CN118353697A - System, method and device for managing network data transmission method - Google Patents
System, method and device for managing network data transmission method Download PDFInfo
- Publication number
- CN118353697A CN118353697A CN202410558980.0A CN202410558980A CN118353697A CN 118353697 A CN118353697 A CN 118353697A CN 202410558980 A CN202410558980 A CN 202410558980A CN 118353697 A CN118353697 A CN 118353697A
- Authority
- CN
- China
- Prior art keywords
- memory
- data
- module
- transmission
- data transmission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 152
- 238000000034 method Methods 0.000 title claims abstract description 77
- 230000015654 memory Effects 0.000 claims abstract description 213
- 238000012795 verification Methods 0.000 claims description 26
- 238000013507 mapping Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 7
- 238000012546 transfer Methods 0.000 claims description 4
- 230000007246 mechanism Effects 0.000 claims description 2
- 238000012545 processing Methods 0.000 abstract description 12
- 230000008569 process Effects 0.000 abstract description 6
- 238000007726 management method Methods 0.000 description 33
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000005856 abnormality Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000002595 magnetic resonance imaging Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 231100000279 safety data Toxicity 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Abstract
The invention belongs to the technical field of information, and discloses a system, a method and a device for managing a network data transmission method, wherein the system comprises the following steps: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool; the encryption module is used for asymmetrically encrypting the data; the transmission module is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data; and the data transmitter is used for transmitting the row data. The invention ensures that the whole data transmission process is executed without passing through a Central Processing Unit (CPU), thereby avoiding the independent registration of the memory required by each data transmission in the data transmission processing process and improving the efficiency of the data transmission processing.
Description
Technical Field
The present invention belongs to the field of information technology, and in particular, relates to a system, a method and an apparatus for managing a network data transmission method.
Background
Classical methods in the current network security transmission scheme are divided into 2 types of symmetric encryption and asymmetric encryption. The symmetric encryption operation is fast but is easy to attack and crack; the asymmetric encryption algorithm is complex and not easy to crack, but the encryption speed is low, and the method is not suitable for transmitting a large amount of safety data. According to the research on the Huffman compression method, different data files can form different Huffman compression coding tables and compression files of a small amount of data after Huffman compression. By the scheme of asymmetric encryption design on the Huffman coding table, the number of bytes encrypted by an asymmetric encryption algorithm can be reduced, and the asymmetric encryption of a large-data-volume file can be realized. Meanwhile, the size of the whole file can be reduced and the network transmission efficiency can be improved through compressing the big data file. The scheme is applied to a plurality of network security transmission projects, and can completely meet the network transmission security requirements.
In recent years, with rapid development of computer and network technologies, more and more social groups, institutions and enterprises establish computer networks, and people shift the centers of gravity of activities in various aspects of social activities, offices, scientific researches and the like into the networks, so that a huge internet composed of local area networks as nodes is formed. More and more data exchange tasks between the interconnected network nodes need to be completed to realize the sharing of the software and hardware resources and the information resources of the computer. Data exchange is performed in an open system such as the internet, and data security in the transmission process is critical for data with higher security level requirements.
Disclosure of Invention
Aiming at the problems existing in the prior art, the invention provides a system, a method and a device for managing a network data transmission method.
The present invention is thus embodied in a system for managing a network data transmission method, the system comprising:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
Further, the application module applies for a part of the memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool.
Further, the data transmission request is sent by the data transmitter or another data transmitter, where the transmission request carries a virtual memory start address and a memory length.
Further, the memory resource pool is applied and established in advance from the memory of the server by the data transmitter through a basic input output system BIOS;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the physical memory starting address and the memory length, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory.
Further, the data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
Further, the encryption module is configured to asymmetrically encrypt data, and specifically includes:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
Further, the first authentication information includes: user signatures or digital signatures.
The terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information
Another object of the present invention is to provide a method of managing a network data transmission method of a system implementing the managing network data transmission method, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
Another object of the present invention is to provide an apparatus for managing a network data transmission method, characterized in that the apparatus comprises a memory and a processor, the memory storing a computer program, which when executed by the processor, causes the processor to execute the steps of the method for managing a network data transmission method.
It is a further object of the present invention to provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method.
In combination with the technical scheme and the technical problems to be solved, the technical scheme to be protected has the following advantages and positive effects:
The first, the data transmitter of the invention, after receiving the data transmission request, sends the data transmission request to the memory manager and instructs the memory manager to apply for transmitting the memory from the memory resource pool, wherein the memory resource pool is applied for establishment in advance from the server memory by the data transmitter through the basic input output system BIOS, the memory manager applies for transmitting the memory from the memory resource pool and uses the transmitting memory to carry out data transmission with the data transmitter, so that the execution of the whole data transmission process does not need to pass through the CPU of the central processing unit, the independent registration of the memory required by each data transmission in the data transmission processing process is avoided, and the efficiency of the data transmission processing is improved.
The invention ensures that the whole data transmission process is executed without passing through a Central Processing Unit (CPU), thereby avoiding the independent registration of the memory required by each data transmission in the data transmission processing process and improving the efficiency of the data transmission processing.
Second, the significant technical improvements provided by the system for managing network data transmissions of the present invention are mainly embodied in the following aspects:
1) Optimized memory management:
by using an efficient dynamic memory allocation algorithm (e.g., a best-fit algorithm or a first-fit algorithm), the system can more efficiently utilize memory resources. This not only reduces memory waste, but also improves the processing speed of data transmission and the overall performance of the system.
2) Enhanced data security:
By applying asymmetric encryption techniques (such as RSA or ECC), the system significantly improves security during data transmission. The encryption method ensures that only a receiver holding the correct private key can decrypt and access the transmitted data, thereby effectively preventing data leakage and unauthorized access.
3) Efficient data transmission:
the design of the data transmitters and transmission modules in the system allows for efficient and reliable data transmission. By using the TCP/IP protocol and related flow control and congestion control mechanisms, such as TCP congestion control, the system can optimize the data transmission speed, reduce the data packet loss and retransmission, and improve the overall network efficiency.
4) Flexibility and scalability:
The system design considers the data transmission requirements of different types and sizes, so that the system can flexibly adapt to various network environments and application scenes. This flexibility and scalability is critical to accommodate rapidly changing network conditions and increasing data transmission requirements.
5) The comprehensive performance of the system is improved:
The system provides a more efficient, safe and reliable data management and transmission solution on the whole in combination with optimization of multiple aspects such as memory management, encryption security, efficient transmission and the like, and is particularly suitable for application scenes with data sensitivity and high response speed requirements.
In summary, the system for managing network data transmission provides a more efficient, safe and reliable solution for network data transmission through technical innovation in the aspects of memory management, data security, transmission efficiency and the like, and is particularly suitable for processing a large amount of data and in an environment needing high security.
Drawings
Fig. 1 is a system configuration diagram of a method for managing network data transmission according to an embodiment of the present invention;
FIG. 2 is a flowchart of an encryption module for performing an asymmetric encryption method on data according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for managing network data transmission according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the following examples in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following are two specific embodiments and implementations thereof, directed to the previously described system for managing network data transmissions:
example 1 Enterprise-level File transfer System
In an enterprise environment, large amounts of sensitive data, such as financial reports, customer information, etc., are transmitted safely and efficiently.
1) The application module:
Implemented as part of an enterprise system, allows users to initiate file transfer requests through an enterprise application interface. The request includes file size, type, and destination information.
2) And the memory management module is used for:
the method is deployed on an enterprise server, and memory resources are dynamically allocated by using a best-fit algorithm so as to process a large number of concurrent file transmission requests.
3) An encryption module:
the RSA algorithm is utilized to encrypt the file, so that only authorized users can access the transmitted file. The private key is stored on a secure server and the public key is distributed to authorized users.
4) And a transmission module:
And the high-efficiency TCP/IP protocol is used for file transmission, and a TCP window adjustment algorithm is matched to realize the rapid transmission of large files.
5) A data transmitter:
The method is realized as a network socket and is responsible for sending the encrypted file to a designated target address, and advanced flow control and congestion avoidance technology is adopted.
Example 2 medical data exchange platform
The medical records and image data of the patient, such as MRI scans, are safely and reliably transmitted while meeting HIPAA (health insurance portability and liability act) requirements.
1) The application module:
The system is realized as a part of a medical information system, and doctors and authorized medical personnel can initiate data transmission requests through a safe interface.
2) And the memory management module is used for:
Deployed in a data center of a hospital, memory resources are allocated using a first-time adaptation algorithm to handle sensitive medical data transmissions.
3) An encryption module:
the data encryption is performed using the ECC algorithm, since ECC provides higher security at the same key length, and is suitable for protecting sensitive medical information.
4) And a transmission module:
And combining an efficient TCP/IP protocol and an SSL/TLS encryption layer to ensure the safety and the integrity of data in the transmission process.
5) A data transmitter:
the method is realized as a network socket supporting HTTPS, and ensures the security and confidentiality of medical data in the internet transmission process.
In both embodiments, the system is customized to meet specific safety, performance, and compliance requirements for different application scenarios (enterprise and medical). Through the implementation scheme, the system not only can effectively process and transmit a large amount of data, but also can ensure the safety and compliance of the data, and is suitable for the requirements of various industries.
As shown in fig. 1, an embodiment of the present invention provides a system for managing a network data transmission method, where the system includes:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
And the application module applies for a part of the memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool.
The data transmission request is sent by the data transmitter or another data transmitter, and the transmission request carries a virtual memory starting address and a memory length.
The memory resource pool is applied and established in advance from a server memory by the data transmitter through a basic input output system BIOS;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the physical memory starting address and the memory length, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory.
The data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
As shown in fig. 2, the encryption module is configured to asymmetrically encrypt data, and specifically includes:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
Further, the first authentication information includes: user signatures or digital signatures.
The terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information
2. Application example. In order to prove the inventive and technical value of the technical solution of the present invention, this section is an application example on specific products or related technologies of the claim technical solution.
As shown in fig. 3, an embodiment of the present invention provides a method for managing a network data transmission method of a system for implementing the method for managing a network data transmission method, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
An embodiment of the present invention provides an apparatus for managing a network data transmission method, where the apparatus includes a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the processor is caused to execute steps of the method for managing a network data transmission method.
Embodiments of the present invention provide a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method.
It should be noted that the embodiments of the present invention can be realized in hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or special purpose design hardware. Those of ordinary skill in the art will appreciate that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, such as provided on a carrier medium such as a magnetic disk, CD or DVD-ROM, a programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The device of the present invention and its modules may be implemented by hardware circuitry, such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, etc., or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., as well as software executed by various types of processors, or by a combination of the above hardware circuitry and software, such as firmware.
The invention provides a system for managing network data transmission method, which combines formulas and algorithms, and the detailed working principle is as follows:
1) The application module: the user or the application program initiates a data transmission request through the application module. The application module sends a request to the memory management module, wherein the request contains information such as data quantity, data type and the like which need to be transmitted.
Mathematical formula: assuming that the size of the transfer request is \x\bytes, the available memory resource pool size is \y\bytes, and the capacity limit of the available memory resource pool can be expressed by \y-x\.
2) And the memory management module is used for: after receiving the request of the application module, the memory management module decides whether the request can be satisfied according to the state of the current memory resource pool and the information of the request.
If the memory resource pool has enough available memory, the memory management module allocates the transmission memory with corresponding size from the resource pool and returns the transmission memory to the application module and the transmission module.
If there is insufficient memory available in the memory resource pool, the memory management module processes the request according to a predetermined policy (such as priority, polling, etc.), or denies the request.
Mathematical formula: the size of the available memory resource pool \ (y\), the transmission data amount of the application \ (x\), and the available transmission memory amount\ (z=y-x\).
3) An encryption module: before data is transmitted, asymmetric encryption is carried out through an encryption module. The asymmetric encryption uses a public key and a private key to encrypt and decrypt, so that the security of the data in the transmission process is ensured.
Mathematical algorithm: asymmetric encryption algorithms such as RSA, ECC, etc.
4) And a transmission module: after receiving the transmission memory allocated by the memory management module, the transmission module instructs the memory management module to use the transmission memory and the data transmitter to perform data transmission. The transmission module is also responsible for monitoring the transmission progress and ensuring the integrity of the data.
5) A data transmitter: the data transmitter is responsible for the actual network data transmission. The data transmitter establishes a connection with the receiving end and uses the encrypted data to transmit the data through the connection. The data transmitter is also responsible for handling various abnormal situations in the network, such as packet loss, network delay, etc., ensuring reliable transmission of data.
6) The working flow is as follows:
1. the user or the application program initiates a data transmission request through the application module.
2. The application module sends the request to the memory management module.
3. The memory management module decides whether the request is satisfied according to the state of the available memory resource pool.
4. And if the request is met, the memory management module allocates corresponding transmission memories to the application module and the transmission module.
5. The encryption module encrypts data.
6. The transmission module instructs the data transmitter to use the allocated transmission memory for data transmission.
7. The data transmitter performs data transmission and monitors a transmission state.
8. Exception handling and optimization: if an abnormality (such as network interruption, data error, etc.) occurs in the data transmission process, the system performs corresponding abnormality processing such as retransmission, verification and verification.
The system can also optimize according to the historical data and the current state, such as dynamically adjusting the transmission rate, adaptively selecting the network path, and the like, so as to improve the efficiency and reliability of data transmission.
The foregoing is merely illustrative of specific embodiments of the present invention, and the scope of the invention is not limited thereto, but any modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present invention will be apparent to those skilled in the art within the scope of the present invention.
Claims (10)
1. A method of managing network data transmissions, comprising the steps of:
receiving a data transmission request sent by an application module, wherein the data transmission request comprises the size and the type of data;
Applying for a required transmission memory from a memory resource pool by a memory management module, wherein the memory management module applies a dynamic memory allocation algorithm including, but not limited to, a best-fit algorithm or a first-fit algorithm to ensure efficient utilization of memory resources;
Performing an asymmetric encryption operation on data to be transmitted using an encryption module, wherein the asymmetric encryption algorithm includes, but is not limited to, an RSA or ECC algorithm to ensure the security of data transmission;
The transmission module instructs the memory management module to use the allocated transmission memory to realize the effective transmission between the data and the data transmitter;
The actual transmission work of the data is completed by the data transmitter, wherein the data transmitter is realized as a network socket, and utilizes a flow control and congestion control algorithm, such as a congestion control mechanism of TCP, to ensure the reliability and the efficiency of the data transmission.
2. A network data transmission management system, the system comprising:
The application module is used for generating and sending a data transmission request to the memory management module, wherein the data transmission request comprises data size and type information;
The memory management module is connected with the application module and is responsible for dynamically distributing transmission memory from a memory resource pool according to a data transmission request, and the module applies a memory distribution algorithm to optimize the use of the memory;
The encryption module is used for carrying out asymmetric encryption on data to be transmitted so as to improve the security in the data transmission process, and the adopted encryption algorithm comprises but is not limited to RSA or ECC;
The transmission module is connected with the memory management module and is responsible for coordinating data transmission between the memory management module and the data transmitter, so as to ensure that the encrypted data is correctly loaded into the transmission memory;
the data transmitter is connected with the transmission module, is realized as a network socket and is responsible for the actual transmission of encrypted data, and a flow control and congestion control algorithm is applied to ensure the high efficiency and the reliability of the transmission process.
3. A system for managing a network data transmission method, the system comprising:
The application module is connected with the receiving module and is used for sending the data transmission request to the memory management module,
The memory management module is connected with the application module and is used for applying for transmitting the memory from the memory resource pool;
the encryption module is used for asymmetrically encrypting the data;
The transmission module is connected with the memory management module and is used for indicating the memory management module to use the transmission memory and the data transmitter to transmit data;
and the data transmitter is connected with the transmission module and is used for transmitting the row data.
4. The system for managing network data transmission method according to claim 3, wherein the application module applies for a part of memory from the server memory to mark through the BIOS according to the set size and the memory read/write attribute, and the marked memory becomes a memory resource pool; the data transmission request is sent by the data transmitter or another data transmitter, and the transmission request carries a virtual memory starting address and a memory length.
5. A system for managing network data transfer methods as claimed in claim 3, wherein said memory resource pool is established by said data transmitter from a server memory by a basic input output system BIOS applied in advance;
the memory management module applying for transmitting the memory from the memory resource pool comprises the following steps: the memory management module obtains a physical memory corresponding to the virtual memory by using a memory mapping table, and applies for transmitting the memory from a memory resource pool according to the initial address and the memory length of the physical memory, wherein the memory mapping table records the mapping relation between the virtual memory and the physical memory;
The data transmitter applies for a part of memory from the server memory to establish a memory resource pool through the BIOS, specifically:
The data transmitter applies for a part of memory from the server memory to mark through the BIOS according to the set size and memory read/write attribute, and the marked memory becomes a memory resource pool.
6. A system for managing a network data transmission method according to claim 3, wherein the encryption module is configured to asymmetrically encrypt data, and specifically comprises:
S1: the terminal receives a first file to be encrypted, and encrypts the first file by a first asymmetric encryption method to obtain a second file;
S2: the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information; and loading the second verification information into the second file and then transmitting the second verification information to the receiving end.
7. A system for managing a network data transmission method as set forth in claim 3, wherein the first authentication information includes: user signature or digital signature;
the terminal encrypts the first verification information of the first file by a second encryption method to obtain second verification information specifically comprises the following steps: and the terminal encrypts the first verification information of the first file by adopting a second encryption method to obtain second verification information.
8. A method of managing network data transmission method of implementing the system of managing network data transmission method of any one of claims 3 to 7, the method comprising:
S21: the application module is used for sending the data transmission request to the memory management module, and the memory management module is used for applying for transmitting the memory from the memory resource pool;
s22: carrying out asymmetric encryption on the data by utilizing an encryption module;
S23: and using the transmission module to instruct the memory management module to use the transmission memory and the data transmitter to transmit data.
9. An apparatus for managing a network data transmission method, characterized in that the apparatus comprises a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of the method for managing a network data transmission method according to any one of claims 1-7.
10. A computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of the method of managing a network data transmission method according to any one of claims 1 to 7.
Publications (1)
Publication Number | Publication Date |
---|---|
CN118353697A true CN118353697A (en) | 2024-07-16 |
Family
ID=
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10313115B2 (en) | System and method for quantum key distribution | |
Singhvi et al. | 1rma: Re-envisioning remote memory access for multi-tenant datacenters | |
US9166862B1 (en) | Distributed caching system | |
US9122888B2 (en) | System and method to create resilient site master-key for automated access | |
US9064124B1 (en) | Distributed caching system | |
US7089587B2 (en) | ISCSI target offload administrator | |
TWI234975B (en) | Apparatus and method for resolving security association database update coherency in high-speed systems having multiple security channels | |
EP3682364B1 (en) | Cryptographic services utilizing commodity hardware | |
US9621399B1 (en) | Distributed caching system | |
US11068398B2 (en) | Distributed caching system | |
CN104252375A (en) | Method and system for sharing USB (Universal Serial Bus) Key by multiple virtual machines positioned in different host computers | |
US11641271B2 (en) | Control method, non-transitory computer-readable storage medium, and information processing apparatus | |
US9390052B1 (en) | Distributed caching system | |
US20210234843A1 (en) | Secured transfer of data between datacenters | |
Che Fauzi et al. | On cloud computing security issues | |
Chhabra et al. | Security enhancement in cloud environment using secure secret key sharing | |
US6918019B2 (en) | Network and networking system for small discontiguous accesses to high-density memory devices | |
EP3553689A1 (en) | System and method for automatically securing sensitive data in public cloud using a serverless architecture | |
Bakir et al. | Caplets: Resource aware, capability-based access control for IoT | |
US11281786B2 (en) | Mechanism to secure side band communication between service processor and an end point | |
CN118353697A (en) | System, method and device for managing network data transmission method | |
US20020194445A1 (en) | Controller architecture and strategy for small discontiguous accesses to high-density memory devices | |
US11954239B2 (en) | Data storage system using selective encryption and port identification in communications with drive subsystem | |
WO2024050869A1 (en) | Decentralized trust-based tee state continuity protection method under public cloud | |
JP7321414B2 (en) | Transmission control method and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication |