CN106921607A - Crypto-operation management method and system under a kind of cipher server cluster - Google Patents
Crypto-operation management method and system under a kind of cipher server cluster Download PDFInfo
- Publication number
- CN106921607A CN106921607A CN201510983361.7A CN201510983361A CN106921607A CN 106921607 A CN106921607 A CN 106921607A CN 201510983361 A CN201510983361 A CN 201510983361A CN 106921607 A CN106921607 A CN 106921607A
- Authority
- CN
- China
- Prior art keywords
- crypto
- queue
- packet
- encryption device
- operation management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 57
- 230000008859 change Effects 0.000 claims description 3
- 238000009826 distribution Methods 0.000 abstract description 5
- 238000000034 method Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
The present invention relates to cryptographic service field, the crypto-operation management method and system under a kind of cipher server cluster are disclosed, the crypto-operation management method includes:The packet that user sends is classified;Each packet is stored in the queue of corresponding types;And the encryption device under selection cipher server cluster carries out crypto-operation to the queue.The present invention can be carried out classifying and integrated to the data of magnanimity, and classification distribution is carried out to encryption device, optimize the processing speed of encryption device, improve the whole efficiency of crypto-operation.
Description
Technical field
The present invention relates to cryptographic service field, in particular it relates to the password under a kind of cipher server cluster
Computing management method and system.
Background technology
At present, the flow of the crypto-operation of cipher server cluster treatment user is:The data of user are in collection
Under group the cluster bottom is reached by the process one-levels such as load balancing distribution, Business Processing, data processing level
Encryption device, and obtain result another level level by computing and return to user.When number of users and number of users
According within the specific limits when, server process speed can meet demand, but as number of users and user
Data exceed can process range when, mass users send mass data in the case of, server is at full capacity
Work, efficiency reduction, period of reservation of number extension.
The content of the invention
It is an object of the invention to provide the crypto-operation management method under a kind of cipher server cluster and it is
System, for solving the problems, such as that cipher server cluster is less efficient when carrying out crypto-operation to mass data.
To achieve these goals, the present invention provides the crypto-operation management under a kind of cipher server cluster
Method, the crypto-operation management method includes:The packet that user sends is classified;By each number
It is stored in the queue of corresponding types according to bag;And the encryption device under selection cipher server cluster is to described
Queue carries out crypto-operation.
Preferably, the packet to user's transmission carries out classification includes:To the setting point of each packet
Class is identified.
Preferably, it is described to include the queue that each packet is stored in corresponding types:By each packet
It is stored in the queue of corresponding types, if the queue of corresponding types does not exist, creates the queue of the type.
Preferably, the encryption device under the selection cipher server cluster carries out password fortune to the queue
Including:When the data packet number in the queue reaches default threshold value, cipher server is selected
Encryption device under cluster carries out crypto-operation to the queue.
Preferably, the crypto-operation management method also includes:According to the result of crypto-operation, modification
Pending data bag quantity in all types of queues.
Present invention also offers the crypto-operation management system under a kind of cipher server cluster, password fortune
Calculating management system includes:Operation layer, for classifying to the packet that user sends;Data Layer, uses
In the queue that each packet is stored in into corresponding types;And encryption device layer, for selecting password to take
Encryption device under business device cluster carries out crypto-operation to the queue.
Preferably, the operation layer includes:Mark module, for setting class indication to each packet;
And sort module, for according to the class indication, classifying to packet.
Preferably, the data Layer includes:Queue management module, for creating and managing queue;Data
Bag management module, the queue for each packet to be stored in corresponding types;And threshold management module,
Threshold value for setting the data packet number being stored in individual queue;Wherein, the encryption device layer is configured
It is when the data packet number in the queue reaches the threshold value, under selection cipher server cluster
Encryption device carries out crypto-operation to the queue.
Preferably, the encryption device layer includes:At least one encryption device, for entering to the queue
Row crypto-operation;And apparatus of load management module, the load for managing all encryption devices.
Preferably, the encryption device layer is additionally operable to the treatment knot to the data Layer feedback cipher computing
Really, and the data Layer is additionally operable to according to the result, change pending in all types of queues
Data packet number.
By above-mentioned technical proposal, the beneficial effects of the invention are as follows:The present invention can enter to the data of magnanimity
Row is classified and integrated, and classification distribution is carried out to encryption device, optimizes the processing speed of encryption device, is carried
The whole efficiency of crypto-operation high.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with
Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention.
In accompanying drawing:
Fig. 1 is the schematic flow sheet of the crypto-operation management method in embodiments of the invention;
Fig. 2 is the structural representation of the crypto-operation management system of another embodiment of the present invention.
Description of reference numerals
The data Layer of 1 operation layer 2
3 encryption devices, 11 mark module of layer
The queue management module of 12 sort module 21
The threshold management module of 22 packet management module 23
The apparatus of load management module of 31 encryption device 32
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that
Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair
It is bright.
The present invention is directed to cipher server cluster, and hereinafter signified cluster each means cipher server collection
Group, the encryption device under cluster can be then cipher server, or possess crypto-operation function
Terminal and equipment etc..
Embodiments of the invention give the crypto-operation management method under a kind of cluster, as shown in figure 1,
The crypto-operation management method includes:Step S1, classifies to the packet that user sends;Step
S2, each packet is stored in the queue of corresponding types;And step S3, it is close under selection cluster
Decoding apparatus carry out crypto-operation to the queue.It should be noted that in step s3, to the team
It refers to carry out crypto-operation to being stored in the queue of packet in step S2 that row carry out crypto-operation, not
Queue including being stored in other types data.
Further, the crypto-operation management method can also include:According to the result of crypto-operation,
Pending data bag quantity in all types of queue of modification, and the result is returned into user.
It is noted that user sends packet, therefore step S1 generally by multiple client
In also need to the data source of record data bag, after subsequently returning to cryptographic calculation to each client
Result.
Further, in the step S1, classification is carried out to the packet that user sends and is specifically included:
Class indication is set to each packet, each data carries class indication after classification, according to the classification
Mark, it is possible to which class indication identical packet is divided into same type.
Here, sorted packet forms the set of { Class1, type 2, type 3 ... type m },
Each packet is to that should have a kind of type.In the present embodiment, the type of packet is preferably comprised symmetrically
Ciphering type, asymmetric encryption type and add key type these three types.
Further, each packet is stored in the queue of corresponding types in step S2, if correspondence class
The queue of type does not exist, then create the queue of the type.After packet is stored in queue, all types of teams are counted
Data packet number in row, i.e. { Class1 quantity, the quantity of type 2, quantity ... the type m of type 3
Quantity }.After counting the pending data packet number in all types of queues, the number-of-packet in queue
When amount reaches predetermined threshold value, the queue is just transmitted, to perform step S3.
If here, the total quantity of the packet in all queues is less than above-mentioned predetermined threshold value, needing weight
New settings threshold value.Preferably, reconfigurable threshold value is 1, as long as there is a packet, will be transmitted
The packet to being processed in step S3, it is little equivalent to the data volume sent in user in the case of,
Batch operation is not carried out to the packet that queue mode is transmitted, so that unique user can obtain most fast place
Reason return speed.
Further, when in step S2, the data packet number in queue reaches predetermined threshold value, just to
When step S3 transmits the queue, so as to the queue that crypto-operation is carried out in the step S3 refers to then to deposit
The data packet number for entering has reached the queue of default threshold value.In addition, being by each in step s 2
The loading condition of encryption device come select the encryption device under cluster to receive queue carry out crypto-operation.
Preferably, selecting idle encryption device carries out crypto-operation, if without idle encryption device,
One minimum encryption device of load of selection carries out crypto-operation.Wherein, each encryption device has one
Corresponding load value { load 1, load 2, load 3 ... load n }, before encryption device treatment queue
After to change corresponding load value.Additionally, also can using various load balancings of the prior art come
The encryption device of selection treatment queue.
Based on above-mentioned crypto-operation management method identical invention thinking, another embodiment of the present invention
A kind of crypto-operation management system is also proposed, as shown in Fig. 2 the crypto-operation management system includes:
Operation layer 1, for classifying to the packet that user sends;Data Layer 2, for by each data
Bag is stored in the queue of corresponding types;And encryption device layer 3, for selecting the encryption device under cluster
Crypto-operation is carried out to the queue.
Lower mask body introduces the composition and function of each layer
First, operation layer 1
Operation layer 1 receives the packet that user is sent by different clients, and often receives a packet,
The data source of each packet is just recorded, the client of the packet is sent to know, in order to follow-up
The result of crypto-operation is come back for user.
Further, the operation layer 1 includes:Mark module 11, for the setting point of each packet
Class is identified;And sort module 12, for according to the class indication, classifying to packet.
Here, sorted packet forms the set of { Class1, type 2, type 3 ... type m },
Each packet is to that should have a kind of type.In the present embodiment, the type of packet is preferably comprised symmetrically
Ciphering type, asymmetric encryption type and add key type these three types.
Additionally, the operation layer 1 can also include transmission mechanism, for sorted packet to be sent out
Give data Layer 2;Pretreatment module can also be included, carried out with the packet according to demand to receiving
Pretreatment.
2nd, data Layer 2
Reception mechanism can be included in the data Layer 2, for receiving dividing for the transmission of the operation layer 1
Packet after class;Transmission mechanism can also be included, for sending all types of to encryption device layer
Queue.
After data Layer 2 receives packet, the data Layer 2 is incited somebody to action according to by the type of each packet
Packet is stored in the queue of corresponding types, i.e. { Class1 queue, the queue of type 2, the queue ... of type 3
Type m queues } if the queue of corresponding types does not exist, create the queue of the type.Deposited in packet
After enqueue, the data Layer 2 counts the data packet number in all types of queues, i.e., and Class1 quantity,
The quantity of type 2, quantity ... the type m quantity of type 3 }.Count pending in all types of queues
After data packet number, when the data packet number preferably in queue reaches default threshold value, just transmission should
Queue carries out crypto-operation to encryption device layer.
Accordingly, the data Layer 2 at least includes:Queue management module 21, for creating and managing queue;
Packet management module 22, the queue for each packet to be stored in corresponding types;And threshold management
Module 23, the threshold value for setting the data packet number being stored in individual queue.
Wherein, if the total quantity of the packet in all queues is less than above-mentioned default threshold value, need
Threshold value is reset by threshold management module 23.Preferably, reconfigurable threshold value is 1.In threshold value
In the case of 1, as long as there is a packet, will transmit the packet to encryption device layer carry out it is close
Code computing, it is little equivalent to the data volume sent in user in the case of, the number not transmitted to queue mode
Batch operation is carried out according to bag, so that unique user can obtain most fast treatment return speed.
3rd, encryption device layer 3
Further, the encryption device layer 3 includes:At least one encryption device 31, for described
Queue carries out crypto-operation;And apparatus of load management module 32, for managing the negative of all encryption devices
Carry.
With reference to the function of above-mentioned threshold management module 23, the team of crypto-operation is carried out in each encryption device
Row are then preferably the queue that the data packet number being stored in has reached default threshold value.Additionally, negative by equipment
Management module 32 is carried, encryption device layer is to load to select to carry out crypto-operation based on each encryption device
Encryption device.Preferably, selecting idle encryption device carries out crypto-operation, if without the free time
Encryption device, then select a minimum encryption device of load to carry out crypto-operation.Wherein, each password
Equipment has a corresponding load value { load 1, load 2, load 3 ... load n }, and password sets
Corresponding load value is changed before and after standby treatment queue.Additionally, also can be using of the prior art various negative
Balance policy is carried to select the encryption device for the treatment of queue.
Further, the encryption device layer 3 is also needed to after crypto-operation terminates, at user feedback
Reason result, the process of the feedback is mainly:Result queue is returned to data Layer by encryption device layer 3
2, the quantity of the pending data bag in the queue of the modification corresponding types of data Layer 2, and return to business
Business is returned to correspondence user by layer 1, operation layer 1 further according to the data source of record.
In addition, crypto-operation management method and crypto-operation management system in two embodiments of the invention
Be particularly well-suited to mass data crypto-operation management, its relative to prior art, mainly in terms of two
Improve the efficiency of crypto-operation management:
1) for encryption device, due to its ardware feature, intersect on same encryption device and do difference
The crypto-operation of type and continuously do the crypto-operation of same type, external expressive velocity be it is different, even
The crypto-operation of continuous same type can save the time read hardware cache and carry out pattern switching, therefore after
Person's speed often substantially exceeds the former.
2) the small data packets classification composition of magnanimity, queue carries out unified batch processing one by one, reduces
The direct frequent data item interaction of each layering of system, improves the whole efficiency of crypto-operation.
In sum, in two embodiments of the invention crypto-operation management method and crypto-operation management
System is carried out classifying and integrated to the data of magnanimity, and classification distribution is carried out to encryption device, and dynamic adjustment is appointed
Business distribution, optimizes the processing speed of encryption device, improves the whole efficiency of crypto-operation.
Here, it will be appreciated that in each square frame and flow chart and/or block diagram of flow chart and/or block diagram
The combination of each square frame, can be realized by computer-readable program instructions.These computer-readable programs refer to
Order can be supplied to the treatment of all-purpose computer, special-purpose computer or other programmable data processing units
Device, so as to produce a kind of machine so that these instructions are at by computer or other programmable datas
When managing the computing device of device, in generating one or more square frames realized in flow chart and/or block diagram
The device of the function/action of regulation.These computer-readable program instructions can also be stored can in computer
Read storage medium in, these instruct cause computer, programmable data processing unit and/or other equipment with
Ad hoc fashion works, so that, the computer-readable medium of the instruction that is stored with then includes a manufacture, its
Each side of function/action specified in one or more square frames in including realizing flow chart and/or block diagram
The instruction in face.Computer-readable program instructions can also be loaded at computer, other programmable datas
Reason device or miscellaneous equipment on so that computer, other programmable data processing units or other set
Standby upper execution series of operation steps, to produce computer implemented process so that computer,
The instruction performed in other programmable data processing units or miscellaneous equipment is realized in flow chart and/or block diagram
One or more square frames specified in function/action.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited
Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention
Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special
Levy, in the case of reconcilable, can be combined by any suitable means.In order to avoid need not
The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its
Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.
Claims (10)
1. a kind of crypto-operation management method under cipher server cluster, it is characterised in that the password
Computing management method includes:
The packet that user sends is classified;
Each packet is stored in the queue of corresponding types;And
Encryption device under selection cipher server cluster carries out crypto-operation to the queue.
2. crypto-operation management method according to claim 1, it is characterised in that described pair with
The packet that family sends carries out classification to be included:Class indication is set to each packet.
3. crypto-operation management method according to claim 1, it is characterised in that it is described will be each
The queue that individual packet is stored in corresponding types includes:Each packet is stored in the queue of corresponding types
In, if the queue of corresponding types does not exist, create the queue of the type.
4. crypto-operation management method according to claim 1, it is characterised in that the selection
Encryption device under cipher server cluster carries out crypto-operation to the queue to be included:In the queue
In data packet number when reaching default threshold value, the encryption device under selection cipher server cluster is to institute
Stating queue carries out crypto-operation.
5. crypto-operation management method according to any one of claim 1 to 4, its feature exists
In the crypto-operation management method also includes:
According to the result of crypto-operation, the pending data bag quantity in all types of queues is changed.
6. a kind of crypto-operation management system under cipher server cluster, it is characterised in that the password
Computing management system includes:
Operation layer, for classifying to the packet that user sends;
Data Layer, for each packet to be stored in the queue of corresponding types;And
Encryption device layer, it is close for selecting the encryption device under cipher server cluster to carry out the queue
Code computing.
7. crypto-operation management system according to claim 6, it is characterised in that the business
Layer includes:
Mark module, for setting class indication to each packet;And
Sort module, for according to the class indication, classifying to packet.
8. crypto-operation management system according to claim 6, it is characterised in that the data
Layer includes:
Queue management module, for creating and managing queue;
Packet management module, the queue for each packet to be stored in corresponding types;And
Threshold management module, the threshold value for setting the data packet number being stored in individual queue;
Wherein, the data packet number during the encryption device layer is configured as in the queue reaches described
During threshold value, the encryption device under selection cipher server cluster carries out crypto-operation to the queue.
9. crypto-operation management system according to claim 6, it is characterised in that the password
Mechanical floor includes:
At least one encryption device, for carrying out crypto-operation to the queue;And
Apparatus of load management module, the load for managing all encryption devices.
10. the crypto-operation management system according to any one of claim 6 to 9, its feature exists
In the encryption device layer is additionally operable to the result to the data Layer feedback cipher computing, and described
Data Layer is additionally operable to, according to the result, change the pending data bag number in all types of queues
Amount.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510983361.7A CN106921607B (en) | 2015-12-24 | 2015-12-24 | Password operation management method and system under password server cluster |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510983361.7A CN106921607B (en) | 2015-12-24 | 2015-12-24 | Password operation management method and system under password server cluster |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106921607A true CN106921607A (en) | 2017-07-04 |
| CN106921607B CN106921607B (en) | 2020-06-26 |
Family
ID=59456946
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510983361.7A Active CN106921607B (en) | 2015-12-24 | 2015-12-24 | Password operation management method and system under password server cluster |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106921607B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110866264A (en) * | 2019-11-15 | 2020-03-06 | 成都卫士通信息产业股份有限公司 | Multi-chip and multi-board cooperative operation method, device and equipment |
| CN119276631A (en) * | 2024-11-25 | 2025-01-07 | 中电信量子科技有限公司 | Cryptographic device large flow data processing method, system and storage medium |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1815947A (en) * | 2005-01-31 | 2006-08-09 | 成都卫士通信息产业股份有限公司 | Frame-group enciphoring method for network enciphoring machine |
| CN102023888A (en) * | 2010-11-04 | 2011-04-20 | 北京曙光天演信息技术有限公司 | Virtual device based on multiple encryption cards |
| US8218651B1 (en) * | 2006-02-28 | 2012-07-10 | Arris Group, Inc | System and method for splicing |
| CN102970142A (en) * | 2012-12-11 | 2013-03-13 | 成都卫士通信息产业股份有限公司 | Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment |
| CN104335495A (en) * | 2012-05-03 | 2015-02-04 | 适应性频谱和信号校正股份有限公司 | Apparatus, systems and methods for DSM energy management |
| US8977841B2 (en) * | 2011-12-16 | 2015-03-10 | International Business Machines Corporation | Sending messages by oblivious transfer |
| CN104951688A (en) * | 2014-03-24 | 2015-09-30 | 国家计算机网络与信息安全管理中心 | Special data encryption method and encryption card suitable for Xen virtualized environment |
-
2015
- 2015-12-24 CN CN201510983361.7A patent/CN106921607B/en active Active
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1815947A (en) * | 2005-01-31 | 2006-08-09 | 成都卫士通信息产业股份有限公司 | Frame-group enciphoring method for network enciphoring machine |
| US8218651B1 (en) * | 2006-02-28 | 2012-07-10 | Arris Group, Inc | System and method for splicing |
| CN102023888A (en) * | 2010-11-04 | 2011-04-20 | 北京曙光天演信息技术有限公司 | Virtual device based on multiple encryption cards |
| US8977841B2 (en) * | 2011-12-16 | 2015-03-10 | International Business Machines Corporation | Sending messages by oblivious transfer |
| CN104335495A (en) * | 2012-05-03 | 2015-02-04 | 适应性频谱和信号校正股份有限公司 | Apparatus, systems and methods for DSM energy management |
| CN102970142A (en) * | 2012-12-11 | 2013-03-13 | 成都卫士通信息产业股份有限公司 | Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment |
| CN104951688A (en) * | 2014-03-24 | 2015-09-30 | 国家计算机网络与信息安全管理中心 | Special data encryption method and encryption card suitable for Xen virtualized environment |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110866264A (en) * | 2019-11-15 | 2020-03-06 | 成都卫士通信息产业股份有限公司 | Multi-chip and multi-board cooperative operation method, device and equipment |
| CN119276631A (en) * | 2024-11-25 | 2025-01-07 | 中电信量子科技有限公司 | Cryptographic device large flow data processing method, system and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106921607B (en) | 2020-06-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yang et al. | Age-based scheduling policy for federated learning in mobile edge networks | |
| Gai et al. | Reinforcement learning-based content-centric services in mobile sensing | |
| Zhao et al. | System optimization of federated learning networks with a constrained latency | |
| CN105637925B (en) | Dynamic frequency and power resource allocation with refinement tactical management | |
| US10142407B2 (en) | Centralized load balancer with weighted hash function | |
| CN107196869A (en) | The adaptive load balancing method, apparatus and system of Intrusion Detection based on host actual loading | |
| Borkar et al. | Opportunistic scheduling as restless bandits | |
| CN104657207B (en) | Dispatching method, service server and the scheduling system of remote authorization request | |
| CN105656973A (en) | Distributed method and system for scheduling tasks in node group | |
| Muhammad et al. | Minimizing age of information in multiaccess-edge-computing-assisted IoT networks | |
| EP2789147B1 (en) | Method and apparatus for load balancing in communication system | |
| CN106685494A (en) | A packet scheduling method and device in a MU‑MIMO system | |
| CN103346978B (en) | A kind of virtual machine network bandwidth fairness and stability support method | |
| US20170046296A1 (en) | Data processing apparatus and terminal | |
| JP2013545199A5 (en) | ||
| CN106484805A (en) | A kind of data export method and data handling system | |
| CN108055701A (en) | A kind of resource regulating method and base station | |
| CN106921607A (en) | Crypto-operation management method and system under a kind of cipher server cluster | |
| Hao et al. | Human-like hybrid caching in software-defined edge cloud | |
| CN104580322B (en) | Distributed data stream processing method and device | |
| CN102958182B (en) | A kind of method and system of cognitive radio fairness dispatch | |
| CN106534247B (en) | The method and apparatus of list downloading | |
| CN106851667B (en) | A kind of data processing method and device for air protocol data surface | |
| US11374869B2 (en) | Managing bandwidth based on user behavior | |
| CN104301241A (en) | A SOA dynamic load distribution method and system |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |