Method for issuing network resource status index, method and device for secure data transmission
A resource and network technology, applied in the field of secure communication, can solve problems such as the inability to adjust the security strength of transmitted data, the lack of consideration of resource availability, and the waste of processing resources, so as to improve processing performance, reduce the occupation of processing resources, and avoid waste. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] Such as figure 1 As shown, it is a flow chart of the specific implementation principle of the method for delivering the health index used to characterize the resource usage of the network side proposed by the embodiment of the present invention, and the specific implementation process is as follows:
[0023] Step 10, obtain each parameter value used to characterize the current resource usage of the network; wherein each parameter value obtained may include but not limited to at least one or more of the following parameter values: the average CPU usage rate of each server on the network side Value; the average value of the memory usage of each server on the network side; the average value of the CPU temperature of each server on the network side; the average value of the hard disk space usage of each server on the network side; .
[0024] Step 20, based on the parameter values obtained above, determine the health index value used to characterize the current resource u...
Embodiment 2
[0033] Correspondingly, as figure 2 As shown, it is a flow chart of the implementation principle of the first method for securely transmitting data proposed in the embodiment of the present invention, and the specific implementation process is as follows:
[0034] Step 200, calculating summary information of the overall data to be transmitted, and encrypting the calculated summary information before transmitting. Of course, this step is an optional step, that is, you can choose not to calculate the summary information of the overall data to be transmitted, and perform encrypted transmission on the calculated summary information. Here, the summary information is calculated for the overall data to be transmitted, and the calculated The main purpose of encrypting and transmitting the summary information is to ensure the integrity of the overall data transmission.
[0035] Step 201, dividing the overall data to be transmitted into at least one data block;
[0036] Step 202, sel...
no. 3 example
[0055] Such as image 3 As shown, it is a flow chart of the implementation principle of the second method for securely transmitting data proposed in the embodiment of the present invention, and the specific implementation process is as follows:
[0056] Step 300, calculate summary information of the overall data to be transmitted, and encrypt the calculated summary information before transmitting. This step is optional.
[0057] Step 301, divide the overall data to be transmitted into at least one data block, and perform out-of-order processing on each of the divided data blocks; the so-called out-of-order refers to disrupting the sequence of the divided sequential data blocks, so that The adjacent data blocks may not be continuous in content after being scrambled.
[0058] Step 302, selecting an unsent data block in sequence from the out-of-order data blocks;
[0059] Step 303, randomly generating a random number for the data block;
[0060] Step 304, determine the latest...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 