CN112637201A - Request processing method, device, equipment and system of web server - Google Patents

Request processing method, device, equipment and system of web server Download PDF

Info

Publication number
CN112637201A
CN112637201A CN202011529251.0A CN202011529251A CN112637201A CN 112637201 A CN112637201 A CN 112637201A CN 202011529251 A CN202011529251 A CN 202011529251A CN 112637201 A CN112637201 A CN 112637201A
Authority
CN
China
Prior art keywords
encryption
hardware
web
task
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011529251.0A
Other languages
Chinese (zh)
Other versions
CN112637201B (en
Inventor
胡月恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Inspur Data Technology Co Ltd
Original Assignee
Beijing Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Inspur Data Technology Co Ltd filed Critical Beijing Inspur Data Technology Co Ltd
Priority to CN202011529251.0A priority Critical patent/CN112637201B/en
Publication of CN112637201A publication Critical patent/CN112637201A/en
Application granted granted Critical
Publication of CN112637201B publication Critical patent/CN112637201B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses a request processing method of a web server, which is applied to a cloud host and can generate an asymmetric encryption task according to a web request after receiving the web request; executing an asymmetric encryption task by using encryption hardware which is transmitted to a cloud host by a cloud platform to obtain an execution result; and finally, generating a web response according to the execution result and feeding back. Therefore, the method transfers the encryption process from the web application program to the hardware equipment, can reduce the load of a CPU while ensuring the safety of data transmission, quickens the execution speed of the asymmetric encryption algorithm and improves the web service efficiency. In addition, the application also provides a request processing device, equipment, a system and a readable storage medium of the web server, and the technical effect of the device corresponds to that of the method.

Description

Request processing method, device, equipment and system of web server
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, a system, and a readable storage medium for processing a request of a web server.
Background
Encryption is an important means for securing data in information technology. Many encryption algorithms are generated around encryption and are mainly classified into two categories, namely symmetric encryption algorithms and asymmetric encryption algorithms. In the data transmission process, an asymmetric encryption algorithm is generally adopted. But the asymmetric encryption algorithm brings security and also increases the burden of a CPU. This can dramatically increase the overhead of CPU resources because asymmetric encryption algorithms involve a large number of mathematical operations. When a Web server side has high concurrent connection requests or frequent short connection requests, the encryption process in each request or data transmission occupies a large amount of CPU resources, and the performance of the server is influenced.
Disclosure of Invention
The application aims to provide a request processing method, a request processing device, equipment, a request processing system and a readable storage medium of a web server, and aims to solve the problem that when the web server processes a request, an asymmetric encryption algorithm occupies a large amount of CPU resources and affects service efficiency. The specific scheme is as follows:
in a first aspect, the present application provides a request processing method for a web server, which is applied to a cloud host, and includes:
receiving a web request; generating an asymmetric encryption task according to the web request;
executing the asymmetric encryption task by using the encryption hardware which is transmitted to the cloud host by the cloud platform to obtain an execution result;
and generating a web response according to the execution result, and feeding back.
Preferably, before the executing the asymmetric encryption task by the encryption hardware passed through to the cloud host by the cloud platform to obtain an execution result, the method further includes:
registering encrypted hardware to a cloud platform based on an encrypted hardware registration interface provided by the cloud platform;
and transmitting the encryption hardware on the cloud platform to the cloud host through a PCI (peripheral component interconnect) transmission mechanism.
Preferably, after the cryptographic hardware is registered to the cloud platform based on the cryptographic hardware registration interface provided by the cloud platform, the method further includes:
recording, by the cloud platform, meta information of the encryption hardware in a database, the meta information including any one or more of: the computing node where the encryption hardware is located, the type number, the manufacturer number and the supported encryption algorithm.
Preferably, after the passing through the encryption hardware on the cloud platform to the cloud host through the PCI pass-through mechanism, the method further includes:
and loading the drive of the encryption hardware on the cloud host according to the meta-information of the encryption hardware.
Preferably, the executing the asymmetric encryption task by using the encryption hardware passed through to the cloud host by the cloud platform to obtain an execution result includes:
the web back-end application calls a data encryption module to execute the asymmetric encryption task;
the data encryption module distributes the asymmetric encryption task to a cloud platform and transmits the asymmetric encryption task to encryption hardware of the cloud host;
and executing the asymmetric encryption task by the allocated encryption hardware to obtain an execution result.
Preferably, the executing the asymmetric encryption task by using the encryption hardware passed through to the cloud host by the cloud platform to obtain an execution result includes:
and executing the asymmetric encryption task in parallel by using the encryption hardware which is transmitted to the cloud host by a plurality of cloud platforms to obtain an execution result.
In a second aspect, the present application provides a request processing apparatus of a web server, which is applied to a cloud host, and includes:
an encryption task generation module: for receiving a web request; generating an asymmetric encryption task according to the web request;
the encryption task execution module: the encryption hardware used for transmitting the asymmetric encryption task to the cloud host by using the cloud platform is used for executing the asymmetric encryption task to obtain an execution result;
a request response module: and the server is used for generating a web response according to the execution result and feeding back the web response.
In a third aspect, the present application provides a request processing device of a web server, including:
a memory: for storing a computer program;
a processor: for executing the computer program to implement the request processing method of the web server as described above.
In a fourth aspect, the present application provides a request processing system of a web server, including: the system comprises a cloud host, a cloud platform and encryption hardware;
the cloud platform registers the encrypted hardware to the local and transmits the encrypted hardware to the cloud host;
when the cloud host receives a web request, an asymmetric encryption task is generated according to the web request, and the asymmetric encryption task is executed by using encryption hardware which is transmitted to the local to obtain an execution result; and generating a web response according to the execution result, and feeding back.
In a fifth aspect, the present application provides a readable storage medium, on which a computer program is stored, the computer program being used for implementing the request processing method of the web server as described above when executed by a processor.
The request processing method of the web server side, which is provided by the application, is applied to a cloud host and comprises the following steps: receiving a web request; generating an asymmetric encryption task according to the web request; executing an asymmetric encryption task by using encryption hardware which is transmitted to a cloud host by a cloud platform to obtain an execution result; and generating a web response according to the execution result, and feeding back. Therefore, the method transfers the encryption process from the application program to the hardware equipment, so that the load of a CPU (Central processing Unit) can be reduced while the data transmission safety is ensured, the execution speed of the asymmetric encryption algorithm is increased, and the web service efficiency is improved.
In addition, the application also provides a request processing device, equipment, a system and a readable storage medium of the web server, and the technical effect of the device corresponds to the technical effect of the method, which is not described herein again.
Drawings
For a clearer explanation of the embodiments or technical solutions of the prior art of the present application, the drawings needed for the description of the embodiments or prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a first embodiment of a method for processing a request of a web server according to the present application;
fig. 2 is a schematic process diagram of a second embodiment of a method for processing a request of a web server according to the present application;
FIG. 3 is a functional block diagram of an embodiment of a request processing apparatus of a web server provided in the present application;
fig. 4 is a schematic structural diagram of an embodiment of a request processing device of a web server provided in the present application.
Detailed Description
The core of the application is to provide a request processing method, a request processing device, equipment, a request processing system and a readable storage medium of a web server, an encryption process is transferred from a web application program to hardware equipment, the load of a CPU (Central processing Unit) can be reduced while the data transmission safety is ensured, the execution speed of an asymmetric encryption algorithm is increased, and the web service efficiency is improved.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a first embodiment of a method for processing a request of a web server provided by the present application is described below, where the first embodiment includes the following steps:
s101, receiving a web request; generating an asymmetric encryption task according to the web request;
s102, executing the asymmetric encryption task by using the encryption hardware which is transmitted to the cloud host by the cloud platform to obtain an execution result;
and S103, generating a web response according to the execution result, and feeding back.
The implementation process of the embodiment mainly involves three parties, namely a cloud platform, a cloud host and encryption hardware. The cloud platform is used for managing a cluster formed by bottom nodes and providing cloud computing service to the outside on the basis; the cloud host refers to a virtual machine managed by a cloud platform; the encryption hardware is used to implement an asymmetric encryption algorithm.
In this embodiment, the encryption hardware is pre-registered in the cloud platform, and the cloud platform further passes the encryption hardware to the cloud host, so that the cloud host can bypass the operating system and use the encryption hardware to complete the asymmetric encryption algorithm. Therefore, at least before S102, the method further comprises the following steps: registering encrypted hardware to a cloud platform based on an encrypted hardware registration interface provided by the cloud platform; and transmitting the encryption hardware on the cloud platform to the cloud host through a PCI (peripheral component interconnect) transmission mechanism.
It can be understood that if management of the encryption hardware, including but not limited to the function of passing the encryption hardware through to the cloud host, is to be implemented by using the cloud platform, it is necessary to record relevant information of the encryption hardware on the cloud platform. Thus, after registering the cryptographic hardware to the cloud platform, the cloud platform can also implement the following processes: recording meta-information of the encryption hardware in a database, the meta-information including any one or more of: the computing node where the encryption hardware is located, the type number, the manufacturer number and the supported encryption algorithm.
Accordingly, on the cloud host side, if the encryption hardware is to be used normally, the drivers related to the encryption hardware are necessarily required to be loaded. Thus, after registering the cryptographic hardware to the cloud platform, the cloud host can also implement the following process: and loading the drive of the encryption hardware on the cloud host according to the meta-information of the encryption hardware.
It is worth mentioning that the encryption hardware can only be used by one cloud host at most at the same time. After the cloud platform passes the encrypted hardware through to the cloud host, the cloud host may reuse the encrypted hardware until the cloud platform passes the encrypted hardware through to other cloud hosts.
As a specific embodiment, the cloud host includes a web backend application and a data encryption module. The web back-end application loads the data encryption module in advance, after receiving the web request, the web back-end application judges whether an asymmetric encryption algorithm needs to be executed, if so, the web back-end application calls the data encryption module, then the data encryption module distributes the asymmetric encryption task to encryption hardware which is transmitted to the current cloud host in a transparent mode, the asymmetric encryption task is completed by the encryption hardware, and an execution result is obtained.
In practical application, various types of encryption hardware can be registered in a cloud platform to form an encryption hardware resource pool, and correspondingly, the cloud platform can transmit various types of encryption hardware to one cloud host.
As a preferred embodiment, the cloud platform may transparently transmit a plurality of encryption hardware to the cloud host, and the cloud host may concurrently execute an asymmetric encryption task in parallel by using the plurality of encryption hardware, so as to further increase the execution speed.
The method for processing the request of the web server, provided by the embodiment, is applied to a cloud host, and includes: receiving a web request; generating an asymmetric encryption task according to the web request; executing an asymmetric encryption task by using encryption hardware which is transmitted to a cloud host by a cloud platform to obtain an execution result; and generating a web response according to the execution result, and feeding back. Therefore, the method transfers the encryption process from the application program to the hardware equipment, so that the load of a CPU (Central processing Unit) can be reduced while the data transmission safety is ensured, the execution speed of the asymmetric encryption algorithm is increased, and the web service efficiency is improved.
A second embodiment of a method for processing a request of a web server provided by the present application is described in detail below.
The implementation process of the second embodiment is shown in fig. 2, and specifically includes the following steps:
s201, expanding the cloud platform to provide an encryption hardware registration interface.
S202, registering the encryption hardware to the cloud platform based on the encryption hardware registration interface. Specifically, relevant information of hardware, such as the type number of the encryption device, the manufacturer number, and the supported encryption algorithm, needs to be encrypted with the cloud platform during registration.
S203, when the cloud platform receives the encryption hardware registration request, the computing node where the encryption hardware is located, the type number, the manufacturer number, the supported encryption algorithm and other meta information are stored in the database.
And S204, transmitting the encrypted hardware to the cloud host needing encryption support according to the user instruction. The process can be executed circularly and a plurality of encryption hardware is transmitted in.
S205, after the cloud host is started, the encryption hardware is detected, and corresponding drivers are loaded according to the meta information of the encryption hardware in the cloud platform and are ready.
S206, loading a data encryption acceleration module by an internal web back-end application program of the cloud host.
S207, when the web request comes, if the web back-end application needs to encrypt data in the cloud host, the data encryption module is called.
S208, the data encryption module entrusts the corresponding encryption task to the encryption hardware which is transmitted in through for execution.
S209, the encryption result is returned to the data encryption module by the encryption hardware and is transmitted back to the web back-end application program, and then the web response is generated by processing specific services by other service modules needing the encryption result.
In summary, according to the request processing method of the web server provided by the embodiment, the encryption hardware can be registered in the cloud platform, and the cloud platform manages all the encryption hardware in a unified manner; for a cloud host needing a data encryption function, the cloud platform transparently transmits corresponding encryption hardware to the cloud host through a standard PCI (peripheral component interconnect) transparent transmission mechanism; the cloud host loads corresponding drivers according to the registration type of the encryption hardware, and is ready; a data encryption module is loaded by a web back-end application program in the cloud host, and when a web request comes, if the web back-end application needs to encrypt data in the cloud host, a corresponding encryption task is entrusted to the transparently-transmitted encryption hardware to be executed through the data encryption module; and then, the encryption result is returned to the data encryption module by the encryption hardware and is transmitted back to the web back-end application program, and then the web response is obtained by processing specific services by other service modules needing the encryption result.
The request processing method of the web server transfers the encryption process from the web application program to the hardware equipment, so that the load of a CPU can be reduced while the data transmission safety is ensured, and the encryption speed is increased.
In the following, a request processing device of a web server provided by an embodiment of the present application is introduced, and a request processing device of a web server described below and a request processing method of a web server described above may be referred to correspondingly.
As shown in fig. 3, the request processing apparatus of the web server of the embodiment is applied to a cloud host, and includes:
the encryption task generating module 301: for receiving a web request; generating an asymmetric encryption task according to the web request;
the encryption task execution module 302: the encryption hardware used for transmitting the asymmetric encryption task to the cloud host by using the cloud platform is used for executing the asymmetric encryption task to obtain an execution result;
the request response module 303: and the server is used for generating a web response according to the execution result and feeding back the web response.
The request processing device of the web server in this embodiment is used to implement the foregoing request processing method of the web server, and therefore, a specific implementation manner of the device may be seen in the foregoing embodiment portions of the request processing method of the web server, for example, the encryption task generating module 301, the encryption task executing module 302, and the request responding module 303, which are respectively used to implement steps S101, S102, and S103 in the foregoing request processing method of the web server. Therefore, specific embodiments thereof may be referred to in the description of the corresponding respective partial embodiments, and will not be described herein.
In addition, since the request processing apparatus of the web server in this embodiment is used to implement the request processing method of the web server, the role of the request processing apparatus corresponds to that of the method described above, and details are not described here.
In addition, the present application also provides a request processing device of a web server, as shown in fig. 4, including:
the memory 100: for storing a computer program;
the processor 200: for executing the computer program to implement the request processing method of the web server as described above.
The application also provides a request processing system of the web server, which comprises: the system comprises a cloud host, a cloud platform and encryption hardware;
the cloud platform registers the encrypted hardware to the local and transmits the encrypted hardware to the cloud host;
when the cloud host receives a web request, an asymmetric encryption task is generated according to the web request, and the asymmetric encryption task is executed by using encryption hardware which is transmitted to the local to obtain an execution result; and generating a web response according to the execution result, and feeding back.
Finally, the present application provides a readable storage medium having stored thereon a computer program for implementing the request processing method of the web server as described above when being executed by a processor.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above detailed descriptions of the solutions provided in the present application, and the specific examples applied herein are set forth to explain the principles and implementations of the present application, and the above descriptions of the examples are only used to help understand the method and its core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A request processing method of a web server is applied to a cloud host, and comprises the following steps:
receiving a web request; generating an asymmetric encryption task according to the web request;
executing the asymmetric encryption task by using the encryption hardware which is transmitted to the cloud host by the cloud platform to obtain an execution result;
and generating a web response according to the execution result, and feeding back.
2. The method of claim 1, wherein prior to the performing the asymmetric cryptographic task using the cryptographic hardware passed through by the cloud platform to the cloud host, resulting in a result of the performing, further comprising:
registering encrypted hardware to a cloud platform based on an encrypted hardware registration interface provided by the cloud platform;
and transmitting the encryption hardware on the cloud platform to the cloud host through a PCI (peripheral component interconnect) transmission mechanism.
3. The method of claim 2, wherein after registering cryptographic hardware to the cloud platform based on a cryptographic hardware registration interface provided by the cloud platform, further comprising:
recording, by the cloud platform, meta information of the encryption hardware in a database, the meta information including any one or more of: the computing node where the encryption hardware is located, the type number, the manufacturer number and the supported encryption algorithm.
4. The method of claim 3, wherein after the passthrough of the encryption hardware on the cloud platform to the cloud host via a PCI passthrough mechanism, further comprising:
and loading the drive of the encryption hardware on the cloud host according to the meta-information of the encryption hardware.
5. The method of claim 1, wherein the performing the asymmetric cryptographic task using the cryptographic hardware passed through by the cloud platform to the cloud host results in an execution result comprising:
the web back-end application calls a data encryption module to execute the asymmetric encryption task;
the data encryption module distributes the asymmetric encryption task to a cloud platform and transmits the asymmetric encryption task to encryption hardware of the cloud host;
and executing the asymmetric encryption task by the allocated encryption hardware to obtain an execution result.
6. The method of any one of claims 1-5, wherein the performing the asymmetric cryptographic task using the cryptographic hardware passed through by the cloud platform to the cloud host, resulting in an execution result, comprises:
and executing the asymmetric encryption task in parallel by using the encryption hardware which is transmitted to the cloud host by a plurality of cloud platforms to obtain an execution result.
7. A request processing device of a web server side is applied to a cloud host, and comprises the following components:
an encryption task generation module: for receiving a web request; generating an asymmetric encryption task according to the web request;
the encryption task execution module: the encryption hardware used for transmitting the asymmetric encryption task to the cloud host by using the cloud platform is used for executing the asymmetric encryption task to obtain an execution result;
a request response module: and the server is used for generating a web response according to the execution result and feeding back the web response.
8. A request processing device of a web server, comprising:
a memory: for storing a computer program;
a processor: for executing said computer program for implementing a request handling method of a web server according to any of claims 1-6.
9. A request processing system of a web server, comprising: the system comprises a cloud host, a cloud platform and encryption hardware;
the cloud platform registers the encrypted hardware to the local and transmits the encrypted hardware to the cloud host;
when the cloud host receives a web request, an asymmetric encryption task is generated according to the web request, and the asymmetric encryption task is executed by using encryption hardware which is transmitted to the local to obtain an execution result; and generating a web response according to the execution result, and feeding back.
10. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program, which when executed by a processor is used for implementing the request processing method of the web server according to any one of claims 1 to 6.
CN202011529251.0A 2020-12-22 2020-12-22 Method, device, equipment and system for processing request of web server Active CN112637201B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011529251.0A CN112637201B (en) 2020-12-22 2020-12-22 Method, device, equipment and system for processing request of web server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011529251.0A CN112637201B (en) 2020-12-22 2020-12-22 Method, device, equipment and system for processing request of web server

Publications (2)

Publication Number Publication Date
CN112637201A true CN112637201A (en) 2021-04-09
CN112637201B CN112637201B (en) 2023-04-21

Family

ID=75321204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011529251.0A Active CN112637201B (en) 2020-12-22 2020-12-22 Method, device, equipment and system for processing request of web server

Country Status (1)

Country Link
CN (1) CN112637201B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746642A (en) * 2021-11-08 2021-12-03 西安热工研究院有限公司 Method and system for communication between computers

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420427A (en) * 2007-09-28 2009-04-29 东芝解决方案株式会社 Cryptographic module selection apparatus
US20190109874A1 (en) * 2017-10-11 2019-04-11 Microsoft Technology Licensing, Llc Secure application monitoring
CN109981244A (en) * 2019-03-08 2019-07-05 西安电子科技大学 A kind of method of novel distributed cloud Encryption Algorithm
CN111565107A (en) * 2020-07-14 2020-08-21 腾讯科技(深圳)有限公司 Key processing method and device based on cloud service platform and computer equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420427A (en) * 2007-09-28 2009-04-29 东芝解决方案株式会社 Cryptographic module selection apparatus
US20190109874A1 (en) * 2017-10-11 2019-04-11 Microsoft Technology Licensing, Llc Secure application monitoring
CN109981244A (en) * 2019-03-08 2019-07-05 西安电子科技大学 A kind of method of novel distributed cloud Encryption Algorithm
CN111565107A (en) * 2020-07-14 2020-08-21 腾讯科技(深圳)有限公司 Key processing method and device based on cloud service platform and computer equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
CN5: "S2-041726:LS on update of OSA stage 2", 《3GPP TSG_SA\WG2_ARCH》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113746642A (en) * 2021-11-08 2021-12-03 西安热工研究院有限公司 Method and system for communication between computers

Also Published As

Publication number Publication date
CN112637201B (en) 2023-04-21

Similar Documents

Publication Publication Date Title
US20130227232A1 (en) Partition aware quality of service feature
CN110650216B (en) Cloud service request method and device
JP2009110347A (en) Resource management system, resource management device, and method thereof
CN109120614B (en) Service processing method and device based on distributed system
CN110532106B (en) Inter-process communication method, device, equipment and storage medium
CN111343262B (en) Distributed cluster login method, device, equipment and storage medium
CN111694639B (en) Updating method and device of process container address and electronic equipment
CN112187934A (en) Micro-service building method
CN112286688A (en) Memory management and use method, device, equipment and medium
CN112468545A (en) Cloud host creation method, device, system, equipment and readable storage medium
CN111221653A (en) Service processing method and device and computer readable storage medium
CN105677481B (en) A kind of data processing method, system and electronic equipment
CN112637201A (en) Request processing method, device, equipment and system of web server
CN112054919B (en) Method, device, storage medium and system for generating ID (identity) of container cluster under stateless condition
CN110740464A (en) NF service discovery method and device
CN111600755A (en) Internet access behavior management system and method
CN115480934A (en) Distributed data processing method, device, equipment and storage medium
CN115686836A (en) Unloading card provided with accelerator
US10481963B1 (en) Load-balancing for achieving transaction fault tolerance
CN109634721B (en) Method and related device for starting communication between virtual machine and host
CN114331445A (en) API (application programming interface), method, storage medium and electronic equipment for accessing massive users
US20120167096A1 (en) Managing the Processing of Processing Requests in a Data Processing System Comprising a Plurality of Processing Environments
US20230291558A1 (en) Trusted computing-based local key escrow method, apparatus, device and medium
US11442943B1 (en) Error-causing record isolation for data stream processing
CN116186709B (en) Method, device and medium for unloading UEFI (unified extensible firmware interface) safe start based on virtualized VirtIO technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant