Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

64results about How to "Solve the single point of failure problem" patented technology

Device networking authentication method based on blockchain

The invention discloses a device networking authentication method based on a blockchain for solving the single point failure problem existing in the current networking authentication method. The technical scheme is to deploy a blockchain network comprising a client, a submission node and a consensus node. By means of the non-tampering property of the blockchain, a device firstly registers on the blockchain before accessing the network, when the device A needs to access the network, the device sends a networking request of a device B that has accessed to the network, the device B compares the information of the device A in the networking request with the information of the device A stored in the blockchain to judge whether the identity of the device A is legal, a smart contract issues a token to the device A, a timestamp in the token ensures that the device A is valid within a certain period of time, and after the token expires, the device A needs to pass the identity authentication toaccess the network again. By adoption of the device networking authentication method disclosed by the invention, the single point failure problem existing in the traditional networking authenticationmethod can be avoided, the legality of the identity of the device is ensured, and the security of the network is improved.
Owner:NAT UNIV OF DEFENSE TECH

Distributed file system facing to cloud storage

InactiveCN102420854AImprove parallel processing performanceOvercoming high load problemsTransmissionSpecial data processing applicationsSingle pointMetadata service
The invention provides a distributed file system facing to cloud storage, mainly aiming at solving the problem that the existing cloud storage system is low in performance and reliability, high in load and invalid in a single point. The system comprises a block data service layer, a metadata service layer and an application client layer, wherein the metadata service layer replaces single metadata server in a global file system (GFS) by a plurality of agent servers, and forms into peer-to-peer type service network by adopting peer-to-peer P2P network configuration; the interaction among three layers of the system comprises the following steps: the application client layer requests to write to the metadata service layer, and the metadata service layer returns block data server information; and the client layer writes the file into the block data service layer and performs the redundancy backups according to a returned result, and the metadata service layer generates metadata according to a backups result and updates local metadata and a vector clock. Therefore, the performance and the business support capacity of the existing cloud storage system can be enhanced, and the system can be used for designing and optimizing the high-performance and high-reliability cloud storage system.
Owner:XIDIAN UNIV

Parallel execution method and device for timed task on multiple servers

The invention provides a parallel execution method and device for a timed task on multiple servers. The uniform configuration of server nodes can be realized, limited calculation resources are fully utilized, the atomicity of a task is supported and guaranteed, operation and maintenance cost is reduced, the problem of single point failure is solved, the stagnation of service due to the single point failure is avoided, no manual intervention is required when the server crashes, the splitting of a large task is supported, application developers only need to pay attention to specific business development, and availability and expansibility are good. The parallel execution method for the timed task on the multiple servers comprises the following steps that: receiving the attendance request ofa task living example submitted by each server node, carrying out attendance on the task living example according to a preset rule, adding the task living example which is subjected to successful attendance to a task execution list to enable the corresponding server to execute the task living example; and polling the execution state of each task living example in the task execution list, signing out the task living example which finishes being executed, and removing the task living example from the task execution list.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Centralized service based distributed peer-to-peer network implementing method and system

The invention relates to a distributed peer-to-peer network based on concentration service and a construction method thereof, wherein, the method includes the following steps: (1) establishing a concentration server for the peer-to-peer network, which is used for adding the peer-to-peer network for a new node and providing service for the exit of the peer-to-peer network and defining a data structure of a B plus tree for the server so as to save the information on a dynamic and variable node; (2) adopting a new node to search a direct neighbor through a concentration server or search the direct neighbor in a virtual link from a peer node and add the direct neighbor into a peer-to-peer network ; (3) applying a boundary node (a peer node with a precursor or a successor exiting from the direct neighbor) to search a direct precursor or a successor neighbor through the concentration server or search the direct precursor or the successor neighbor in the virtual link from the node, so as to maintain ring-shaped topology among the peer nodes. The invention integrates the concentration service in the distributed peer-to-peer network, thus obviously decreasing network fluctuation due to frequent entering or exiting of the node and greatly increasing the work efficiency of the peer-to-peer network.
Owner:BEIJING JIAOTONG UNIV

MIPv6 based security multicast method and steps

The invention belongs to the field of communication network security, and relates to an MIPv6 based security multicast method applied to a mobile communication network, which is characterized in that: the method comprises an authentication center 1, a group member 2, a multicast source 3 and GCKS 4, wherein the authentication center is used for authenticating the group member, the multicast source and the GCSK and distributing certificates; the GCKS is used for authenticating access registration and distributing key update messages for the group member to forward an information list of the group member 2 to an access router, is used for performing security association negotiation with the multicast source, and is used for negotiating and constructing a group key among GCKS; the multicast source 3 is used for sending a multicast data packet to the group member 2 through an intermediate router; and the group member 2 is used for acquiring the multicast data packet. The method makes that the security multicast technology can be used for actual multicast application become possible, improves the security of multicast communication, separates functions of the GCKS and the router, and can well avoid the problem of single point of failure to improve the multicast management efficiency obviously.
Owner:XIDIAN UNIV

Heat transfer characteristic analysis method for heat pipe in nuclear power system

A heat transfer characteristic analysis method for a heat pipe in a nuclear power system mainly comprises the following steps that 1, inputting a heat source of the heat pipe, the working condition of a heat trap, a working medium, a structure and geometric parameters, and setting calculation time; 2, dividing the heat pipe into control bodies and carrying out initialized calculation; 3, calculating the change rate of the temperature of the pipe wall control body along with time, and considering the axial heat transfer and boundary conditions of the heat pipe; 4, calculating the change rate of the temperature of the control body in the wick along with time, ignoring convective heat transfer caused by liquid flow, and regarding the change rate as pure heat conduction; 5, calculating the change rate of the temperature of the control body in the steam cavity along with time, and simplifying continuous steam flowing into thermal resistance heat conduction; 6, solving the equation set by using a Gear algorithm, and completing calculation of all time points; 7, checking the heat transfer limit of the heat pipe and calculating equivalent thermal resistance; 8, comparing and analyzing the influence of the heat pipe key parameters on the heat transfer performance. Transient calculation and heat transfer characteristic analysis are carried out on different heat pipes, and suggestions and guidance are provided for design of a high-performance heat pipe heat exchanger in a nuclear power system.
Owner:XI AN JIAOTONG UNIV

Distributed management framework based on extensible and high-performance computing and distributed management method thereof

The invention discloses a distributed management framework based on extensible and high-performance computing and a distributed management method thereof. The distributed management framework is composed of an integrated management system, a centralized management system and a distributed management system. The integrated management system and the centralized management system are connected through a local area network. The integrated management system and the distributed management system are connected through the local area network. The centralized management system is mainly composed of multiple servers equipped with high-performance scientific computing cards. The servers manage all the scientific computing cards in a centralized way and perform unified computing. The distributed management system is composed of multiple common computers equipped with the high-performance scientific computing cards. The servers manage all the scientific computing cards in the centralized way and perform unified computing. The requirement for the single computing node and hardware is low by using distributed management so that various idle resources can be effectively utilized and the utilization rate of the common computers can be greatly enhanced.
Owner:江苏十月中宸科技有限公司

Multi-data-center online management system and management method based on Internet of Things

The invention discloses a multi-data-center online management system and method based on the Internet of Things. The online management system comprises a plurality of data centers arranged in a distributed mode, a network and a management server. Each data center is provided with a console, and a console is responsible for monitoring the environment and hardware of the corresponding data center and monitoring the resource utilization condition of each data center. The network is a data transmission medium of each data center and the management server. The management server manages a pluralityof data centers connected with the management server, monitors the environment, hardware and resource utilization conditions of the data centers, and coordinates the workload of each data center. According to the invention, each data center is provided with an independent console for management, so that the single-point fault problem and the performance bottleneck problem of the console are solved. The management server allocates the data centers for login and access according to the resource utilization rate condition in each data, the workload of each data center is coordinated, the load ofthe data centers is equalized, and the utilization rate is maximized.
Owner:HENAN VOCATIONAL COLLEGE OF WATER CONSERVANCY ANDENVIRONMENT

Cross-multi-organization user information access control method and device and medium

The invention discloses a cross-multi-organization user information access control method and device and a medium, belongs to the technical field of Internet-of-Things access control, and aims to solve the technical problem of how to realize safe, decentralized and trustless inter-multi-organization user information access. The method comprises the following steps: initializing alliance administrator nodes; deploying the smart contract configured with the access control strategy in a blockchain network through an alliance administrator node; for each organization to join the alliance, selecting at least one server as an organization owner node of the organization, and registering each organization owner node in the blockchain network to obtain a unique account address; storing account addresses related to the organization owner nodes passing the verification into an alliance member list; enabling the organization owner node to share the user information in the organization to the blockchain network; and enabling the organization owner node to send an access request for accessing the user information in other organizations to the alliance administrator node, verifying the access request through the smart contract, and returning the corresponding user information to the organization owner node proposing the access request after the verification is passed.
Owner:QILU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products