Method for scheduling decryption machines

A decryption machine and ciphertext technology, which is applied in the inspection of the authenticity of banknotes, processing coins or valuable banknotes, instruments, etc. The effect of utilization efficiency

Active Publication Date: 2014-01-22
AEROSPACE INFORMATION
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] There are following problems in the existing rotation system method: the decryption machine to be used by the server 101 has not yet processed the invoice ciphertext sent last time and is in a busy state, but when other decryption machines are in an idle state, the server 101 only You can choose to wait until the decryption machine currently to be used is processed, and then send the ciphertext of the invoice to be processed to the decryption machine
It can be seen that the utilization efficiency of the decryption machine by this method is not high, resulting in low decryption efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for scheduling decryption machines
  • Method for scheduling decryption machines

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment 1

[0068] Set a digital code for each decryption machine, so that the decryption machine and the digital code have a one-to-one correspondence;

[0069] Then in step 2, the method for the server to select one decryption machine from all the decryption machines whose working status is idle as the specified decryption machine is: the server judges whether the number of decryption machines whose working status is idle is one, and if so, then the working status The decryption machine that is idle is the designated decryption machine, otherwise, the decryption machine corresponding to the smallest digital code among all the decryption machines whose working status is idle is the designated decryption machine.

[0070] It can be seen that this embodiment is relatively simple. When the number of decryption machines whose working status is idle exceeds one, the server only needs to compare the numbers of the decryption machines to quickly determine the designated decryption machine.

specific Embodiment 2

[0071] In addition to the working status of all decryption machines, the decryption machine working status table also includes the IP addresses of all decryption machines;

[0072] In this way, in step 2, the method for the server to select one of all decryption machines whose working status is idle as the specified decryption machine is: the server judges whether the number of decrypting machines whose working status is idle is one, and if so, then the working status Use an idle decryption machine as the designated decryption machine, otherwise, perform step 2-1, step 2-2 and step 2-3 in sequence;

[0073] Step 2-1: The server determines the IP addresses of all decryption machines whose working status is idle;

[0074] Step 2-2: The server queries the decryption machine load balancing table according to the IP addresses of all decrypting machines whose working status is idle, and determines the cumulative number of tasks of all decrypting machines whose working status is idle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for scheduling decryption machines. The method comprises: step 1, a receiver receiving invoice data information comprising invoice ciphertexts; step 2, the receiver querying the working state table of the decryption machines, determining whether there are decryption machines at idle working states, and if there are such idle decryption machines, selecting one as a specified decryption machine, wherein the decryption machine working state table comprises the working states of all the decryption machines, and the working states of the decryption machines comprise an idle state and a busy state; step 3, the server sending the invoice ciphertexts to the specified decryption machine and changes the working state of the specified decryption machine from the idle state to the busy state in the decryption machine working state table; step 4, the specified decryption machine decrypting the invoice ciphertexts and sending obtained invoice decryption information to the server; and step 5, the server, after receiving the invoice decryption information, changes the working state of the specified decryption machine from the busy state to the idle state in the decryption machine working state table. By using the method provided by the invention, the utilization efficiency of the decryption machines can be enhanced and the decryption efficiency can be improved.

Description

technical field [0001] The invention relates to the technical field of invoice anti-counterfeiting, in particular to a method for scheduling decryption machines. Background technique [0002] The anti-counterfeiting certification of invoices is of special significance for national taxation. At present, the anti-counterfeiting certification of invoices is usually carried out in an electronic form to improve the work efficiency of tax authorities and taxpayers. [0003] figure 1 It is a structural diagram of the tax end in the existing electronic anti-counterfeiting authentication method. Such as figure 1 As shown, the server 101 at the tax end is connected to multiple decryption machines 102. The server 101 can receive the invoice data information sent from the outside, and can also send the authenticity information of the invoice corresponding to the invoice data information. The invoice data information includes Invoice plaintext and invoice ciphertext. The server 101 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07D7/02
Inventor 陈江宁甘景全宋颖车德欣马雁袁冲
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products