Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-component security isolation concurrent processing method

A technology of security isolation and processing method, applied in the field of security isolation and information exchange of computer network information systems, can solve problems such as low efficiency, and achieve the effects of reducing consumption, improving processing efficiency, and reducing impact

Active Publication Date: 2012-06-20
CHINA TOBACCO ZHEJIANG IND
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the case of high concurrency, there will be a lot of file descriptors FD that the system process needs to monitor. If select / poll technology is used, only a part of the descriptors can be queried each time, which is inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention is described in further detail below:

[0013] A multi-component security isolation concurrent processing method, the method comprising:

[0014] 1) Support a process to open a large number of socket descriptors (FD)

[0015] The FDs that can be opened by a single process are limited when using select technology, usually 1024 or 2048, which is obviously not enough for those application services that need to support tens of thousands of connections. There are two ways to break through this limitation: one is to modify the kernel parameters and recompile the kernel; the other is to choose multi-process programming. The first method will increase the select traversal space and reduce the query efficiency. The second method will inevitably bring additional overhead such as creating processes, inter-process communication, and synchronization, and there are also shortcomings. The method of the present invention does not have this restriction, and the F...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security isolation and information exchange of a computer network information system, in particular to a multi-component security isolation concurrent processing method for multiple system security interconnection components. The multi-component security isolation concurrent processing method comprises the following steps of: (1) supporting a process to open a large number of socket descriptor FDs; (2) not reducing the IO efficiency along with the increase of the number of the FDs; and (3) accelerating information transfer between a kernel and a user space by using mmap. The multi-component security isolation concurrent processing method has the advantages that: when high concurrent data processing is performed on a plurality of components, the consumption of system resources is greatly lowered, the influence on the concurrent service processing is reduced, and the continuousness of the data exchange is kept.

Description

technical field [0001] The invention relates to the technical field of security isolation and information exchange of computer network information systems, in particular to a multi-component security isolation concurrent processing method for multi-system security interconnection components. Background technique [0002] Security isolation and information exchange technology, the basic principles are: cut off the general protocol connection between networks; decompose or reassemble data packets into static data; conduct security review on static data, including network protocol inspection and code scanning, etc.; Security data flows into internal units; internal users obtain required data through strict identity authentication mechanisms. In the existing security isolation and information exchange technology, the internal and external network client and server exchange data through secure interconnection components. [0003] The security interconnection component is a multi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 李健俊章志华季琦蒋一翔姜学峰黄卫忠黎勇刘鹏钱杰
Owner CHINA TOBACCO ZHEJIANG IND