US 12,348,628 B2
Data processing method, apparatus, computer program, and storage medium
Weikun Lin, Shenzhen (CN); Zhiqiang Dong, Shenzhen (CN); Bin Li, Shenzhen (CN); and Shengli Ji, Shenzhen (CN)
Assigned to Tencent Technology (Shenzhen) Company Limited, Shenzhen (CN)
Filed by Tencent Technology (Shenzhen) Company Limited, Guangdong (CN)
Filed on Jun. 28, 2022, as Appl. No. 17/851,878.
Application 17/851,878 is a continuation of application No. PCT/CN2021/094022, filed on May 17, 2021.
Claims priority of application No. 202010615081.1 (CN), filed on Jun. 30, 2020.
Prior Publication US 2022/0329422 A1, Oct. 13, 2022
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01)
CPC H04L 9/0877 (2013.01) [H04L 9/0825 (2013.01); H04L 9/085 (2013.01); H04L 9/14 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A data processing method comprising:
receiving a data encryption request transmitted by a client comprising to-be-encrypted data and a first key identifier;
determining a current total service demand of a first hardware security module server cluster and a current total service demand of a second hardware security module server cluster, wherein the current total service demand is a sum of service demands of all servers in each of the respective first and second hardware security module server clusters, and wherein the service demand is a quantity of a key requesting service or a data encryption service;
determining a target hardware security module server cluster based on the hardware security module server cluster with a minimum total service demand;
determining a target hardware security module server of the target hardware security module server cluster;
transmitting the first key identifier to the target hardware security module server such that the target hardware security module server obtains a root key corresponding to the first key identifier and encrypts the root key to generate a master key;
receiving the master key transmitted by the target hardware security module server;
encrypting the master key to generate a data key; and,
encrypting the to-be-encrypted data using the data key to generate encrypted data.