CN101587449A - System and method for sharing load of computer peripherals - Google Patents
System and method for sharing load of computer peripherals Download PDFInfo
- Publication number
- CN101587449A CN101587449A CNA200810111791XA CN200810111791A CN101587449A CN 101587449 A CN101587449 A CN 101587449A CN A200810111791X A CNA200810111791X A CN A200810111791XA CN 200810111791 A CN200810111791 A CN 200810111791A CN 101587449 A CN101587449 A CN 101587449A
- Authority
- CN
- China
- Prior art keywords
- software section
- core missions
- computer peripherals
- module
- missions
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention provides a system and a method for sharing load of computer peripherals, which relates to the technical field of information. The system comprises a software part and a computer peripheral, wherein the software part comprises a communication module, a control module, a monitoring module and a task processing module, and the computer peripheral comprises a communication module, a control module and an intelligent processing module. The method mainly comprises the following steps that: the software part monitors whether the processing efficiency of core tasks in a computer reaches a preset value, and permits the computer to continue to process the core tasks if so, otherwise transfers part of the core tasks to the computer peripheral to be processed, and finally, the software part merges the results of processing the core tasks of two parts to obtain final processing results.
Description
Technical field
The present invention relates to areas of information technology, be specifically related to a kind of system and method for sharing load of computer peripherals.
Background technology
In flourishing day by day today of Information technology, information-based deep further to the influence of socio-economic development.The development of world economy process is accelerated, the fairly obvious computer of the megatrend of informationization, globalization, diversified development is widely used in daily life, the appearance velocity of propagation of internet is accelerated, quantity of information increases, knowledge explosion, change and accelerate, technology content increases, no longer only be confined to the work of scientific research and high precision, also playing the part of more and more important effect in common daily life, simultaneously, is the application of the infotech of representative with the internet, dwindle the distance in regional space, striven for time efficiency.
Computing machine is by original weigh 30 tons, become notebook, the PDA of today, its purposes is also by only limiting to the laboratory to being used for military affairs, scientific research, high precision work, and then to being widely used in daily life, except the variation of profile and purposes, the Computing ability that is determined by computer CPU has also had significant raising, for example in addition, the highest arithmetic speed of supercomputer of today is 91.8 floating-point operations (Teraflop, 1 floating-point operations=per second 1 TFlops mathematical operation).
Yet even so, it is too high that computing machine also exists its CPU usage, the problem that load is overweight, computer CPU not only will be responsible for receiving the information material of extraneous input after all, but also will be responsible for handling these data, and the result that will handle is sent on the corresponding device thereof then.Nearly all big and small work all need be issued an order by CPU, is communicated to other equipment and carries out.Lift a simple example, when we will print a file, the at first instruction of printing by keyboard or mouse input, after CPU receives this instruction, know that we want print file, will assign instruction data is delivered to printer, carry out the work of print file then by printer.Therefore, when the computer CPU occupancy is too high, cause the task efficient of emergency treatment in the computing machine to reduce easily, delay finishing of task, make troubles to people's work.
Smart card is a kind of size and the similar plastic cards of common business card, includes a silicon about diameter 1cm, has canned data and the function of carrying out complex calculation.It is widely used in fields such as phonecard, fiscard, identification card and mobile phone, pay TV.On the chip of smart card, integrated microprocessor, storer and I/O unit etc.It is considered to minimum in the world robot calculator.On smart card, have the extremely strong safe and secret controlling mechanism of a whole set of performance, the security control program is cured among the ROM (read-only memory), thereby has and can't duplicate and safety assurance reliably such as password read-write.It is than common magnetic card, and it is big also to have an information storage capacity, can utilize little processing to increase card advantages such as " wisdom ".
Intelligent key apparatus is a kind of personal computer interface by standard, the portable set that provides information encryption to handle.Its built-in single-chip microcomputer or intelligent card chip can storage key or digital certificate, utilizes the built-in cryptographic algorithm of intelligent key apparatus to realize functions such as the encryption of information or identification processing.Intelligent key apparatus has functions such as PKI application, digital signature, information encryption, secure network login and visit SSL secure network, and have the feature that the private key that guarantees the user leaves hardware never, it also has characteristics such as physically preventing from illegally to obtain its inner sensitive information.The USB Key because generally employing USB interface, so intelligent key apparatus is otherwise known as.
Summary of the invention
For solving the core missions problem that the treatment effeciency in computing machine is low sometimes, processing speed is slow in the prior art, the invention provides a kind of system of sharing load of computer peripherals, comprise software section and computer peripherals on the computing machine;
Described software section comprises communication module, control module, monitoring module and task processing module;
Described communication module is used for described software section and described computer peripherals communicates;
Described control module is used to control communicating by letter of described software section and described computer peripherals, and coordinates the communication between inner each module of the described software section of control and the work of each module;
Described monitoring module, whether the treatment effeciency that is used to monitor the core missions of carrying out on computers reaches preset value, and notifies described control module with monitored results;
Described task processing module, be used for monitoring module and monitor described core missions treatment effeciency when being lower than described preset value, described core missions are split as two parts, and wherein a part of core missions send to described computer peripherals by described communication module, and allow computing machine to continue to handle remaining a part of core missions, and receiving after described computer peripherals sends the result of described a part of core missions of returning by described communication module, the result of described two parts core missions is merged, obtain final core missions result; If described core missions treatment effeciency is not less than described preset value, then allow computing machine to continue to carry out described core missions;
Described computer peripherals comprises communication module, control module and intelligent processing module;
Described communication module is used for described computer peripherals and described software section communicates;
Described control module, be used to control described software section and described computer peripherals communicate by letter and inner each module of computer peripherals between communication and the work of each module;
Described intelligent processing module, be used to handle described software section and send described a part of core missions of described computer peripherals to, and after processing, result is sent to described software section by described communication module by the communication module of described computer peripherals.
Described software section also comprises core missions selection module, is used for automatic or manual and selects core missions.
Described software section also comprises authentication module, and whether be used to authenticate described computer peripherals legal.
Described software section also comprises the encryption and decryption module, is used for described software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described software section is received from the outside;
Correspondingly, described computer peripherals also comprises the encryption and decryption module, is used for described computer peripherals will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described computer peripherals is received from the outside.
Described data are a part of core missions or its result.
The control module of described software section also is used for determining the preset value of described core missions treatment effeciency, and described preset value can be determined by automatic or manual.
Communication module in described software section and the described computer peripherals can but to be not limited to be USB interface, parallel port, serial ports or eSATA interface or infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio-frequency apparatus.
On the other hand, the present invention also provides a kind of method of sharing load of computer peripherals, and described method comprises:
Step 1, computer peripherals are set up with the software section on the computing machine and are communicated by letter;
Step 2, described software section monitoring core missions are carried out computer-chronograph on computers whether its treatment effeciency are reached preset value; If execution in step 3 then; Otherwise execution in step 4;
Step 3 allows to continue to carry out described core missions on computers, until being finished;
Step 4, described software section is split as two parts with described core missions, and wherein a part of core missions send to described computer peripherals; Described software section allows computing machine to continue to handle remaining a part of core missions;
Step 5, described computer peripherals is handled it after receiving described a part of core missions, and result sent to described software section, described software section will merge the result of two parts core missions, obtain final core missions result.
Described core missions can be self-defined by described software section by the user, perhaps selects a Computer Processing task as core missions automatically by described software section.
Before the described step 4, can also comprise the step that described software section authenticates described computer peripherals.
In the described step 4, before described a part of core missions are sent to described computer peripherals, can also encrypt it;
Correspondingly, in the described step 5, described computer peripherals at first is decrypted it, and then handles after receiving described a part of core missions.
Equally, in the described step 5, described computer peripherals sends to described operation result before the described software section, can also encrypt it;
Correspondingly, described software section merges before the described result, need the result of having encrypted be decrypted.
The preset value of described core missions treatment effeciency can be self-defined by described software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by described software section.
It can be by USB interface, parallel port, serial ports or eSATA interface or modes such as infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio frequency that described computer peripherals is communicated by letter with described software section.
The invention has the beneficial effects as follows when in computing machine, carrying out core missions, whether reach the preset value of treatment effeciency by its treatment effeciency of software supervision, if do not reach, then core missions are split, part core missions after will splitting then send computer peripherals to and handle, after the computer peripherals processing finishes, with result return to software and by software the most at last the result of two parts core missions merge, thereby guaranteed the timely of core missions, fast processing, reduced the operation burden of computer system, and the process of can logarithm reportedly sending is encrypted, and has improved the security of operation.
Description of drawings
Fig. 1 is the structural representation of sharing load of computer peripherals provided by the invention system.
Fig. 2 is the process flow diagram of sharing load of computer peripherals method provided by the invention.
Embodiment
In order to be illustrated more clearly in the system and method for a kind of sharing load of computer peripherals of the present invention, below in conjunction with accompanying drawing and preferred embodiment it is further explained, but should not be construed as limitation of the present invention.
For making embodiments of the invention more concrete, computer peripherals in following examples is specially intelligent key apparatus, and the intelligent key apparatus cpu function is powerful in the present embodiment, the port information flow is also bigger, core missions are specially the anti-virus software virus killing, software section is specially anti-virus software, runs on computing machine.
The preferred embodiment of sharing load of computer peripherals system:
Shown in the accompanying drawing 1 is the preferred embodiment of the system of a kind of sharing load of computer peripherals provided by the invention, and as shown in FIG., this system comprises, software section and computer peripherals (intelligent key apparatus).
Software section comprises, task processing module 101, control module 102, monitoring module 103 and communication module 104;
In the practical application, software section also comprises core missions selection module, is used for automatic or manual and selects core missions; Authentication module, whether be used for the authentication computer external equipment legal; And/or the encryption and decryption module, be used for software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or software section is received from the outside.Data are a part of core missions or its result.
In the present embodiment, computer peripherals is specially intelligent key apparatus, and software section is specially anti-virus software, and core missions are specially the anti-virus software virus killing, and wherein anti-virus software virus killing efficient preset value is set by the anti-virus software control module.Anti-virus software virus killing task is set accounts for 80% of computer CPU, monitoring modular 103 monitors anti-virus software virus killing task occupancy 80% o'clock less than computer CPU, monitoring modular 103 sends control module 102 with monitoring result, control module 102 control task processing modules 101 split anti-virus software virus killing task, and the part anti-virus software virus killing task after will splitting sends intelligent key apparatus.
In the practical application, can also replace anti-virus software virus killing task to monitor with other tasks, the percent that takies computer CPU can be set arbitrarily, for example: 50%, 70% etc., this computer CPU occupancy preset value is set when the initialization by control module 102.
Intelligent key apparatus comprises, communication module 105, control module 106 and intelligent processing module 107;
If the software section of system comprises the encryption and decryption module, correspondingly, intelligent key apparatus also comprises the encryption and decryption module, is used for intelligent key apparatus will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or intelligent key apparatus is received from the outside.Data are a part of core missions or its result.
In the present embodiment, software section is when the user obtains intelligent key apparatus, and the manufacturer provides by intelligent key apparatus, and installs on computers.
Preferably, communication module 105 in the communication module 102 of the software section in the present embodiment and the intelligent key apparatus is meant usb interface connector, in addition communication module 102 and 103 can also be that the connector of parallel port, serial ports, eSATA interface or other are infrared, Wireless Telecom Equipments such as bluetooth, Wireless USB, contactless smart card, light wave or video.
Accompanying drawing 2 shows the preferred embodiment of the method for a kind of intelligent key apparatus load balancing of the present invention, originally execute example, the intelligent key apparatus cpu function is powerful, and the port information flow is also bigger, and software section is provided by the intelligent key apparatus manufacturer, be installed on computer run, core missions are specially 1+2+3+ ... + 100, and 1*2*3* ... * 100 two computation processes are before the concrete Processing tasks, intelligent key apparatus need be by the authentication of software section, and concrete steps are:
Computer utility shock response algorithm authentication intelligent key device in the present embodiment.
Present embodiment, after the intelligent key apparatus authentication is passed through, monitoring facilities is started working, core missions 1+2+3+ in the monitoring computer ... + 100 and 1*2*3* ... * whether 100 computer CPU occupancy reaches 80% of computer CPU, is, execution in step 205, otherwise, reach preset value for making the core missions CPU usage, accelerate core missions and handle, execution in step 206 splits core missions and transfers to the intelligent key apparatus processing;
In the practical application, can also replace above-mentioned two computation processes with other tasks, the occupancy preset value of CPU is artificially set when the initialization by control program, can be any setting (by the software section automatic or manual), for example: 50%, 70% etc.;
Step 205 allows computing machine to continue to carry out core missions;
The present embodiment software section calculates 1+2+3+ with core missions ... + 100 encrypt employed algorithm can but be not limited to DES, 3DES or RC4;
In the practical application, if the core missions that split are tasks of an integral body, promptly, as core missions are 1+2+3+ ... + 100 these computation processes, then software section splits task and gives the intelligent key apparatus processing, and after the intelligent key apparatus processing finishes to return, after the core missions another part result merging of result with Computer Processing that receives, submit to computing machine together, the software section monitoring facilities continues the treatment effeciency of the next core missions of monitoring then.
The preset value of core missions treatment effeciency can be self-defined by software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by software section.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (14)
1. the system of a sharing load of computer peripherals is characterized in that, comprises software section and computer peripherals on the computing machine;
Described software section comprises communication module, control module, monitoring module and task processing module;
Described communication module is used for described software section and described computer peripherals communicates;
Described control module is used to control communicating by letter of described software section and described computer peripherals, and coordinates the communication between inner each module of the described software section of control and the work of each module;
Described monitoring module, whether the treatment effeciency that is used to monitor the core missions of carrying out on computers reaches preset value, and notifies described control module with monitored results;
Described task processing module, be used for monitoring module and monitor described core missions treatment effeciency when being lower than described preset value, described core missions are split as two parts, and wherein a part of core missions send to described computer peripherals by described communication module, and allow computing machine to continue to handle remaining a part of core missions, and receiving after described computer peripherals sends the result of described a part of core missions of returning by described communication module, the result of described two parts core missions is merged, obtain final core missions result; If described core missions treatment effeciency is not less than described preset value, then allow computing machine to continue to carry out described core missions;
Described computer peripherals comprises communication module, control module and intelligent processing module;
Described communication module is used for described computer peripherals and described software section communicates;
Described control module, be used to control described software section and described computer peripherals communicate by letter and inner each module of computer peripherals between communication and the work of each module;
Described intelligent processing module, be used to handle described software section and send described a part of core missions of described computer peripherals to, and after processing, result is sent to described software section by described communication module by the communication module of described computer peripherals.
2. system according to claim 1 is characterized in that, described software section also comprises core missions selection module, is used for automatic or manual and selects core missions.
3. system according to claim 1 is characterized in that described software section also comprises authentication module, and whether be used to authenticate described computer peripherals legal.
4. system according to claim 1, it is characterized in that, described software section also comprises the encryption and decryption module, is used for described software section will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described software section is received from the outside;
Correspondingly, described computer peripherals also comprises the encryption and decryption module, is used for described computer peripherals will be decrypted to the encrypted data that the data that transmit the outside are encrypted and/or described computer peripherals is received from the outside.
5. system according to claim 4 is characterized in that, described data are a part of core missions or its result.
6. system according to claim 1 is characterized in that, the control module of described software section also is used for determining the preset value of described core missions treatment effeciency, and described preset value is determined by the automatic or manual mode.
7. system according to claim 1, it is characterized in that the communication module in described software section and the described computer peripherals is at least a in USB interface, parallel port, serial ports or eSATA interface or infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or the radio-frequency apparatus.
8. the method for a sharing load of computer peripherals is characterized in that, described method comprises:
Step 1, computer peripherals are set up with the software section on the computing machine and are communicated by letter;
Step 2, described software section monitoring core missions are carried out computer-chronograph on computers whether its treatment effeciency are reached preset value; If execution in step 3 then; Otherwise execution in step 4;
Step 3 allows to continue to carry out described core missions on computers, until being finished;
Step 4, described software section is split as two parts with described core missions, and wherein a part of core missions send to described computer peripherals; Described software section allows computing machine to continue to handle remaining a part of core missions;
Step 5, described computer peripherals is handled it after receiving described a part of core missions, and result sent to described software section, described software section will merge the result of two parts core missions, obtain final core missions result.
9. method according to claim 8 is characterized in that, described core missions are self-defined by described software section by the user, perhaps selects a Computer Processing task as core missions automatically by described software section.
10. method according to claim 8 is characterized in that, before the described step 4, also comprises the step that described software section authenticates described computer peripherals.
11. method according to claim 8 is characterized in that, in the described step 4, before described a part of core missions are sent to described computer peripherals, also comprises it is encrypted;
Correspondingly, in the described step 5, described computer peripherals at first is decrypted it, and then handles after receiving described a part of core missions.
12. method according to claim 8 is characterized in that, in the described step 5, described computer peripherals sends to described operation result before the described software section, also comprises it is encrypted;
Correspondingly, described software section merges before the described result, need the result of having encrypted be decrypted.
13. method according to claim 8 is characterized in that, the preset value of described core missions treatment effeciency is self-defined by described software section by the user, perhaps selects the preset value of a value as the core missions treatment effeciency automatically by described software section.
14. method according to claim 8, it is characterized in that communicate by letter with described software section at least a into by in USB interface, parallel port, serial ports or eSATA interface or the modes such as infrared ray, bluetooth, Wireless USB, contactless smart card, light wave or radio frequency of described computer peripherals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200810111791XA CN101587449A (en) | 2008-05-20 | 2008-05-20 | System and method for sharing load of computer peripherals |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA200810111791XA CN101587449A (en) | 2008-05-20 | 2008-05-20 | System and method for sharing load of computer peripherals |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101587449A true CN101587449A (en) | 2009-11-25 |
Family
ID=41371703
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA200810111791XA Pending CN101587449A (en) | 2008-05-20 | 2008-05-20 | System and method for sharing load of computer peripherals |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101587449A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102693455A (en) * | 2012-05-04 | 2012-09-26 | 武汉天喻信息产业股份有限公司 | Fully automatic system and method of data preparation based on financial IC card |
WO2015078073A1 (en) * | 2013-11-29 | 2015-06-04 | 深圳市理邦精密仪器股份有限公司 | Method for monitoring software crash and medical external apparatus using same |
WO2021109654A1 (en) * | 2019-12-03 | 2021-06-10 | 支付宝(杭州)信息技术有限公司 | Security task processing method and electronic device |
-
2008
- 2008-05-20 CN CNA200810111791XA patent/CN101587449A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102693455A (en) * | 2012-05-04 | 2012-09-26 | 武汉天喻信息产业股份有限公司 | Fully automatic system and method of data preparation based on financial IC card |
WO2015078073A1 (en) * | 2013-11-29 | 2015-06-04 | 深圳市理邦精密仪器股份有限公司 | Method for monitoring software crash and medical external apparatus using same |
WO2021109654A1 (en) * | 2019-12-03 | 2021-06-10 | 支付宝(杭州)信息技术有限公司 | Security task processing method and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9015848B2 (en) | Method for virtualizing a personal working environment and device for the same | |
CN106605233B (en) | Providing trusted execution environment using processor | |
US9495524B2 (en) | Secure user authentication using a master secure element | |
KR101805476B1 (en) | Virtual point of sale | |
CN101770386B (en) | Safe startup method for Linux embedded system | |
US7861015B2 (en) | USB apparatus and control method therein | |
EP3065074A1 (en) | Fingerprint authentication method and device, intelligent terminal, and computer storage medium | |
JP5808482B2 (en) | User terminal and payment system | |
EP3706019B1 (en) | Hardware-enforced access protection | |
US10491395B2 (en) | Handy terminal and payment method to be used in same | |
US20140380403A1 (en) | Secure access enforcement proxy | |
EP2915116A1 (en) | Secure computing environment | |
US20150019875A1 (en) | Portable device for data encryption/decryption and/or compression/decompression | |
CN109033771B (en) | System and method for PIN entry on a mobile device | |
CN101535957A (en) | System and method for sharing atrusted platform module | |
CN104504563A (en) | Mobile information safety equipment and working method thereof | |
CN107422838A (en) | A kind of Wearable, solution lock control system and solution lock control method | |
WO2004053664A1 (en) | Program execution control apparatus, os, client terminal, server, program execution control system, program execution control method, and program execution control program | |
CN101587449A (en) | System and method for sharing load of computer peripherals | |
EP3776324A1 (en) | Remote secured terminal | |
WO2013121275A1 (en) | Portable device for data encryption/decryption and/or compression/decompression | |
EP3839783A1 (en) | Electronic device for providing service by using secure element, and operating method thereof | |
CN101646262A (en) | Wireless data card and identity certification method thereof | |
US20140215204A1 (en) | Device for preventing logging of clients input data in a computer system | |
Morgner et al. | Mobile smart card reader using NFC-enabled smartphones |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20091125 |