[go: up one dir, main page]

CN106921607A - Crypto-operation management method and system under a kind of cipher server cluster - Google Patents

Crypto-operation management method and system under a kind of cipher server cluster Download PDF

Info

Publication number
CN106921607A
CN106921607A CN201510983361.7A CN201510983361A CN106921607A CN 106921607 A CN106921607 A CN 106921607A CN 201510983361 A CN201510983361 A CN 201510983361A CN 106921607 A CN106921607 A CN 106921607A
Authority
CN
China
Prior art keywords
crypto
queue
packet
encryption device
operation management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510983361.7A
Other languages
Chinese (zh)
Other versions
CN106921607B (en
Inventor
钟源
王申
郑杰骞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aisino Corp
Original Assignee
Aisino Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aisino Corp filed Critical Aisino Corp
Priority to CN201510983361.7A priority Critical patent/CN106921607B/en
Publication of CN106921607A publication Critical patent/CN106921607A/en
Application granted granted Critical
Publication of CN106921607B publication Critical patent/CN106921607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The present invention relates to cryptographic service field, the crypto-operation management method and system under a kind of cipher server cluster are disclosed, the crypto-operation management method includes:The packet that user sends is classified;Each packet is stored in the queue of corresponding types;And the encryption device under selection cipher server cluster carries out crypto-operation to the queue.The present invention can be carried out classifying and integrated to the data of magnanimity, and classification distribution is carried out to encryption device, optimize the processing speed of encryption device, improve the whole efficiency of crypto-operation.

Description

Crypto-operation management method and system under a kind of cipher server cluster
Technical field
The present invention relates to cryptographic service field, in particular it relates to the password under a kind of cipher server cluster Computing management method and system.
Background technology
At present, the flow of the crypto-operation of cipher server cluster treatment user is:The data of user are in collection Under group the cluster bottom is reached by the process one-levels such as load balancing distribution, Business Processing, data processing level Encryption device, and obtain result another level level by computing and return to user.When number of users and number of users According within the specific limits when, server process speed can meet demand, but as number of users and user Data exceed can process range when, mass users send mass data in the case of, server is at full capacity Work, efficiency reduction, period of reservation of number extension.
The content of the invention
It is an object of the invention to provide the crypto-operation management method under a kind of cipher server cluster and it is System, for solving the problems, such as that cipher server cluster is less efficient when carrying out crypto-operation to mass data.
To achieve these goals, the present invention provides the crypto-operation management under a kind of cipher server cluster Method, the crypto-operation management method includes:The packet that user sends is classified;By each number It is stored in the queue of corresponding types according to bag;And the encryption device under selection cipher server cluster is to described Queue carries out crypto-operation.
Preferably, the packet to user's transmission carries out classification includes:To the setting point of each packet Class is identified.
Preferably, it is described to include the queue that each packet is stored in corresponding types:By each packet It is stored in the queue of corresponding types, if the queue of corresponding types does not exist, creates the queue of the type.
Preferably, the encryption device under the selection cipher server cluster carries out password fortune to the queue Including:When the data packet number in the queue reaches default threshold value, cipher server is selected Encryption device under cluster carries out crypto-operation to the queue.
Preferably, the crypto-operation management method also includes:According to the result of crypto-operation, modification Pending data bag quantity in all types of queues.
Present invention also offers the crypto-operation management system under a kind of cipher server cluster, password fortune Calculating management system includes:Operation layer, for classifying to the packet that user sends;Data Layer, uses In the queue that each packet is stored in into corresponding types;And encryption device layer, for selecting password to take Encryption device under business device cluster carries out crypto-operation to the queue.
Preferably, the operation layer includes:Mark module, for setting class indication to each packet; And sort module, for according to the class indication, classifying to packet.
Preferably, the data Layer includes:Queue management module, for creating and managing queue;Data Bag management module, the queue for each packet to be stored in corresponding types;And threshold management module, Threshold value for setting the data packet number being stored in individual queue;Wherein, the encryption device layer is configured It is when the data packet number in the queue reaches the threshold value, under selection cipher server cluster Encryption device carries out crypto-operation to the queue.
Preferably, the encryption device layer includes:At least one encryption device, for entering to the queue Row crypto-operation;And apparatus of load management module, the load for managing all encryption devices.
Preferably, the encryption device layer is additionally operable to the treatment knot to the data Layer feedback cipher computing Really, and the data Layer is additionally operable to according to the result, change pending in all types of queues Data packet number.
By above-mentioned technical proposal, the beneficial effects of the invention are as follows:The present invention can enter to the data of magnanimity Row is classified and integrated, and classification distribution is carried out to encryption device, optimizes the processing speed of encryption device, is carried The whole efficiency of crypto-operation high.
Other features and advantages of the present invention will be described in detail in subsequent specific embodiment part.
Brief description of the drawings
Accompanying drawing is, for providing a further understanding of the present invention, and to constitute the part of specification, with Following specific embodiment is used to explain the present invention together, but is not construed as limiting the invention. In accompanying drawing:
Fig. 1 is the schematic flow sheet of the crypto-operation management method in embodiments of the invention;
Fig. 2 is the structural representation of the crypto-operation management system of another embodiment of the present invention.
Description of reference numerals
The data Layer of 1 operation layer 2
3 encryption devices, 11 mark module of layer
The queue management module of 12 sort module 21
The threshold management module of 22 packet management module 23
The apparatus of load management module of 31 encryption device 32
Specific embodiment
Specific embodiment of the invention is described in detail below in conjunction with accompanying drawing.It should be appreciated that Specific embodiment described herein is merely to illustrate and explain the present invention, and is not limited to this hair It is bright.
The present invention is directed to cipher server cluster, and hereinafter signified cluster each means cipher server collection Group, the encryption device under cluster can be then cipher server, or possess crypto-operation function Terminal and equipment etc..
Embodiments of the invention give the crypto-operation management method under a kind of cluster, as shown in figure 1, The crypto-operation management method includes:Step S1, classifies to the packet that user sends;Step S2, each packet is stored in the queue of corresponding types;And step S3, it is close under selection cluster Decoding apparatus carry out crypto-operation to the queue.It should be noted that in step s3, to the team It refers to carry out crypto-operation to being stored in the queue of packet in step S2 that row carry out crypto-operation, not Queue including being stored in other types data.
Further, the crypto-operation management method can also include:According to the result of crypto-operation, Pending data bag quantity in all types of queue of modification, and the result is returned into user.
It is noted that user sends packet, therefore step S1 generally by multiple client In also need to the data source of record data bag, after subsequently returning to cryptographic calculation to each client Result.
Further, in the step S1, classification is carried out to the packet that user sends and is specifically included: Class indication is set to each packet, each data carries class indication after classification, according to the classification Mark, it is possible to which class indication identical packet is divided into same type.
Here, sorted packet forms the set of { Class1, type 2, type 3 ... type m }, Each packet is to that should have a kind of type.In the present embodiment, the type of packet is preferably comprised symmetrically Ciphering type, asymmetric encryption type and add key type these three types.
Further, each packet is stored in the queue of corresponding types in step S2, if correspondence class The queue of type does not exist, then create the queue of the type.After packet is stored in queue, all types of teams are counted Data packet number in row, i.e. { Class1 quantity, the quantity of type 2, quantity ... the type m of type 3 Quantity }.After counting the pending data packet number in all types of queues, the number-of-packet in queue When amount reaches predetermined threshold value, the queue is just transmitted, to perform step S3.
If here, the total quantity of the packet in all queues is less than above-mentioned predetermined threshold value, needing weight New settings threshold value.Preferably, reconfigurable threshold value is 1, as long as there is a packet, will be transmitted The packet to being processed in step S3, it is little equivalent to the data volume sent in user in the case of, Batch operation is not carried out to the packet that queue mode is transmitted, so that unique user can obtain most fast place Reason return speed.
Further, when in step S2, the data packet number in queue reaches predetermined threshold value, just to When step S3 transmits the queue, so as to the queue that crypto-operation is carried out in the step S3 refers to then to deposit The data packet number for entering has reached the queue of default threshold value.In addition, being by each in step s 2 The loading condition of encryption device come select the encryption device under cluster to receive queue carry out crypto-operation. Preferably, selecting idle encryption device carries out crypto-operation, if without idle encryption device, One minimum encryption device of load of selection carries out crypto-operation.Wherein, each encryption device has one Corresponding load value { load 1, load 2, load 3 ... load n }, before encryption device treatment queue After to change corresponding load value.Additionally, also can using various load balancings of the prior art come The encryption device of selection treatment queue.
Based on above-mentioned crypto-operation management method identical invention thinking, another embodiment of the present invention A kind of crypto-operation management system is also proposed, as shown in Fig. 2 the crypto-operation management system includes: Operation layer 1, for classifying to the packet that user sends;Data Layer 2, for by each data Bag is stored in the queue of corresponding types;And encryption device layer 3, for selecting the encryption device under cluster Crypto-operation is carried out to the queue.
Lower mask body introduces the composition and function of each layer
First, operation layer 1
Operation layer 1 receives the packet that user is sent by different clients, and often receives a packet, The data source of each packet is just recorded, the client of the packet is sent to know, in order to follow-up The result of crypto-operation is come back for user.
Further, the operation layer 1 includes:Mark module 11, for the setting point of each packet Class is identified;And sort module 12, for according to the class indication, classifying to packet.
Here, sorted packet forms the set of { Class1, type 2, type 3 ... type m }, Each packet is to that should have a kind of type.In the present embodiment, the type of packet is preferably comprised symmetrically Ciphering type, asymmetric encryption type and add key type these three types.
Additionally, the operation layer 1 can also include transmission mechanism, for sorted packet to be sent out Give data Layer 2;Pretreatment module can also be included, carried out with the packet according to demand to receiving Pretreatment.
2nd, data Layer 2
Reception mechanism can be included in the data Layer 2, for receiving dividing for the transmission of the operation layer 1 Packet after class;Transmission mechanism can also be included, for sending all types of to encryption device layer Queue.
After data Layer 2 receives packet, the data Layer 2 is incited somebody to action according to by the type of each packet Packet is stored in the queue of corresponding types, i.e. { Class1 queue, the queue of type 2, the queue ... of type 3 Type m queues } if the queue of corresponding types does not exist, create the queue of the type.Deposited in packet After enqueue, the data Layer 2 counts the data packet number in all types of queues, i.e., and Class1 quantity, The quantity of type 2, quantity ... the type m quantity of type 3 }.Count pending in all types of queues After data packet number, when the data packet number preferably in queue reaches default threshold value, just transmission should Queue carries out crypto-operation to encryption device layer.
Accordingly, the data Layer 2 at least includes:Queue management module 21, for creating and managing queue; Packet management module 22, the queue for each packet to be stored in corresponding types;And threshold management Module 23, the threshold value for setting the data packet number being stored in individual queue.
Wherein, if the total quantity of the packet in all queues is less than above-mentioned default threshold value, need Threshold value is reset by threshold management module 23.Preferably, reconfigurable threshold value is 1.In threshold value In the case of 1, as long as there is a packet, will transmit the packet to encryption device layer carry out it is close Code computing, it is little equivalent to the data volume sent in user in the case of, the number not transmitted to queue mode Batch operation is carried out according to bag, so that unique user can obtain most fast treatment return speed.
3rd, encryption device layer 3
Further, the encryption device layer 3 includes:At least one encryption device 31, for described Queue carries out crypto-operation;And apparatus of load management module 32, for managing the negative of all encryption devices Carry.
With reference to the function of above-mentioned threshold management module 23, the team of crypto-operation is carried out in each encryption device Row are then preferably the queue that the data packet number being stored in has reached default threshold value.Additionally, negative by equipment Management module 32 is carried, encryption device layer is to load to select to carry out crypto-operation based on each encryption device Encryption device.Preferably, selecting idle encryption device carries out crypto-operation, if without the free time Encryption device, then select a minimum encryption device of load to carry out crypto-operation.Wherein, each password Equipment has a corresponding load value { load 1, load 2, load 3 ... load n }, and password sets Corresponding load value is changed before and after standby treatment queue.Additionally, also can be using of the prior art various negative Balance policy is carried to select the encryption device for the treatment of queue.
Further, the encryption device layer 3 is also needed to after crypto-operation terminates, at user feedback Reason result, the process of the feedback is mainly:Result queue is returned to data Layer by encryption device layer 3 2, the quantity of the pending data bag in the queue of the modification corresponding types of data Layer 2, and return to business Business is returned to correspondence user by layer 1, operation layer 1 further according to the data source of record.
In addition, crypto-operation management method and crypto-operation management system in two embodiments of the invention Be particularly well-suited to mass data crypto-operation management, its relative to prior art, mainly in terms of two Improve the efficiency of crypto-operation management:
1) for encryption device, due to its ardware feature, intersect on same encryption device and do difference The crypto-operation of type and continuously do the crypto-operation of same type, external expressive velocity be it is different, even The crypto-operation of continuous same type can save the time read hardware cache and carry out pattern switching, therefore after Person's speed often substantially exceeds the former.
2) the small data packets classification composition of magnanimity, queue carries out unified batch processing one by one, reduces The direct frequent data item interaction of each layering of system, improves the whole efficiency of crypto-operation.
In sum, in two embodiments of the invention crypto-operation management method and crypto-operation management System is carried out classifying and integrated to the data of magnanimity, and classification distribution is carried out to encryption device, and dynamic adjustment is appointed Business distribution, optimizes the processing speed of encryption device, improves the whole efficiency of crypto-operation.
Here, it will be appreciated that in each square frame and flow chart and/or block diagram of flow chart and/or block diagram The combination of each square frame, can be realized by computer-readable program instructions.These computer-readable programs refer to Order can be supplied to the treatment of all-purpose computer, special-purpose computer or other programmable data processing units Device, so as to produce a kind of machine so that these instructions are at by computer or other programmable datas When managing the computing device of device, in generating one or more square frames realized in flow chart and/or block diagram The device of the function/action of regulation.These computer-readable program instructions can also be stored can in computer Read storage medium in, these instruct cause computer, programmable data processing unit and/or other equipment with Ad hoc fashion works, so that, the computer-readable medium of the instruction that is stored with then includes a manufacture, its Each side of function/action specified in one or more square frames in including realizing flow chart and/or block diagram The instruction in face.Computer-readable program instructions can also be loaded at computer, other programmable datas Reason device or miscellaneous equipment on so that computer, other programmable data processing units or other set Standby upper execution series of operation steps, to produce computer implemented process so that computer, The instruction performed in other programmable data processing units or miscellaneous equipment is realized in flow chart and/or block diagram One or more square frames specified in function/action.
The preferred embodiment of the present invention is described in detail above in association with accompanying drawing, but, the present invention is not limited Detail in above-mentioned implementation method, in range of the technology design of the invention, can be to the present invention Technical scheme carry out various simple variants, these simple variants belong to protection scope of the present invention.
It is further to note that each particular technique described in above-mentioned specific embodiment is special Levy, in the case of reconcilable, can be combined by any suitable means.In order to avoid need not The repetition wanted, the present invention is no longer separately illustrated to various possible combinations.
Additionally, can also be combined between a variety of implementation methods of the invention, as long as its Without prejudice to thought of the invention, it should equally be considered as content disclosed in this invention.

Claims (10)

1. a kind of crypto-operation management method under cipher server cluster, it is characterised in that the password Computing management method includes:
The packet that user sends is classified;
Each packet is stored in the queue of corresponding types;And
Encryption device under selection cipher server cluster carries out crypto-operation to the queue.
2. crypto-operation management method according to claim 1, it is characterised in that described pair with The packet that family sends carries out classification to be included:Class indication is set to each packet.
3. crypto-operation management method according to claim 1, it is characterised in that it is described will be each The queue that individual packet is stored in corresponding types includes:Each packet is stored in the queue of corresponding types In, if the queue of corresponding types does not exist, create the queue of the type.
4. crypto-operation management method according to claim 1, it is characterised in that the selection Encryption device under cipher server cluster carries out crypto-operation to the queue to be included:In the queue In data packet number when reaching default threshold value, the encryption device under selection cipher server cluster is to institute Stating queue carries out crypto-operation.
5. crypto-operation management method according to any one of claim 1 to 4, its feature exists In the crypto-operation management method also includes:
According to the result of crypto-operation, the pending data bag quantity in all types of queues is changed.
6. a kind of crypto-operation management system under cipher server cluster, it is characterised in that the password Computing management system includes:
Operation layer, for classifying to the packet that user sends;
Data Layer, for each packet to be stored in the queue of corresponding types;And
Encryption device layer, it is close for selecting the encryption device under cipher server cluster to carry out the queue Code computing.
7. crypto-operation management system according to claim 6, it is characterised in that the business Layer includes:
Mark module, for setting class indication to each packet;And
Sort module, for according to the class indication, classifying to packet.
8. crypto-operation management system according to claim 6, it is characterised in that the data Layer includes:
Queue management module, for creating and managing queue;
Packet management module, the queue for each packet to be stored in corresponding types;And
Threshold management module, the threshold value for setting the data packet number being stored in individual queue;
Wherein, the data packet number during the encryption device layer is configured as in the queue reaches described During threshold value, the encryption device under selection cipher server cluster carries out crypto-operation to the queue.
9. crypto-operation management system according to claim 6, it is characterised in that the password Mechanical floor includes:
At least one encryption device, for carrying out crypto-operation to the queue;And
Apparatus of load management module, the load for managing all encryption devices.
10. the crypto-operation management system according to any one of claim 6 to 9, its feature exists In the encryption device layer is additionally operable to the result to the data Layer feedback cipher computing, and described Data Layer is additionally operable to, according to the result, change the pending data bag number in all types of queues Amount.
CN201510983361.7A 2015-12-24 2015-12-24 Password operation management method and system under password server cluster Active CN106921607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510983361.7A CN106921607B (en) 2015-12-24 2015-12-24 Password operation management method and system under password server cluster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510983361.7A CN106921607B (en) 2015-12-24 2015-12-24 Password operation management method and system under password server cluster

Publications (2)

Publication Number Publication Date
CN106921607A true CN106921607A (en) 2017-07-04
CN106921607B CN106921607B (en) 2020-06-26

Family

ID=59456946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510983361.7A Active CN106921607B (en) 2015-12-24 2015-12-24 Password operation management method and system under password server cluster

Country Status (1)

Country Link
CN (1) CN106921607B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866264A (en) * 2019-11-15 2020-03-06 成都卫士通信息产业股份有限公司 Multi-chip and multi-board cooperative operation method, device and equipment
CN119276631A (en) * 2024-11-25 2025-01-07 中电信量子科技有限公司 Cryptographic device large flow data processing method, system and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1815947A (en) * 2005-01-31 2006-08-09 成都卫士通信息产业股份有限公司 Frame-group enciphoring method for network enciphoring machine
CN102023888A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Virtual device based on multiple encryption cards
US8218651B1 (en) * 2006-02-28 2012-07-10 Arris Group, Inc System and method for splicing
CN102970142A (en) * 2012-12-11 2013-03-13 成都卫士通信息产业股份有限公司 Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment
CN104335495A (en) * 2012-05-03 2015-02-04 适应性频谱和信号校正股份有限公司 Apparatus, systems and methods for DSM energy management
US8977841B2 (en) * 2011-12-16 2015-03-10 International Business Machines Corporation Sending messages by oblivious transfer
CN104951688A (en) * 2014-03-24 2015-09-30 国家计算机网络与信息安全管理中心 Special data encryption method and encryption card suitable for Xen virtualized environment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1815947A (en) * 2005-01-31 2006-08-09 成都卫士通信息产业股份有限公司 Frame-group enciphoring method for network enciphoring machine
US8218651B1 (en) * 2006-02-28 2012-07-10 Arris Group, Inc System and method for splicing
CN102023888A (en) * 2010-11-04 2011-04-20 北京曙光天演信息技术有限公司 Virtual device based on multiple encryption cards
US8977841B2 (en) * 2011-12-16 2015-03-10 International Business Machines Corporation Sending messages by oblivious transfer
CN104335495A (en) * 2012-05-03 2015-02-04 适应性频谱和信号校正股份有限公司 Apparatus, systems and methods for DSM energy management
CN102970142A (en) * 2012-12-11 2013-03-13 成都卫士通信息产业股份有限公司 Method and system for concurrently encrypting and decrypting virtual private network (VPN) equipment in multi-encryption-card environment
CN104951688A (en) * 2014-03-24 2015-09-30 国家计算机网络与信息安全管理中心 Special data encryption method and encryption card suitable for Xen virtualized environment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110866264A (en) * 2019-11-15 2020-03-06 成都卫士通信息产业股份有限公司 Multi-chip and multi-board cooperative operation method, device and equipment
CN119276631A (en) * 2024-11-25 2025-01-07 中电信量子科技有限公司 Cryptographic device large flow data processing method, system and storage medium

Also Published As

Publication number Publication date
CN106921607B (en) 2020-06-26

Similar Documents

Publication Publication Date Title
Yang et al. Age-based scheduling policy for federated learning in mobile edge networks
Gai et al. Reinforcement learning-based content-centric services in mobile sensing
Zhao et al. System optimization of federated learning networks with a constrained latency
CN105637925B (en) Dynamic frequency and power resource allocation with refinement tactical management
US10142407B2 (en) Centralized load balancer with weighted hash function
CN107196869A (en) The adaptive load balancing method, apparatus and system of Intrusion Detection based on host actual loading
Borkar et al. Opportunistic scheduling as restless bandits
CN104657207B (en) Dispatching method, service server and the scheduling system of remote authorization request
CN105656973A (en) Distributed method and system for scheduling tasks in node group
Muhammad et al. Minimizing age of information in multiaccess-edge-computing-assisted IoT networks
EP2789147B1 (en) Method and apparatus for load balancing in communication system
CN106685494A (en) A packet scheduling method and device in a MU‑MIMO system
CN103346978B (en) A kind of virtual machine network bandwidth fairness and stability support method
US20170046296A1 (en) Data processing apparatus and terminal
JP2013545199A5 (en)
CN106484805A (en) A kind of data export method and data handling system
CN108055701A (en) A kind of resource regulating method and base station
CN106921607A (en) Crypto-operation management method and system under a kind of cipher server cluster
Hao et al. Human-like hybrid caching in software-defined edge cloud
CN104580322B (en) Distributed data stream processing method and device
CN102958182B (en) A kind of method and system of cognitive radio fairness dispatch
CN106534247B (en) The method and apparatus of list downloading
CN106851667B (en) A kind of data processing method and device for air protocol data surface
US11374869B2 (en) Managing bandwidth based on user behavior
CN104301241A (en) A SOA dynamic load distribution method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant