Method and apparatus for dual hardware and software cryptography
First Claim
1. A method in a data processing system for executing cryptographic operations, the method comprising:
- responsive to a request to perform a cryptographic operation, selecting one of a software process and a hardware process for performing the cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process; and
performing the cryptographic operation using the selected process.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides a method, apparatus, and computer implemented instructions for executing cryptographic operations. Responsive to a request to perform a cryptographic operation, one (or more) of a software process and a hardware process is selected for performing the cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process. The cryptographic operation is performed using the selected process. Necessary object conversions, which is transparent to the application, is carried out in order to convert objects to usable forms of the selected process (es).
-
Citations
46 Claims
-
1. A method in a data processing system for executing cryptographic operations, the method comprising:
-
responsive to a request to perform a cryptographic operation, selecting one of a software process and a hardware process for performing the cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process; and
performing the cryptographic operation using the selected process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method in a data processing system for executing cryptography processes, the method comprising:
-
responsive to a request to perform a cryptographic operation, selecting from one of a software process and a hardware process for performing the cryptographic operation based on available resources to perform the cryptographic operation to form a selected process; and
performing the cryptographic operation using the selected process. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A data processing system comprising:
-
a bus system;
a communications unit connected to the bus, wherein data is sent and received using the communications unit;
a memory connected to the bus system, wherein a set of instructions are located in the memory; and
a processor unit connected to the bus system, wherein the processor unit executes the set of instructions to select one of a software process and a hardware process for performing the cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process in response to a request to perform a cryptographic operation; and
perform the cryptographic operation using the selected process. - View Dependent Claims (21, 22, 23, 24, 27, 28, 29, 30, 31, 32, 33, 34, 35, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
25. A data processing system comprising:
-
a bus system;
a communications unit connected to the bus, wherein data is sent and received using the communications unit;
a memory connected to the bus system, wherein a set of instructions are located in the memory; and
a processor unit connected to the bus system, wherein the processor unit executes the set of instructions to select from one of a software process and a hardware process for performing the cryptographic operation based on available resources to perform the cryptographic operation to form a selected process in response to a request to perform a cryptographic operation; and
perform the cryptographic operation using the selected process.
-
-
26. A data processing system for executing cryptographic operations, the data processing system comprising:
-
selecting means for selecting one of a software process and a hardware process for performing a cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process in response to a request to perform the cryptographic operation; and
performing means for performing the cryptographic operation using the selected process.
-
-
36. A data processing system for executing cryptography processes, the data processing system comprising:
-
selecting means for selecting from one of a software process and a hardware process for performing a cryptographic operation based on available resources to perform the cryptographic operation to form a selected process responsive to a request to perform the cryptographic operation; and
performing means for performing the cryptographic operation using the selected process.
-
-
45. A computer program product in a computer readable medium for executing cryptographic operations, the computer program product comprising:
-
first instructions, responsive to a request to perform a cryptographic operation, for selecting one of a software process and a hardware process for performing the cryptographic operation based on a policy which process results in a available resources to perform the cryptographic operation to form a selected process; and
second instructions for performing the cryptographic operation using the selected process.
-
-
46. A computer program product in a computer readable medium for executing cryptography processes, the method comprising:
-
first instructions, responsive to a request to perform a cryptographic operation, for selecting from one of a software process and a hardware process for performing the cryptographic operation based on available resources to perform the cryptographic operation to form a selected process; and
second instructions for performing the cryptographic operation using the selected process.
-
Specification