CN116668191A - Internet of things application virtual gateway with data encryption convergence function - Google Patents

Internet of things application virtual gateway with data encryption convergence function Download PDF

Info

Publication number
CN116668191A
CN116668191A CN202310911822.4A CN202310911822A CN116668191A CN 116668191 A CN116668191 A CN 116668191A CN 202310911822 A CN202310911822 A CN 202310911822A CN 116668191 A CN116668191 A CN 116668191A
Authority
CN
China
Prior art keywords
data
communication node
database
index
network address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310911822.4A
Other languages
Chinese (zh)
Other versions
CN116668191B (en
Inventor
史博林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Birthplace Technology Development Co ltd
Original Assignee
Beijing Birthplace Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Birthplace Technology Development Co ltd filed Critical Beijing Birthplace Technology Development Co ltd
Priority to CN202310911822.4A priority Critical patent/CN116668191B/en
Publication of CN116668191A publication Critical patent/CN116668191A/en
Application granted granted Critical
Publication of CN116668191B publication Critical patent/CN116668191B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application provides an application virtual gateway of the Internet of things with a data encryption convergence function, which is used for grouping acquired data at a data starting node and establishing an index catalog for each group of data; establishing an interaction database, and carrying out isolation distribution on the grouped data in the database; constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes; and taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set.

Description

Internet of things application virtual gateway with data encryption convergence function
Technical Field
The application belongs to the field of virtual gateways, and particularly relates to an application virtual gateway of an Internet of things with a data encryption convergence function.
Background
Currently, large-scale networking systems are a common platform used in a variety of settings for running service applications and maintaining data for business and operational functions. For example, a data center (e.g., physical cloud computing infrastructure) may provide multiple services (e.g., web applications, email services, search engine services, etc.) to multiple customers simultaneously. These large-scale networked systems typically include a large number of resources distributed throughout the data center, where each resource resembles a physical machine or Virtual Machine (VM) running on a physical host. When a data center hosts multiple tenants (e.g., customer programs), these resources are allocated from the data center to different tenants to meet their usage needs. The collection of resources allocated to tenants may be grouped into logical or virtual subnets for ease of management and security isolation. Customers of a data center often need service applications running in an enterprise private network (e.g., servers managed by customers geographically remote from the data center) or other third party networks to interact with software running on resources in the data center.
To enable this interaction while securely separating the resources allocated to the tenant from the resources allocated to other tenants, the hosted service provider may employ a single, centralized routing mechanism to act as a network gateway between all machines belonging to the tenant in the virtual subnet, or the resources managed by the host system hypervisor and the remote resources of the tenant. However, this architecture employing a centralized routing mechanism is inefficient because operation depends on the physical proximity of the mechanism to the machines/resources it serves. For example, if the machines/resources are located in different parts of the data center or in different locations (e.g., across the data center and enterprise private network), at least some of the machines/resources will face higher latency and lower bandwidth connections when the driver is being used by other machines/resources. Thus, the centralized routing mechanism becomes a common point of congestion for communications entering and exiting a particular virtual subnet. Furthermore, the machine/resource will be forced to send data packets on a suboptimal route when it is limited to passing all communications through the centralized routing mechanism.
With the development of computer technology, virtualization technology has been widely popularized and applied. Desktop virtualization is to install a virtual machine system on a physical server implementing a data center, and the virtual machine system simulates hardware resources required by the operation of an operating system. The operating systems run on the virtual hardware resources, so that a plurality of operating systems can share the hardware resources of the physical server, and the resource utilization rate is improved.
Therefore, there is a need for an internet of things application virtual gateway with data encryption convergence function.
Disclosure of Invention
The application provides an application virtual gateway of the Internet of things with a data encryption convergence function, which solves the problems that in the prior art, encrypted data of the virtual gateway are stored and shared in a concentrated manner, and the encrypted data are stored and shared in a concentrated manner, so that the problem that the data are leaked or tampered in the transmission between devices or systems can be avoided.
The technical scheme of the application is realized as follows: the method comprises the steps that an Internet of things application virtual gateway with a data encryption convergence function groups acquired data at a data starting node, and an index catalog is built for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
The application file mainly comprises the following aspects: data grouping, index catalog and virtual network address node construction, address-dependent establishment, communication node setting and information acquisition mode by users. At the data start node, the acquired data are grouped, and an index directory is established for each group of data so as to carry out isolation distribution in the database. In terms of establishing index directories, the virtual gateway will construct virtual network address nodes according to the index directories corresponding to the number. These virtual network address nodes will store the IP information in the interaction database and build the dependent addresses of the virtual network address and the IP information by mapping. These dependent addresses will be fed back into the interaction database through the blockchain nodes. In the communication node, the user performs asymmetric encryption through the private key and performs data interaction with the virtual gateway. The user obtains index directory information and IP information in the virtual network address through the private key. This information will be stored within the blockchain node for later use. In short, the application virtual gateway of the Internet of things with the data encryption convergence function realizes the data encryption and convergence functions by constructing an index directory and virtual network address nodes and by establishing public key encryption and dependent addresses.
As a preferred embodiment, the interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database in a distributed arrangement, and an original log file, an HTML code or an HTML label is backed up.
As a preferred embodiment, when grouping is performed after data is acquired, the grouped data is screened, cleaned and ordered according to preset parameters to form an independent table area.
As a preferred embodiment, index directories are established in the table area, and each index directory adopts independent numbers, so that required data can be rapidly located.
As a preferred embodiment, after the data packets are established, a transaction management mechanism is established between the packet data, and the same requests of different users through the communication nodes are combined through distributed transaction management and are uniformly processed in the interaction database.
As a preferred implementation, the mapping establishes the dependence address of the virtual network address and the IP information by mapping the IP address and the port information to the interaction database, and inputting the host name and the port number to determine the mapping relationship after selecting the virtual network address to be mapped in the interaction database.
As a preferred implementation mode, the communication node adopts a multi-chain multi-account interface, and is connected with different users through a plurality of interfaces at the same time, and simultaneously, data transmitted in opposite directions in an interaction channel are encrypted respectively.
After the technical scheme is adopted, the application has the beneficial effects that:
and data are gathered to the blockchain node, so that the data are safer and more reliable, and the data are prevented from being revealed and tampered. By grouping the users and encrypting the data at different nodes, the data transmitted by the users between the different nodes has better security and confidentiality. And establishing an interaction database, and isolating data transmitted between different nodes to avoid the data from being tampered and leaked. The virtual network address and the dependent address of the IP information are established through mapping, so that a user can better control the data transmitted between different nodes, and the data is prevented from being tampered or stolen. And taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set. The content which is communicated with the user is encrypted through an asymmetric encryption technology, so that the personal privacy and identity information of the user can be better protected when the user performs data interaction.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a schematic diagram of virtual gateway data interaction according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Examples
As shown in fig. 1, an internet of things application virtual gateway with a data encryption convergence function groups acquired data at a data start node and establishes an index directory for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
The main flow can be briefly described as follows: and (3) data acquisition: and at the data starting node, acquiring data for grouping, and establishing an index catalog for each group of data.
Database establishment: and establishing an interaction database, and carrying out isolation distribution on the grouped data in the database. Virtual network address node construction: and constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, and establishing the dependent addresses of the virtual network address and the IP information through mapping.
And (3) data feedback: the dependent address is fed back into the interaction database through the blockchain node. And (3) setting communication nodes: and taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set.
Asymmetric encryption: and carrying out asymmetric encryption in the communication node through the public and private keys, and carrying out data interaction between the user and the communication node through the unique exclusive address.
Acquiring information: and the user enters the communication node through the private key to acquire index directory information and IP information in the virtual network address.
In general, the working principle of the system is to build virtual network address nodes and index catalogues, perform isolated distribution on data, and realize data feedback and secure communication by using a block chain technology. The user can enter the communication node through the private key to acquire data, so that the function of data encryption and aggregation is realized.
The interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database which is arranged in a distributed mode, and an original log file, an HTML code or an HTML label is backed up. First, the distributed storage technology stores data using a plurality of servers, and can improve efficiency and reliability of data storage. This technique is commonly used to process large amounts of data, such as log files and HTML code. Secondly, the interaction database backs up the original log file, HTML code or HTML tag for recovery when data loss or corruption occurs. This ensures data integrity and consistency while also avoiding the unavailability of data due to data loss or corruption. It should be noted that distributed storage techniques are not suitable for all application scenarios, such as network applications where throughput and latency requirements are high.
When data are acquired and grouped, the grouped data are screened, cleaned and ordered according to preset parameters to form an independent table area. In the grouping process, various methods may be employed, such as based on keywords, date, or other parameters, etc. Keyword-based methods are typically performed by searching for keywords corresponding to data and then combining the data corresponding to the keywords into a field. The data is then screened, cleaned and sorted according to this field, eventually forming a separate table area.
The method based on date or other parameters is to screen and sort the grouped data by setting some parameters, such as "time range" or "time interval", etc. Through the parameters, the data can be screened and cleaned according to a certain rule, so that the quality and the integrity of the data are ensured. In addition, the method can also carry out custom adjustment and optimization on the surface area according to actual needs.
And establishing index catalogues in the table area, wherein each index catalogue adopts independent numbers, so that required data can be rapidly positioned. In the process of creating the index directory, various methods may be employed. One such method is by searching for keywords corresponding to the data, then combining the data corresponding to the keywords into a field, and finally screening, cleaning and sorting the data according to the field to finally form an independent table region. In this table area, the index directory will be stored in a database for convenient user query and use. Another method is to number each index directory independently, which can ensure consistency and reliability of the index directory. Each index directory has its own number, meaning that they can be uniquely identified, thereby avoiding the problem of duplicate data. In addition, the method can also prevent the index directory from being maliciously modified or deleted, thereby ensuring the safety of the data.
After the data packet is established, a transaction management mechanism is established among the packet data, and different users are combined through the same request of the communication node through distributed transaction management and are uniformly processed in an interaction database. In particular, after the data packet is established, this goal may be achieved through a distributed transaction management mechanism. The mechanism would combine multiple requests in the packet data into one request and send it to one node in the interaction database. In the interaction database, the node processes the request and returns the result to one of the packet data. Thus, the same request of different users through the communication node can be combined and the same request in the interaction database can be processed. Distributed transaction management is a common technique that can be used to handle large-scale, highly concurrent data interaction scenarios. The method can improve the efficiency and reliability of data processing and reduce the risks of data errors and loss.
The mapping establishes the dependent address of the virtual network address and the IP information by mapping the IP address and the port information to an interactive database, selecting the virtual network address to be mapped in the interactive database, and inputting the host name and the port number to determine the mapping relation. Specifically, the virtual gateway first needs to store the IP address and port number in the interaction database in order to map the dependent address that establishes the virtual network address with the IP information. Then, the user can determine the mapping relationship by inputting the host name and the port number. In the mapping process, the user may need to input the host name and port number multiple times to determine the mapping relationship. This is because the virtual gateway needs to query and access each host and return different results on different hosts. The process of mapping the dependent address of establishing virtual network addresses and IP information is very important. It can conveniently store the IP address and port information in the interaction database and ensure their correctness and reliability.
The communication node adopts a multi-chain multi-account interface, is connected with different users through a plurality of interfaces, and simultaneously encrypts data transmitted in opposite directions in the interaction channel respectively. An advantage of the design is that it can support multiple types of network connections, including fiber optic, wireless networks, etc. By adopting the design, the communication node can be connected with different types of users, so that the user experience and the reliability of data transmission are improved. In addition, the system also adopts a plurality of interfaces so as to facilitate the user to access the communication node and interact with the interaction database through the interfaces. This design also ensures data security because only designated users can connect and transmit data through the communication node. Finally, the communication node also adopts a separate encryption design to protect the user data from hacking or disclosure. The design can prevent an attacker from tampering or encrypting the user data through the interaction channel, thereby improving the security of the user data. In general, this design employs a variety of techniques to achieve high performance, high availability and security communication node designs.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the application.

Claims (7)

1. The application virtual gateway of the Internet of things with the data encryption convergence function is characterized in that,
grouping the acquired data at a data starting node, and establishing an index catalog for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
2. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database which is arranged in a distributed mode, and an original log file, an HTML code or an HTML label is backed up.
3. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: when data are acquired and grouped, the grouped data are screened, cleaned and ordered according to preset parameters to form an independent table area.
4. The internet of things application virtual gateway with data encryption convergence function of claim 3, wherein: and establishing index catalogues in the table area, wherein each index catalogue adopts independent numbers, so that required data can be rapidly positioned.
5. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: after the data packet is established, a transaction management mechanism is established among the packet data, and different users are combined through the same request of the communication node through distributed transaction management and are uniformly processed in an interaction database.
6. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the mapping establishes the dependent address of the virtual network address and the IP information by mapping the IP address and the port information to an interactive database, selecting the virtual network address to be mapped in the interactive database, and inputting the host name and the port number to determine the mapping relation.
7. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the communication node adopts a multi-chain multi-account interface, is connected with different users through a plurality of interfaces, and simultaneously encrypts data transmitted in opposite directions in the interaction channel respectively.
CN202310911822.4A 2023-07-25 2023-07-25 Internet of things application virtual gateway with data encryption convergence function Active CN116668191B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310911822.4A CN116668191B (en) 2023-07-25 2023-07-25 Internet of things application virtual gateway with data encryption convergence function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310911822.4A CN116668191B (en) 2023-07-25 2023-07-25 Internet of things application virtual gateway with data encryption convergence function

Publications (2)

Publication Number Publication Date
CN116668191A true CN116668191A (en) 2023-08-29
CN116668191B CN116668191B (en) 2023-10-20

Family

ID=87720827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310911822.4A Active CN116668191B (en) 2023-07-25 2023-07-25 Internet of things application virtual gateway with data encryption convergence function

Country Status (1)

Country Link
CN (1) CN116668191B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117113411A (en) * 2023-09-11 2023-11-24 北京发祥地科技发展有限责任公司 Internet of Things data processing technology based on artificial intelligence

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180205552A1 (en) * 2015-06-02 2018-07-19 ALTR Solutions, Inc. Utilizing a tree-structure to segment and distribute files across a series of blockchains
US20190288850A1 (en) * 2016-08-12 2019-09-19 ALTR Solutions, Inc. Decentralized database optimizations
US20200225655A1 (en) * 2016-05-09 2020-07-16 Strong Force Iot Portfolio 2016, Llc Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment
CN114008979A (en) * 2019-06-24 2022-02-01 亚马逊科技公司 Serverless packet processing service with isolated virtual network integration
CN114861167A (en) * 2022-04-06 2022-08-05 国网浙江省电力有限公司电力科学研究院 Block chain-based distributed energy data management cooperative processing method and system
CN115934202A (en) * 2022-12-23 2023-04-07 星环信息科技(上海)股份有限公司 Data management method, system, data service gateway and storage medium
CN116018795A (en) * 2020-10-03 2023-04-25 英特尔公司 Infrastructure processing unit

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180205552A1 (en) * 2015-06-02 2018-07-19 ALTR Solutions, Inc. Utilizing a tree-structure to segment and distribute files across a series of blockchains
US20200225655A1 (en) * 2016-05-09 2020-07-16 Strong Force Iot Portfolio 2016, Llc Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment
US20190288850A1 (en) * 2016-08-12 2019-09-19 ALTR Solutions, Inc. Decentralized database optimizations
CN114008979A (en) * 2019-06-24 2022-02-01 亚马逊科技公司 Serverless packet processing service with isolated virtual network integration
CN116366350A (en) * 2019-06-24 2023-06-30 亚马逊科技公司 Serverless packet processing service with isolated virtual network integration
CN116018795A (en) * 2020-10-03 2023-04-25 英特尔公司 Infrastructure processing unit
CN114861167A (en) * 2022-04-06 2022-08-05 国网浙江省电力有限公司电力科学研究院 Block chain-based distributed energy data management cooperative processing method and system
CN115934202A (en) * 2022-12-23 2023-04-07 星环信息科技(上海)股份有限公司 Data management method, system, data service gateway and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117113411A (en) * 2023-09-11 2023-11-24 北京发祥地科技发展有限责任公司 Internet of Things data processing technology based on artificial intelligence
CN117113411B (en) * 2023-09-11 2024-03-08 北京发祥地科技发展有限责任公司 Internet of things data processing technology based on artificial intelligence

Also Published As

Publication number Publication date
CN116668191B (en) 2023-10-20

Similar Documents

Publication Publication Date Title
CN103001999B (en) For privately owned Cloud Server, intelligent apparatus client and the method for public cloud network
US9122533B2 (en) System and method for reducing cloud IP address utilization using a distributor registry
EP3732864A1 (en) High performance distributed system of record
US7016945B2 (en) Entry distribution in a directory server
US20030182423A1 (en) Virtual host acceleration system
US11223603B2 (en) Private virtual network replication of cloud databases
CN116668191B (en) Internet of things application virtual gateway with data encryption convergence function
EP3529950B1 (en) Method for managing data traffic within a network
Xie et al. Supporting seamless virtual machine migration via named data networking in cloud data center
WO2013071890A1 (en) Resource access system and method based on identity and session
EP4165821A1 (en) Securing data using key agreement
US11792153B1 (en) Application routing infrastructure for private-level redirect trapping and creation of NAT mapping to work with connectivity in cloud and customer networks
CN103379148A (en) Cloud calculator and method for processing files through cloud calculator
US9405923B2 (en) Establishing isolation between content hosting services executing on common support server
CN111831743A (en) Block chain data storage system and method based on cloud storage
US11841875B2 (en) Database sharing in a virtual private deployment
US11206207B1 (en) Managed multicast communications across isolated networks
CN107124411A (en) Virtual private cloud implementation method, device and system under classic network environment
CN117097591B (en) Application security access gateway system and route forwarding method
US20230344815A1 (en) End-point instance indexing and owner pop selection in gateway service ticketing
Han Efficient Security and Privacy Enhancing Solutions in Untrusted Environments
CN115470514A (en) Intelligent education service system based on cloud computing
Pozefsky et al. SNA's Design for Networking
Kimmatkar et al. Applications sharing using binding server for distributed environment
Shinde A Cloud Enable Data Sharing Platform using BESTPEER++

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant