Unlock instant, AI-driven research and patent intelligence for your innovation.
Cloud security computing method and device based on cloud fault-tolerant technology, and storage medium
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A fault-tolerant technology and computing method technology, applied in the field of cloud security computing method and device, storage medium, to achieve the effect of rapid restart, easy migration and deployment
Active Publication Date: 2022-07-29
BEIJING JIAOTONG UNIV
View PDF6 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0008] The purpose of the present invention is to provide a secure computing method, device and storage medium based on cloud fault-tolerant technology, so as to overcome the technical problems faced by the existing cloud computing platform
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0043] like figure 1 As shown, the implementation of the present invention provides a cloud security computing method based on cloud fault tolerance, comprising the following steps:
[0044] Step S1, the management node adopts a master-multi-slave fault-tolerant architecture, and uses KeepAlived and Haproxy to implement self-checking of management node survival and load balancing of user requests;
[0045] In step S2, the business node adopts a dynamic redundant fault-tolerant security design to maintain the life cycle of the application microservice, and the business node feeds back survival information to the management node in real time through the heartbeat;
[0046] Among them, the application microservices report the life cycle to the management node based on the probe mechanism, and the application microservices exchange input and output information through redundant voting.
[0047] The computing method of this embodiment can optimize the traditional cloud computing m...
Embodiment 2
[0078] The present invention also provides a cloud security computing device based on cloud fault-tolerant technology, including:
[0079] Management fault-tolerant module, which is used for management nodes to adopt a master-multi-slave fault-tolerant architecture, and uses KeepAlived and Haproxy to achieve self-check of management node survival and load balancing of user requests;
[0080] The application fault-tolerant module is used for business nodes to adopt dynamic redundant fault-tolerant security design to maintain the life cycle of application microservices, and business nodes feed back survival information to management nodes in real time through heartbeat;
[0081] Among them, the application microservice reports the life cycle to the management node based on the probe mechanism, and the application microservice exchanges input and output information through redundant voting.
Embodiment 3
[0083] The present invention also provides a storage medium, where the storage medium stores machine-executable instructions, and when the machine-executable instructions are invoked and executed by a processor, the machine-executable instructions cause the processor to implement cloud-based fault tolerance Technology's cloud security meter approach.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a cloud security computing method and device based on a cloud fault-tolerant technology, and a storage medium, and the method comprises the steps: S1, enabling a management node to employ a master multi-slave fault-tolerant architecture, and achieving the survival self-inspection of the management node and the load balance of a user request through the KeepAlived and the HaProxy; s2, the service node adopts a dynamic redundant fault-tolerant security design to maintain an application micro-service life cycle, and the service node feeds back survival information to the management node in real time through heartbeat; wherein the application micro-services report life cycles to the management node based on a probe mechanism, and input and output information is exchanged among the application micro-services through redundancy voting. By adopting the technical scheme of the invention, the availability and reliability of a traditional cloud computing platform or a cloud computing-based service are effectively improved, and the reliability and stability of each cloud computing-based industrial control system can be further improved.
Description
technical field [0001] The invention belongs to the field of electrified transportation, and particularly relates to a cloud security computing method and device and a storage medium based on cloud fault-tolerant technology. Background technique [0002] As an innovative service mode of information technology, cloud computing is a mode of delivery and use of IT infrastructure, because it can provide corresponding infrastructure resources according to user needs, and users "pay on demand" to use corresponding resources and widely used Applied in all walks of life. Cloud computing has the characteristics of ultra-large scale, virtualization, high availability, versatility, high scalability, and on-demand services, which can greatly improve the utilization efficiency of existing resources. With the advantages of unified deployment of business applications and centralized data management, cloud computing undertakes core management and application services in many industrial con...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.