Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for carrying out computing power contribution by using idle resources of user and electronic equipment

A technology of user terminal equipment and equipment, which is applied in the direction of calculation, program control design, multi-program device, etc., can solve problems such as privacy leakage, and achieve the effects of saving bandwidth, high practicability, and saving time

Inactive Publication Date: 2021-06-15
HUBEI UNIV OF TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, many calculations and services are based on crowdsourcing statistics, but when service providers provide tasks to cloud services, the risk of privacy leakage may be introduced. Similarly, users provide idle resources to cloud services. There is a risk of privacy breaches

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for carrying out computing power contribution by using idle resources of user and electronic equipment
  • System and method for carrying out computing power contribution by using idle resources of user and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention

[0052] The present invention further elaborates the present invention through the application of the system and method for computing power contribution by using the user's idle resources in Bitcoin mining.

[0053] please see figure 1 , a mining method that uses idle resources of users to contribute computing power provided by the present invention has a distributed system architecture, and specifically involves the following entities: Key Generation Center (Key Generation Center, hereinafter referred to as KGC), which has idle resources User terminal device ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for carrying out computing power contribution by using idle resources of a user and electronic equipment, which adopt a distributed system structure by using a secret sharing and aggregation technology, the system The system comprises user equipment with idle resources, fog equipment, a cloud service and a service provider. The method comprises the following steps: initializing a system, sending a request task by a user or a service provider, distributing a task by a cloud service, distributing a task by fog equipment, assisting calculation by the user and uploading a calculation result, aggregating the result by the fog equipment, aggregating by the cloud service and uploading the result. According to the invention, user information with idle resources, contents calculated by a cloud server assisted by a user and a final calculation result need to be kept secret. If a user who puts forward a task demand is also a user with idle resources, a calculation task may be calculated by the fog equipment, and a result is directly returned to the user, so that the working efficiency is improved, and if the user is not the user with the idle resources, the cloud service needs to help the calculation, and the result is returned to the user.

Description

technical field [0001] The invention belongs to the field of information security technology, and relates to a system, method and electronic equipment for computing power contribution using idle resources of users, and in particular to a system and method for contributing computing power using idle resources of users without leaking server request data And electronic equipment, the present invention can use the user's idle resources to provide computing power for mining, and at the same time give certain rewards to users who provide computing power. Background technique [0002] With the rapid development of big data and the Internet of Things, users need more and more computing resources. This also causes many user terminal devices ITD to have certain idle resources, and hope to rent out the idle resources to the cloud service CS in some way, and the process of renting out needs to ensure that the user's private information cannot be leaked. [0003] In real life, users ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/48G06F21/60G06F21/62
CPCG06F9/4806G06F21/602G06F21/6245
Inventor 沈华王胜男张明武张浩王丽琼
Owner HUBEI UNIV OF TECH