Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

167 results about "Resource isolation" patented technology

Method for establishing database cluster by utilizing virtualization

The invention provides a method for establishing a database cluster by utilizing virtualization, which utilizes the technical advantages of virtualization, ensures that all processing units in the database cluster obtain optimal resources, simultaneously improves the resource utilization rate of a physical hardware, and realizes the rapid deployment, expansion of the database cluster, the dynamic migration, the resource isolation of a multi-cluster system and the dynamic management of system resources, wherein the all processing units in the database cluster obtain optimal resources, i.e. a CPU, a memory and IO resources are customized and allocated in advance for a virtual machine according to the requirements of the processing unit in the database cluster for the resources in an underlying server system of the virtual machine; the improvement of the utilization rate of system resources means that a plurality of virtual machines are deployed and operated on the underlying server system of the virtual machine so as to improve the resource utilization rate of the underlying server of the virtual machine; the rapid deployment and expansion of the database cluster mean that the rapid expansion of the database cluster is realized through the mirroring replication function of a virtualized software; and the dynamic migration means that the dynamic migration of the virtual machine is realized by utilizing the virtualized software, and the service of the database cluster is not interrupted.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Dedication of administrative servers to management of server functions in a multi-server environment

A system for managing administration of computer services provided to users includes a computer system and an operating system running on the computer system. A server process is launched by the computer system for providing services to users. An isolated Virtual Private Server (VPS) has a set of services that perform administrative operations relating to the server process. The server process can be a webserver, a file server, an FTP server, an authentication server, a VPS, a chroot environment, a jail environment, a sand box environment, a print server and a Windows Terminal Service. The administrative operations can include collection of statistics relating to the server process; servicing of requests for management of the server process; servicing of requests for management of operating system functions; servicing of requests for computer system resource allocation; servicing of requests for computer system resource re-allocation; servicing of requests for authorization within the operating system; servicing of requests for authorization within the server process; servicing of requests that the server process is forbidden from executing; servicing of operations that potentially can cause a fault in the server process; and servicing of operations that require multiplexing of server processes. The multiplexing can be based on a network protocol addressing, or on a content of a request directed to the server process. The VPS isolation can include logical isolation of processes, physical isolation of processes, resources isolation, namespace isolation, data isolation, address isolation, fault isolation and performance isolation.
Owner:VIRTUOZZO INT GMBH

Automatic driving-oriented edge computation resource management method

The invention discloses an automatic driving-oriented edge computation resource management method. The method comprises the following steps of: carrying out uniform management and dynamic distributionon edge-side resources according to a demand, for computation resources, of an automatic driving business, so as to realize real-time interaction with an autonomous vehicle; migrating the computationto an edge computation node; and storing mass automatic driving data according to a customer demand so as to relieve the pressure, for computation and storage demands, of the vehicle. Compared with the prior art, the method has the advantages that the computation, storage and network resources of edge sides are pooled to form transparent and high-availability resource infrastructure nodes, so that high-availability computation ability is provided for automatic driving businesses, and large-capacity and low-cost storage services and edge side high-speed network services are provided at the same time; resource isolation between businesses and data is realized, and resource switching is dynamically completed, so that the computation, storage and network are respectively charged as required and then the charging is more reasonable; the value maximization of the computation and storage resources is realized; and the automatic driving efficiency is improved.
Owner:山东浪潮创新创业科技有限公司

Policy-based container network resource isolation control method

The invention provides a policy-based container network resource isolation control method in allusion to a problem that the container network resource isolation cannot flexibly customize a network access policy according to the task in the prior art. The method comprises the steps that S1, a user actively configures a container network isolation policy scheme through a visual policy configurationinterface according to the service scenario; S2, an SDN (Software Defined Network) controls to generate isolation policy configuration according to the isolation policy scheme configured by the user through the visual policy configuration interface and sends the isolation policy configuration to equipment; and S3, a base layer executes a corresponding isolation and access control mechanism according to the isolation policy configuration sent by the control layer. According to the invention, hierarchical container network isolation is realized in allusion to container network resource isolationcontrol requirements, and the conditions of container network mutual access is flexibly customized according to the service access scenario, thereby realizing the difference of an access relationshipof container network resources under different application scenarios, and ensuring the effective isolation of the network resources.
Owner:NAT UNIV OF DEFENSE TECH

Resource isolation method and device for distributed database system, and server

Embodiments of the invention provide a resource isolation method and device for a distributed database system, and a server. The distributed database system comprises a plurality of servers; a plurality of containers are arranged on each server; each container occupies a pre-allocated resource in the server which the container belongs to; and each container corresponds to a database instance. Themethod comprises the following steps of receiving a service outside the distributed database system or a to-be-processed request of a tenant; sending the to-be-processed request to the database instance allocated to the service or the tenant; and processing the to-be-processed request through each container corresponding to each database instance allocated to the service or the tenant. According to the resource isolation method and device, the service or the request of the tenant can be processed through the container corresponding to each database instance allocated to the service or the tenant, and the request can be processed in a server resource which is allowed to be used by the corresponding container according to the service or the tenant, so that different service or tenant resources are isolated.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

PaaS cloud implementation method based on containers

The invention discloses a PaaS cloud implementation method based on containers. The method comprises following steps: saving configuration information of all containers and providing disposition; a deployment strategy ensuring that multiple containers under the same APP are scattered across different hosts; performing management on the host and containers and one physical cluster being corresponding to multiple projects, etc.. Therefore, the introduction of containers into the cloud computing basic resource delivery to provide PaaS layer services is realized, reducing waste of resources caused by the traditional PaaS products using virtual machines, increasing disposition efficiency and reducing exploitation and test period for users; the method is a lightweight VM solution scheme based on process containers, realizing a resource isolation and quota of an application program grade; Compared with the traditional cloud infrastructure system implementation, the container-based cloud service system has lower cost of overall ownership, higher resource utilization and is more stable and reliable, which further enhances the virtualization efficiency, improves resource utilization, accelerates enterprise devops process, and provides fast and effective support services for applications.
Owner:深圳市华云中盛科技股份有限公司

Offline detection method and system for cross-site scripting vulnerability

The invention discloses an offline detection method and system for a cross-site scripting vulnerability. The offline detection method includes that a control device acquires the IP of a function test server and a function test project virtualization website HOST; a resource isolating device carries out resource isolation on a target function test environment, packs standard resource isolating mirror images and deploys in a safety test environment; a transmitting device deployed in the target function test environment transmits network flow which conforms to the function test project to a scheduling device; the scheduling device carries out data encapsulation on the transmitted network flow and sends the encapsulated test data to a test device; the test device sends a safety test request to the safety test environment, analyzes the page returned from the safety test environment to find out the cross-site scripting safety vulnerability, and sends to the control device; the control device confirms the safety test project of the safety vulnerability according to the IP of the function test server and the function test project HOST. The offline detection method and system for the cross-site scripting vulnerability enable the coverage and automatic degree of the safety test to be improved.
Owner:MICRO DREAM TECHTRONIC NETWORK TECH CHINACO

Method for generating forwarding table entry, controller and network device

ActiveCN109218201AFlexible message forwarding modeFlexible forwardingService provisioningNetwork traffic/resource managementResource isolationResource allocation
The present application discloses a method for generating a forwarding table entry and a network device. The method comprises that a controller sends a plurality of resource allocation request messages to a plurality of network devices in a network fragment to trigger the network devices to allocate resources according to the resource allocation request messages, wherein the resource allocation request message include the identifier of the network fragment and a resource required to be allocated to the network fragment by the corresponding network device; the controller receives a plurality ofresource allocation response messages, wherein the resource allocation response message includes the identifier of the network fragment and the segment identifier of the corresponding network device,the resource allocated by each device belongs to the network fragment; the controller generates a forwarding table corresponding to the network fragment according to the resource allocation responsemessages, wherein the forwarding table includes the forwarding table entry reaching the network devices of the network fragment, and the forwarding table entry includes a segment identifier reaching adestination network device. The forwarding table entry helps to provide a user with a flexible message forwarding way based on network fragment resource isolation.
Owner:HUAWEI TECH CO LTD

File system resource isolation method for Docker container

The invention relates to a file system resource isolation method for a Docker container. The method includes: allocating host file system resources according to the access request of the container anddetermining a lock resource corresponding to the access request, the file system resource isolation method at least comprises the following steps: dividing a lock resource into a first lock capable of being refined and a second lock incapable of being refined based on the granularity of the lock resource, and creating a plurality of new containers in a manner of configuring refined copies of thefirst lock to form independent locks; allocating the host file system resources according to the file resource request parameters required by the new containers, and dividing the plurality of new containers into a first marking container and a second marking container based on the allocation result; and controlling the execution of the file system operation according to the use amount of the filesystem resources allocated to the first marking container or the second marking container under the condition that the lock competition exists or the file system resources need to be used when the first marking container or the second marking container executes the file system operation.
Owner:HUAZHONG UNIV OF SCI & TECH

Edge computing gateway management system and method based on LXC container technology

The invention relates to the field of edge computing, in particular to an edge computing gateway management system based on an LXC container technology. The edge computing gateway management system provided by the invention comprises an edge computing gateway cluster and a cloud server; the edge computing gateway cluster comprises a plurality of edge computing gateways, and a plurality of LXC containers are deployed in the edge computing gateways; an IoT cloud management platform and an LXC container mirror image library are arranged in the cloud server, the IoT cloud management platform is responsible for unified management and monitoring of the whole gateway cluster, and an LXC container basic mirror image is stored in the LXC container mirror image library; and each edge computing gateway in the edge computing gateway cluster establishes communication connection with the cloud server to jointly form a lightweight, flexible and customizable containerized platform. The invention further discloses an edge computing gateway management method applying the system, based on the method, a user can rapidly deploy applications in batches, resource isolation between the applications is achieved, and various Internet of Things application scenes can be met.
Owner:青岛海洋科技中心

Multitask security isolation system and method under virtual-real interconnected environment of cloud platform

The invention provides a multitask security isolation system and method under a virtual-real interconnected environment of a cloud platform to solve the technical problem existing in the prior art that the unified management of multiple virtual and physical resources and the task security isolation cannot be implemented at the same time. The system comprises a task flow identification module for identifying different tasks, an access control module creating task resources according to the task identification, a task isolation module for security isolation between the tasks and between the resources, and a resource management module for unified management of the securely isolated resources. The implementing steps are as follows: the task flow label module adds a security label to a task and required resources thereof; the access control module verifies user identity and authority information and applies for the virtual and physical resources required by the task; the access control module performs network isolation and virtual resource isolation on the resources applied for the task; and the resource management module performs unified management on the securely isolated virtual and physical resources in the cloud platform and assigns the resources required by the task to the task.
Owner:XIDIAN UNIV

Automatic digital government affair service system based on block chain technology

The invention discloses an automatic digital government affair service system based on a block chain technology. The system comprises a user layer, an access layer, an application layer, a block chainbottom layer and a block chain resource layer, a distributed event processing flow management module, a work flow management module, a document management module, a public information management module and a personnel information management module are built; according to the digital government affair service system, a block chain bottom layer is constructed on the basis of network resources suchas cloud computing service and network resources; a distributed account book, a intelligent contract and a consensus mechanism bottom layer technology are fused; an open and integral blockchain solution is provided for an upper-layer application; the system comprises a complete blockchain system, a development suite, a development document and matched basic applications and basic services, can realize resource isolation and controllable storage, processing and interaction of data, solves the problems of real-time sharing, authentication change and safe utilization of the data, and effectivelyimproves the data interaction efficiency of data submission, check, query, supervision and the like.
Owner:北京零识科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products