CN116668191A - Internet of things application virtual gateway with data encryption convergence function - Google Patents
Internet of things application virtual gateway with data encryption convergence function Download PDFInfo
- Publication number
- CN116668191A CN116668191A CN202310911822.4A CN202310911822A CN116668191A CN 116668191 A CN116668191 A CN 116668191A CN 202310911822 A CN202310911822 A CN 202310911822A CN 116668191 A CN116668191 A CN 116668191A
- Authority
- CN
- China
- Prior art keywords
- data
- communication node
- database
- index
- network address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000004891 communication Methods 0.000 claims abstract description 55
- 230000003993 interaction Effects 0.000 claims abstract description 49
- 238000013507 mapping Methods 0.000 claims abstract description 20
- 230000001419 dependent effect Effects 0.000 claims abstract description 19
- 238000009826 distribution Methods 0.000 claims abstract description 7
- 238000002955 isolation Methods 0.000 claims abstract description 7
- 230000002452 interceptive effect Effects 0.000 claims description 10
- 230000007246 mechanism Effects 0.000 claims description 10
- 238000005516 engineering process Methods 0.000 claims description 8
- 238000003860 storage Methods 0.000 claims description 5
- 238000000034 method Methods 0.000 description 20
- 238000013461 design Methods 0.000 description 7
- 238000007726 management method Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Abstract
The application provides an application virtual gateway of the Internet of things with a data encryption convergence function, which is used for grouping acquired data at a data starting node and establishing an index catalog for each group of data; establishing an interaction database, and carrying out isolation distribution on the grouped data in the database; constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes; and taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set.
Description
Technical Field
The application belongs to the field of virtual gateways, and particularly relates to an application virtual gateway of an Internet of things with a data encryption convergence function.
Background
Currently, large-scale networking systems are a common platform used in a variety of settings for running service applications and maintaining data for business and operational functions. For example, a data center (e.g., physical cloud computing infrastructure) may provide multiple services (e.g., web applications, email services, search engine services, etc.) to multiple customers simultaneously. These large-scale networked systems typically include a large number of resources distributed throughout the data center, where each resource resembles a physical machine or Virtual Machine (VM) running on a physical host. When a data center hosts multiple tenants (e.g., customer programs), these resources are allocated from the data center to different tenants to meet their usage needs. The collection of resources allocated to tenants may be grouped into logical or virtual subnets for ease of management and security isolation. Customers of a data center often need service applications running in an enterprise private network (e.g., servers managed by customers geographically remote from the data center) or other third party networks to interact with software running on resources in the data center.
To enable this interaction while securely separating the resources allocated to the tenant from the resources allocated to other tenants, the hosted service provider may employ a single, centralized routing mechanism to act as a network gateway between all machines belonging to the tenant in the virtual subnet, or the resources managed by the host system hypervisor and the remote resources of the tenant. However, this architecture employing a centralized routing mechanism is inefficient because operation depends on the physical proximity of the mechanism to the machines/resources it serves. For example, if the machines/resources are located in different parts of the data center or in different locations (e.g., across the data center and enterprise private network), at least some of the machines/resources will face higher latency and lower bandwidth connections when the driver is being used by other machines/resources. Thus, the centralized routing mechanism becomes a common point of congestion for communications entering and exiting a particular virtual subnet. Furthermore, the machine/resource will be forced to send data packets on a suboptimal route when it is limited to passing all communications through the centralized routing mechanism.
With the development of computer technology, virtualization technology has been widely popularized and applied. Desktop virtualization is to install a virtual machine system on a physical server implementing a data center, and the virtual machine system simulates hardware resources required by the operation of an operating system. The operating systems run on the virtual hardware resources, so that a plurality of operating systems can share the hardware resources of the physical server, and the resource utilization rate is improved.
Therefore, there is a need for an internet of things application virtual gateway with data encryption convergence function.
Disclosure of Invention
The application provides an application virtual gateway of the Internet of things with a data encryption convergence function, which solves the problems that in the prior art, encrypted data of the virtual gateway are stored and shared in a concentrated manner, and the encrypted data are stored and shared in a concentrated manner, so that the problem that the data are leaked or tampered in the transmission between devices or systems can be avoided.
The technical scheme of the application is realized as follows: the method comprises the steps that an Internet of things application virtual gateway with a data encryption convergence function groups acquired data at a data starting node, and an index catalog is built for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
The application file mainly comprises the following aspects: data grouping, index catalog and virtual network address node construction, address-dependent establishment, communication node setting and information acquisition mode by users. At the data start node, the acquired data are grouped, and an index directory is established for each group of data so as to carry out isolation distribution in the database. In terms of establishing index directories, the virtual gateway will construct virtual network address nodes according to the index directories corresponding to the number. These virtual network address nodes will store the IP information in the interaction database and build the dependent addresses of the virtual network address and the IP information by mapping. These dependent addresses will be fed back into the interaction database through the blockchain nodes. In the communication node, the user performs asymmetric encryption through the private key and performs data interaction with the virtual gateway. The user obtains index directory information and IP information in the virtual network address through the private key. This information will be stored within the blockchain node for later use. In short, the application virtual gateway of the Internet of things with the data encryption convergence function realizes the data encryption and convergence functions by constructing an index directory and virtual network address nodes and by establishing public key encryption and dependent addresses.
As a preferred embodiment, the interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database in a distributed arrangement, and an original log file, an HTML code or an HTML label is backed up.
As a preferred embodiment, when grouping is performed after data is acquired, the grouped data is screened, cleaned and ordered according to preset parameters to form an independent table area.
As a preferred embodiment, index directories are established in the table area, and each index directory adopts independent numbers, so that required data can be rapidly located.
As a preferred embodiment, after the data packets are established, a transaction management mechanism is established between the packet data, and the same requests of different users through the communication nodes are combined through distributed transaction management and are uniformly processed in the interaction database.
As a preferred implementation, the mapping establishes the dependence address of the virtual network address and the IP information by mapping the IP address and the port information to the interaction database, and inputting the host name and the port number to determine the mapping relationship after selecting the virtual network address to be mapped in the interaction database.
As a preferred implementation mode, the communication node adopts a multi-chain multi-account interface, and is connected with different users through a plurality of interfaces at the same time, and simultaneously, data transmitted in opposite directions in an interaction channel are encrypted respectively.
After the technical scheme is adopted, the application has the beneficial effects that:
and data are gathered to the blockchain node, so that the data are safer and more reliable, and the data are prevented from being revealed and tampered. By grouping the users and encrypting the data at different nodes, the data transmitted by the users between the different nodes has better security and confidentiality. And establishing an interaction database, and isolating data transmitted between different nodes to avoid the data from being tampered and leaked. The virtual network address and the dependent address of the IP information are established through mapping, so that a user can better control the data transmitted between different nodes, and the data is prevented from being tampered or stolen. And taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set. The content which is communicated with the user is encrypted through an asymmetric encryption technology, so that the personal privacy and identity information of the user can be better protected when the user performs data interaction.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a schematic diagram of virtual gateway data interaction according to the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Examples
As shown in fig. 1, an internet of things application virtual gateway with a data encryption convergence function groups acquired data at a data start node and establishes an index directory for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
The main flow can be briefly described as follows: and (3) data acquisition: and at the data starting node, acquiring data for grouping, and establishing an index catalog for each group of data.
Database establishment: and establishing an interaction database, and carrying out isolation distribution on the grouped data in the database. Virtual network address node construction: and constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, and establishing the dependent addresses of the virtual network address and the IP information through mapping.
And (3) data feedback: the dependent address is fed back into the interaction database through the blockchain node. And (3) setting communication nodes: and taking any user in the data channel between the block chain node and the interaction database as a communication node, and taking the communication node as a communication node for other users to enter the data channel after the communication node is set.
Asymmetric encryption: and carrying out asymmetric encryption in the communication node through the public and private keys, and carrying out data interaction between the user and the communication node through the unique exclusive address.
Acquiring information: and the user enters the communication node through the private key to acquire index directory information and IP information in the virtual network address.
In general, the working principle of the system is to build virtual network address nodes and index catalogues, perform isolated distribution on data, and realize data feedback and secure communication by using a block chain technology. The user can enter the communication node through the private key to acquire data, so that the function of data encryption and aggregation is realized.
The interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database which is arranged in a distributed mode, and an original log file, an HTML code or an HTML label is backed up. First, the distributed storage technology stores data using a plurality of servers, and can improve efficiency and reliability of data storage. This technique is commonly used to process large amounts of data, such as log files and HTML code. Secondly, the interaction database backs up the original log file, HTML code or HTML tag for recovery when data loss or corruption occurs. This ensures data integrity and consistency while also avoiding the unavailability of data due to data loss or corruption. It should be noted that distributed storage techniques are not suitable for all application scenarios, such as network applications where throughput and latency requirements are high.
When data are acquired and grouped, the grouped data are screened, cleaned and ordered according to preset parameters to form an independent table area. In the grouping process, various methods may be employed, such as based on keywords, date, or other parameters, etc. Keyword-based methods are typically performed by searching for keywords corresponding to data and then combining the data corresponding to the keywords into a field. The data is then screened, cleaned and sorted according to this field, eventually forming a separate table area.
The method based on date or other parameters is to screen and sort the grouped data by setting some parameters, such as "time range" or "time interval", etc. Through the parameters, the data can be screened and cleaned according to a certain rule, so that the quality and the integrity of the data are ensured. In addition, the method can also carry out custom adjustment and optimization on the surface area according to actual needs.
And establishing index catalogues in the table area, wherein each index catalogue adopts independent numbers, so that required data can be rapidly positioned. In the process of creating the index directory, various methods may be employed. One such method is by searching for keywords corresponding to the data, then combining the data corresponding to the keywords into a field, and finally screening, cleaning and sorting the data according to the field to finally form an independent table region. In this table area, the index directory will be stored in a database for convenient user query and use. Another method is to number each index directory independently, which can ensure consistency and reliability of the index directory. Each index directory has its own number, meaning that they can be uniquely identified, thereby avoiding the problem of duplicate data. In addition, the method can also prevent the index directory from being maliciously modified or deleted, thereby ensuring the safety of the data.
After the data packet is established, a transaction management mechanism is established among the packet data, and different users are combined through the same request of the communication node through distributed transaction management and are uniformly processed in an interaction database. In particular, after the data packet is established, this goal may be achieved through a distributed transaction management mechanism. The mechanism would combine multiple requests in the packet data into one request and send it to one node in the interaction database. In the interaction database, the node processes the request and returns the result to one of the packet data. Thus, the same request of different users through the communication node can be combined and the same request in the interaction database can be processed. Distributed transaction management is a common technique that can be used to handle large-scale, highly concurrent data interaction scenarios. The method can improve the efficiency and reliability of data processing and reduce the risks of data errors and loss.
The mapping establishes the dependent address of the virtual network address and the IP information by mapping the IP address and the port information to an interactive database, selecting the virtual network address to be mapped in the interactive database, and inputting the host name and the port number to determine the mapping relation. Specifically, the virtual gateway first needs to store the IP address and port number in the interaction database in order to map the dependent address that establishes the virtual network address with the IP information. Then, the user can determine the mapping relationship by inputting the host name and the port number. In the mapping process, the user may need to input the host name and port number multiple times to determine the mapping relationship. This is because the virtual gateway needs to query and access each host and return different results on different hosts. The process of mapping the dependent address of establishing virtual network addresses and IP information is very important. It can conveniently store the IP address and port information in the interaction database and ensure their correctness and reliability.
The communication node adopts a multi-chain multi-account interface, is connected with different users through a plurality of interfaces, and simultaneously encrypts data transmitted in opposite directions in the interaction channel respectively. An advantage of the design is that it can support multiple types of network connections, including fiber optic, wireless networks, etc. By adopting the design, the communication node can be connected with different types of users, so that the user experience and the reliability of data transmission are improved. In addition, the system also adopts a plurality of interfaces so as to facilitate the user to access the communication node and interact with the interaction database through the interfaces. This design also ensures data security because only designated users can connect and transmit data through the communication node. Finally, the communication node also adopts a separate encryption design to protect the user data from hacking or disclosure. The design can prevent an attacker from tampering or encrypting the user data through the interaction channel, thereby improving the security of the user data. In general, this design employs a variety of techniques to achieve high performance, high availability and security communication node designs.
The foregoing description of the preferred embodiments of the application is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the application.
Claims (7)
1. The application virtual gateway of the Internet of things with the data encryption convergence function is characterized in that,
grouping the acquired data at a data starting node, and establishing an index catalog for each group of data;
establishing an interaction database, and carrying out isolation distribution on the grouped data in the database;
constructing corresponding virtual network address nodes according to the number of the index catalogues, importing the IP information of the index catalogues in the interaction database into the virtual network address nodes, establishing dependent addresses of the virtual network address and the IP information through mapping, and feeding back the dependent addresses into the interaction database through the block chain nodes;
any user in a data channel between the block chain node and the interaction database is used as a communication node, and after the communication node is set, the communication node is used as a communication node for other users to enter the data channel;
and carrying out asymmetric encryption in the communication node through the public and private keys, carrying out data interaction between the user and the communication node through the unique exclusive address, and enabling the user to enter the communication node through the private key to acquire index directory information and IP information in the virtual network address.
2. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the interactive database adopts a distributed storage technology, data on a data server is stored in the interactive database which is arranged in a distributed mode, and an original log file, an HTML code or an HTML label is backed up.
3. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: when data are acquired and grouped, the grouped data are screened, cleaned and ordered according to preset parameters to form an independent table area.
4. The internet of things application virtual gateway with data encryption convergence function of claim 3, wherein: and establishing index catalogues in the table area, wherein each index catalogue adopts independent numbers, so that required data can be rapidly positioned.
5. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: after the data packet is established, a transaction management mechanism is established among the packet data, and different users are combined through the same request of the communication node through distributed transaction management and are uniformly processed in an interaction database.
6. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the mapping establishes the dependent address of the virtual network address and the IP information by mapping the IP address and the port information to an interactive database, selecting the virtual network address to be mapped in the interactive database, and inputting the host name and the port number to determine the mapping relation.
7. The internet of things application virtual gateway with data encryption convergence function of claim 1, wherein: the communication node adopts a multi-chain multi-account interface, is connected with different users through a plurality of interfaces, and simultaneously encrypts data transmitted in opposite directions in the interaction channel respectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310911822.4A CN116668191B (en) | 2023-07-25 | 2023-07-25 | Internet of things application virtual gateway with data encryption convergence function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310911822.4A CN116668191B (en) | 2023-07-25 | 2023-07-25 | Internet of things application virtual gateway with data encryption convergence function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116668191A true CN116668191A (en) | 2023-08-29 |
CN116668191B CN116668191B (en) | 2023-10-20 |
Family
ID=87720827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310911822.4A Active CN116668191B (en) | 2023-07-25 | 2023-07-25 | Internet of things application virtual gateway with data encryption convergence function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116668191B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117113411A (en) * | 2023-09-11 | 2023-11-24 | 北京发祥地科技发展有限责任公司 | Internet of Things data processing technology based on artificial intelligence |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180205552A1 (en) * | 2015-06-02 | 2018-07-19 | ALTR Solutions, Inc. | Utilizing a tree-structure to segment and distribute files across a series of blockchains |
US20190288850A1 (en) * | 2016-08-12 | 2019-09-19 | ALTR Solutions, Inc. | Decentralized database optimizations |
US20200225655A1 (en) * | 2016-05-09 | 2020-07-16 | Strong Force Iot Portfolio 2016, Llc | Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment |
CN114008979A (en) * | 2019-06-24 | 2022-02-01 | 亚马逊科技公司 | Serverless packet processing service with isolated virtual network integration |
CN114861167A (en) * | 2022-04-06 | 2022-08-05 | 国网浙江省电力有限公司电力科学研究院 | Block chain-based distributed energy data management cooperative processing method and system |
CN115934202A (en) * | 2022-12-23 | 2023-04-07 | 星环信息科技(上海)股份有限公司 | Data management method, system, data service gateway and storage medium |
CN116018795A (en) * | 2020-10-03 | 2023-04-25 | 英特尔公司 | Infrastructure processing unit |
-
2023
- 2023-07-25 CN CN202310911822.4A patent/CN116668191B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180205552A1 (en) * | 2015-06-02 | 2018-07-19 | ALTR Solutions, Inc. | Utilizing a tree-structure to segment and distribute files across a series of blockchains |
US20200225655A1 (en) * | 2016-05-09 | 2020-07-16 | Strong Force Iot Portfolio 2016, Llc | Methods, systems, kits and apparatuses for monitoring and managing industrial settings in an industrial internet of things data collection environment |
US20190288850A1 (en) * | 2016-08-12 | 2019-09-19 | ALTR Solutions, Inc. | Decentralized database optimizations |
CN114008979A (en) * | 2019-06-24 | 2022-02-01 | 亚马逊科技公司 | Serverless packet processing service with isolated virtual network integration |
CN116366350A (en) * | 2019-06-24 | 2023-06-30 | 亚马逊科技公司 | Serverless packet processing service with isolated virtual network integration |
CN116018795A (en) * | 2020-10-03 | 2023-04-25 | 英特尔公司 | Infrastructure processing unit |
CN114861167A (en) * | 2022-04-06 | 2022-08-05 | 国网浙江省电力有限公司电力科学研究院 | Block chain-based distributed energy data management cooperative processing method and system |
CN115934202A (en) * | 2022-12-23 | 2023-04-07 | 星环信息科技(上海)股份有限公司 | Data management method, system, data service gateway and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117113411A (en) * | 2023-09-11 | 2023-11-24 | 北京发祥地科技发展有限责任公司 | Internet of Things data processing technology based on artificial intelligence |
CN117113411B (en) * | 2023-09-11 | 2024-03-08 | 北京发祥地科技发展有限责任公司 | Internet of things data processing technology based on artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
CN116668191B (en) | 2023-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103001999B (en) | For privately owned Cloud Server, intelligent apparatus client and the method for public cloud network | |
US9122533B2 (en) | System and method for reducing cloud IP address utilization using a distributor registry | |
EP3732864A1 (en) | High performance distributed system of record | |
US7016945B2 (en) | Entry distribution in a directory server | |
US20030182423A1 (en) | Virtual host acceleration system | |
US11223603B2 (en) | Private virtual network replication of cloud databases | |
CN116668191B (en) | Internet of things application virtual gateway with data encryption convergence function | |
EP3529950B1 (en) | Method for managing data traffic within a network | |
Xie et al. | Supporting seamless virtual machine migration via named data networking in cloud data center | |
WO2013071890A1 (en) | Resource access system and method based on identity and session | |
EP4165821A1 (en) | Securing data using key agreement | |
US11792153B1 (en) | Application routing infrastructure for private-level redirect trapping and creation of NAT mapping to work with connectivity in cloud and customer networks | |
CN103379148A (en) | Cloud calculator and method for processing files through cloud calculator | |
US9405923B2 (en) | Establishing isolation between content hosting services executing on common support server | |
CN111831743A (en) | Block chain data storage system and method based on cloud storage | |
US11841875B2 (en) | Database sharing in a virtual private deployment | |
US11206207B1 (en) | Managed multicast communications across isolated networks | |
CN107124411A (en) | Virtual private cloud implementation method, device and system under classic network environment | |
CN117097591B (en) | Application security access gateway system and route forwarding method | |
US20230344815A1 (en) | End-point instance indexing and owner pop selection in gateway service ticketing | |
Han | Efficient Security and Privacy Enhancing Solutions in Untrusted Environments | |
CN115470514A (en) | Intelligent education service system based on cloud computing | |
Pozefsky et al. | SNA's Design for Networking | |
Kimmatkar et al. | Applications sharing using binding server for distributed environment | |
Shinde | A Cloud Enable Data Sharing Platform using BESTPEER++ |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |