Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

55 results about "Converged infrastructure" patented technology

Converged infrastructure is a way of structuring an information technology (IT) system which groups multiple components into a single optimized computing package. Components of a converged infrastructure may include servers, data storage devices, networking equipment and software for IT infrastructure management, automation and orchestration.

Method and system for media content transmission based on CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure

The invention discloses a method and a system for media content transmission based on a CDN (Content Distribution Network) and P2P (Peer to Peer) converged infrastructure, belonging to the field of multimedia communication. The method comprises the steps: a source server uploads stored media contents to all CDN network nodes at first; all CDN network nodes segment received media contents and respectively sign and store the media content segments; the CDN network nodes extract the media content segments from the specific CDN network nodes according a content request of a user terminal and transmit the media content segments after the media content segments are fragmented; and the user terminal splices the received content fragments into a content segment and carries out signature verification on the CDN network nodes and the spliced media content segment through a CA (Certificate Authority) certificate chain. The method disclosed by the invention has the advantages of guaranteeing the content privacy in a transmission process and data completeness and preventing the contents from artificial manipulation and damage, and meanwhile, a segmented signature manner is favorable for reducing the quantity of fragments to be retransmitted when transmission errors occur, so that flow waste is reduced.
Owner:北京视博数字电视科技有限公司

Network attack and defense virtual simulation system based on hyper-converged infrastructure

The invention discloses a network attack and defense virtual simulation system based on hyper-converged infrastructure, relates to the field of network security and solves the problems that an existing network security virtual simulation system is low in expansibility and low in efficiency ratio and is difficult to manage. The system comprises a Web application module, a protocol forwarding module, an experiment configuration module, an experiment operation module, a node configuration module, a mirror synchronization module and a performance monitoring module. According to the network attack and defense virtual simulation experiment system established through adoption of the hyper-converged infrastructure, a plurality of server nodes are interconnected through a high-speed network; the server nodes are computing nodes and also are storage nodes; the service capability of the system is expanded horizontally by increasing the number of the service nodes; the plurality of server nodes are arranged in the system, so when software and hardware faults occur in partial server nodes, the operation of the system is not influenced; the fault server nodes can be directly replaced; and when the server nodes are newly increased, mirror resources can be automatically synchronized to the newly increased server nodes by the system, and the service capability of the system can be rapidly improved.
Owner:CHANGCHUN UNIV OF SCI & TECH

Security evaluating and detecting method used for cloud infrastructure

ActiveCN104735063AImprove utilization efficiencyReduce unnecessary occupationTransmissionDevice formComputer module
The invention relates to the technical field of the information security, in particular to a security evaluating and detecting method used for a cloud infrastructure. The method is completed by a device formed by a dispatching module, a testing software library, a testing mirror, a testing configuration library, a testing result library, an analysis module, a testing requirement docment, a testing report and other modules. Configuration operating is carried out on the testing software library by a user in advance before testing; security testing software which exists in the market and aims at the cloud infrastructure and independently programmed testing software programs are uploaded to the testing software library; classification is carried out on the software according to the usual classification, namely the system security, the network security, the data security, the behavior security and the like, and the software is partitioned to different 'testing software lists'; the testing software library can be continuously updated, and the advancement and the maturity of the testing software are guaranteed. The problem of compatibility of the information security testing method and the cloud calculation is solved, and the method can be used for security evaluating and testing of the cloud infrastructure.
Owner:GUANGDONG ELECTRONICS IND INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products