US 12,265,642 B2
Data encryption or decryption method, apparatus, and system
Mingming Zhu, Hangzhou (CN); Zhongkai Yang, Hangzhou (CN); Shiping Deng, Hangzhou (CN); and Weiyan Zheng, Hangzhou (CN)
Assigned to HUAWEI TECHNOLOGIES CO., LTD., Shenzhen (CN)
Filed by Huawei Technologies Co., Ltd., Shenzhen (CN)
Filed on Dec. 7, 2022, as Appl. No. 18/062,944.
Application 18/062,944 is a continuation of application No. PCT/CN2021/088551, filed on Apr. 21, 2021.
Claims priority of application No. 202010514307.9 (CN), filed on Jun. 8, 2020; and application No. 202011426126.7 (CN), filed on Dec. 9, 2020.
Prior Publication US 2023/0102374 A1, Mar. 30, 2023
Int. Cl. H04L 29/06 (2006.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01)
CPC G06F 21/6218 (2013.01) [G06F 21/602 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
obtaining a data processing request comprising to-be-processed data;
selecting one of a first processing manner and a second processing manner as a processing manner for the to-be-processed data based on a size of the to-be-processed data and a first parameter, wherein the first processing manner is to be performed by an encryption/decryption chip, wherein the second processing manner is to be performed by a software program running on a central processing unit, wherein the first parameter comprises an encryption delay or a decryption delay generated when a data block of a unit length is processed, and wherein selecting the processing manner comprises:
predicting a first processing delay and a second processing delay based on the size of the to-be-processed data and the first parameter, wherein the first parameter further comprises a third processing delay and a fourth processing delay, wherein the third processing delay is generated when the data block is processed using the first processing manner, wherein the fourth processing delay is generated when the data block is processed using the second processing manner, and wherein the first processing delay is generated when the to-be-processed data is processed using the first processing manner, and the second processing delay is generated when the to-be-processed data is processed using the second processing manner; and
selecting the processing manner based on a result of a comparison between the first processing delay and the second processing delay; and
performing an encryption operation or a decryption operation on the to-be-processed data based on the processing manner.