Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62results about How to "Avoid resource hogging" patented technology

Virtual machine system and safety control method thereof

The invention discloses a virtual machine system which comprises a management virtual machine, a virtual machine monitor, a client virtual machine and a safety virtual machine. The management virtual machine is used for authenticating the client virtual machine and sending an authenticated result to the virtual machine monitor. The virtual machine monitor is used for transmitting an access request sent from the client virtual machine to the management virtual machine. The authenticated result sent from the management virtual machine is transmitted to the client virtual machine. The authenticated result sent from the client virtual machine is transmitted to the safety virtual machine. According to access permission, physical resources are accessed and an access result is returned to the client virtual machine. The client virtual machine is used for sending the access request and the authenticated result to the virtual machine monitor. The safety virtual machine is used for issuing the access permission of the client virtual machine to the virtual machine monitor. The invention further discloses a safety control method of the virtual machine system. With the system and the method, workload of the virtual machine monitor can be lowered, the access permission of the client virtual machine can be flexibly controlled, and the access of the client virtual machine to the physical resources is effectively controlled.
Owner:ZTE CORP

Identity card information safety transmission method and system

The invention provides an identity card information safety transmission method and system. The method comprises the steps that a card reader receives a card reading instruction and then transmits a transmission secret key generation request to a background server; the background server generates and transmits a first random factor; the card reader carries out the signing of first to-be-signed data, generates first signature data, and transmits first authentication data; the background server carries out the verification of the validity of a digital certificate of the card reader; and the flow is ended if the verification is not passed. After the card reader receives the first random factor, a private key is used at once to sign the first random factor, and the first random factor is transmitted to the server, thereby enabling the background server to receive and verify the first authentication data in shortest time, improving the authentication efficiency of the background server for the card reader. Therefore, the background server instantly determines whether the card reader is legal at the initial stage of the mutual authentication of the card reader and the background server or not. The flow is ended if the card reader is illegal, thereby preventing illegal transaction from occupying resources of the background server.
Owner:TENDYRON CORP

Virtual machine process monitoring system and method

The invention provides a virtual machine process monitoring system and method. The system comprises management nodes, computing nodes and virtual machines, wherein the management nodes are used for receiving data information sent by all the computing nodes under a same cluster and issuing corresponding management instructions, the computing nodes are used for receiving and forwarding data information of all the virtual machines under the computing nodes and sending the instructions issued by the management nodes to the corresponding virtual machines, and the virtual machines are used for running all processes and sending the process states to the computing nodes corresponding to the virtual machines. The method comprises the steps that 1, process daemon modules are set on the virtual machines; 2, the process daemon modules send the process states to the computing nodes corresponding to the virtual machines; 3, the computing nodes receive the process states of the virtual machines and issue the management instructions according to the process states. One daemon process is added to each virtual machine so that it can be ensured that services of a user on the corresponding virtual machine run normally, and the reliability and high availability of the services are improved.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Implementation method of SM4-GCM network encryption transmission system based on FPGA

The invention relates to an SM4-GCM network encryption transmission system implementation method based on an FPGA, and the method comprises the following steps: S1, receiving required data from a data preparation module, and respectively sending a parameter and a secret key into a random number module and a secret key extension module to generate a corresponding random number and an extension secret key; S2, sending the random number and the plaintext into an encryption module for encryption; S3, sending the obtained ciphertext, key and random number to a message authentication module to generate an HMAC value; S4, during encryption/decryption, enabling the system to update a key required for the next time through an SM3 algorithm and a Pascal algorithm. According to the invention, the shake-128 algorithm in the Keccak is utilized to realize the generation of the random number, the security of the random number is improved, and the resource utilization rate and the working frequency of the random number are improved by optimizing the nonlinear transformation operation and the message authentication operation, so the method is more suitable for the environment of a high-speed network; the SM3 algorithm and the Pascal algorithm are utilized to realize the safe change of the secret key, and the GMAC module is combined to ensure the correctness of the system secret key update.
Owner:HANGZHOU DIANZI UNIV

Cross-domain computing task scheduling method and system based on intelligent perception

ActiveCN109960573AAvoid preemptionSolve the problem of low accuracy of scheduling decisionsProgram initiation/switchingResource allocationPattern perceptionTime complexity
The invention provides a cross-domain computing task scheduling method and system based on intelligent perception. The cross-domain computing task scheduling method comprises the steps of step 1, training a decision tree model based on label data; step 2, estimating and calculating the execution time of the task based on the relative time complexity; step 3, predicting a resource change trend index of each domain based on the resource historical record and an ARIMA algorithm; step 4, obtaining resource real-time state indexes of each domain by using a resource state interface; step 5, estimating migration time of the data migrated to each domain based on the available bandwidth; and step 6, deciding the task optimal execution domain based on the decision tree model and the comprehensive index. The trend prediction algorithm and the decision tree algorithm are creatively and comprehensively applied to the cross-domain computing task scheduling scene, the task resource preemption phenomenon is avoided, and the problem that the scheduling decision accuracy is low is solved; through the flow type machine learning technology, the performance problems of a trend prediction algorithm anda decision tree algorithm are solved, and the overall time of cross-domain computing task scheduling is greatly shortened.
Owner:TIANJIN NANKAI UNIV GENERAL DATA TECH

Method for transmitting Modbus RTU protocol in wide area network

The invention relates to the technical field of Internet of Things sensing equipment communication, in particular to a method for transmitting a Modbus RTU protocol in a wide area network, which is applied to a network in which a slave station is connected with a master station through a communication module, and comprises the steps that the communication module generates a self-defined registration message and sends the registration message to the master station, and the registration message comprises setting information of the communication module; the communication module is connected with a managed slave station address; after receiving the registration message, the master station records the setting information of the communication module and the address of the slave station connected and managed by the communication module, and establishes a link; and the master station and the slave station carry out transmission and interaction of the Modbus RTU protocol through the established link. According to the method, the Modbus RTU protocol is transmitted in the wide area network, the whole process is not limited by the fact that the slave station must have a fixed IP address, the protocol conversion process and a conversion module are omitted, the monitoring function cost of the Internet of Things sensing equipment is reduced, and the monitoring efficiency is improved.
Owner:CHINA COAL TECH & ENG GRP CHONGQING RES INST CO LTD +1

Information system based on vehicle-mounted terminal information, vehicle-mounted terminal and information processing method thereof

Provided are an information system based on vehicle-mounted terminal information, a vehicle-mounted terminal and an information processing method thereof. The vehicle-mounted terminal comprises a display unit suitable for displaying a first information interface based on information sent by a server, a request unit suitable for generating a display request requesting displaying of a second information interface based on the first information interface, an obtaining unit suitable for obtaining vehicle-mounted information comprising device information of vehicle-mounted devices and/or user information based on the display request and a control unit suitable for controlling the display unit to display the second information interface based on the vehicle-mounted information obtained by the obtaining unit, wherein the second information interface is used for generating feedback information for the information sent by the service terminal. According to the technical scheme, the problem that resources are occupied due to the fact that the vehicle-mounted terminal conducts feedback to the information sent by the service terminal repeatedly for a plurality of times is avoided. Accuracy of information feedback, to the service terminal, of the vehicle terminal is improved. Interactivity among the service terminal, the vehicle-mounted terminal and a user is also improved.
Owner:SHANGHAI PATEO ELECTRONIC EQUIPMENT MANUFACTURING CO LTD

Application downloading method, terminal, server, computer equipment and storage medium

The invention provides an application downloading method, a terminal, a server, computer equipment and a storage medium, and the method comprises the steps: obtaining file configuration information corresponding to at least two application file packages of a target application from a downloading configuration server in response to a file downloading trigger event for the target application; determining a to-be-downloaded target file package from the at least two application file packages based on the file configuration information and a shared file corresponding to a target application stored in the terminal equipment; downloading the target file package from the file resource server, wherein the at least two application file packages are obtained by performing file clustering on a plurality of application files of the target application according to a preset clustering condition. According to the application file downloading mode, the probability that the device downloads repeated files can be effectively reduced, the downloading speed can be increased, the downloading flow can be saved, the storage space of the device is effectively prevented from being occupied by repeated resources, and the running speed of the device can be increased.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Whole-disk copying method based on ISCSI (Internet Small Computer System Interface) and storage system

The invention provides a whole-disk copying method based on an ISCSI (Internet Small Computer System Interface) and a storage system. The whole-disk copying method comprises the following steps of: step S100: controlling a server to generate a whole-disk copying command cmd (N) by an IPSAN (Internet Protocol Storage Area Network), and sending the copying command cmd (N,s) to each driving ISCSI hard disk A (N,s) in an initiative ISCSI hard disk array A (N); and step 200: copying a set region to M driven ISCSI hard disks in a driven ISCSI hard disk array B (M) by each driving ISCSI hard disk A (N,s) according to the copying command cmd (N,s), wherein the setting regions of each driving ISCSI hard disk are different, and the setting regions of the N driving ISCSI hard disks A (N,s) are gathered into a whole disk. Each ISCSI hard disk is interconnected through an Ethernet switch and the adopted ISCIS hard disk has a data transmission and logic function so that the ISCIS hard disks can carry out port-to-port block-free communication through the Ethernet switch; the whole-disk copying of the data is realized under an instruction of an IPSAN control server; and the copying delaying and the resource occupation, which are caused by that the data is stored and transmitted by the IPSAN control server, are avoided.
Owner:BEIJING FORTUNET INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products