possible embodiment, the determining the transmission delay of the data to be encrypted according to the data stored in the current buffer queue and the delay parameter of the peer device includes:
determining processing time consumption according to the data stored in the current cache queue and the data processing speed;
and determining the transmission time delay of the data to be encrypted according to the time consumption of the processing and the time delay parameter of the opposite terminal equipment.
In one possible embodiment, the determining, according to the security level and the transmission delay, the calculation power parameter when encrypting the data to be encrypted includes:
and determining the calculation force parameters of the data to be encrypted when the data to be encrypted is encrypted based on preset calculation force values corresponding to different preset security levels and different transmission delays.
In one possible embodiment, the determining the chip identifier based on the computing power parameter in combination with the processing computing power of each chip includes:
calculating the chips required by completing the calculation parameters according to the processing calculation forces of the chips;
and selecting a chip identifier corresponding to the required chip.
In one possible embodiment, the encrypting the data to be encrypted by using the security chip corresponding to the chip identifier includes:
creating a data processing queue for the security chip corresponding to each chip identifier;
and respectively adding different sub-data in the data to be encrypted into each data processing, and carrying out encryption processing of the corresponding data processing queue data through the corresponding security chip.
Fig. 7 is a schematic structural diagram of a data encryption processing device with a multi-chip calling mechanism according to an embodiment of the present invention, where, as shown in fig. 7, the device includes a processor 201, a memory 202, an input device 203, and an output device 204; the number of processors 201 in the device may be one or more, one processor 201 being taken as an example in fig. 7; the processor 201, memory 202, input devices 203, and output devices 204 in the apparatus may be connected by a bus or other means, for example in fig. 7. The memory 202 is used as a computer readable storage medium for storing software programs, computer executable programs and modules, such as program instructions/modules corresponding to the data encryption processing method of the multi-chip calling mechanism in the embodiment of the invention. The processor 201 executes various functional applications of the device and data processing, that is, a data encryption processing method implementing the above-described multi-chip calling mechanism by running software programs, instructions, and modules stored in the memory 202. The input means 203 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the device. The output device 204 may include a display device such as a display screen.
Embodiments of the present invention also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are for performing a data encryption processing method of a multi-chip call mechanism, the method comprising:
acquiring data to be encrypted, and determining the security level and transmission delay of the data to be encrypted;
determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay;
determining a chip identification based on the calculation force parameters in combination with the processing calculation force of each chip;
and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments of the present invention may be implemented by software and necessary general purpose hardware, and of course may be implemented by hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk, or an optical disk of a computer, where the instructions include a number of instructions for causing a computer device (which may be a personal computer, a service, or a network device, etc.) to perform the method according to the embodiments of the present invention.
It should be noted that, in the embodiment of the data encryption processing apparatus of the multi-chip calling mechanism, each unit and module included are only divided according to the functional logic, but not limited to the above-mentioned division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the embodiments of the present invention.
In some possible implementations, various aspects of the methods provided herein may also be implemented in the form of a program product including program code for causing a computer device to perform the steps of the methods described herein above according to various exemplary embodiments of the application, when the program product is run on the computer device, e.g., the computer device may perform the data encryption processing method of the multi-chip invocation mechanism described in the examples herein. The program product may be implemented using any combination of one or more readable media.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the embodiments of the present invention are not limited to the particular embodiments described herein, but are capable of numerous obvious changes, rearrangements and substitutions without departing from the scope of the embodiments of the present invention. Therefore, while the embodiments of the present invention have been described in connection with the above embodiments, the embodiments of the present invention are not limited to the above embodiments, but may include many other equivalent embodiments without departing from the spirit of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.

Claims (7)

1. The data encryption processing method of the multi-chip calling mechanism is characterized by comprising the following steps:
acquiring data to be encrypted, and determining the security level and transmission delay of the data to be encrypted, wherein the transmission delay is the time interval for transmitting the data to be encrypted to opposite terminal equipment;
determining a calculation force parameter when the data to be encrypted are encrypted according to the security level and the transmission delay;
determining a chip identifier based on the calculation force parameters and the processing calculation force of each chip, wherein the method comprises the following steps: calculating the chips required by completing the calculation force parameters according to the processing calculation force of each chip, and selecting the chip identifiers corresponding to the required chips;
and carrying out encryption processing on the data to be encrypted by utilizing the security chip corresponding to the chip identifier, wherein the encryption processing comprises the following steps: creating a data processing queue for each security chip corresponding to the chip identifier, respectively adding different sub-data in the data to be encrypted into each data processing queue, and performing encryption processing on the data of the corresponding data processing queue through the corresponding security chip;
wherein the determining the security level and the transmission delay of the data to be encrypted includes: determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link; and determining the transmission time delay of the data to be encrypted according to the data stored in the current cache queue and the time delay parameter of the opposite terminal equipment.
2. The method for processing the data by the multi-chip call mechanism according to claim 1, wherein the determining the security level of the data to be encrypted according to the type of the data to be encrypted and the security of the current transmission link comprises:
determining that the security level of the data to be encrypted is a first security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is low;
determining that the security level of the data to be encrypted is a second security level under the condition that the type of the data to be encrypted is a private data type and the security of a current transmission link is high;
determining that the security level of the data to be encrypted is a third security level under the condition that the type of the data to be encrypted is a non-private data type and the security of a current transmission link is low;
and under the condition that the type of the data to be encrypted is a non-private data type and the security of the current transmission link is high, determining the security level of the data to be encrypted to be a fourth security level, wherein the security levels of the first security level, the second security level, the third security level and the fourth security level are sequentially reduced.
3. The method for processing data by using a multi-chip call mechanism according to claim 1, wherein determining the transmission delay of the data to be encrypted according to the data stored in the current buffer queue and the delay parameter of the peer device comprises:
determining processing time consumption according to the data stored in the current cache queue and the data processing speed;
and determining the transmission time delay of the data to be encrypted according to the time consumption of the processing and the time delay parameter of the opposite terminal equipment.
4. A method for processing data by encrypting a multi-chip call mechanism according to any one of claims 1 to 3, wherein said determining a calculation power parameter for encrypting said data to be encrypted according to said security level and said transmission delay comprises:
and determining the calculation force parameters of the data to be encrypted when the data to be encrypted is encrypted based on preset calculation force values corresponding to different preset security levels and different transmission delays.
5. A data encryption processing apparatus of a multichip call mechanism, comprising:
the system comprises a grade time delay determining module, a data processing module and a data processing module, wherein the grade time delay determining module is configured to acquire data to be encrypted, determine the security grade and the transmission time delay of the data to be encrypted, and determine the security grade of the data to be encrypted according to the type of the data to be encrypted and the security of a current transmission link; determining the transmission delay of the data to be encrypted according to the data stored in the current cache queue and the delay parameter of the opposite terminal equipment; the transmission delay is a time interval for sending the data to be encrypted to the opposite terminal equipment;
the calculation force parameter determining module is configured to determine calculation force parameters when the data to be encrypted are encrypted according to the security level and the transmission delay;
the identification determining module is configured to determine chip identifications based on the calculation force parameters and the processing calculation force of each chip, wherein the identification determining module comprises the steps of calculating the chips required by completing the calculation force parameters according to the processing calculation force of each chip, and selecting the chip identifications corresponding to the required chips;
the encryption processing module is configured to perform encryption processing on the data to be encrypted by using a security chip corresponding to the chip identifier, and comprises the following steps: and respectively creating a data processing queue for each security chip corresponding to the chip identifier, respectively adding different sub-data in the data to be encrypted into each data processing queue, and carrying out encryption processing on the data of the corresponding data processing queue through the corresponding security chip.
6. A data encryption processing apparatus of a multi-chip call mechanism, the apparatus comprising: one or more processors; a data encryption processing apparatus storing a multichip call mechanism for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the data encryption processing method of a multichip call mechanism as claimed in any one of claims 1 to 4.
7. A storage medium containing computer executable instructions which, when executed by a computer processor, are for performing a data encryption processing method of the multi-chip invocation mechanism of any of claims 1-4.
CN202310081573.0A 2023-02-03 2023-02-03 Data encryption processing method and device of multi-chip calling mechanism Active CN116070240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310081573.0A CN116070240B (en) 2023-02-03 2023-02-03 Data encryption processing method and device of multi-chip calling mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310081573.0A CN116070240B (en) 2023-02-03 2023-02-03 Data encryption processing method and device of multi-chip calling mechanism

Publications (2)

Publication Number Publication Date
CN116070240A CN116070240A (en) 2023-05-05
CN116070240B true CN116070240B (en) 2024-03-08

Family

ID=86178218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310081573.0A Active CN116070240B (en) 2023-02-03 2023-02-03 Data encryption processing method and device of multi-chip calling mechanism

Country Status (1)

Country Link
CN (1) CN116070240B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116865952B (en) * 2023-05-23 2024-02-20 江苏华存电子科技有限公司 Encryption management method and system for data

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10136384A1 (en) * 2001-07-26 2003-02-13 Hermann Puettmann Device for encryption of computer data that is to be transmitted over a network, etc. has a cryptographic unit comprising a multiplicity of chip modules to which data is supplied so that it can be encrypted prior to transmission
JP2006292921A (en) * 2005-04-08 2006-10-26 Canon Inc Encryption processor
CN101290569A (en) * 2008-05-06 2008-10-22 国网南京自动化研究院 Method for parallel data processing adopting multi- password chip
CN108491263A (en) * 2018-03-02 2018-09-04 珠海市魅族科技有限公司 Data processing method, data processing equipment, terminal and readable storage medium storing program for executing
CN109101338A (en) * 2018-07-26 2018-12-28 杭州华澜微电子股份有限公司 A kind of block chain processing framework and its method based on the extension of multichannel chip
CN110086751A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of 1,100,000,000 network cryptographic machine encipher-decipher methods of high speed, low time delay
CN112630630A (en) * 2020-11-30 2021-04-09 深圳比特微电子科技有限公司 Chip testing method, computing chip and digital currency mining machine
CN112740193A (en) * 2018-10-30 2021-04-30 北京比特大陆科技有限公司 Method for accelerating system execution operation of big data operation
CN112912743A (en) * 2018-12-07 2021-06-04 北京比特大陆科技有限公司 Computing power control method, device, equipment and storage medium
CN113515240A (en) * 2021-09-03 2021-10-19 西安紫光国芯半导体有限公司 Chip computing device and computing system
CN113836543A (en) * 2020-06-08 2021-12-24 华为技术有限公司 Method, device and system for encrypting or decrypting data
CN114915503A (en) * 2022-07-15 2022-08-16 广州万协通信息技术有限公司 Data stream splitting processing encryption method based on security chip and security chip device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10136384A1 (en) * 2001-07-26 2003-02-13 Hermann Puettmann Device for encryption of computer data that is to be transmitted over a network, etc. has a cryptographic unit comprising a multiplicity of chip modules to which data is supplied so that it can be encrypted prior to transmission
JP2006292921A (en) * 2005-04-08 2006-10-26 Canon Inc Encryption processor
CN101290569A (en) * 2008-05-06 2008-10-22 国网南京自动化研究院 Method for parallel data processing adopting multi- password chip
CN110086751A (en) * 2018-01-26 2019-08-02 北京数盾信息科技有限公司 A kind of 1,100,000,000 network cryptographic machine encipher-decipher methods of high speed, low time delay
CN108491263A (en) * 2018-03-02 2018-09-04 珠海市魅族科技有限公司 Data processing method, data processing equipment, terminal and readable storage medium storing program for executing
CN109101338A (en) * 2018-07-26 2018-12-28 杭州华澜微电子股份有限公司 A kind of block chain processing framework and its method based on the extension of multichannel chip
CN112740193A (en) * 2018-10-30 2021-04-30 北京比特大陆科技有限公司 Method for accelerating system execution operation of big data operation
CN112912743A (en) * 2018-12-07 2021-06-04 北京比特大陆科技有限公司 Computing power control method, device, equipment and storage medium
CN113836543A (en) * 2020-06-08 2021-12-24 华为技术有限公司 Method, device and system for encrypting or decrypting data
CN112630630A (en) * 2020-11-30 2021-04-09 深圳比特微电子科技有限公司 Chip testing method, computing chip and digital currency mining machine
CN113515240A (en) * 2021-09-03 2021-10-19 西安紫光国芯半导体有限公司 Chip computing device and computing system
CN114915503A (en) * 2022-07-15 2022-08-16 广州万协通信息技术有限公司 Data stream splitting processing encryption method based on security chip and security chip device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
密码服务器系统安全体系结构分析与研究;容晓峰;;西安工业大学学报(第04期);全文 *
高性能密码服务系统体系结构设计;容晓峰, 李增欣, 刘平, 周利华;吉林大学学报(信息科学版)(第04期);全文 *

Also Published As

Publication number Publication date
CN116070240A (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN115208701B (en) Data packet selective encryption method and device
CN116070240B (en) Data encryption processing method and device of multi-chip calling mechanism
WO2022161182A1 (en) Trusted computing method and apparatus based on data stream
WO2017006118A1 (en) Secure distributed encryption system and method
CN115208697A (en) Adaptive data encryption method and device based on attack behavior
CN107872315B (en) Data processing method and intelligent terminal
CN112765610A (en) Transaction scheduling method and device
Abd Elminaam et al. SMCACC: developing an efficient dynamic secure framework for mobile capabilities augmentation using cloud computing
CN115795522B (en) Multi-core concurrent high-speed cryptographic engine data processing method and device
CN115102701B (en) Multi-chip data encryption and decryption processing method and device
CN110716982A (en) Block chain real-time storage method and device, computer equipment and storage medium
CN115208570A (en) Encryption method and device based on dynamic replacement of secret key
CN113489706B (en) Data processing method, device, system, equipment and storage medium
CN114710288A (en) Network switch safety monitoring method, device and medium based on artificial intelligence
CN111190733A (en) Computing resource scheduling method and device for RSA (rivest Shamir Adleman) computation
Silva et al. Performance evaluation of cryptography on middleware-based computational offloading
CN112615712B (en) Data processing method, related device and computer program product
CN116049837B (en) Trusted computing system and method, electronic equipment and storage medium
CN115883200B (en) Log security management method, device, platform and medium
CN116527257B (en) Heterogeneous computing system and resource processing method based on same
CN111639354B (en) Data encryption method and device, data decryption method and device and electronic equipment
CN113468563B (en) Virtual machine data encryption method and device, computer equipment and storage medium
CN115516454B (en) Hardware security module and system
CN115801237A (en) Information encryption/decryption device, information encryption method, and information decryption method
CN117014434A (en) Data processing method, device, storage medium, electronic equipment and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant