CN118353697A - System, method and device for managing network data transmission method - Google Patents

System, method and device for managing network data transmission method Download PDF

Info

Publication number
CN118353697A
CN118353697A CN202410558980.0A CN202410558980A CN118353697A CN 118353697 A CN118353697 A CN 118353697A CN 202410558980 A CN202410558980 A CN 202410558980A CN 118353697 A CN118353697 A CN 118353697A
Authority
CN
China
Prior art keywords
memory
data
module
transmission
data transmission
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410558980.0A
Other languages
Chinese (zh)
Inventor
李光辉
范寿海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Chaohui Intelligent Technology Co ltd
Original Assignee
Guangzhou Chaohui Intelligent Technology Co ltd
Filing date
Publication date
Application filed by Guangzhou Chaohui Intelligent Technology Co ltd filed Critical Guangzhou Chaohui Intelligent Technology Co ltd
Publication of CN118353697A publication Critical patent/CN118353697A/en
Pending legal-status Critical Current

Links

Abstract

The invention belongs to the technical field of information, and discloses a system, a method and a device for managing a network data transmission method, wherein the system comprises the following steps: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool; the encryption module is used for asymmetrically encrypting the data; the transmission module is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data; and the data transmitter is used for transmitting the row data. The invention ensures that the whole data transmission process is executed without passing through a Central Processing Unit (CPU), thereby avoiding the independent registration of the memory required by each data transmission in the data transmission processing process and improving the efficiency of the data transmission processing.

Description

System, method and device for managing network data transmission method
Technical Field
The present invention belongs to the field of information technology, and in particular, relates to a system, a method and an apparatus for managing a network data transmission method.
Background
Classical methods in the current network security transmission scheme are divided into 2 types of symmetric encryption and asymmetric encryption. The symmetric encryption operation is fast but is easy to attack and crack; the asymmetric encryption algorithm is complex and not easy to crack, but the encryption speed is low, and the method is not suitable for transmitting a large amount of safety data. According to the research on the Huffman compression method, different data files can form different Huffman compression coding tables and compression files of a small amount of data after Huffman compression. By the scheme of asymmetric encryption design on the Huffman coding table, the number of bytes encrypted by an asymmetric encryption algorithm can be reduced, and the asymmetric encryption of a large-data-volume file can be realized. Meanwhile, the size of the whole file can be reduced and the network transmission efficiency can be improved through compressing the big data file. The scheme is applied to a plurality of network security transmission projects, and can completely meet the network transmission security requirements.
In recent years, with rapid development of computer and network technologies, more and more social groups, institutions and enterprises establish computer networks, and people shift the centers of gravity of activities in various aspects of social activities, offices, scientific researches and the like into the networks, so that a huge internet composed of local area networks as nodes is formed. More and more data exchange tasks between the interconnected network nodes need to be completed to realize the sharing of the software and hardware resources and the information resources of the computer. Data exchange is performed in an open system such as the internet, and data security in the transmission process is critical for data with higher security level requirements.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention provides a system, a method and a device for managing a network data transmission method.
The present invention is thus embodied in a system for managing a network data transmission method, the system comprising:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
Further, the application module applies for a part of the memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool.
Further, the data transmission request is sent by the data transmitter or another data transmitter, where the transmission request carries a virtual memory start address and a memory length.
Further, the memory resource pool is applied and established in advance from the memory of the server by the data transmitter through a basic input output system BIOS;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the physical memory starting address and the memory length, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory.
Further, the data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
Further, the encryption module is configured to asymmetrically encrypt data, and specifically includes:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
Further, the first authentication information includes: user signatures or digital signatures.
The terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information
Another object of the present invention is to provide a method of managing a network data transmission method of a system implementing the managing network data transmission method, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
Another object of the present invention is to provide an apparatus for managing a network data transmission method, characterized in that the apparatus comprises a memory and a processor, the memory storing a computer program, which when executed by the processor, causes the processor to execute the steps of the method for managing a network data transmission method.
It is a further object of the present invention to provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method.
In combination with the technical scheme and the technical problems to be solved, the technical scheme to be protected has the following advantages and positive effects:
The first, the data transmitter of the invention, after receiving the data transmission request, sends the data transmission request to the memory manager and instructs the memory manager to apply for transmitting the memory from the memory resource pool, wherein the memory resource pool is applied for establishment in advance from the server memory by the data transmitter through the basic input output system BIOS, the memory manager applies for transmitting the memory from the memory resource pool and uses the transmitting memory to carry out data transmission with the data transmitter, so that the execution of the whole data transmission process does not need to pass through the CPU of the central processing unit, the independent registration of the memory required by each data transmission in the data transmission processing process is avoided, and the efficiency of the data transmission processing is improved.
The invention ensures that the whole data transmission process is executed without passing through a Central Processing Unit (CPU), thereby avoiding the independent registration of the memory required by each data transmission in the data transmission processing process and improving the efficiency of the data transmission processing.
Second, the significant technical improvements provided by the system for managing network data transmissions of the present invention are mainly embodied in the following aspects:
1) Optimized memory management:
by using an efficient dynamic memory allocation algorithm (e.g., a best-fit algorithm or a first-fit algorithm), the system can more efficiently utilize memory resources. This not only reduces memory waste, but also improves the processing speed of data transmission and the overall performance of the system.
2) Enhanced data security:
By applying asymmetric encryption techniques (such as RSA or ECC), the system significantly improves security during data transmission. The encryption method ensures that only a receiver holding the correct private key can decrypt and access the transmitted data, thereby effectively preventing data leakage and unauthorized access.
3) Efficient data transmission:
the design of the data transmitters and transmission modules in the system allows for efficient and reliable data transmission. By using the TCP/IP protocol and related flow control and congestion control mechanisms, such as TCP congestion control, the system can optimize the data transmission speed, reduce the data packet loss and retransmission, and improve the overall network efficiency.
4) Flexibility and scalability:
The system design considers the data transmission requirements of different types and sizes, so that the system can flexibly adapt to various network environments and application scenes. This flexibility and scalability is critical to accommodate rapidly changing network conditions and increasing data transmission requirements.
5) The comprehensive performance of the system is improved:
The system provides a more efficient, safe and reliable data management and transmission solution on the whole in combination with optimization of multiple aspects such as memory management, encryption security, efficient transmission and the like, and is particularly suitable for application scenes with data sensitivity and high response speed requirements.
In summary, the system for managing network data transmission provides a more efficient, safe and reliable solution for network data transmission through technical innovation in the aspects of memory management, data security, transmission efficiency and the like, and is particularly suitable for processing a large amount of data and in an environment needing high security.
Drawings
Fig. 1 is a system configuration diagram of a method for managing network data transmission according to an embodiment of the present invention;
FIG. 2 is a flowchart of an encryption module for performing an asymmetric encryption method on data according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for managing network data transmission according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following are two specific embodiments and implementations thereof, directed to the previously described system for managing network data transmissions:
example 1 Enterprise-level File transfer System
In an enterprise environment, large amounts of sensitive data, such as financial reports, customer information, etc., are transmitted safely and efficiently.
1) The application module:
Implemented as part of an enterprise system, allows users to initiate file transfer requests through an enterprise application interface. The request includes file size, type, and destination information.
2) And the memory management module is used for:
the method is deployed on an enterprise server, and memory resources are dynamically allocated by using a best-fit algorithm so as to process a large number of concurrent file transmission requests.
3) An encryption module:
the RSA algorithm is utilized to encrypt the file, so that only authorized users can access the transmitted file. The private key is stored on a secure server and the public key is distributed to authorized users.
4) And a transmission module:
And the high-efficiency TCP/IP protocol is used for file transmission, and a TCP window adjustment algorithm is matched to realize the rapid transmission of large files.
5) A data transmitter:
The method is realized as a network socket and is responsible for sending the encrypted file to a designated target address, and advanced flow control and congestion avoidance technology is adopted.
Example 2 medical data exchange platform
The medical records and image data of the patient, such as MRI scans, are safely and reliably transmitted while meeting HIPAA (health insurance portability and liability act) requirements.
1) The application module:
The system is realized as a part of a medical information system, and doctors and authorized medical personnel can initiate data transmission requests through a safe interface.
2) And the memory management module is used for:
Deployed in a data center of a hospital, memory resources are allocated using a first-time adaptation algorithm to handle sensitive medical data transmissions.
3) An encryption module:
the data encryption is performed using the ECC algorithm, since ECC provides higher security at the same key length, and is suitable for protecting sensitive medical information.
4) And a transmission module:
And combining an efficient TCP/IP protocol and an SSL/TLS encryption layer to ensure the safety and the integrity of data in the transmission process.
5) A data transmitter:
the method is realized as a network socket supporting HTTPS, and ensures the security and confidentiality of medical data in the internet transmission process.
In both embodiments, the system is customized to meet specific safety, performance, and compliance requirements for different application scenarios (enterprise and medical). Through the implementation scheme, the system not only can effectively process and transmit a large amount of data, but also can ensure the safety and compliance of the data, and is suitable for the requirements of various industries.
As shown in fig. 1, an embodiment of the present invention provides a system for managing a network data transmission method, where the system includes:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
And the application module applies for a part of the memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool.
The data transmission request is sent by the data transmitter or another data transmitter, and the transmission request carries a virtual memory starting address and a memory length.
The memory resource pool is applied and established in advance from a server memory by the data transmitter through a basic input output system BIOS;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the physical memory starting address and the memory length, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory.
The data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
As shown in fig. 2, the encryption module is configured to asymmetrically encrypt data, and specifically includes:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
Further, the first authentication information includes: user signatures or digital signatures.
The terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information
2. Application example. In order to prove the inventive and technical value of the technical solution of the present invention, this section is an application example on specific products or related technologies of the claim technical solution.
As shown in fig. 3, an embodiment of the present invention provides a method for managing a network data transmission method of a system for implementing the method for managing a network data transmission method, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
An embodiment of the present invention provides an apparatus for managing a network data transmission method, where the apparatus includes a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the processor is caused to execute steps of the method for managing a network data transmission method.
Embodiments of the present invention provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method.
It should be noted that the embodiments of the present invention can be realized in hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or special purpose design hardware. Those of ordinary skill in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such as provided on a carrier medium such as a magnetic disk, CD or DVD-ROM, a programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The device of the present invention and its modules may be implemented by hardware circuitry, such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., as well as software executed by various types of processors, or by a combination of the above hardware circuitry and software, such as firmware.
The invention provides a system for managing network data transmission method, which combines formulas and algorithms, and the detailed working principle is as follows:
1) The application module: the user or the application program initiates a data transmission request through the application module. The application module sends a request to the memory management module, wherein the request contains information such as data quantity, data type and the like which need to be transmitted.
Mathematical formula: assuming that the size of the transfer request is \x\bytes, the available memory resource pool size is \y\bytes, and the capacity limit of the available memory resource pool can be expressed by \y-x\.
2) And the memory management module is used for: after receiving the request of the application module, the memory management module decides whether the request can be satisfied according to the state of the current memory resource pool and the information of the request.
If the memory resource pool has enough available memory, the memory management module allocates the transmission memory with corresponding size from the resource pool and returns the transmission memory to the application module and the transmission module.
If there is insufficient memory available in the memory resource pool, the memory management module processes the request according to a predetermined policy (such as priority, polling, etc.), or denies the request.
Mathematical formula: the size of the available memory resource pool \ (y\), the transmission data amount of the application \ (x\), and the available transmission memory amount\ (z=y-x\).
3) An encryption module: before data is transmitted, asymmetric encryption is carried out through an encryption module. The asymmetric encryption uses a public key and a private key to encrypt and decrypt, so that the security of the data in the transmission process is ensured.
Mathematical algorithm: asymmetric encryption algorithms such as RSA, ECC, etc.
4) And a transmission module: after receiving the transmission memory allocated by the memory management module, the transmission module instructs the memory management module to use the transmission memory and the data transmitter to perform data transmission. The transmission module is also responsible for monitoring the transmission progress and ensuring the integrity of the data.
5) A data transmitter: the data transmitter is responsible for the actual network data transmission. The data transmitter establishes a connection with the receiving end and uses the encrypted data to transmit the data through the connection. The data transmitter is also responsible for handling various abnormal situations in the network, such as packet loss, network delay, etc., ensuring reliable transmission of data.
6) The working flow is as follows:
1. the user or the application program initiates a data transmission request through the application module.
2. The application module sends the request to the memory management module.
3. The memory management module decides whether the request is satisfied according to the state of the available memory resource pool.
4. And if the request is met, the memory management module allocates corresponding transmission memories to the application module and the transmission module.
5. The encryption module encrypts data.
6. The transmission module instructs the data transmitter to use the allocated transmission memory for data transmission.
7. The data transmitter performs data transmission and monitors a transmission state.
8. Exception handling and optimization: if an abnormality (such as network interruption, data error, etc.) occurs in the data transmission process, the system performs corresponding abnormality processing such as retransmission, verification and verification.
The system can also optimize according to the historical data and the current state, such as dynamically adjusting the transmission rate, adaptively selecting the network path, and the like, so as to improve the efficiency and reliability of data transmission.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the invention is not limited thereto, but any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention will be apparent to those skilled in the art within the scope of the present invention.

Claims (10)

1. A method of managing network data transmissions, comprising the steps of:
receiving a data transmission request sent by an application module, wherein the data transmission request comprises the size and the type of data;
Applying for a required transmission memory from a memory resource pool by a memory management module, wherein the memory management module applies a dynamic memory allocation algorithm including, but not limited to, a best-fit algorithm or a first-fit algorithm to ensure efficient utilization of memory resources;
Performing an asymmetric encryption operation on data to be transmitted using an encryption module, wherein the asymmetric encryption algorithm includes, but is not limited to, an RSA or ECC algorithm to ensure the security of data transmission;
The transmission module instructs the memory management module to use the allocated transmission memory to realize the effective transmission between the data and the data transmitter;
The actual transmission work of the data is completed by the data transmitter, wherein the data transmitter is realized as a network socket, and utilizes a flow control and congestion control algorithm, such as a congestion control mechanism of TCP, to ensure the reliability and the efficiency of the data transmission.
2. A network data transmission management system, the system comprising:
The application module is used for generating and sending a data transmission request to the memory management module, wherein the data transmission request comprises data size and type information;
The memory management module is connected with the application module and is responsible for dynamically distributing transmission memory from a memory resource pool according to a data transmission request, and the module applies a memory distribution algorithm to optimize the use of the memory;
The encryption module is used for carrying out asymmetric encryption on data to be transmitted so as to improve the security in the data transmission process, and the adopted encryption algorithm comprises but is not limited to RSA or ECC;
The transmission module is connected with the memory management module and is responsible for coordinating data transmission between the memory management module and the data transmitter, so as to ensure that the encrypted data is correctly loaded into the transmission memory;
the data transmitter is connected with the transmission module, is realized as a network socket and is responsible for the actual transmission of encrypted data, and a flow control and congestion control algorithm is applied to ensure the high efficiency and the reliability of the transmission process.
3. A system for managing a network data transmission method, the system comprising:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
4. The system for managing network data transmission method according to claim 3, wherein the application module applies for a part of memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool; the data transmission request is sent by the data transmitter or another data transmitter, and the transmission request carries a virtual memory starting address and a memory length.
5. A system for managing network data transfer methods as claimed in claim 3, wherein said memory resource pool is established by said data transmitter from a server memory by a basic input output system BIOS applied in advance;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the initial address and the memory length of the physical memory, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory;
The data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
6. A system for managing a network data transmission method according to claim 3, wherein the encryption module is configured to asymmetrically encrypt data, and specifically comprises:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
7. A system for managing a network data transmission method as set forth in claim 3, wherein the first authentication information includes: user signature or digital signature;
the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: and the terminal encrypts the first verification information of the first file by adopting a second encryption method to obtain second verification information.
8. A method of managing network data transmission method of implementing the system of managing network data transmission method of any one of claims 3 to 7, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
9. An apparatus for managing a network data transmission method, characterized in that the apparatus comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the method for managing a network data transmission method according to any one of claims 1-7.
10. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method according to any one of claims 1 to 7.
CN202410558980.0A 2024-05-08 System, method and device for managing network data transmission method Pending CN118353697A (en)

Publications (1)

Publication Number Publication Date
CN118353697A true CN118353697A (en) 2024-07-16

Family

ID=

Similar Documents

Publication Publication Date Title
US10313115B2 (en) System and method for quantum key distribution
Singhvi et al. 1rma: Re-envisioning remote memory access for multi-tenant datacenters
US9166862B1 (en) Distributed caching system
US9122888B2 (en) System and method to create resilient site master-key for automated access
US9064124B1 (en) Distributed caching system
US7089587B2 (en) ISCSI target offload administrator
TWI234975B (en) Apparatus and method for resolving security association database update coherency in high-speed systems having multiple security channels
EP3682364B1 (en) Cryptographic services utilizing commodity hardware
US9621399B1 (en) Distributed caching system
US11068398B2 (en) Distributed caching system
CN104252375A (en) Method and system for sharing USB (Universal Serial Bus) Key by multiple virtual machines positioned in different host computers
US11641271B2 (en) Control method, non-transitory computer-readable storage medium, and information processing apparatus
US9390052B1 (en) Distributed caching system
US20210234843A1 (en) Secured transfer of data between datacenters
Che Fauzi et al. On cloud computing security issues
Chhabra et al. Security enhancement in cloud environment using secure secret key sharing
US6918019B2 (en) Network and networking system for small discontiguous accesses to high-density memory devices
EP3553689A1 (en) System and method for automatically securing sensitive data in public cloud using a serverless architecture
Bakir et al. Caplets: Resource aware, capability-based access control for IoT
US11281786B2 (en) Mechanism to secure side band communication between service processor and an end point
CN118353697A (en) System, method and device for managing network data transmission method
US20020194445A1 (en) Controller architecture and strategy for small discontiguous accesses to high-density memory devices
US11954239B2 (en) Data storage system using selective encryption and port identification in communications with drive subsystem
WO2024050869A1 (en) Decentralized trust-based tee state continuity protection method under public cloud
JP7321414B2 (en) Transmission control method and program

Legal Events

Date Code Title Description
PB01 Publication