Distributed password recovery method and system
A recovery method and distributed technology, applied in key distribution, can solve problems affecting the overall performance of the system and unbalanced load of distributed computing nodes, etc., and achieve the effects of improving fault tolerance, optimal overall performance, and low cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.
[0040] refer to figure 1 , shows the flow of the first embodiment of the distributed password recovery method of the present application, the execution subject is a distributed computer system, and the distributed computer system includes 1 service node and n computing nodes (n≧1), each The computer nodes are connected through a computer network; the computing power of the i-th node in unit time is v i ; Among them, 1≦i≦n, v i Indicates the number of passwords processed by the i-th computer node per unit time; for example, when the unit time is minutes, if v 10 =10000, indicating that the computing capability of the tenth computing node is to process 10000 passwords per minute. This preferred method e...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


