CN103118015B - A kind of implementation method of terminal security strategy and system - Google Patents

A kind of implementation method of terminal security strategy and system Download PDF

Info

Publication number
CN103118015B
CN103118015B CN201310016621.4A CN201310016621A CN103118015B CN 103118015 B CN103118015 B CN 103118015B CN 201310016621 A CN201310016621 A CN 201310016621A CN 103118015 B CN103118015 B CN 103118015B
Authority
CN
China
Prior art keywords
timeslice
terminal
distribution
strategy
distribution server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310016621.4A
Other languages
Chinese (zh)
Other versions
CN103118015A (en
Inventor
谢静宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ying Sui Communication Technology Co., Ltd.
Original Assignee
SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd filed Critical SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310016621.4A priority Critical patent/CN103118015B/en
Publication of CN103118015A publication Critical patent/CN103118015A/en
Application granted granted Critical
Publication of CN103118015B publication Critical patent/CN103118015B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Hardware Redundancy (AREA)

Abstract

The invention provides a kind of implementation method and system of terminal security strategy.Said method comprises the following steps: Security Policy Server receives the detection data message of each terminal to report, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server; Timeslice distribution server, according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determines the first distribution timeslice of each terminal and the timeslice of system spare; If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice; Security Policy Server is according to the safety problem of the Target Assignment timeslice processing terminal of each terminal.

Description

A kind of implementation method of terminal security strategy and system
Technical field
The invention belongs to computer security technique field, particularly relate to a kind of implementation method and system of terminal security strategy.
Background technology
In traditional business network environment, enterprise terminal computer is piled up all kinds of different safety desktop product, as anti-viral software etc., these software products are usually from different vendor, cannot unified management, and take a large amount of system resource, thus affect the operating efficiency of enterprise.For solving the problem, enterprise version safety product arises at the historic moment.But the system resource utilization problem that current enterprise version safety product brings needs solution badly.
Summary of the invention
The invention provides a kind of implementation method and system of terminal security strategy, to solve the problem.
The invention provides a kind of implementation method of terminal security strategy.Said method comprises the following steps: Security Policy Server receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server; Timeslice distribution server obtains the first present system time sheet total amount from Security Policy Server; Timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value; If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice; The Target Assignment timeslice of each terminal is sent to Security Policy Server by timeslice distribution server, and Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.
What the present invention also provided a kind of terminal security strategy realizes system, comprises terminal, Security Policy Server and timeslice distribution server.Terminal connects Security Policy Server, and timeslice distribution server connects Security Policy Server.Wherein, Security Policy Server receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server.Timeslice distribution server obtains the first present system time sheet total amount from Security Policy Server.Timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.If the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.The Target Assignment timeslice of each terminal is sent to Security Policy Server by timeslice distribution server, and Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.
Compared to prior art, according to implementation method and the system of terminal security strategy provided by the invention, timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.In addition, if the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.So, by the time devided modulation of each terminal security problem of timeslice distribution server computing, realize the Resourse Distribute of Security Policy Server, thus make full use of resource, improve treatment effeciency, reduce system burden.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Figure 1 shows that the flow chart of the implementation method of the terminal security strategy that preferred embodiment according to the present invention provides;
Figure 2 shows that the schematic diagram of the system that realizes of the terminal security strategy that preferred embodiment according to the present invention provides.
Embodiment
Hereinafter also describe the present invention in detail with reference to accompanying drawing in conjunction with the embodiments.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
Figure 1 shows that the flow chart of the implementation method of the terminal security strategy that preferred embodiment according to the present invention provides.As shown in Figure 1, the implementation method of terminal security strategy that preferred embodiment of the present invention provides comprises step 101 ~ 105.
In step 101, Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to timeslice distribution server.
In the present embodiment, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.In this, safety problem type such as comprises virus, system dangerous project, wooden horse and other dangerous items etc.But the present invention does not limit this.In this, for four terminals 1 ~ 4, Security Policy Server receives the detection data message of four terminal to report, and sets up safety problem statistical form according to described detection data message, and described safety problem statistical form is such as shown in table 1.But the present invention is not limited thereto.
Table 1
In step 102, described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server.Specifically, timeslice distribution server sends system time sheet to Security Policy Server and obtains request, after Security Policy Server receives described system time sheet acquisition request, Security Policy Server obtains the first present system time sheet total amount of self, and sends the first present system time sheet total amount to timeslice distribution server.
In step 103, described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.
In the present embodiment, first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.Specifically, the time devided modulation ratio of each terminal danger classes number that equals this terminal and corresponding time devided modulation degree product with the ratio of value and the dangerous project sum of all terminals.
In this, for table 1, danger classes comprises Three Estate: senior, intermediate and rudimentary.Correspondingly, the time devided modulation degree of senior correspondence is 50%, and the time devided modulation degree that middle rank is corresponding is 40%, and the time devided modulation degree of rudimentary correspondence is 10%.But the present invention does not limit this.In practical application, corresponding time devided modulation degree can be set as required.
For table 1, for terminal 1, its safety problem table is as shown in table 2a.
Table 2a
Now, known according to the first strategy: time devided modulation ratio=(the 3*50%+1*40%)/16=1.9/16 of terminal 1.Wherein, the dangerous project sum of current four terminals is 16 as shown in Table 1.
For table 1, for terminal 2, its safety problem table is as shown in table 2b.
Table 2b
Now, known according to the first strategy: time devided modulation ratio=(the 2*50%+1*40%+2*10%)/16=1.6/16 of terminal 2.
For table 1, for terminal 3, its safety problem table is as shown in table 2c.
Table 2c
Now, known according to the first strategy: time devided modulation ratio=(the 1*40%+3*10%)/16=0.7/16 of terminal 3.
For table 1, for terminal 4, its safety problem table is as shown in table 2d.
Table 2d
Now, known according to the first strategy: time devided modulation ratio=(the 1*50%+1*40%+1*10%)/16=1/16 of terminal 4.
In addition, in the present embodiment, first distributes the product that timeslice is time devided modulation ratio and the first present system time sheet total amount.In this, the the first present system time sheet total amount obtained for time devided modulation server is for a, and first of time devided modulation ratio each terminal known of each terminal determined according to time devided modulation server to distribute timeslice as follows successively: first of terminal 1 distributes timeslice=1.9a/16; First of terminal 2 distributes timeslice=1.6a/16; First of terminal 3 distributes timeslice=0.7a/16; First of terminal 4 distributes timeslice=a/16.It can thus be appreciated that, the timeslice=a-(1.9a/16+1.6a/16+0.7a/16+a/16 of system spare)=10.8a/16=0.675a.
In step 104, if the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, then obtain the Target Assignment timeslice of each terminal according to described first distribution timeslice and described second distribution timeslice.
In the present embodiment, still for the terminal of four in step 103, if preset value is such as set to 0.5a, then the timeslice (such as, 0.675a) of system spare is greater than preset value.Wherein, the present invention does not limit the setting of preset value, in practical application, can arrange preset value as required.Now, timeslice distribution server using the timeslice of system spare (that is, 0.675a) as the second present system time sheet total amount, then recalculates the second distribution timeslice of each terminal according to the first strategy.In this, second of each terminal that time devided modulation server calculates is distributed timeslice and is specially: second of terminal 1 distributes timeslice=(1.9/16) * 0.675a=1.2825a/16; Second of terminal 2 distributes timeslice=(1.6/16) * 0.675a=1.08a/16; Second of terminal 3 distributes timeslice=(0.7/16) * 0.675a=0.4725a; Second of terminal 4 distributes timeslice=(1/16) * 0.675a=0.675a/16.Now, the timeslice=0.675a-(1.2825a/16+1.08a/16+0.4725a/16+0.675a/16 of system spare)=0.455625a.Now, the timeslice (that is, 0.455625a) of system spare is less than preset value (0.5a), then timeslice distribution server obtains the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.In this, Target Assignment timeslice is that the first distribution timeslice and second distributes timeslice sum.Specifically, the Target Assignment timeslice=1.9a/16+1.2825a/16=3.1825a/16 of terminal 1; Target Assignment timeslice=the 1.6a/16+1.08a/16=2.68a/16 of terminal 2; Target Assignment timeslice=the 0.7a/16+0.4725a/16=1.1725a/16 of terminal 3; Target Assignment timeslice=the a/16+0.675a/16=1.675a/16 of terminal 4.
In the present embodiment, if after timeslice distribution server calculates the second distribution timeslice of each terminal, the remaining timeslice of current system is still greater than preset value, then timeslice distribution server is using the remaining timeslice of current system as the 3rd present system time sheet total amount, recalculates the 3rd of each terminal distribute timeslice according to the first strategy.3rd computational process of distributing timeslice is distributed timeslice and second with first and is distributed timeslice.In addition, if after obtaining the 3rd distribution timeslice, the timeslice of system spare is less than or equal to preset value, then the Target Assignment timeslice of each terminal equals the first distribution timeslice, the second distribution timeslice and the 3rd distributes timeslice sum.In other words, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
In step 105, the Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.In this, the Target Assignment timeslice of each terminal determined is sent to Security Policy Server by timeslice distribution server, after Security Policy Server receives the Target Assignment timeslice of each terminal, according to the safety problem of Target Assignment timeslice process corresponding terminal.In this, for project 3 dangerous in table 1, Security Policy Server such as directly can delete the dangerous project 3 of terminal 2 and terminal 3; For dangerous project 1, Security Policy Server such as needs the relevant setting of first more new terminal 1 and terminal 2, confirms relevantly to arrange after renewal completes, process dangerous project 1 in terminal 1 or terminal 2.
Figure 2 shows that the schematic diagram of the system that realizes of the terminal security strategy that preferred embodiment according to the present invention provides.As shown in Figure 2, the system that realizes of terminal security strategy that preferred embodiment of the present invention provides comprises terminal 10a ~ 10n, Security Policy Server 12 and timeslice distribution server 14.In this, the present invention does not limit the number of terminal.Terminal 10a ~ 10n connects Security Policy Server 12, and timeslice distribution server 14 connects Security Policy Server 12.
In the present embodiment, Security Policy Server 12 receives the detection data message of each terminal to report, and according to detection data message, sets up safety problem statistical form, and safety problem statistical form is synchronized to timeslice distribution server 14.Timeslice distribution server 14 obtains the first present system time sheet total amount from Security Policy Server 12.Timeslice distribution server 14 is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.If the timeslice of system spare is greater than preset value, timeslice distribution server 14 is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.The Target Assignment timeslice of each terminal is sent to Security Policy Server 12 by timeslice distribution server 14, and Security Policy Server 12 is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal.About the specific operation process of said system with described in said method, therefore repeat no more in this.
In sum, the implementation method of the terminal security strategy provided according to present pre-ferred embodiments and system, timeslice distribution server is according to safety problem statistical form, the first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value.In addition, if the timeslice of system spare is greater than preset value, timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to the first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to preset value, then obtain the Target Assignment timeslice of each terminal according to the first distribution timeslice and the second distribution timeslice.So, by the time devided modulation of each terminal security problem of timeslice distribution server computing, realize the Resourse Distribute of Security Policy Server, thus make full use of resource, improve treatment effeciency, reduce system burden.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an implementation method for terminal security strategy, is characterized in that, comprises the following steps:
Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to timeslice distribution server;
Described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server;
Described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value;
If the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, then obtain the Target Assignment timeslice of each terminal according to described first distribution timeslice and described second distribution timeslice;
The Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal;
Wherein, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
2. method according to claim 1, is characterized in that, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.
3. method according to claim 1, it is characterized in that, described first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.
4. method according to claim 3, is characterized in that, described first distributes the product that timeslice is described time devided modulation ratio and described first present system time sheet total amount.
5. method according to claim 1, is characterized in that, described Target Assignment timeslice is that described first distribution timeslice and described second distributes timeslice sum.
6. method according to claim 1, it is characterized in that, if after described timeslice distribution server calculates the second distribution timeslice of each terminal, the remaining timeslice of current system is greater than described preset value, then described timeslice distribution server is using the remaining timeslice of current system as the 3rd present system time sheet total amount, recalculates the 3rd of each terminal distribute timeslice according to described first strategy.
7. terminal security strategy realize a system, it is characterized in that, comprise terminal, Security Policy Server and timeslice distribution server, described terminal connects described Security Policy Server, and described timeslice distribution server connects described Security Policy Server,
Wherein, described Security Policy Server receives the detection data message of each terminal to report, and according to described detection data message, sets up safety problem statistical form, and described safety problem statistical form is synchronized to described timeslice distribution server,
Described timeslice distribution server obtains the first present system time sheet total amount from described Security Policy Server,
Described timeslice distribution server is according to described safety problem statistical form, described first present system time sheet total amount and the first strategy, determine the first distribution timeslice of each terminal and the timeslice of system spare, and judge whether the timeslice of system spare is less than or equal to preset value
If the timeslice of system spare is greater than described preset value, described timeslice distribution server is using the timeslice of system spare as the second present system time sheet total amount, recalculate second of each terminal according to described first strategy and distribute timeslice, if now the timeslice of system spare is less than or equal to described preset value, the Target Assignment timeslice of each terminal is then obtained according to described first distribution timeslice and described second distribution timeslice
The Target Assignment timeslice of each terminal is sent to described Security Policy Server by described timeslice distribution server, and described Security Policy Server is according to the safety problem of each terminal of Target Assignment timeslice process of each terminal;
Wherein, when the timeslice of system spare is less than or equal to preset value, timeslice distribution server stops the calculating of the distribution timeslice of each terminal, the distribution timeslice correspondence of each terminal calculated is added the Target Assignment timeslice obtaining each terminal simultaneously.
8. system according to claim 7, is characterized in that, the detection data message of each terminal to report comprises danger classes corresponding to safety problem type, dangerous project and dangerous project.
9. system according to claim 7, it is characterized in that, described first strategy is: the time devided modulation degree that the dangerous project of different danger classes is corresponding different, the dangerous project sum of the time devided modulation degree corresponding according to the dangerous project of each terminal, dangerous project and described terminal, determines the time devided modulation ratio of corresponding terminal.
10. system according to claim 7, is characterized in that, described first distributes the product that timeslice is described time devided modulation ratio and described first present system time sheet total amount.
CN201310016621.4A 2013-01-17 2013-01-17 A kind of implementation method of terminal security strategy and system Active CN103118015B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310016621.4A CN103118015B (en) 2013-01-17 2013-01-17 A kind of implementation method of terminal security strategy and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310016621.4A CN103118015B (en) 2013-01-17 2013-01-17 A kind of implementation method of terminal security strategy and system

Publications (2)

Publication Number Publication Date
CN103118015A CN103118015A (en) 2013-05-22
CN103118015B true CN103118015B (en) 2015-08-05

Family

ID=48416289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310016621.4A Active CN103118015B (en) 2013-01-17 2013-01-17 A kind of implementation method of terminal security strategy and system

Country Status (1)

Country Link
CN (1) CN103118015B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889510A (en) * 2005-06-30 2007-01-03 华为技术有限公司 Method for raising network security via message processing
CN101916068A (en) * 2010-07-29 2010-12-15 北京交通大学 Computer control system based on 2-out-of-2 structure and implementation method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889510A (en) * 2005-06-30 2007-01-03 华为技术有限公司 Method for raising network security via message processing
CN101916068A (en) * 2010-07-29 2010-12-15 北京交通大学 Computer control system based on 2-out-of-2 structure and implementation method thereof

Also Published As

Publication number Publication date
CN103118015A (en) 2013-05-22

Similar Documents

Publication Publication Date Title
EP3534320A1 (en) Block chain-based multi-chain management method and system, electronic device, and storage medium
US10171630B2 (en) Executing remote commands
CN103248696B (en) Dynamic configuration method for virtual resource under a kind of cloud computing environment
MY184724A (en) Method and system for conducting resource transfer using a social networking application
CN103281361A (en) Personal cloud cooperation system and data management method
CN104091130A (en) Authority control method for enterprise data management platform
CN103095706B (en) A kind of processing method of terminal security and system
CN105376347A (en) IP address allocation method and system
CN102611704B (en) Cloud computing node registering system and cloud computing node registering method
CN104506630B (en) Permissions data generation method, server and system based on user role
CN103118015B (en) A kind of implementation method of terminal security strategy and system
Sharma et al. Power‐saving policies for annual energy cost savings in green computing
CN103118014B (en) A kind of control method of terminal security and system
CN103095707B (en) A kind of information processing method of terminal security and system
CN102238037B (en) Cooperative target strategy detailing method
CN102999728B (en) Based on date storage method and the device of safety desktop
CN105426252A (en) Thread distribution method and system of distributed type file system
CN105825316A (en) Integral management method
CN104092602A (en) Cloud computing gateway
CN110868330A (en) Evaluation method, device and evaluation system for CPU resources which can be divided by cloud platform
CN107273047A (en) A kind of buffer memory management method, cache manager and storage management software
CN103309730A (en) Method and device for inter-process callback
CN113515330B (en) Cloud desktop security authentication method and system based on domestic cryptographic technology
Xie et al. Trust management model of cloud computing based on multi-agent
CN103530239A (en) Method for improving performance of communication server by using memory pool

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20170523

Address after: 511300 Guangdong Province, Guangzhou City Licheng street Zengcheng District Garden Road No. 66 first floor shop

Patentee after: Guangzhou Ying Sui Communication Technology Co., Ltd.

Address before: Suzhou City, Jiangsu Province, Suzhou Industrial Park 215021 Xinghu Street No. 328 Chongwen Road, Guohua building A511

Patentee before: Suzhou Yibei Information Technology Co., Ltd.