Resource allocation method and device, equipment and storage medium

A resource allocation and resource technology, applied in the field of network information security, can solve problems such as poor user experience, time-consuming, waste of resources, etc.

Inactive Publication Date: 2020-04-24
SANGFOR TECH INC
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The first is to allocate as many resources as possible to the previous tasks. The amount of concurrent scanning tasks is relatively small. When the first task occupies more resources, only one task can be executed, and the subsequent tasks can only wait for the previous task to release resources. It can only be executed later, it takes a long time to execute multiple tasks, and the user experience is poor
The second is to ensure that multiple tasks are executed at the same time. A single task can only allocate a certain amount of resources at most. When there is only one task, a large number of resources are idle, resulting in waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource allocation method and device, equipment and storage medium
  • Resource allocation method and device, equipment and storage medium
  • Resource allocation method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solutions and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. All other embodiments obtained under the premise of creative labor belong to the scope of protection of this application.

[0029] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0030] In the following description, the term "first\second\third" is only used to distinguish similar objects, and does not represent a specific ordering of objects. Understandably, "first\second\third" Where permitted, the specific order or sequencing may be interchanged such that the embodiments of the application described herein can be practiced in sequences oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a resource allocation method and device, equipment and a storage medium. The method comprises the steps of acquiring a first task list and a second task list, wherein each firsttask in the first task list is a to-be-executed vulnerability scanning task, and each second task in the second task list is an executed vulnerability scanning task; when the number of second tasks in the second task list is smaller than a preset threshold value, determining a first target task from the first task list; allocating preset resources to each first target task to execute each first target task; and after the preset resources are allocated to each first target task, or when the number of the second tasks in the second task list is greater than or equal to a preset threshold, allocating the remaining resources according to the execution sequence of each second task.

Description

technical field [0001] The present application relates to the technical field of network information security, and relates to but not limited to a resource allocation method, device, equipment and storage medium. Background technique [0002] Vulnerability scanning technology is an important network security technology, which can effectively improve network security by cooperating with firewalls and intrusion detection systems. When a vulnerability scanner performs a vulnerability scanning task, the number of scanning targets, asset types, and scanning methods are generally different for different vulnerability scanning tasks, and the resource consumption varies greatly. When multiple scanning tasks are issued at the same time, whether the allocation of resources is reasonable is related to the length of time to complete the scanning tasks and affects user experience. [0003] The existing resource allocation generally adopts two schemes. The first is to allocate as many r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/57G06F21/46
CPCG06F21/46G06F21/577H04L63/1433
Inventor 李怀远
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products