CN109901924A - A kind of software technology and method of general all things on earth interconnection - Google Patents

A kind of software technology and method of general all things on earth interconnection Download PDF

Info

Publication number
CN109901924A
CN109901924A CN201711291675.6A CN201711291675A CN109901924A CN 109901924 A CN109901924 A CN 109901924A CN 201711291675 A CN201711291675 A CN 201711291675A CN 109901924 A CN109901924 A CN 109901924A
Authority
CN
China
Prior art keywords
node
data
relationship
application program
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711291675.6A
Other languages
Chinese (zh)
Inventor
夏远曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuan Bit Technology Co Ltd
Original Assignee
Beijing Yuan Bit Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuan Bit Technology Co Ltd filed Critical Beijing Yuan Bit Technology Co Ltd
Priority to CN201711291675.6A priority Critical patent/CN109901924A/en
Publication of CN109901924A publication Critical patent/CN109901924A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of software technology and method of general all things on earth interconnection, it is by general purpose application program gridding technology and its authentication mechanism, by all computing unit connections in each field of the every profession and trade of access information cyberspace at a unified calculating space, make a kind of technical foundation and network environment that general all things on earth interconnects, builds together, base support is provided for the unified big data environment of building diversification, powerful network computing resources are provided for artificial intelligence and integrate entire society's strength, provide the support built together to break through important technical difficult point;By authenticating this faith mechanism, the safety of information technology is greatly increased;The general technology for proposing all things on earth interconnection of the invention, grid computing technology is applied in general application program, make the grid of general application layer, for construct interconnect, shared open and more excellent than cloud computing safer generation information technology provides technical foundation.

Description

A kind of software technology and method of general all things on earth interconnection
Technical field
The present invention relates to the software technologies and method of the interconnection of general all things on earth.
Background technique
With the development that Internet technology and mobile Internet are fallen, types of applications software emerges one after another, Internet user It is more and more with the equipment of access internet, however information technology has many limitations at present, these limitations are most outstanding Performance is application isolated island and the data silo that current Internet technology occurs, so-called application isolated island and data silo, is referred to various Software application is fought separately, almost nil in application and the mutual fusion degree of data plane between software and software, Each software possesses oneself specific function and distinctive data, comparatively the function of software compares fixation, extension, upgrading It needs to develop again, or in the form of functional module, also or is in the form of plug-in unit;In addition, the number of application program oneself It is shared according to there's almost no between other applications, cause each software to enclose one piece of one's own data, as island It is equally respectively isolated.
All things on earth interconnection at present is the technology to have swept the globe a heat, and information technology field pursuit, which is interconnected, is not only government Or the inexorable trend of needs and information technology self-growth of the enterprise in information technology, such as big data, artificial intelligence Deng to information technology in the shared opening of data and technology, being badly in need of interconnecting, build together: on the one hand, the independence of software The phenomenon that property and business model cause technology isolated island, the inheritability of application program is very poor at present, artificial intelligence and big data Scientific research threshold it is high, often investment and output serious unbalance, interconnect, everybody wisdom can be combined by building together, breakthrough Scientific research level saves research and development cost;On the other hand, application program is high to the dependence of computing resource, the calculating energy of single device Power is again very limited, and a large amount of idle and utilization rates of entire society's computing resource are not high, and many social computing resources is caused to obtain Less than the technology elimination for being just updated the replacement is made full use of, causes social production data and produce the huge waste of the energy, people Class, which needs to break through, applies isolated island, data silo, and the status of technology isolated island constructs unified polynary data system, application system It is the future of information technology field with counting system.
Summary of the invention
The present invention is exactly to propose a kind of new general information technology to solve the above-mentioned problems, it is therefore an objective to solve letter Breath field includes interconnecting, being shared total for all information technology fields of internet, industry manufacture, domestic intelligent electric appliance etc. It builds, solves the existing application isolated island of current information technology, data silo and technology isolated island these outstanding problems, make full use of society Idle computing resource makes full use of the information technology having been carried out, and the big data environment of unified diversification is constructed, to reach To the raising for calculating efficiency, save information technology field development cost, calculate cost, resources costs and save the social energy and The purpose of resource.
To achieve the goals above, the present invention takes following scheme.
A kind of software technology and method of general all things on earth interconnection, calculate skill based on a kind of general application program gridding On the basis of art and method.
Described one kind general application program gridding computing technique and method, effect are calculated by any one Machine, smart machine or industry manufacture controlling terminal can access vast as the open sea information space, provide unlimited calculating energy Power possesses unified application method.
The information space refer to by realize general application program gridding computing technique one by one PC machine, notes Sheet, server, mobile terminal and the information control terminal in industry manufacture, domestic intelligent equipment collectively constitute, each equipment As a node in information space, is interconnected, shared by a kind of safety measure realization of authentication mechanism from each other Using with data.
A kind of authentication mechanism is a kind of faith mechanism that general application program gridding computing technique provides, including Basic authentication and relationship authenticate two processes.
The basic authentication, its effect are to calculate node access to network in space, are the bases of authentication system, any Node has to pass through basic authentication, just can be with access to network system, and basic authentication gives the attribute of node, which is used for The certification of building relationship, each node can possess multiple basic authentications, that is, each node can possess multiple attributes.
The relationship certification, its main feature is that, by node attribute, manually or by automating strategy, the node of building Network of personal connections between node, the local calculation net in this network of personal connections, that is, grid system, application program by with relationship It is authentication associated, it can possess and space is calculated by the Local grid of relationship certification building.
The relationship certification, the relationship of certification include all relationships that the mankind are able to know that, including human society, substance The world and people and relationships, the structural relation including substance, the membership credentials of human society such as object, object and object, substance inside are known The structural relation of knowledge system, shengke relation, symbiosis etc., the chemical conversion of these relation forms are the method for relationship certification, are structures Make the base of relationship between each access node among the technical foundation of the big data of unified diversification, and building all things on earth interconnection Plinth, the invention patent are exactly the mechanism authenticated by this relationship, building all things on earth interconnection.
The all things on earth interconnection, characterized in that including following some interconnection examples.
1) relationship between node and node controls node and manufacturing technology node is all being counted such as in industrial manufacture view It calculates in space, between the node of control centre and the node of manufacturing center, may be constructed control relationship, only possess this control The certification both sides of relationship, could be in the upper Application share realizing control and being managed of application.
2) relationship between application program and node needs to replicate application programs when such as applying gridding Onto formulation node.
3) relationship between application program and data, as between Students'Management System and school student data, configuration program With the relationship of data.
4) relationship between application program and application program is constituted as between face recognition technology and voice recognition technology The three-dimensional application relationship of mankind's identification of a set of diversification.
5) relationship between people and object constitutes the control relationship of people and object as between mobile terminal and domestic intelligent electric appliance.
6) interpersonal relationship, as, by personal relationship's authentication mechanism, reached between mobile terminal node and constituting people A kind of relationship body being certified between people.
7) relationship between people and data, if the mankind use mobile terminal, knowledge needed for searching or commodity, this composition Various general character between data and the mankind or special relationship, so-called general character relationship, i.e., universal relationship, knowledge is for people It is exactly a kind of universal relationship, for certain knowledge for owner, the relationship of foundation is all same relationship for class;It is special Different relationship refers to the single-relation between someone and some data, if the resume of someone and oneself is special relationship, with it Other people are unrelated.
8) relationship between people and application program such as formulates people and mobile terminal binding real-name authentication, will constitute people and net Lattice calculate the use of all application programs and the relationship used in space.
9) relationship between object and object, in industrial manufacturing process, control between various manufacturing processes control nodes with And the relationship in process.
Described one kind general application program gridding computing technique and method, including general grid computing environment technology and The gridding of application executes two links, characterized in that described applies gridding process, wherein application include application program and Using data.
The grid computing, effect is can to provide unlimited computing capability by any computer, can be with Access vast as the open sea information.
The general grid computing environment is exactly the software support that grid computing needs, passes through across the language operation of program When virtualization technology as basic environment, the PC machine of virtualization technology, notebook, clothes when by being mounted with across language operation one by one The integrated environment that device, mobile terminal and other information processing systems with computing capability of being engaged in form, is each mounted with across language The system of virtualization technology is all a calculating node in grid computing environment when operation, these nodes pass through application program Gridding technical organization at a calculating net, provide computing resource for application program.
The virtualization technology when application program across language operation, including source code translation device, intermediate code manager, centre Code interpreter, host language library, host language expanding library, host language run-time library.
The source code translation device is the tool for application source code to be translated into intermediate code processing, it can The source code of the different grammatical forms such as java/c++/c/c#, the intermediate code of unified format is translated into.
The intermediate code, i.e., the standard code obtained by source code translation device are the standard codes that interpreter directly uses.
The intermediate code manager, the functions such as storage, inquiry, deletion, sharing of intermediate code.
The intermediate code, characterized in that execute logic including standard interface, standard.
The standard interface, effect one are to execute the unique identification of logic, and program finds execution by standard interface Logic, another effect of standard interface are the far call API Names for interaction using opening.
The effect of the standard execution logic is the execution body of function.
The effect of the java standard library is the function library with fixed function packaged in advance.
The intermediate code interpreter is the tool for translating into host language and executing intermediate code.
The intermediate code, is stored as unit of function, is stored in different hosts language environment using unified formatted data.
The host language is currently a popular various development languages, including java, c#, c++, c, js, go etc..
Virtualization technology when across the language operation refers in different language operation, passes through intermediate code interpreter, indifference It is other to explain the intermediate code for executing the application program of unified standard, it is separated to reach application program with language environment.
The application program is separated with language environment, and wherein application program is also to separate with execution function, both points It is to realize that application is inherited to inherit with technical experience from being the key that realize that across the language virtual technology of application program is also direct purpose Basis;So that application program or function obtain adequately accessible share.
The application program separated with language environment and application program with execute function be also to separate, characterized in that packet Include following implemented step.
Step 1: application source code is translated into intermediate code by source code translation device.
Step 2: intermediate code manager as unit of the computing unit function of application program, will record annotation, the name of function Title parameter, executes all information such as body, and records the call relation between function, while intermediate code uses unified data Format saves, and stores since intermediate code is as unit of function, and using Uniform data format, and function is separated with application, Function can be called for different applications, and indifference executes, and solve to separate using and function.
Step 3: will be using several independent utility units are divided, each applying unit uses unique identification, uses independence Applying unit unique identification is associated with entrance function, several independent utility units constitute a complete application program.
Step 4: since the intermediate code in second step is as unit of function, in different language environments, all using unified Data format storage, can realize under different language environments in this way, the indiscriminate execution of intermediate code, institute can be made By operated by third step formed as unit of independent utility unit, can be 1 independent utility unit, can be entire application All independent utility units of program by the entrance function of each independent utility unit, and pass through entrance function and other letters All information such as required all functions and its annotation, title, parameter, execution body are extracted, will be mentioned by several call relations The application come out moves to the performing environment of virtual technology when being mounted with across language operation by way of network data flow In.
Step 5: migration to target program received intermediate code data are saved in local intermediate code database, Thus complete entire transition process, that is, the realization that application program is separated with software execution environment.
Step 6: executed by host language interpreter (across language virtual machine) indiscriminate explanations, realize application with Software separation, that is, solve the inheritance of application.
Virtualization technology when across the language operation, effect is to realize that application program is separated with performing environment, so that answering With program can indifference be implemented in different language runtime environment, virtualization technology solves the present invention specially when across language operation The basic technology of isolated island and data silo is applied in the solution that benefit proposes, after application program is separated with performing environment, using journey Sequence will be no longer belong to a certain specific software, but can with the other software phase across Language Runtime virtual machine is equally installed It is mutually shared.
The gridding technology of the application program, characterized in that including authentication center, certificate manager, gridding processing Device, application program execute manager composition.
The authentication center, characterized in that its effect is the control centre of certification.
The certificate manager, characterized in that in each calculate node, handle verification process, management to calculate node The certification of node.
The gridding technology of the application, it is application assigned computing resource that its effect, which is by authentication mechanism, It is characterized in, the application includes program and data.
The effect of the authentication mechanism is a kind of faith mechanism, and purpose passes through certification in entire grid computing space Mechanism realizes the controllable automation strategy artificial or that certain is controllable of the mankind, is one piece of local calculation of application assigned Space, the mankind can control the application program in grid computing space by control authentication mechanism.
The authentication mechanism, characterized in that authenticate two processes including basic authentication and relationship.
The basic authentication, characterized in that its effect is to calculate sky by node, using (procedure, data) access to network Between in, be the basis of authentication system, any node has to pass through basic authentication using (procedure, data), just can be with access to network System, and basic authentication gives node, using the attribute of (procedure, data), and the attribute is for constructing relationship certification, Mei Gejie Point, can possess multiple basic authentications using (procedure, data), that is, each node, can possess using (procedure, data) Multiple attributes;The basic authentication of node is the basis using (procedure, data), and node basic authentication is coming for grid computing resource Source only possesses computing resource, and grid system can just be formed, and just may be employed the gridding operation of (procedure, data).
The relationship certification, characterized in that by attribute, manually or by automating strategy, the node and knot of building Point between, node and application (procedure, data) between, using (procedure, data) and apply (procedure, data) between relationship Net, the local calculation net in this network of personal connections, that is, grid system, using (procedure, data) by authentication associated with relationship, It can possess and space is calculated by the Local grid of relationship certification building.
The relationship certification, the relationship of certification include all relationships that the mankind are able to know that, including human society, substance generation Boundary and people and the relationships such as object, object and object, substance inside, the structural relation including substance, the membership credentials of human society, knowledge The structural relation of system, shengke relation, symbiosis etc., the chemical conversion of these relation forms are the method for relationship certification, are constructions The technical foundation of the big data of unified diversification.
The grid-based management device, characterized in that it be responsible for relationship certification binding obtain grid computing resource and The execution side such as it is responsible for application (procedure, data) migration between the computing resource node of binding, duplication, blocks, forbid, inquire The gridding process management of formula.
The application (procedure, data) and relationship certification are bound, characterized in that its process includes that basic authentication and relationship are recognized Demonstrate,prove two processes.
Step 1: that is, using selection and by the basic authentication of certification, leading to using the basic authentication of (procedure, data) Cross in basic authentication specify attribute, determine application attribute, such as: title, geographical location, application field, owner, field, Classification etc. information.
Step 2: the relationship using (procedure, data) authenticates.
1) it after passing through using (procedure, data) basic authentication, can apply for that relationship authenticates, both pass through basic authentication, choosing It selects and is authenticated with some associated relationship of the basic authentication, filed an application to authentication center, while specified executive mode, the execution Mode refers to the method for operation or inquiry mode of the application (procedure, data) between relationship node, such as: if it is program, If it is data, then it can specify a sequence and classification according to the execution of specified sequence, parallel execution, dynamic load leveling etc. Deng.
2) attribute of the characteristics of authentication center receives application, is authenticated according to relationship and application (procedure, data), passes through The mode of manual intervention or certain specific automation strategy, decide whether through certification, if do not passed through, this time authenticate Terminate, if passed through, executes 3.
3) relationship that authentication center passes through application (procedure, data) authenticates, and will be sent in relationship certification using application really On fixed all nodes.
4) relationship node receives the execution relationship application using a, by way of manual intervention or it is certain specific from Dynamicization strategy decides whether that through certification, if do not passed through, this time certification terminates, if passed through, has succeeded on the node At the gridding process of application (procedure, data), 5 are executed.
5) the relationship node comes application copy, and the application for being saved in oneself is concentrated, this process can also be until answering It is handled when being called with (procedure, data).
6) when all relationship nodes all pass through certification, then entirely the gridding process of application (procedure, data) is completed, if Part relations node is then to be partially completed using the gridding process of (procedure, data), if all nodes all do not lead to by certification It crosses, then this time using the gridding procedure failure of (procedure, data).
The migration, characterized in that in grid computing space, will refer to that application (procedure, data) is turned with from a node The process of another node is moved on to, includes that the method for operation defined such as from top to bottom from bottom to top, or is pressed in transition process It is executed according to given sequence.
The duplication, characterized in that in grid computing space, will be copied to using (procedure, data) by a node On more nodes, reproduction process includes the method for operation using (procedure, data), such as parallel, dynamic load leveling executes Mode.
The blocking, characterized in that in grid computing space, (procedure, data) will be applied from one or certain fingers Fixed node withdraws from execution, will apply and be denoted as that state wouldn't be executed.
It is described to forbid, characterized in that in grid computing space, will forbid some application (procedure, data) some or It executes that migration, person be multiple or inquiry operation on the certain nodes of person, and deletes the application on the node for having executed migration, duplication (procedure, data).
The inquiry, characterized in that executed for this and search specified data.
The application program executes manager, characterized in that manages the instantiation of application program in mesh node, executed Journey log management, the destruction of Application Instance, specific step is as follows.
1) user calls application program a by node N, and the program on node N executes manager and searched by authentication center Application program a, if terminating without a is applied, 2 being executed if finding.
2) node N instantiates application program, creates unique ID for this calling, and by this unique mark ID and tie The basic authentication of point N together, is sent in application program network of personal connections node, and the application program in network of personal connections node executes manager The basic authentication of ID and node N are obtained, starts to execute application according to application program execution relationship, while in all network of personal connections nodes Application program execute manager and record the log that locally executes, as count this execute consumed by computing resource.
3) after the completion of application program executes, according to the basic authentication information of application example ID and node N, collect and execute consumption Situation.
The application program executes manager, characterized in that is able to record the resource service condition that application program executes, together When due to preserve call initiate node basic authentication information, so can inversely track initially call node information, this The technology that kind inversely tracks, can be used for the detection to the network crime of information security field, grid system can be according to certification System, moment position network crime objectives, track down the network crime for public security organ and provide the effective information of first time, from And a possibility that greatly reducing the network crime.
General application program gridding computing technique, that is, method, characterized in that its cost calculation foundation is resource Consumption, such as memory, hard disk, CPU use duration etc., and cloud computing is that the mode of computing resource piecemeal is leased to user, Comparison can know that grid computing is more more flexible than cloud computing, more scientific, more accurately, the cost of user be greatly saved.
General application program gridding computing technique, that is, method, characterized in that by authentication system, possess reverse tracking Ability, this technology inversely tracked can be used for the detection to the network crime of information security field, and moment positions network and violates Guilty objectives track down the network crime for public security organ and provide the effective information of first time, to greatly reduce the network crime A possibility that, substantially increase the internet security of information technology.
General application program gridding computing technique, that is, method, characterized in that the use of application program is gridding, Application program replicates between grid node to be possessed self and blocks with migration, program, the ability of self transfer, so comparison cloud computing The fixed application technology of piecemeal, grid computing have higher flexibility and stronger stability and safety than cloud computing.
Idea of the invention is that by general purpose application program gridding technology and its authentication mechanism, by access information cyberspace All computing unit connections in each field of every profession and trade make the general all things on earth of one kind and interconnect at a unified calculating space, The technical foundation and network environment built together make unified general technology of Internet of things solution;All things on earth interconnects, On the one hand the computing resource left unused in society can be chained up by the benefit built together, constitute a unification for application program Calculating space, on the one hand solve application program computing resource confinement problems so that application program is in grid computing space Possess unlimited computing resource, improves the stability of information technology software operation;Another aspect application program and running environment point From breaking the existing pattern using isolated island and data silo, so that computing resource, application resource in information space and data provide Source and technical resource obtain most adequately sharing and utilizing, and provide base support for the unified big data environment of building diversification, Powerful network computing resources are provided for artificial intelligence and integrate entire society's strength, are provided altogether to break through important technical difficult point Enjoy the support built together;By authenticating this faith mechanism, the safety of information technology is greatly increased;Innovative point of the invention exists In: the on the one hand creative general technology for proposing all things on earth interconnection applies to grid computing technology in general application program, Make the grid of general application layer, for construct interconnect, it is shared open and more excellent more safer than cloud computing Generation information technology provide technical foundation;On the other hand the calculating node and calculating node, meter established by authentication system Calculate node and application program, calculate node and data, application program and application program, application program and data, the mankind and node, People and program, the mankind and data, it is interpersonal be connected with each other, control, rely on, the relationships such as inquiry are directly to connect, nothing The process searched again need to be passed through, this direct connection uses certification instead of the process calculated again using application program in search System, all things on earth interacted system possess the information search mode as human brain, the direct Info Link side of stereo Formula.
Detailed description of the invention
Fig. 1 is the construction process of common application gridding computing architecture and interconnecting relation.
Specific embodiment
The present invention will be further described for following embodiment.
Embodiment 1 applies gridding process, authentication authorization and accounting process and procedure, data gridding process.
Step 1: basic authentication process.
1) basic authentication is actively applied for authentication center from calculating node, is determined to pass through by authentication center or is not passed through.
2) authentication center actively invites certification node, is determined to pass through by calculating node or not passed through.
3) authentication center actively forces to send basic authentication to calculating node, and this forcible authentication is not needed through node Agree to.
Step 2: relationship verification process.
1) node is calculated by some basic authentication, proposes the certification application of certain physical relationship r of certain a kind of relationship T.
2) the relationship type T that authentication center submits according to node searches the tool for meeting the type of the type of foundation attribute The matching of body relationship r, if attribute that the calculating node of primary relationship defines is " so-and-so primary school ", the relationship type T of submission be " on Junior ", physical relationship are r " junior ", mean that attribute is that the node application of " so-and-so primary school " establishes oneself with it as " up and down Grade " relationship and oneself be " junior " relationship, authentication center then passes through artificial or by specified automation strategy, searches The superior unit " xxx unit " of " so-and-so primary school ", if finding determining superior unit, goes to step 4, if can not search, To step 3.
3) authentication center can not find matched relationship, then this is applied for predefined relationship and saved, And predefined state is returned to applicant.
4) authentication center finds matched authenticating party, by manual or automated strategy, decides whether matched pass System's certification is sent to match party and is determined to pass through by match party or not passed through, if it is determined that directly giving match party then jumps to the Otherwise 6 steps carry out step 5.
5) authentication center is temporarily by the type matched relationship certification, and state is shelved in return, and center to be certified is into one Step audit.
6) matched strategy is sent match party by authentication center.
7) match party decides whether to pass through after receiving relationship certification, if passed through, this time relationship certification is successfully established, The network of personal connections of applicant and match party opening relationships certification determination;If do not passed through, relationship application failure terminates application.
Step 3: using (procedure, data) gridding process.
1) application application binding basic authentication, determines the essential attribute of application, executes 2 if passing through, otherwise terminates.
2) the relationship certification of application application association customization, and specified executive mode, authentication center are then executed by application Step 3, but do not pass through, then terminate this association request.
3) authentication center passes through the application that application is authenticated with relationship, then the application will possess the grid of associated relationship certification Internet resources are calculated, grid system initializes application by specified implementation procedure by incidence relation, and executive mode is migration Execution step 4, executive mode be duplication execution step 5, executive mode be block execution step 6, executive mode be taboo Execution step 7 only.
4) executive mode is the implementation procedure of migration, by specified application copy to the network node determining by relationship certification In, it is run according to operation order specified in migration.
5) executive mode is the implementation procedure of duplication, by specified application copy to the network node determining by relationship certification In, it is run according to rule specified in duplication, rule includes parallel operation rules and dynamic load leveling rule.
6) executive mode is the implementation procedure blocked, is moved being crossed by the execution specified in the determining network node of relationship certification It moves or execution is withdrawn from the application of duplication, be identified as temporarily not executable state.
7) executive mode is the implementation procedure forbidden, and will be forbidden by the application specified in the determining network node of relationship certification Migration and reproduction process, and block replicated or migration application.

Claims (5)

1. a kind of software technology and method of general all things on earth interconnection, based on a kind of general application program gridding computing technique And on the basis of method;
Described one kind general application program gridding computing technique and method, effect is by any computer, an intelligence Energy equipment or industry manufacture controlling terminal can access vast as the open sea information space, provide unlimited calculating energy Power possesses unified application method;
The information space refer to by realize general application program gridding computing technique one by one PC machine, notebook, Server, mobile terminal and the information control terminal in industry manufacture, domestic intelligent equipment collectively constitute, each equipment conduct A node in information space is interconnected by a kind of safety measure realization of authentication mechanism from each other, sharing application With data;
A kind of authentication mechanism is a kind of faith mechanism that general application program gridding computing technique provides, including basis Certification and relationship authenticate two processes;
The basic authentication, its effect are to calculate node access to network in space, are the basis of authentication system, Ren Hejie Point has to pass through basic authentication using (procedure, data), just can be with access to network system, and basic authentication gives node, answers With the attribute of (procedure, data), the attribute for constructing relationship certification, each node, can possess using (procedure, data) it is more A basic authentication, that is, each node can possess multiple attributes;
Relationship certification, its main feature is that, it is artificial or pass through automation plan by node, using (procedure, data) attribute Slightly, between the node and node of building, between node and application (procedure, data) and using (procedure, data) and using (journey Sequence, data) between network of personal connections, the local calculation net in this network of personal connections, that is, grid system, using (procedure, data) By authentication associated with relationship, it can possess and space is calculated by the Local grid of relationship certification building;
The relationship certification, the relationship of certification include all relationships that the mankind are able to know that, including human society, the material world And the relationships such as inside people and object, object and object, substance, the structural relation including substance, the membership credentials of human society, knowledge body The structural relation of system, shengke relation, symbiosis etc., the chemical conversion of these relation forms are the method for relationship certification, are construction systems The technical foundation of the big data of one diversification, and the basis of relationship between each access node among all things on earth interconnection is constructed, The invention patent is exactly the mechanism authenticated by this relationship, building all things on earth interconnection;
The all things on earth interconnection, characterized in that including following some interconnecting relations:
Relationship between node and node controls node and manufacturing technology node and is all calculating space such as in industrial manufacture view In, it between the node of control centre and the node of manufacturing center, may be constructed control relationship, only possess this control relationship Both sides are authenticated, it could be in the upper Application share realizing control and being managed of application;
Relationship between application program and node when such as applying gridding, is needed application copy to formulation node On;
Relationship between application program and data, between the application operated such as Students'Management System and school's database data, structure At the various operative relationships of data;
Between application program and application program, as between face recognition technology and voice recognition technology, constituted a set of diversification The three-dimensional application relationship of mankind's identification;
Relationship between people and object constitutes the control relationship of people and object as between mobile terminal and domestic intelligent electric appliance;
Interpersonal relationship, if by personal relationship's authentication mechanism, reach between mobile terminal node constitute person to person it Between a kind of relationship body being certified;
Relationship between people and data, if the mankind use mobile terminal, knowledge or commodity needed for searching, this compositions data and Various general character between the mankind or special relationship, so-called general character relationship, i.e., universal relationship, knowledge carry out the mankind It says, is exactly a kind of universal relationship, for certain knowledge for owner, the relationship of foundation is all same relationship;Special pass System refers to single-relation between someone and some data, if the resume of someone and oneself is special relationship, with other people It is unrelated;
Relationship between people and application program such as formulates people and mobile terminal binding real-name authentication, will constitute people and grid computing The use of all application programs and the relationship used in space;
Relationship between object and object, control and process in industrial manufacturing process, between various manufacturing process's control nodes On relationship.
2. a kind of software technology and method of general all things on earth interconnection as described in claim 1, characterized in that provide a kind of general Application program gridding computing technique and a kind of certification policy, realize it is inter-trade, cross-cutting, all can be with access information network All computing units between and application program, data, computing resource interconnect, build together, breach existing letter Application, data, the limitation of technology isolated island existing for breath technology, while authentication mechanism also ensures that information space is safer Newly.
3. a kind of software technology and method of general all things on earth interconnection as described in claim 1, characterized in that its authentication relationship is just It is the operative relationships such as connection, control, dependence, inquiry in information technology, since this relationship authenticates, can authenticates and include the mankind All relationships of society and the universe world, so authenticating building calculating node with this relationship and calculating node, calculate node With application program, calculating node and data, application program and application program, application program and data, the mankind and node, people and journey The relationships such as sequence, the mankind and data, interpersonal interconnection, control, dependence, inquiry, break prior art isolated island completely Problem so that application program with calculate environment, application data to thorough decoupling so that application program, computing resource, Data obtain more freedom degrees, more open space and safer environment.
4. such as the software technology and method of the general all things on earth interconnection of one kind as described in claim 1, characterized in that pass through and authenticate body The calculating node and calculate node, calculating node and application program, calculating node and data, application program and apply journey that system establishes Sequence, application program and data, the mankind and node, people and program, the mankind and data, it is interpersonal be connected with each other, control, according to The relationships such as bad, inquiry are directly to connect, and need not move through the process searched again, this direct connection, instead of using using journey Sequence calculates the process in search again, and using authentication system, all things on earth interacted system possesses the information search mould as human brain Formula, the direct Info Link mode of stereo.
5. described one kind general application program gridding computing technique and method, including general grid computing environment technology and answer Two links are executed with gridding, characterized in that the application, including application program and data;
The grid computing, effect is can to provide unlimited computing capability by any computer, can be accessed Vast as the open sea information;
The general grid computing environment is exactly the software support that grid computing needs, passes through void when across the language operation of program Quasi-ization technology is as basic environment, the PC machine of virtualization technology, notebook, service when by being mounted with across language operation one by one The integrated environment of device, mobile terminal and other information processing system compositions with computing capability, is each mounted with across language fortune The system of virtualization technology is all a calculating node in grid computing environment when row, these nodes pass through application program Gridding technical organization provides computing resource at a calculating net for application program;
The virtualization technology when application program across language operation, including source code translation device, intermediate code manager, intermediate code solution Release device, host language library, host language expanding library, host language run-time library;
The source code translation device is the tool for application source code to be translated into intermediate code processing, it can The source code of the difference grammatical form such as java/c++/c/c#, translates into the intermediate code of unified format;
The intermediate code, i.e., the standard code obtained by source code translation device are the standard codes that interpreter directly uses;
The intermediate code manager, the functions such as storage, inquiry, deletion, sharing of intermediate code;
The intermediate code, including standard interface, standard execute logic;
The standard interface, effect one are to execute the unique identification of logic, and program is found execution and patrolled by standard interface Volume, another effect of standard interface is the far call API Name for interaction using opening;
The effect of the standard execution logic is the execution body of function;
The effect of the java standard library is the function library with fixed function packaged in advance;
The intermediate code interpreter is the tool for translating into host language and executing intermediate code;
The intermediate code, is stored as unit of function, is stored in different hosts language environment using unified formatted data;
The host language is currently a popular various development languages, including java, c#, c++, c, js, go etc.;
Virtualization technology when across the language operation refers in different language operation, indiscriminate by intermediate code interpreter It explains the intermediate code for executing the application program of unified standard, is separated to reach application program with language environment;
The application program is separated with language environment, and wherein application program is also to separate with execution function, both separation are It realizes that key of the application program across language virtual technology is also direct purpose, is to realize that the base inherited with technical experience is inherited in application Plinth;So that application program or function obtain adequately accessible share;
The application program is separated with language environment and application program is also to separate, including following implemented is walked with execution function Suddenly;
Step 1: application source code is translated into intermediate code by source code translation device;
Step 2: intermediate code manager as unit of the computing unit function of application program, will record the annotation of function, title, Parameter executes all information such as body, and records the call relation between function, while intermediate code uses unified data format It saves, is stored since intermediate code is as unit of function, and using Uniform data format, function is separated with application, function It can be called for different applications, indifference executes, and solves to separate using and function;
Step 3: will be using several independent utility units are divided, each applying unit uses unique identification, uses independent utility Unit unique identification is associated with entrance function, several independent utility units constitute a complete application program;
Step 4: in different language environments, all using unified number since the intermediate code in second step is as unit of function It stores according to format, can realize under different language environments in this way, the indiscriminate execution of intermediate code can be made, so by Third step operate to be formed as unit of independent utility unit, can be 1 independent utility unit, can be entire application program All independent utility units by the entrance function of each independent utility unit, and pass through entrance function and other functions All information such as required all functions and its annotation, title, parameter, execution body are extracted, will be proposed out by call relation The application come is moved to when being mounted with across language operation in the performing environment of virtual technology by way of network data flow;
Step 5: migration to target program received intermediate code data are saved in local intermediate code database, in this way With regard to completing entire transition process, that is, the realization that application program is separated with software execution environment;
Step 6: executing by host language interpreter (across language virtual machine) indiscriminate explanation, application and software are realized Separation, that is, solve the inheritance of application;
Virtualization technology when across the language operation, effect is to realize that application program is separated with performing environment, so that using journey Sequence can indifference be implemented in different language runtime environment, virtualization technology solves the invention patent and mentions when across language operation The basic technology of isolated island and data silo is applied in solution out, and after application program is separated with performing environment, application program will Be no longer belong to a certain specific software, but can with to be equally equipped with the other software across Language Runtime virtual machine mutually total It enjoys;
The application gridding technology, including authentication center, certificate manager, gridding processor, application program execute management Device composition;
The authentication center, its effect are the control centres of certification;
The certificate manager handles verification process, the certification of management node in each calculate node to calculate node;
The application gridding technology, characterized in that it is application distribution computing resource that its effect, which is by authentication mechanism, described Application include program and data;
The effect of the authentication mechanism is a kind of faith mechanism, and purpose is in entire grid computing space, by the mechanism of certification, Realize the controllable automation strategy artificial or that certain is controllable of the mankind, characterized in that for application one piece of local calculation of distribution Space, the mankind can control the application in grid computing space by control authentication mechanism;
The authentication mechanism, including basic authentication and relationship authenticate two processes;
The basic authentication, characterized in that its effect is calculated in space by node, using (procedure, data) access to network, The basis of authentication system, any node has to pass through basic authentication using (procedure, data), just can with access to network system, And basic authentication gives node, using the attribute of (procedure, data), which authenticates for constructing relationship, each node, Multiple basic authentications can be possessed using (procedure, data), that is, each node, can possess using (procedure, data) it is multiple Attribute;The basic authentication of node is the basis using (procedure, data), and node basic authentication is the source of grid computing resource, Only possess computing resource, grid system can just be formed, and just may be employed the gridding operation of (procedure, data);
Relationship certification, characterized in that it is artificial or by automation strategy by attribute, the node and node of building it Between, node and application (procedure, data) between, using (procedure, data) with apply (procedure, data) between network of personal connections, this A network of personal connections, that is, the local calculation net in grid system, using (procedure, data) by authentication associated with relationship, Space is calculated by the Local grid of relationship certification building to possess;
Relationship certification, the relationship of certification include all relationships that the mankind are able to know that, including human society, the material world with And the relationships such as inside people and object, object and object, substance, the structural relation including substance, the membership credentials of human society, knowledge hierarchy Structural relation, shengke relation, symbiosis etc., it is that construction is unified that the chemical conversion of these relation forms, which is the method for relationship certification, Diversification big data technical foundation;
The grid-based management device, characterized in that it is responsible for obtaining grid computing resource with the binding of relationship certification and be responsible for Using (procedure, data) migration between the computing resource node of binding, the executive modes such as duplication, block, forbid, inquire Gridding process management;
The application (procedure, data) and relationship certification are bound, characterized in that its process includes basic authentication and relationship certification two A process;
Step 1: that is, using selection and by the basic authentication of certification, passing through base using the basic authentication of (procedure, data) The attribute specified in plinth certification determines the attribute of application, such as: title, geographical location, application field, owner, field, classification Etc. information;
Step 2: the relationship using (procedure, data) authenticates;
1) after passing through using (procedure, data) basic authentication, can apply for that relationship authenticates, both by basic authentication, selection with Associated some relationship certification of the basic authentication, is filed an application, while specified executive mode, the side of execution to authentication center Formula refers to the method for operation or inquiry mode of the application (procedure, data) between relationship node, such as:, can if it is program If it is data, then can specify a sequence and classification etc. according to the execution of specified sequence, parallel execution, dynamic load leveling etc.;
2) attribute of the characteristics of authentication center receives application, is authenticated according to relationship and application (procedure, data), by manually doing Pre- mode or certain specific automation strategy decide whether through certification, if do not passed through, this time certification terminates, If passed through, 3 are executed;
3) authentication center pass through application (procedure, data) relationship authenticate, by using application be sent to relationship certification in determine On all nodes;
4) relationship node receives the execution relationship application using a, by way of manual intervention or certain specific automation Strategy decides whether that through certification, if do not passed through, this time certification terminates, if passed through, successfully completes and answers on the node With the gridding process of (procedure, data), 5 are executed;
5) the relationship node comes application copy, and the application for being saved in oneself is concentrated, this process can also be until applying (journey Sequence, data) it is called when handle;
6) when all relationship nodes all pass through certification, then entirely the gridding process of application (procedure, data) is completed, such as fruit part Relationship node is then to be partially completed using the gridding process of (procedure, data) by certification, if all nodes all do not pass through, Then this time using the gridding procedure failure of (procedure, data);
The migration, characterized in that in grid computing space, will refer to that application (procedure, data) is transferred to from a node The process of another node includes the method for operation of definition in transition process, such as from top to bottom, from bottom to top, or according to giving Fixed sequence executes;
The duplication, characterized in that in grid computing space, will be copied to more using (procedure, data) by a node Node on, reproduction process includes the method for operation using (procedure, data), such as parallel, dynamic load leveling executive mode;
The blocking, characterized in that, will be from one or certain specified using (procedure, data) in grid computing space Node withdraws from execution, will apply and be denoted as that state wouldn't be executed;
It is described to forbid, characterized in that in grid computing space, some application (procedure, data) will to be forbidden some or certain Executes that migration, person answers or inquiry operation on a little nodes, and deletion has executed the application (journey on the node of migration, duplication Sequence, data);
The inquiry, characterized in that executed for this and search specified data;
The application program executes manager, manages the instantiation of application program in mesh node, implementation procedure log management, answers With the destruction of program example, specific step is as follows;
1) user calls application program a by node N, and the program on node N executes manager and searches application by authentication center Program a, if terminating without a is applied, 2 being executed if finding;
2) node N instantiation application program calls creation unique ID for this, and this is uniquely indicated ID and node N Basic authentication together, be sent in application program network of personal connections node, application program in network of personal connections node executes manager and obtains To the basic authentication of ID and node N, start to execute application according to application program execution relationship, while in all network of personal connections nodes Application program executes manager and records the log locally executed, executes consumed computing resource as this is counted;
3) after the completion of application program executes, according to the basic authentication information of application example ID and node N, collect execution consumption feelings Condition;
The application program executes manager, the resource service condition that application program executes is able to record, simultaneously because preserving The basic authentication information for initiating node is called, so the information for initially calling node can be inversely tracked, it is this inversely to track Technology, can be used for the detection to the network crime of information security field, and grid system can be according to authentication system, moment positioning Network crime objectives track down the network crime for public security organ and provide the effective information of first time, to greatly reduce net A possibility that network crime;
General application program gridding computing technique, that is, method, its cost calculation foundation are the consumptions of resource, such as in Deposit, hard disk, CPU are using duration etc., and cloud computing is that the mode of computing resource piecemeal is leased to user, and comparison can be known Grid computing is more more flexible than cloud computing, more scientific, more accurately, the cost of user is greatly saved;
General application program gridding computing technique, that is, method possesses reverse tracking ability by authentication system, this reverse The technology of tracking can be used for the detection to the network crime of information security field, and moment positions network crime objectives, is Public security organ tracks down the network crime and provides the effective information of first time, thus a possibility that greatly reducing the network crime, significantly Improve the internet security of information technology;
General application program gridding computing technique, that is, method, the use of application program is gridding, and application program is in net Duplication and migration between lattice node, program possess self and block, and the ability of self transfer is answered so comparison cloud computing piecemeal is fixed With technology, grid computing has higher flexibility and stronger stability and safety than cloud computing.
CN201711291675.6A 2017-12-08 2017-12-08 A kind of software technology and method of general all things on earth interconnection Pending CN109901924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711291675.6A CN109901924A (en) 2017-12-08 2017-12-08 A kind of software technology and method of general all things on earth interconnection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711291675.6A CN109901924A (en) 2017-12-08 2017-12-08 A kind of software technology and method of general all things on earth interconnection

Publications (1)

Publication Number Publication Date
CN109901924A true CN109901924A (en) 2019-06-18

Family

ID=66940009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711291675.6A Pending CN109901924A (en) 2017-12-08 2017-12-08 A kind of software technology and method of general all things on earth interconnection

Country Status (1)

Country Link
CN (1) CN109901924A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021052284A1 (en) * 2019-09-20 2021-03-25 京东方科技集团股份有限公司 Method for creating and method for executing action resource, electronic device, and storage medium
CN113703779A (en) * 2021-09-06 2021-11-26 武汉市字节码科技有限公司 Cross-platform multi-language compiling method and ultra-light Internet of things virtual machine

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021052284A1 (en) * 2019-09-20 2021-03-25 京东方科技集团股份有限公司 Method for creating and method for executing action resource, electronic device, and storage medium
CN113703779A (en) * 2021-09-06 2021-11-26 武汉市字节码科技有限公司 Cross-platform multi-language compiling method and ultra-light Internet of things virtual machine
CN113703779B (en) * 2021-09-06 2024-04-16 王喆 Cross-platform multi-language compiling method and ultra-light Internet of things virtual machine

Similar Documents

Publication Publication Date Title
Yu et al. Virtualization for distributed ledger technology (vDLT)
Liao et al. Securing collaborative environment monitoring in smart cities using blockchain enabled software-defined internet of drones
Bagherzadeh et al. Integration of cloud computing and IoT (CloudIoT) in smart grids: Benefits, challenges, and solutions
CN103888360A (en) Method for integrating covering method to obtain service node in SDN based on greedy algorithm
CN109522002A (en) A kind of unmanned aerial vehicle station open architecture based on model-driven
Kashyap et al. Service Composition in IoT using Genetic algorithm and Particle swarm optimization
CN110855637A (en) Block chain Internet of things distributed access control method based on attributes
CN109901924A (en) A kind of software technology and method of general all things on earth interconnection
CN109635037A (en) A kind of the fragment storage method and device of relationship type distributed data base
Guan et al. Blockchain: A distributed solution to UAV‐enabled mobile edge computing
Kumaran et al. Social internet of things (siot): Techniques, applications and challenges
Sandhu et al. A stochastic game net‐based model for effective decision‐making in smart environments
Chandanshive et al. Application of Internet of Things in Civil Engineering construction projects-A State of the Art
Friess Driving european internet of things research
CN104166581B (en) A kind of virtual method towards increment manufacturing equipment
Choi et al. Application patterns for cyber-physical systems
CN109889555A (en) A kind of general application program gridding computing technique and method
Schleicher et al. Nomads-enabling distributed analytical service environments for the smart city domain
CN116578420A (en) Water affair intelligent connection equipment and control method thereof
Haddar et al. Electing a leader in the local computation model using mobile agents
CN108966122A (en) It is a kind of for determining the method and apparatus of the elevation information of wireless access point
CN104680429B (en) Intelligent grid interoperability Analysis of Conceptual Model System
CN116271829A (en) Virtual object control method, device and storage medium
Bhalla Using Blockchain to Reduce Multi-Server Edge Computing Latencies for Supervised Learning
Lim et al. Intelligent access control mechanism for ubiquitous applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190618