Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hardware resource embezzlement detection method and device, storage medium and equipment

A technology of hardware resources and detection methods, applied in the protection of internal/peripheral computer components, etc., can solve the problems of inability to detect abnormal embezzlement of hardware resources, etc.

Pending Publication Date: 2022-04-15
北京明朝万达科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a hardware resource misappropriation detection method, device, storage medium, and equipment to at least solve the technical problem in the prior art that it is impossible to detect abnormal misappropriation of hardware resources according to a preset analysis strategy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hardware resource embezzlement detection method and device, storage medium and equipment
  • Hardware resource embezzlement detection method and device, storage medium and equipment
  • Hardware resource embezzlement detection method and device, storage medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present invention, an embodiment of a method for detecting embezzlement of hardware resources is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0028] figure 1 is a flow chart of a method for detecting embezzlement of hardware resources according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0029] Step S102, acquiring the resource usage information of the hardware resource by the application program, wherein the resource usage information includes: resource usage amount and resource usage duration;

[0030] Step S104, using a preset resource analysis strat...

Embodiment 2

[0067] According to an embodiment of the present invention, an embodiment of a device for implementing the above method for detecting embezzlement of hardware resources is also provided, Figure 4 is a schematic structural diagram of a device for detecting embezzlement of hardware resources according to an embodiment of the present invention, as shown in Figure 4 As shown, the above-mentioned device includes: an acquisition module 40, an analysis module 42 and a determination module 44, wherein:

[0068] An acquisition module 40, configured to acquire resource usage information of hardware resources by applications, wherein the resource usage information includes: resource usage and resource usage duration;

[0069] An analysis module 42, configured to analyze the above-mentioned resource usage information by adopting a preset resource analysis strategy, and obtain an analysis result;

[0070] The determining module 44 is configured to determine that the above-mentioned applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hardware resource embezzlement detection method and device, a storage medium and equipment. The method comprises the steps that resource use information of hardware resources by an application program is obtained, and the resource use information comprises resource use amount and resource use duration; analyzing the resource use information by adopting a preset resource analysis strategy to obtain an analysis result; and when the analysis result indicates that the resource usage amount and / or the resource usage duration reach the corresponding preset threshold, determining that the application program abnormally embezzles the hardware resources. The technical problem that the abnormal embezzlement condition of hardware resources cannot be detected according to a preset analysis strategy in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of resource detection, in particular to a hardware resource embezzlement detection method, device, storage medium and equipment. Background technique [0002] The rapid development of distributed technology and blockchain technology makes it possible to transfer centralized computing and storage to any computer node in the network. If the technology can be used legally in beneficial areas and hardware resources are used efficiently, it will bring huge benefits. [0003] However, many lawbreakers have used the technology illegally and maliciously, resulting in the theft of hardware resources in many computer nodes on the network. The stolen resources have caused a huge loss of machine resources, and have also caused many problems, such as: hardware resource owners. Economic loss and improper profit for those who illegally use technology. [0004] For the above problems, no effective solution has bee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/88
Inventor 张毅喻波王志海安鹏董晓斌
Owner 北京明朝万达科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products