WO2011147046A1 - 网络资源 - Google Patents

网络资源 Download PDF

Info

Publication number
WO2011147046A1
WO2011147046A1 PCT/CN2010/000745 CN2010000745W WO2011147046A1 WO 2011147046 A1 WO2011147046 A1 WO 2011147046A1 CN 2010000745 W CN2010000745 W CN 2010000745W WO 2011147046 A1 WO2011147046 A1 WO 2011147046A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
network
information
resources
machine
Prior art date
Application number
PCT/CN2010/000745
Other languages
English (en)
French (fr)
Inventor
刘文祥
Original Assignee
Liu Wenxiang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Liu Wenxiang filed Critical Liu Wenxiang
Priority to PCT/CN2010/000745 priority Critical patent/WO2011147046A1/zh
Publication of WO2011147046A1 publication Critical patent/WO2011147046A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Definitions

  • the present invention relates to network technology (Network Technology), database technology (Oatabase Technology), computer (computer) technology, information technology (Ctnfonnation Technology, IT), Internet (Internet), telecommunications network, cable television network, integrated circuit (1C) Technology, etc.
  • Network resources are also called intelligent resources, network databases, distributed resources, and distributed data.
  • Network resources will be widely used in businesses, government, economics, industry, agriculture, healthcare, finance, and enterprises that build proprietary networks using the Internet (Internet) and/or public wireless networks (including public optical networks), or a combination of them. , business, service and other industry sectors.
  • Internet Internet
  • public wireless networks including public optical networks
  • LAN Local Area Network
  • a network such as a local area network, a computer-like device, and a database, which is composed of an interface circuit and a long-distance transmission medium, and which can communicate with each other and share resources, is called a wide area network (Wide). Area Network, WAN).
  • Wide Area Network
  • the technology is extended by using technologies such as relay ⁇ hlay), bridge, and switching pitching.
  • the network between the local area network and the wide area network is called the metropolitan area network (Metropolitan Area Network). , MAN).
  • the Internet network (ARPANET) derived from the US Department of Defense's Advanced Research Projects Agency is called the Internet.
  • Databases and data warehouses are at the heart of the data architecture, using hardware and software to control the implementation of various data architecture functions.
  • SQL Structured Query Language
  • ISO International Organization for Standardization
  • the various database structures are self-contained and cannot be securely and reliably interoperable with each other over the Internet.
  • Data warehouse A collection of integrated, topic-oriented databases with decision support (DSS) capabilities.
  • Data mining A collection of behaviors used to discover new, hidden, or unexpected patterns in data.
  • Data visualization The process of turning huge amounts of data into meaningful images.
  • Cloud Computing is a computer remote access model; consisting of three interrelated parts of infrastructure, platforms, and services. It is not a distributed computing model. Related to “Cloud resources” is a resource remote access model; it is also a central model; not a distributed resource model.
  • Cloud Security Cloud Security is a computer remote access security system; it needs to solve four major difficulties: it requires a large number of clients, requires professional anti-virus technology and experience, requires a lot of capital and technology investment, must be an open system and A large number of partners are required to join.
  • Group Wisdom A group of independent and diverse individuals make certain decisions or predictions that are better than experts; it is a collection of artificial intelligence of self-organizing systems.
  • Generative A value, quality, or attribute that must be produced, grown, nurtured, or nurtured.
  • the ontology in computer information science referred to as the ontology. It provides a shared vocabulary that can be used to model the domain: the types of objects and concepts that exist objectively, and their attributes and relationships.
  • a wireless terminal, an access station, a wireless computer device, a wireless switch, or a wireless router in a wireless network all include a wireless transceiver.
  • the public network referred to below refers to the Internet (Internet) and/or public wireless network (including public optical networks) and their combined systems.
  • the task of the present invention is to use a new type of network interconnection technology and resource flow technology to connect a plurality of resource-optimized network networks, etc., respectively, to each other through a different public network to form various resource networks.
  • the application and service system of resources formed by the resource network and the electronic resource is the network resource.
  • information resources Formal expression of tangible material or intangible knowledge that becomes a dynamic demand of users on the information network, called information resources, referred to as resources. It includes storage resources, computing resources, software resources, data resources, multimedia resources, etc.; as well as web logs, group intelligence, encyclopedia, ontology, and life elements.
  • the unit adopts the network physical topology, and the hardware and software of the network form an interoperable Internetwork (Internetwork) with full control rights, which is called an independent network. It is a local area network, a metropolitan area network, or a wide area network; it can be wired or wireless (including light). A unit can have several independent networks at the same time.
  • a general-purpose computer with a network address translation (NAT) program which is best equipped or artificially designated, is called a superior function computer in the network.
  • the USB is also a host computer.
  • An independent network with one and only one high-end machine is called a good machine network.
  • the U-machine network uses a local area network, or a wired WAN.
  • the U-machine network can be just a general-purpose computer, and the computer is a U-machine. It is a special case of the UF network.
  • a unit can have several independent networks at the same time.
  • An information resource that can be transmitted in a separate network is called an electronic resource. For example, e-commerce resources, e-government resources, and electronic machinery resources.
  • Network resources Information resources that need to be transmitted securely and reliably over a public network are called network resources.
  • network resources For example, network business resources, network government resources, and so on.
  • the proprietary network integrates the security and service quality of the U-machine network, as well as the advantages of simple public network structure and low cost, and establishes a secure information channel.
  • the system's traffic is encrypted and/or fully processed as it passes through the public network. This guarantees the confidentiality and/or integrity of the information.
  • Each component unit of a different function in a business program or service program is called a business element.
  • a software architecture domain software module that drives service elements to communicate with each other in a proprietary network in a proprietary network is called a service element scheduling.
  • the discriminator provides interfaces and protocols for service meta-scheduling. This interface is neutral: it is independent of the hardware platform, operating system, and programming language that implements the business elements. The change or invalidation of one service element in the private network does not affect other service elements.
  • the service element scheduling is distributed among the various machines; it is interoperable, independent, modular, and transparent, and interacts in a universal and unified manner. It is a block of independent service functions resident in the memory of the machine.
  • the software architecture is a self-contained set of business elements. Users can access and use these business elements regardless of where they are located.
  • the application process is a combination of business elements.
  • the private network sends the service element through the public network, which is based on the IP protocol of the machine. It breaks through the limitations of interoperability of the private technology of the business unit.
  • a number of resource-optimized network networks are connected to the same public network through a separate machine to form a system that can be securely and reliably interoperated, called a resource network (S1).
  • a device that is capable of collecting, operating, processing, and storing resources is called an electronic resource.
  • a resource system composed of a resource network and an electronic resource is called a network resource. According to the needs of the unit resource application or service, the resource network can be dynamically expanded and configured to be combined and resource services can be performed.
  • Resource networks can be classified into: distributed resource networks, World Wide Web (Web) resource networks, data warehouse resource networks, multimedia resource networks, service meta-scheduling resource networks, and dedicated resource networks.
  • Network resources can be classified into: distributed resource systems, centralized resource systems, or integrated resource systems.
  • the backup system of the resource network can be composed of a backup client, a primary backup server, a media server, a backup storage unit, and backup management software.
  • a general-purpose computer that is interconnected with a high-performance machine (or its network) and a public network and controls information that can be securely and reliably interoperated between them, and is called a general-purpose computer capable of distinguishing identity. 1) .
  • the public network connected to the identification machine includes the identification machine, which is called the identification network.
  • the identification machine Through the control function, the machine can realize "high-trust" interoperability between the network of the machine, and the machine can be a peer (Peer) or a client-type computer (client-ciass computer) or a server-type computer.
  • the resolution solves four key technical problems of security, authenticity, anonymity and separability in the proprietary network of unit resources built using the Internet.
  • Data security refers to the protection of resource information in resource devices to prevent unauthorized disclosure, modification or destruction.
  • the software module of the excellent machine can be directly inserted into the expansion function slot of the identification machine.
  • the machine and the machine can be combined into the same machine.
  • Check program program function The checker of the sink checks the plaintext information, finds any of them, arranges them together, and sequentially stores them in a fixed area in the external memory, which will be the first A program is presented on the designated information display. If the program is a legitimate program that allows access, the user selects the "Allow all” option when prompted for the first time. When the computer encounters the program, it will not ask again and allow access. If the user does not reply within a certain period of time or selects the " ⁇ Allow” option, the machine discards the program. The terminal computer operates the program of the inspection program to clear the computer virus, thereby preventing the virus attacking the network of the machine.
  • the source-end identification machine adds a symmetrically encrypted key after the plaintext information to be sent through the public network; this combined data is input into a one-way hash function (MessageDigest) to obtain a hash ( Hash) is the source hash value); the plaintext information ( ⁇ contains the hidden hook) is followed by the source hash value, encrypted with the key, and becomes the ciphertext; the ciphertext is sent to the sink through the public network. machine.
  • a one-way hash function (MessageDigest) to obtain a hash ( Hash) is the source hash value); the plaintext information ( ⁇ contains the hidden hook) is followed by the source hash value, encrypted with the key, and becomes the ciphertext; the ciphertext is sent to the sink through the public network. machine.
  • the sink-side discriminator uses the previously agreed shared symmetric key to decrypt the received ciphertext into plaintext, and obtains the plaintext information and the source-side hash value; the plaintext information contains the hash value) Add the key later; input the combined data into a pre-agreed one-way hash function to obtain the hash value as the sink hash value); the sink hash value is compared with the received source hash value. If the two hash values are the same; then confirm that the information is sent from the legitimate source end, accept the information; otherwise discard the information.
  • the user refers to other units, partner units or remote clients) encrypts the password left in a certain unit with the user's private key as the digital signature of the user;
  • the unit public key encrypts the digital signature, the user name, the user public key, and the symmetric key as a secret; encrypts the plaintext information with a symmetric key as a ciphertext;
  • the source end discriminates the secret, ciphertext;
  • the machine is used to decrypt the secret device; the discriminator uses the private molybdenum to decrypt the secret member, and obtains the user name, the user public key, the symmetric key and the user digital signature; decrypts the user digital signature by using the user public key to obtain the user password;
  • the machine compares the user name, IP address, and user password with the relevant information stored in the unit.
  • the unit confirms that the information is sent by the user; then decrypts the ciphertext with the symmetric key, and obtains the plaintext information sent by the user; the discriminating machine determines the user authority by accessing the control list; Transfer to the computer with the appropriate permissions. Otherwise discard this information.
  • a unit encrypts the password left by the user (referring to other units, partner units or remote clients) in the unit with its private key, as the unit digital signature;
  • the public key encrypts the unit digital signature, the unit name, the unit public key, and the symmetric key as a secret;
  • the plaintext information is encrypted with a symmetric key as the ciphertext;
  • the source end discriminates the ciphertext and the secret file;
  • the client domain of the user is transmitted to the user to identify the machine; the user decrypts the secret with his private key, and obtains the unit name, the unit public key, the symmetric key, and the unit digital signature; Secret; get the password left by the user in the unit; then the user of the user domain to identify the machine) compare the password with the password reserved in the unit. If it is completely correct, the user confirms that the information is sent by the unit; decrypts the ciphertext with a symmetric key to obtain the plaintext information sent by the unit. Otherwise
  • Source-end hierarchical encryption program A paragraph with a higher security level in the plaintext information, first encrypts the part of the paragraph with another key of the shared symmetric encryption algorithm. He can use an asymmetric key or the like); After the plaintext encrypted in the part of the paragraph, a sequence or symbol indicating the location of the encrypted paragraph is added, and then the key is added to obtain the hash value (source end); the latter part is the same as the "source encryption program” function program.
  • “Stop-end hierarchical decryption program” the front part of the same as the shrink-end decryption program” function program; then after the partial paragraph encrypted plaintext, add the number or symbol of the indicated position of the encrypted paragraph, and then add a pre-agreed key, ask The hash value (sink).
  • the sink hash value is compared with the received source hash value; if the two hash values are the same; then the information is confirmed to be sent from the legitimate source end, and the information is accepted; otherwise, the information is discarded. If the information is accepted; the ciphertext at the corresponding location is decrypted by another previously agreed shared symmetric key, and the entire plaintext is obtained.
  • the discriminating machine can select any one of the above five sets of programs or various different program groups combined by them according to the specific resource service needs.
  • the 1.6 machine also records all external access in detail; it also prevents unauthorized access to external information on the Internet. It enables the access of the external high-performance machine or the unit's resource equipment to its superior network, which can only be concentrated on the machine; the "high-reliability" of all the high-end machines or resource devices on the resource-optimized network.
  • the computer also allows the high-end machines connected to it to transmit and receive various encrypted information of other resource-optimized network of the system through the Internet.
  • the procedure for checking procedures is called the standard procedure for discriminating.
  • the Source Encryption Program and the Sutton Decryption Program are also called the standard program for discriminating.
  • the network is called the resource network ( Figure 1).
  • the hard disk of the resource library (including database, software library, network log library, group wisdom library, encyclopedia library, ontology library, life metabase, etc.) is the device and place for storing and backing up resources.
  • a sufficiently large hard disk space is a prerequisite for implementing resource device functions: high input/output ⁇ / ⁇ ) processing capability is a necessary condition for ensuring resource device efficiency.
  • the memory capacity of the server and the performance of the microprocessor also have an impact on the efficiency of the resource device. Therefore, the selected resource device and server performance must match the resource size.
  • the resource device or server may be the destination of the resource in the resource-optimized network, or may be the source of the resource.
  • the browser in the U-machine network can send the resource information on the e-resource to the resource device of the resource network; or deliver the resource required by the user to the user's electronic resource through the browser.
  • the network operating system (NOS) that the resource machine network can use: UNIX, Li belly or Windows; it can select the appropriate operating system according to needs.
  • the resource-optimized network has interoperability, portability, expandability, scalability, and plug&play features. It is generally based on the principle of distributed control, and can adopt hierarchical control structures of systems, subsystems and modules; its construction is portable and transparent; and provides a neutral mechanism platform that does not depend on the structure of specific resource devices. , is a brand new construction.
  • any server in the same resource-optimized network can operate on resource services and resource devices. Building a resource-optimized network requires adherence to some core design concepts: simple, flexible, scalable, and modular.
  • the resource-optimized network can be used to collect or provide resources for a large number of resource services and services by utilizing the reconfigurability of the resource services of the unit and the compatibility of resource communication.
  • the Resource Utilities Network provides resource services to organizations (including the public); it addresses the closure of resource pools (including databases) that are faced by various industries.
  • the resource machine network is a complete architecture. It includes the main components of the source of resources, resource extraction and conversion tools, resource modeling tools, resource storage device resource management tools, resource access and analysis tools. The various components are interdependent and form an organic system. According to the network of the machine Service objectives, identify relevant modules and interfaces, achieve efficient use of resources, and provide the most reliable support for in-depth analysis and decision-making of resources.
  • Resource devices and computer-like devices in the resource-optimized network can also directly communicate and exchange information with each other.
  • the discriminating machine manages the difference of each superior machine network through network protocol conversion to perform unified business or service management.
  • People can develop programs on any high-performance network of a proprietary network, and can easily schedule resources between various high-performance networks at any time to achieve on-demand resource allocation.
  • Developed programs can be shared by proprietary networks.
  • the service element scheduling technology can be adopted.
  • Business meta-scheduling is a technology accumulation that encompasses everything from structured programming to client/server mode and programming. It is a completely new software model: the business element is a component of an application or service program on the network of the machine.
  • the business unit can share its Application Programming Interface (API) through the "window" of the host and directly call it to other applications or service programs on the network.
  • API Application Programming Interface
  • This technology enables the seamless integration of resources regardless of the software used in the resource application or service, and the hardware used in the network.
  • the standard for transmitting information in each network can be different, but It is best based on an internet protocol.
  • Web 2.0 provides a platform for "all resources"; users become 'participants' and producers and consumers). Each user actively contributes content to the repository and actively creates the value of the repository.
  • Yousha.com becomes a platform for resource service sharing and is a readable and writable network.
  • the Siki is used to create collaborative websites and provide community websites in the Resource Optimizer Network; web logs only allow comments to be added and data cannot be modified.
  • the UFIDA network has creative, interactive, and secure resource sharing, collaboration, and networking capabilities.
  • Intelligent agent technology can also be adopted.
  • ⁇ Distributed artificial intelligence can be integrated into special functional units, resource devices and high-performance machines that solve problems.
  • Intelligent agent technology supports the technical know-how of resources and knowledge. It also makes it easier to absorb reasoning skills such as packaging business rules in agents.
  • Intelligent agents can also include learning and self-promoting capabilities at both the basic implementation (adaptive routing) and the program (g-adapted user interface).
  • the resource information processed by the U-machine network is sometimes not included in the commercial resources exchanged between applications or services. Instead they contain information about low-level events. These low-level events are combined into a certain pattern by intelligent agents, which may show advanced business intelligence due to group intelligence.
  • group intelligence can generate resource intelligence based on low-level events of the resource-optimized network.
  • the ontology provides the deterministic semantics (eta data) that the computer can understand by the computer; the intelligent agent technology can complete the resource services specified by the semantics.
  • the extraction of information in the proprietary network enables a whole new set of search technologies. It avoids the tedious and error-prone screening of existing results from the search engine.
  • Intelligent agents can be integrated into special functional units, resource devices, and resource-optimized networks that solve problems. Proprietary networks can handle a large number of unstructured resource types (such as images, audio, video) that appear with the Internet.
  • the Resource Optimizer Network is the third generation of Internet-based resource applications or services. It utilizes an electronic resource to implement resources that are readable, writable, and executable.
  • a proprietary network that can be "highly trusted” to interoperate between Sft machine networks is the resource network ( Figure 1).
  • the way that the machine network accesses the public network through the identification machine is a way of qualitative change.
  • the discriminator has a protocol that will be different from the Internet Protocol ⁇ ) and translates into the function of the Internet Protocol.
  • Each resource-universal network domain is superior to the public network through the protocol conversion function of the discriminator.
  • the resource network meets the requirements of interactive applications and stability; it is interoperable; it can distinguish the different security requirements of each part of a specific resource file; the public key infrastructure can be used for authentication and key distribution.
  • the "high-trust” communication ( Figure 1) of the same public network between the two computers in the different network of the resource network is as follows: The information sent from the source computer; the source machine arrives at the source The source end of the end of the installation of the encryption program, etc.; after the encryption; through the public network Network; to the terminal with the shrink-end decryption program and the program of the check program, etc.; after the information is decrypted and checked for viruses; go to the terminal machine; finally arrive at the sink computer. The machine refused to illegally access the resource network.
  • the resource network has the characteristics of self-healing, machine-driven, multi-party leasing, service-oriented, virtualization, and linear expansion. It provides resource services to the public; it addresses the problem of database closure in private networks facing a wide range of industries.
  • the proprietary network can implement infrastructure as a service, IaaS), platform as a service Platform as a Service, PaaS) Software as a Service (SaaS).
  • IaaS infrastructure as a service
  • PaaS platform as a service Platform as a Service
  • SaaS Software as a Service
  • the service or personalized information component in the U-machine network is combined, and the ability to provide them to the user through the user interface of the merged service meta-scheduling and Web 2.0 functions is called ⁇ . It is not only used to identify software, but also used in commercial applications. Software ⁇ and make business ⁇ ⁇ possible. For example, an electronic map of a satellite positioning system adds location information to actual resource information to create new, unique services that are not provided by any of the previous sources.
  • a resource network can also have the following capabilities:
  • Resource network can use service meta-scheduling technology.
  • the resource service process refers to a complete and dynamically adjusted set of business elements that are collaborative, transactional, and utilized or created by customers.
  • the resource network uses business meta-scheduling to provide resource information to users through standardized, streamlined, and automated coupling components.
  • the service element scheduling enables the user's resources to be directly converted into a set of interconnected resource modules that can be accessed through the network.
  • the resource network only the local high-performance network is a high-performance network (local network) for service element scheduling; or two or more high-performance networks are high-performance networks (foreign networks) for service element scheduling.
  • SaaS Software as a Service
  • Software Resources are packaged as repeatable business tasks or business process steps. For small and medium-sized units, the investment in purchasing, installing and maintaining infrastructure, middleware and procedures can be eliminated.
  • the "long tail theory” is the theoretical basis for SaaS's commercial success. Any company that does not need to be staffed to manage it can get the latest technology applications.
  • the client or the network of the superior machine accesses the Internet, which is the basis for the user to obtain rich resources in the resource network.
  • Resource network stability, reliability, security, availability, flexibility, manageability, automation, energy conservation and environmental protection, and the Internet can be used anywhere, enabling cross-regional resource sharing and resource provision.
  • Network resources are service systems formed by resource networks and electronic resources.
  • the electronic resource has functions of collecting, operating, processing, and storing resources.
  • Network resources are in line with resource management methods. For cross-regional or global unit resource devices, they are closely linked. Its management method has both local decentralized management and global coordinated control. Network resources satisfy this resource system that requires local processing and global processing to work together.
  • Network resources can increase the performance price ratio. With the expansion of unit resources business, the amount of resources has exploded. If a large number of resources centralized access to coffee remote access) will be more and more demanding on the performance of the host, even the original host can not meet the requirements and have to be abandoned. With network resources, many existing devices and environments can work together to achieve higher performance-price ratios. Resources can be used offline through an electronic resource.
  • Business Processing is a collection of collaborative, transactional, value-creating, fully dynamic and tuned units of work.
  • the business process in network resources refers to how to complete various tasks and services such as resource configuration and scheduling.
  • the work unit replaces functionalization
  • Business Process Management is a technology for managing the entire activity cycle of a business process (discovery, design, deployment, analysis, optimization) of resources. It is primarily and primarily a holistic, business model of process management.
  • Each high-performance network is a centralized (or decentralized) resource system; it has the capability of autonomous processing to complete local resource services of the local superior network.
  • These high-performance networks are not irrelevant; they form a logical whole, unified under the management of the resource-optimized network system software, and participate in and complete the global resource business.
  • the logical collection of resource devices in the network of high-performance machines consists of two parts: one is the collection of resources required by the service, called the physical resource device, which is the main body of the resource-optimized network; the second is the definition of the resource structure, and the overall A description of the fragmentation and distribution of a resource, called a resource dictionary.
  • the resources of the UFI network are managed by its local server and have its own processing capabilities, which can complete the application or service of the local U2000 network.
  • the information flow transmitted through the public network may also be handled in integrity; to ensure the integrity of the information.
  • Network resources can also have the function of identity authentication to ensure the authenticity of information.
  • identity authentication To ensure the authenticity of information.
  • An off-the-shelf general-purpose computer capable of interacting with the U-machine network for resource information is an electronic resource. It is a microcomputer with software for resource collection, resource operation, resource processing, resource storage, etc., and capable of displaying information. It has a microprocessor (Microprocessor Unit, CPU for short), an information display; its integrated circuit contains data memory (EPR0M), working memory (RAM) and program memory (EPRd) circuits. It can also add input buttons and so on.
  • the e-resource program contains standard procedures for the discriminator; there can also be a complete check of the information. It can be plugged directly into a dedicated slot in the Resource Browser to work with the resource network.
  • the storage capacity of an electronic resource is generally 64 KB or more.
  • the electronic resource solves key technical issues such as security, confidentiality, anonymity and integrity of offline information.
  • the electronic resource device can also add hardware and software such as identity authentication as needed; and ensure the separability and authenticity of its information transmission.
  • the electronic resource requires both online information processing and online authorization processing. So allow it to be used offline.
  • the output field of the electronic resource is input to the plug, which can be inserted into the input field of the other electronic resource.
  • the slot can directly exchange resource information.
  • the e-resource is also a business process management system (BP S). It is able to show the appropriate workflow to the unit's leaders and staff across multiple agencies: a leadership system for the leader; a content that helps the staff to make decisions and operations. It can complete strategic decisions, work plans, task development, resource processing, and more. The completion of strategic decisions, work plans, task development, and resource processing in existing units is basically done manually.
  • the electronic resource can also have:
  • the electronic resource device can access the resource information in the local optimal machine network on the resource browser of the resource superior machine network. It can also input or export resource information in a foreign resource network through a public network.
  • the new method can be used for the encryption, complete inspection and identity authentication of information.
  • Electronic resource devices can also adopt programs such as digital signatures and access control policies; and with the application layer, security level management is performed on various information transmitted. It can perform certain security encryption for certain parts of a message according to its different security levels.
  • the electronic resource depends on the software in its memory to run independently. They can be connected directly to the output interface via their different input interfaces. This electronic resource has all the logic functions of reading and translating, and can independently check the legitimacy of the respective electronic resources and the identity of the holder.
  • the electronic resource device working online is inserted into the dedicated plug on the resource browser.
  • the resource browser can be directly connected to the resource network through dedicated lines, telephone lines, and the like.
  • Each resource service is transmitted by the electronic resource agent to the resource optimal machine network for processing in real time, and the file can be updated in real time.
  • the electronic resource is identified by its owner, and biometric techniques such as fingerprint scanning, voice confirmation, and iris authentication can also be used.
  • the security software of the electronic resource device may also have the function of checking the personal identification number of the electronic resource holder and determining the legality of the holder. It can contain and display personal second-generation ID number and personal photos, and implement real-name system.
  • the electronic resource storage capacity is high enough to store all the information of the required software, ID card and all the records of multiple access resource information and service fees. Its hardware has voltage and clock detectors, exposure automatic crash logic, anti-anatomy and other encryption measures; software has password protection, security encryption algorithms and other encryption methods.
  • the e-resource is easy to manufacture, low in cost, long in service life, and can be reused.
  • a number of resource-optimized network of the unit and its branches and a special-purpose network of specific functions are connected to the router of the same public network through the identification machine to jointly construct a unit that writes “trusted” interoperability.
  • Internal resource inline network called resource inline network (®2); referred to as intranet.
  • ®2 resource inline network
  • Different types of intranet systems are formed due to different function-specific network: Web intranet, service meta-scheduling intranet and Multimedia intranet, etc.
  • Each computer in the intranet can be equipped with the same "procedure program” and / or “source encryption program” "sink decryption program” standard program. In this way, each discriminator monitors the information coming in and out of the resource superior network or the specific function supercomputer network, and refuses to illegally access the internal network of the unit.
  • the various existing data inline networks are closed networks; they are unable or difficult to describe unstructured resource types.
  • the existing relational database model is too simple to express complex multimedia structures.
  • the existing "cloud” technology is just a remote access technology.
  • the Intranet can also have distributed data series (Seb) intranet, multimedia intranet, business meta-scheduling intranet, knowledge intranet, fuzzy intranet and dedicated intranet, etc. .
  • Seb distributed data series
  • the UF network is mainly an intranet with a Web database system called the Web Intranet ( Figure 2).
  • a new resource service model can also emerge in B/S mode: Outsourcing. It can provide users with access services for the Web server and the repository: after the user registers, they will get a username, password, domain name and a certain disk and resource library space. Users can log in to the resource library using a browser; develop their own service program: they can also be uploaded to the specified directory of the server after the development of the unit is completed. In this way, users only need to concentrate on the development of the service program, without having to consider the management, maintenance and resource backup of the server. It provides a good platform for improving the resource service level of medium and small units.
  • the Web Intranet technology combines the advantages of relational networks and Internet technologies, and combines the results of Internet technologies, storage technologies, and retrieval technologies to adapt to Internet-based resource services with a new functional structure.
  • Access to the repository via Web technology does not require the development of specialized client programs; resource services can be implemented through a browser.
  • Users can easily access repository information: Web information is organized in HTML, and both web servers and browsers follow this standard; ready-made browsers are available for use on a variety of operating systems, writing to a web server
  • the ⁇ ⁇ document which can be viewed by browsers on all platforms, enables true cross-platform operation.
  • the existing database system model is simple and is not conducive to the expression of complex data structures. In addition to structured numbers or characters, it cannot accommodate more data types.
  • the UF network is mainly an intranet of a resource library system with service meta-scheduling functions, called the service meta-scheduling intranet ( Figure 2).
  • the service meta-scheduling intranet is a product of the combination of service meta-scheduling technology and resource network technology. It adopts the programming method of business meta-scheduling, takes a stable objective business element as the basic element, and uses "class” and "inheritance” to express the commonality between things and the inherent relationship between them.
  • the service meta-scheduling intranet satisfies two criteria: first, it is a repository system with the basic functions of the repository system; secondly it is a service meta-scheduling system that supports a complete service meta-scheduling mechanism.
  • a service meta-scheduling intranet is a proprietary network that can share business elements.
  • the service meta-scheduling intranet can also store resources as objects that can be automatically retrieved and shared. Included in the object is the completion of each resource service processing instruction. These objects may contain different types of resources, including the original data and processing, as well as sound, graphics, and video signals. Objects can share and reuse these resources. These features of the Service Element Scheduling Intranet make software development easy by reusing and building new multimedia resource applications or service capabilities that combine different types of resources to accomplish a variety of tasks.
  • the UF network is mainly the intranet of the Multimedia resource library system, called the Multimedia Intranet ( Figure 2).
  • Multimedia intranet objects can evolve from traditional single character type information media to a variety of types of information media including graphics, images, sounds, and characters. It integrates multimedia technology and resource library technology; it is a collection of several multimedia objects. The multimedia resource objects are organized in a certain way and can be shared by other services.
  • the main features of the multimedia intranet are -
  • 6.3. 1 can represent and handle a variety of media resources.
  • the representation of multimedia resources within a computer is determined by the characteristics and associations inherent in the multimedia resources.
  • Conventional resource item representations are used for conventional formatting resources; for unformatted resources such as graphics, images, sounds, and video, the representation method is determined based on the characteristics of the multimedia.
  • the same media will have different storage formats.
  • 6.3.2 can reflect and manage the characteristics of various media resources, or the spatial or temporal correlation between various media resources.
  • various media information has its own characteristics or a certain natural connection between various media information.
  • These associations include the synchronization characteristics of the timing relationship and the spatial structure of the coffee related information integrated in a reasonable layout of the expression space).
  • 6.3.3 can provide a stronger function for unformatted resource query and search than traditional database management systems. It allows searching for resources in multiple repositories at the same time, allowing searching for resources by establishing an index such as graphs for analysis of unformatted resources, allowing various media resources to be searched by scope, knowledge, and other descriptors. Wait. These resources can be cross-called and fused to each other.
  • 6.3.5 can provide resource service processing and version management functions.
  • multimedia database management systems are limited to specific multimedia services.
  • the multimedia service field only involves the processing of multimedia files, and few use multimedia library as a source of multimedia resources.
  • the UF network is mainly the intranet of the Knowledge Database system, called the Knowledge Intranet ( Figure 2).
  • Knowledge intranet can store and organize a large number of facts, rules, concepts, and provide users with convenient and fast retrieval and query. It is an interconnected set of knowledge that is stored, organized, managed, and used in computer memory by a knowledge of a certain domain (or some domain). This knowledge includes theoretical knowledge and factual resources related to the field, and it is up to Jl ⁇ ft to retreat from expert experience.
  • the Knowledge Intranet is intelligent and its characteristics are:
  • the knowledge resource library is generally modular.
  • the knowledge in the knowledge resource pool is generally hierarchical.
  • the lowest level is factual knowledge
  • the middle level is the knowledge used to control facts
  • the highest level is strategy
  • it is controlled by middle level knowledge.
  • a policy is considered a rule of rules.
  • the specific function of the network is mainly the intranet of the fuzzy resource library system, called the fuzzy intranet ( Figure 2).
  • the fuzzy resource library is a combination of resource library technology and fuzzy theory. Fuzziness is an important attribute of the objective world.
  • a fuzzy intranet is a network that stores, organizes, manages, and operates fuzzy resources. Fuzzy intranet resource structure and resource linkages, resource operations and operations, resource constraints (including integrity and security), user-used repository windows, user views, resource consistency, and non-redundancy Definitions, etc. are all vague. Accurate resources are a special case of fuzzy resources.
  • the fuzzy resource library system has the representation method of fuzzy resources; the organization management of fuzzy system; the operation, query and retrieval of fuzzy resource library; the acquisition and storage of fuzzy resources; the editing of fuzzy resources; the fuzzy resource library Management and other functions.
  • the existing database in specific areas uses firewall technology and cannot defend against computer virus attacks, which is one of its main defects.
  • each computer can also be equipped with the same tree unit identity authentication and authorization procedures, etc., and each identification machine has an IP address table of these machines and a resource network connected to it or Each host name domain domain address in a specific function network.) and an access control list. The machine monitors the information coming in or out of the resource-optimized network or the specific-function network, and denies access to the intranet illegally.
  • the unit's resource network or intranet, and one or several high-performance network of the partner, are connected to the router of the same public network through the identification machine to construct a "high-reliability" information interoperable outreach network. It is called the unit resource outreach network, referred to as the extranet ( Figure 1).
  • the machine can contain standard programs, authentication procedures, authorization programs, and combinations thereof as needed.
  • the extranet can integrate the feedback of resource quality into the modification system through the quality tracking system, and obtain better resources through improvement.
  • a unit remote client connected to the same public network can log in to the resource network or intranet to achieve between them. "Highly trusted” information interoperates. These clients and the intranet form a system together, called the resource access internet, referred to as the resource access network ( Figure 1).
  • the resource access network is a remote client that is equipped with software such as a program for checking the program, a cryptographic program, and a decryption program.
  • the router is connected to the Internet and is composed of a resource network or an intranet. A system that provides "highly trusted" interoperability between remote users and the intranet.
  • the remote client can also be equipped with software for identifying and authorizing programs in the tree unit, and can recognize various information of different identities coming in from the Internet.
  • the computer will monitor the information coming in and out of the resource network and remote clients and deny illegal access.
  • clients can only access one computer.
  • Clients in the resource access network can access many high-performance networks.
  • the resource-optimized network accesses the public network through the identification machine, forming a resource network, and is also applicable to the access network in the telecommunication network and the cable television network, and other various access networks.
  • UFI Network As a new platform for human business interaction, UFI Network has made the existing industry boundaries obscure. It streamlines the company's business processes and produces inexpensive, excellent, and fast products and services. Customers, retailers, distributors, and manufacturers are integrated into one business system.
  • PSTN Telephone Switched Network
  • ISDN Integrated Services Digital Network
  • Digital Data Network
  • FR Shout Relay
  • ATM Asynchronous Transfer Mode
  • the telecommunications network of the local telecommunications network respectively forms a telecom resource network by dialing the machine and accessing the router of the public network. Users can access a wide variety of telecommunications resources.
  • the existing telecommunication access network is a closed network; there are too many network nodes, user data is dispersed, maintenance and management is difficult; business development is complex and capacity is limited; and a large number of switches face the fate of elimination.
  • the output interface of the fiber-optic coaxial cable hybrid network (HFC) in the cable TV network, connected with the superior machine, is the TV excellent machine network. It is a high-speed and low-cost integrated network; it has the advantages of frequency bandwidth, large capacity, multi-function, low cost, two-way, support for multiple services and connecting thousands of households.
  • HFC fiber-optic coaxial cable hybrid network
  • TV networks around the country are connected to the routers of the public network to form a TV resource network. Users can get rich and colorful TV resources.
  • the existing cable television network is also a closed network; it is a network dedicated to transmitting analog television programs, using a one-way broadcast type.
  • Data mining is the process of discovering new and important service relationships and hidden resources by using original resource derivation. It is a collection of powerful resource analysis techniques. These technologies can be used to analyze and develop extremely large distributed resource networks.
  • Data visualization is a process of using dynamic image representation to reveal the pattern of resource intrinsic relationships. It can transform huge amounts of data into meaningful images. These techniques can transform a specific amount of resource data into meaningful distributed shapes or images. It includes visualization of hierarchical resources, visualization of multidimensional resources, visualization of document resources, and Web visualization.
  • All resources of resource mining and resource visualization in the U-machine network can be "high-trusted" interoperability in the public network through the identification machine.
  • a resource network with resource mining and resource visualization is a distributed network, ie, an immediate network, a cluster network, an autonomous network, a public service network, and the like.
  • Resource mining is the act and process of discovering new, hidden, or unexpected new resources from existing repositories.
  • Data correlation is the various mathematical relationships between two or more variables of a resource.
  • An element can be associated with multiple variables at the same time (time factor, geographic factor, demographic factor, etc. For example, it can be one element related to another element; one element is related to another element that spans different time intervals; A group of elements is related; one element is related to a geographical area; one element is related to external resources; one element is related to demographic segmentation population, etc.
  • Resource mining uses a set of techniques combined with each other, using resource correlation (Data correlation) ) and extract the most valuable content from the repository.
  • Data correlation resource correlation
  • Primitive resources can come from many different repositories, including satellite photos, underwater sound-sensing devices, measurement maps, or computer simulations.
  • the information and patterns of these resources are of great quantity and complexity.
  • Resource visualization technology uses human visual systems to assist in the analysis of complex resource sets by mapping physical attributes to resources. This ability to create multidimensional constructs and models from primitive resources maps resources to physical properties; leverages the power of the human visual system to help analyze complex resource sets.
  • the hidden mode in the resource can be identified.
  • FIG. 1 Schematic diagram of resource superior machine network, resource network, intranet, extranet, resource access network and so on. They are a special network that combines a high-performance machine, a number of computer-based devices, resource devices, and the like into a resource-optimized network; a resource-optimized network and/or a specific function-based network, which is connected to a router of the public network through a discriminator.
  • FIG. 2 Schematic diagram of the business meta-scheduling intranet, multimedia intranet, knowledge intranet, fuzzy intranet and so on. They are respectively an intranet composed of a specific function network and/or a resource network, connected by a router of the public network.
  • a free and open resource information network and various combinations thereof can be operated on various integrated computer platforms, can be interoperable with other system's high-performance network "high-trust", and can provide users with a A unified style of resource interaction.
  • the backup system is generally set up in the important UF network ( dl ).
  • the backup client usually refers to the program and resource devices; the software series that can read resources from the online storage and transfer the resources to the backup server; the primary backup server is used to arrange backup and recovery work, and maintain the storage medium of the resources.
  • the media server copies the resources to the backup media as directed by the primary backup server.
  • the backup storage unit is a resource tape, a disk, or a disc.
  • Veritas NetBackup software uses a four-level hierarchy to centrally manage and adapt to multiple service structures. Its technical features include flexible setup, disaster recovery, parallel processing, reliable resources, ease of use, monitoring capabilities, and system resource recovery.
  • the U-machine network in the proprietary network the various resource devices that may be handled at present, are placed in the online storage (OnStore) device to ensure that the information is read at any time.
  • online storage OnStore
  • OffStore offline storage
  • Storage Virtualization backup management software provides a transparent storage system. According to the instructions of the resource machine network, the inactive resources in the archive backup directory are automatically archived and backed up to the near-line storage (NearStore) device, and the historical resources are automatically archived to the offline storage device.
  • NearStore near-line storage
  • the discriminator generally uses more than 32 CPUs; the host frequency is above 20MHz; the memory is more than 8MB and is equipped with a hard disk storage with sufficient capacity.
  • the machine has a controller, a data memory (EEPR0M), a work memory (RAM), and a program memory (EPR0M). It runs network operating system software and manages communication between the resources and the network through the public network (including wireless and optical networks). It is the throat between the machine network and the public network.
  • the discriminator can be a peer (Peer); it can also be a client, a server, or the like. In addition to the standard programs, it can have other programs as needed.
  • the machine can also have the following procedure as needed - the easiest way to authenticate is to create a username and password information table in the machine.
  • the machine authenticates through an Access Control List (ACL).
  • ACL Access Control List
  • the list of username and password information is simply identified by the identity of the different types of source network (represented by its IP address).
  • Authorization specifies the actions that a user can perform after gaining access to the network.
  • a new way to authenticate and authorize is to create a table of user or unit names, IP addresses, passwords, and authorization rights.
  • the unit's discriminator access control list is used to authenticate other users, partner units, remote clients or organizations.
  • the list identifies the different types of source broker names) ⁇ IIP address and the user's password. Only the user name, IP address, and user's password are the same as in the access control list, and the address-based authentication is guaranteed to take effect, and the authorization authority is determined.
  • the machine also has the most flexible means of handling the security of a single file. For example, a unit can perform an encryption or digital signature on individual paragraphs of a file it issues. The machine can provide this level of security services. It can distinguish the different security requirements of a specific file.
  • the machine can not only contain the workstation program, but also encode the transmission resource using the message authentication code (MAC) technology to ensure the integrity of the information that is maliciously attacked.
  • MAC message authentication code
  • Its typical encoding mechanism is a cryptographic hashing mechanism.
  • the resource superior machine network (S1) is a product of the combination of network physical topology technology and resource technology.
  • the special machine has a microprocessor and a memory, and is equipped with an input button, an information display, and the like. It has data memory (EEPRQH0, working memory (RAM) and program memory (EPR0M).
  • the high-performance machine generally uses more than 32 CPUs; the host frequency is above 20MHz; the memory is more than 8MB and is equipped with sufficient capacity of the hard disk storage. It is the core of the resource-optimized network, running the network operating system software, managing the communication between the computer-based devices in the resource-optimized network, the resources of the management unit and the users' use of these resources.
  • the optimal machine generally adopts the wavelength division and the time division. Or real-time control; multi-functional, multi-tasking processing capabilities.
  • the UF has all the logic functions of reading and translating resource devices and computer devices, and can recognize various functions of the unit's resource devices.
  • U-machines In addition to various standard interface circuits, U-machines also have dedicated interfaces for interfacing with special resource devices.
  • the browser in the resource-optimized network is a device for providing a microprocessor, a display, and the like with browser software for use by the user. It contains a program that accesses and displays resource information (containing multiple service programs and resolves the object with a program determined by the object name).
  • the network file system (Net) of the Resource Utilities network allows the service program to open a file, move it to a specified location in the file, and start reading and writing resources at that location. It refuses to recognize the machine with this service program. That is, the machine will not remotely access the U.S. machine.
  • the machine can use operating system software such as DOS, UN/Linux, and Windows. As a general use of Linux.
  • Linux uses shell commands and related programs and files in the character interface to implement basic functions such as system management and network services.
  • the shell is the interface between the user state and the operating system kernel, which plays a role in coordinating user and system consistency and interacting between the user and the system.
  • Computer-based device software is a special software developed for the realization of various functions of resource devices, also known as control software. It is stored in the EPRffl of the computer class device. The function settings and control schemes of resource devices of various units are different, and are mainly determined according to specific requirements.
  • the basic functions of the unit's resource devices are composed of multiple functional modules; different software structures have different ways of arranging and managing these functional modules. It features multi-tasking and real-time, and the corresponding software technology can be used for multi-task real-time processing and multiple real-time interrupt processing.
  • Multitasking real-time processing is the task of causing a computer-like device to perform two or more of the same or different tasks at the same time or at the same time interval.
  • interrupt management is mainly done by hardware, and the software structure of the resource device depends on the interrupt structure of the system.
  • the real-time tasks of the resource device are arranged into interrupt service programs of different priority levels or in the same interrupt program in priority order.
  • the interrupt type structure software arranges various functional modules of the resource device in different levels of interrupt service programs.
  • the management scheduling of resource devices is mainly solved by mutual communication between interrupt programs.
  • the devices in the resource network are diverse in resource device structure and are applicable to various industries. It can set up a group of computer-like devices with different functions to form various types of resource series through RS-232 and RS-422 short-range serial interfaces; and exchange various resources with computer-based devices.
  • the resource network can use DOS, UNIX/Linux Windows and other network miscellaneous systems. Linux software is generally used.
  • Devices in the resource network use large-scale and very large-scale integrated circuits, which can greatly reduce the failure rate of resource devices.
  • AI artificial intelligence
  • 3 ⁇ 4 energy fault diagnosis system that is, the various fault causes and disposal methods that experts have mastered are stored in the resource equipment as a knowledge base, and the software is developed based on the knowledge base. Find the cause of the failure and propose a way to troubleshoot it.
  • Resource networks meet interactive service and stability requirements; interoperability.
  • the resource superior machine network is attacked by computer viruses on the Internet, and at most, it only detects the machine and does not affect the normal operation of the resource excellent machine network.
  • Distributed networks including resource networks, intranets, extranets, resource access networks, etc. must consider the following important parts:
  • Hardware is the material basis for supporting distributed networks.
  • a hard disk is a device and a place for storing resources and their backups.
  • a large enough hard disk space is a prerequisite for implementing a distributed network; higher I/O processing power is a necessary condition for ensuring the efficiency of a distributed network.
  • the memory capacity and CPU processing speed of the machine, server and modem also have an impact on system efficiency. If there is too little memory, the cache space is limited and the access speed of resources will decrease. Therefore, host performance must match the service size.
  • DBMS database management system
  • a distributed network is an application or service system that adapts to local processing and global processing to work together.
  • a global service is a resource device that involves two or more nodes in a service.
  • Each U-machine network is a centralized or decentralized resource system; it has the capability of autonomous processing to complete the business application of the local U-machine network.
  • Each of the network of high-performance machines is not irrelevant; they form a logical whole, and together, under the management of the software of the network of the machine, participate in and complete the services of the network resources.
  • a logical collection of resources on a node consists of two parts: one is a collection of resources required by the service, called a physical resource, and is the main body of the resource network; the other part is about the definition of the resource structure, and the fragmentation of the global resource, A description of the distribution, called a resource directory or a resource directory.
  • Network resources are service systems formed by resource networks and electronic resources.
  • the resource network and the electronic resource unit together form the hardware and software of the business or service system of the online network resource.
  • the software of the resource browser and the electronic resource has software such as overwriting, encryption, modulation and demodulation, decryption and decoding.
  • the resource browser also has identification software for the secure encryption algorithm of the electronic resource.
  • the electronic resource uses a personal identification number (PIN) to identify the identity of the holder.
  • the important data in the electronic resource is encrypted and the information identification code (MAC) is added.
  • the online resource service system verifies the identification code to identify whether the electronic resource has been tampered with and displayed on the display of the browser.
  • the integrated circuit of the electronic resource contains basic components and circuits of a main microcomputer such as a microprocessor, a random access memory, a read only memory, an interrupt system, a timer/counter, and an input/output.
  • the circuits of all components are connected together by an address bus, a data bus, and a control bus, and then communicate with the circuits of the external computer through the input/output interface circuits.
  • the microcontroller on the electronic resource has the important function of controlling the display of characters and images on the information display. It is responsible not only for the coordination and control of the electronic resource as a whole, but also for the control of reading and writing and storing the resources and parameters of the electronic resource.
  • the browser of the resource network is basically the same as the structure of the following electronic resource, and the general body surface size is larger than that of the electronic resource. Their software is matched to each other.
  • An electronic resource device is a microcomputer with hardware and software for collecting, operating, processing, and storing resources. It has computer functions such as reading and writing and processing resources; its information display is generally a small liquid crystal display. It is typically 4 inches to 8 inches in size.
  • the electronic resource device contains a standard program for the identification of the machine (a program for the forging program) or a "source-side encryption program” and a "end-end decryption program”). In this way, each electronic resource monitors the resources entering and leaving it and rejects illegal access.
  • the electronic resource unit uses CPU 16 bits or more; the host frequency is 10 MHz or more; the memory is 64 KB or more.
  • the storage capacity of the electronic resource is up to 64KB, which is enough to store the required software, all resource information of one service and all resource records of multiple services.
  • Its hardware has voltage and clock detector, automatic freeze logic, anti-anatomy, etc.
  • Each electronic resource has an input interface circuit and/or an output interface circuit that match each other. They are located at different locations in the electronic resource; they are usually located on both sides of the electronic resource.
  • One of the resource's output plugs is the interface circuit of the interface circuit, which can be inserted into the interface circuit of the input slot domain of another resource. Resources can be exchanged directly between them through interfaces.
  • TDS Transition Minimized Differential Signaling
  • DW digital signal interface circuit
  • the electronic resource needs to communicate with the outside computer. It needs to provide its identification signal to the outside computer for detection and identification.
  • DDC Display Data Channel
  • the memory is an erasable and programmable read-only memory (EEPRFF1) that stores display identification data, ie, electronic file information of the display, such as a line/field frequency range, manufacturer, cycle, product serial number , model, standard display mode and its parameters, device data and data required for operation.
  • display identification data ie, electronic file information of the display, such as a line/field frequency range, manufacturer, cycle, product serial number , model, standard display mode and its parameters, device data and data required for operation.
  • the DDC memory of the electronic resource device realizes the identity recognition of the liquid crystal display through the DDC serial data pin, the DDC serial clock pin and the external computing touch information intercommunication. Only the external computer recognizes the liquid crystal display, and the two can work synchronously, coordinately, and stably.
  • the digital input interface circuit of the liquid crystal display in the electronic resource device receives the TDS digital signal output from the external computer; the IDS receiver sent to the liquid crystal display main board; and the output clock signal is sent to the clock generator.
  • the digital signal is decoded and sent to the image scaling processor (SCALER) of the main control circuit for processing.
  • the main control circuit performs format determination on the input image signal, and performs operations such as scaling processing and image positioning on the image.
  • the processed line sync signal in the liquid crystal display main control circuit of the electronic resource device is sent to the phase-locked loop type clock generator circuit, so that the generated clock pulse is locked with the input line sync signal; the other circuit is sent to the screen display circuit ( On Screen Display, 0SD).
  • the line/field sync signal (HS, VS) required by the display circuit is not taken directly from the external input line/field sync signal, but is taken from the line/field sync signal output by the auto-control circuit.
  • the line/field sync signal sent from the main control circuit to the display circuit based on the pre-programmed timing data, the line/field sync signal generated in the image scaling processor (SCALER), It can ensure that the LCD display has normal display and menu display when there is no signal input.
  • the digital signal of the electronic resource processor is processed by the image scaling processor (SCALER) of the main control circuit of the liquid crystal display to enable the digital signal suitable for the physical resolution of the liquid crystal panel, together with the digital line/field synchronization signal, to be sent to the liquid crystal panel interface circuit.
  • the digital video signal is converted into a digital video signal that meets the requirements of the liquid crystal panel interface circuit.
  • the liquid crystal panel interface circuit of the electronic resource device converts the digital video signal, including the display line/field synchronization signal alone or together with the display line/field synchronization signal, to the timing circuit and the drive control circuit of the liquid crystal panel: driving the display
  • the characters and images are displayed on the LCD screen.
  • the line/field synchronization signal received by the digital input interface circuit of the electronic resource device is sent to the microcontroller for energy saving management of the liquid crystal display, and the liquid crystal display is controlled to enter a normal operation, standby, suspend, and off state.
  • the liquid crystal display in the electronic resource device uses the DisplayPort interface circuit to realize a low-cost direct-drive liquid crystal display, and all signals can be input to the video processor of the main board by only one connection line. 6.
  • each discriminator is equipped with the same standard procedures such as "Procedure for Checking Programs” or “Source Encryption Program” and “Stop Decryption Program”.
  • Each computer monitors the information coming in and out of the resource network or private network and denies access to the network of the Internet in the intranet.
  • a resource device service program built on the client/server which performs resource management, organization, and processing on the server side, that is, provides resource services; transmits the client's request and the result or information returned by the server on the network; Completed on the client side is the resource device processing and user interaction interface.
  • the client.server and middleware thus form the client/server model infrastructure.
  • the server provides high-speed, high-capacity storage, powerful resource processing and management, and the ability to run multiple processes concurrently. It also provides functions such as communication and resource processing; it is generally divided into file servers, resource servers, resource servers, and so on.
  • the client consists of a graphical user interface (GUI) and service program code.
  • the service program requests a resource device query and transmits such a request to the server domain server. It mainly completes the interface representation and some resource device logic functions.
  • the interface representation logic reflects the resource device processing logic of the service program on the one hand and the end user's usage interface on the other hand. Users access various servers through the client interface and get the corresponding resource services, including interaction with all peripherals (terminals) and other I/O devices.
  • Client queries are generally presented in SQL, MIRS, and QBIC (Query By Image Content).
  • the resource server accepts and executes SQL, MIRS, or QBIC queries from multiple clients. When the resource server performs a SQL, MIRS, or QBIC request, it selects only the resources that satisfy the SQL MIRS or QBIC query conditions, and then processes the selected resources as required, and then returns them to the requesting client.
  • Middleware is a collection of software technologies, which refers to the connection between the client and the server, also known as interface software.
  • Common middleware is a variety of network operating systems and various network transport protocols.
  • Dedicated middleware for resource device middleware interoperability of heterogeneous resource devices based on SQL, MIRS or QBIC
  • resource processing middleware based on RPC, etc., sharing different server resources
  • component middleware email and Lotus Notes, etc.
  • Object middleware clients can call objects residing on remote servers
  • DDSM middleware administrative agents and agents can talk).
  • the tiered memory system can be a standalone system or a node in the network, but the cache is only provided to the internal memory of the node.
  • an optical disk resource device with a disk drive is directly connected to the system or connected via a local area network (LAN).
  • LAN local area network
  • the system features a large high-speed disk (hard disk).
  • a resource server is a high-end PC equivalent to a file server or a multi-processor.
  • a separate PC with a CD-ROM is connected to a modem in a wide area network (WAN) as a disk object server.
  • the cache server can be placed in several different places.
  • Another method is to use a resource server connected to the modem or another separate PC with a large hard disk as the cache server for logging in to the resource device.
  • Network caches are implemented when all objects stored in the network cache are shared by all or most of the WAN users.
  • the discriminator can interact with the Internet directly connected to the Internet.
  • the U-machine network is a different function-based network, the following different intranets are formed.
  • the Web Intranet ( Figure 2) mainly adopts two modes: C/S and B/S.
  • the stomach has become one of the core services.
  • the B/S mode is a service centered on Web technologies. Only a small support library, such as a dynamic link library for Java or VB, is installed on the browser.
  • the web server is used in the middle layer. The server accepts the browser's request and forwards it to the repository server via the open source device interface standard ODBC or other means, and returns the results returned by the repository server back to the browser in HTML file format.
  • the browser is actually a parser that converts the standard language into an interface, and the server is installed on the web server.
  • Web resource device technology uses network technologies such as word table multi-dimensional processing, variable length storage and service meta-scheduling, and resource equipment technology, which transforms resource equipment services into comprehensive Internet-based services. It uses word table multi-dimensional processing to support unstructured multimedia resources, so that various types of resources can be stored in the same resource device, greatly reducing the time to perform complex processing; on the other hand, it supports new programming such as ActiveX. Tools that can develop increasingly complex resource processing system programs, greatly simplifying system development and management.
  • the resource resource device management system can handle resource capabilities, and combines the ability of business meta-scheduling to handle complex relationships and new resources.
  • the service meta-scheduling resource model is rich in semantics, powerful in description, and extensible. It can easily let users define new resource types and their operations. Encapsulation and scalability are the essence of business meta-scheduling technology.
  • the service meta-scheduling intranet is a network-based distributed resource library system. It is managed by more than one node, making the physical layout of the repository device transparent to the user. Resource sharing can be implemented in the sense of both parallel sharing and serial sharing at the object level.
  • Intranet storage structures can be divided into two categories: one is a relation-based approach; the other is an object-compliant storage structure.
  • Each object class of the relational method is stored in a relationship.
  • the DBMS automatically assigns it a system identifier unique to the entire library. This identifier cannot be changed by the system or by the user during the life of the object.
  • the association between objects is manifested by storing the system identifier of another object in the object tuple.
  • the system indexes the related object classes. When the user requests to contact the query by " or IS", the system can use the join index to satisfy all the query requirements.
  • the simplest way to conform to an object's storage structure is to store it in the topological order defined in the logical model. It is suitable for the characteristics of multimedia resources.
  • the storage structure and access methods that are more suitable for the characteristics of multimedia resources include EXODUS B+ tree index structure or R+ tree index structure.
  • Multimedia Intranet Figure 2
  • MIRS multimedia indexing and retrieval system
  • MIRS multimedia intranet architecture is flexible and scalable to support a variety of services, query types, and content (features).
  • MIRS includes a large number of functional modules or managers. It can add new managers to extend the capabilities of MIRS. The new manager can remove or replace the original manager to update the functionality.
  • multimedia intranets Another feature of multimedia intranets is distributed, including a large number of servers and clients. Its storage media: replaceable hard drives, tape backup media, and optical disk archive media.
  • the multimedia intranet satisfies the independence of physical resources and the independence of logical resources, and also satisfies the independence of media resources.
  • the resource operating system of the multimedia intranet provides many new functions in addition to the same operations as the traditional network.
  • the Multimedia Intranet has an open function, moves the DB's Service Program Interface (API), and provides interfaces that are independent of peripherals and formats.
  • API Service Program Interface
  • the multimedia intranet contains a multimedia resource model for conceptual simulation and expression simulation.
  • the Knowledge Intranet (Figure 2) is a combination of artificial intelligence technology and resource library technology.
  • the Knowledge Intranet can serve resource device methods to a class of resource networks generated in the data processing field of science and technology.
  • the information stored therein is the resources generated and accumulated by scientific and technical personnel in various activities such as scientific research, experimentation and development.
  • the knowledge intranet has a representation method of knowledge; organizational management of knowledge systemization; operation, query and retrieval of knowledge resource equipment; knowledge acquisition and learning; knowledge editing; library management and other functions.
  • the fuzzy relational resource library has been well received in the fields of pattern recognition, process control, case detection, medical diagnosis, engineering design, nutrition consultation, public service and expert system. 7.
  • the extranet Figure 1
  • one or several U-machine networks (or their superior machines) of the unit partners are connected to the Internet through a separate machine. Then the unit's intranet and one or several high-performance networks of this unit partner, their respective machines and the Internet, build a credible "extranet (S 1). It contains the "procedures for inspection procedures" Or the identification of the partner of the same program such as "Source Encryption Program” and "Stop Decryption Program” and the identification of the unit's resource network will monitor the information of the incoming and outgoing network, and reject the illegal intranet. Access.
  • the identification machine of each unit of the unit and the network designated by the partner can also be equipped with the same standard procedures for unit identity authentication and authorization procedures, and each of these machines has IP addresses for each machine.
  • the system consisting of the remote client and the resource network of the program of the inspection program or the source encryption program and the sink decryption program is the resource access network dl).
  • the remote client After the remote client is connected to the Internet, it can log in to the unit's resource network.
  • the remote client of the user and the identification function of the unit resource network enable the information sent or received by the user to be transmitted or hacked by the ciphertext on the Internet to ensure the intended purpose of information transmission.
  • the computer software module can be installed on the remote client as a plug-in. Users can access and use the resource-optimized network on-demand via the Internet using resource remote clients.
  • Encryption and authentication methods with high encryption strength can also be used to ensure interoperability between remote clients and intranets or extranets via the Internet.
  • the public key cryptography algorithm (Public-Key Crypto-graphic Algorithms) is used for identity authentication and key exchange: symmetric encryption and decryption technology is used to encrypt and decrypt large-capacity information.
  • the remote client can be equipped with a tree unit identity authentication and authorization program according to requirements; the identification of the unit resource network is correspondingly equipped with the identity authentication and authorization procedure of the tree user, and these remote clients are included in each unit of the unit. And an access control list of the IP address table of the machine and the host address of each host name in the resource-optimized network that is allowed to access.
  • the function of the remote client and the unit resource network can make the information sent or received by the remote machine transmitted by the ciphertext on the Internet, ensuring the "high trustworthiness" of the information transmission and preventing the important resources from being stolen on the Internet.
  • the resource access network is used to provide remote users with secure access to the intranet. It is a private network that is not a fixed line. For different forms of access technology, this technology can be implemented by updating the access policy of the private network.
  • the digital line standard in telecommunications systems is different from the standard used in the Internet. Therefore, a special hardware is required to be installed in the identification machine as an interface between the Internet and the digital lines of the telecommunications company.
  • This device called the Data Service Unit/Channel Service Unit (DSU/CSU), consists of two functional parts, usually integrated on a single backplane.
  • the DSU port processes the data. It converts the data between the two formats; that is, the digital format required to convert the digital format on the Internet to the computer-like device of the Telecommunication Network.
  • the type of interface standard for the Internet depends on the operating speed of the telecoms network. If the data rate is lower than 56Kbps, the switching device can use the RS-232 standard. For rates above 56Kbps, the switching device must use a hardware interface that supports a higher rate (such as RS-449 or V.35 standard hardware).
  • the CSU port handles line interruptions and diagnostics.
  • the main way of integrating the mobile communication network with the Internet is to use the mobile terminal as a PC.
  • Hybrid network of fiber-optic coaxial cable in cable TV system (HF « is lack of coaxial cable to transmit TV programs to users, still at the analog level. Its Feeder network, the backbone network that selects fiber as the transmission medium; uses dense wavelength division multiplexing (DTO) fiber technology. While transmitting analog TV programs in the HFC network, digital TV and interactive TV can also be transmitted to provide three resource services of image, data and voice communication. Among them, in addition to signal modulation and demodulation, cable modems also have functions such as routing, bridging, tuning and encoding. HFC uses a cable modem to access the Internet through a modem. Not only does the data transfer rate be fast, but the three resources can not interfere with each other; it can simultaneously watch TV, access the Internet via the Internet, and make calls.
  • DTO dense wavelength division multiplexing
  • Resource mining technology and resource visualization technology utilize a corporate information warehouse (CIF). It is a system for inclusive operational data store (ODS), operational resource store (operational data store), data warehouse, resource warehouse, integration/transformation program I/T program interface, and operational environment. frame. It is logically combined by Data Elements and physically combined by a resource network.
  • the resource element is an attribute of the entity; it is a uniquely named, well-defined resource type consisting of resource items and included in the record of the behavior.
  • Resource mining technology is an extension of statistics; it has certain artificial intelligence and machine learning capabilities; it can solve service decision problems. Users can use Customer Relationship Management (CRM) software to analyze large resource pools and transform the information in the repository into service decisions that drive interactions with customers.
  • CRM Customer Relationship Management
  • MOLAP Multidimention Online Analytical Processing
  • ® cube n-dimensional space
  • MQLAP can analyze any number of dimensions simultaneously, and can view resources from the perspective of any number of dimensions.
  • Relational Online Analytical Processing replaces the multi-dimensional repository server with a large relational repository server.
  • This super-relational resource library contains comprehensive resources and detailed resources that allow the use of undercut techniques for resource sets.
  • customer tools in relational online analytical processing can dynamically generate synthetic resources that are not in the repository.
  • R MP provides powerful management tools and an open SQL interface.
  • Computer graphics is the source of many valuable products in virtual reality technologies such as entertainment and video games.
  • Resource visualization uses computer graphics to convert many columns of resources into images: a resource visualization model that is taken from a complex collection of large resources.
  • the combination of resource visualization and resource network technology enables dynamic, real-time 3D scenes in electronic surveillance facilities (JP traffic monitoring, hospital operating rooms, factory floors, etc.) to be captured via multiple video cameras placed in appropriate locations.
  • the image streams obtained from these cameras can be combined to form a dynamically changing 3D video stream through several techniques.
  • This dynamic information flow can be transmitted to a remote high-performance network or a remote client through a resource network or a resource access network.
  • the resource visualization environment connects key components together. These components are people, computer platforms, display devices, and storage systems; at the same time, the visualization environment allows resources to flow and transform smoothly between these components.
  • the technology of resource visualization is not specific to a particular area or unit. High-tech and new technologies in various fields require multidisciplinary, geographically dispersed research teams that mix results from complex simulations with observational data and manipulate these data sets. These depend on the new network system (resource network) and communication methods (using the machine).
  • Resource visualization is the screening of resources, from which to extract fine, and convert effective content into visual form to facilitate people to identify, understand, browse and observe more quickly.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Description

网络资源 技术领域 本发明涉及网络技术 (Network Technology)、数据库技术 Oatabase Technology) ,计算机 Computer) 技术、信息技术 Ctnfonnation Technology, IT)、互联网 (Internet)、电信网络、有线电视网络、集成电路 (1C)技术 等。网络资源也称为智能资源、网络数据库、分布式资源、分布式数据。
网络资源将广泛应用于利用互联网(Internet)和 /或公用无线网络(包括公用光网络)、或它们组合的系统而构建专 有网络的商务、政务、经济、工业、农业、医务、金融、企业、事业、服务等各个行业领域。
背景技术 在局部地理区域内的若干台计算机和数据库等组件,按照网络物理拓扑结构,通过接口电路与近距离传输 介质相连接而组成的,并且这些组件之间可以互相通信和共享资源的物理网络,称为局域网(Local Area Network, LAN) 。
局域网、计算机类设备和数据库等部件,按照网络物理拓扑结构,通过接口电路与远距离的传输介质相连接而组成的 并且这些部件之间可以互相通信和共享资源的物理网络,称为广域网(Wide Area Network, WAN) 。
采用中继 <hlay)、网桥(bridge)和交换 pitching)等技术来扩展局域网,按照网络物理拓扑结构,所形成的介 于局域网和广域网之间的网络,称为城域网 (Metropolitan Area Network, MAN)。
互联的同构网络和通过网关等互联的异构网络或者由它们组合的网络,称为互联网络(internetirork) 。
源于美国国防部高级研究计划署的计算机网络(ARPANET)扩展成的互联网络,称为互联网(Internet) 。
以下所指单位:是指政府、企业、事业、军队、团体、社区、组织、合作伙伴、个人等及其联合体。
一系列为用户直接访问而建立的反映某个单位业务规则中特定的信息或者功能的数据库,称为数据集市。
数据库和数据仓库是数据体系结构的核心,其用硬件和软件来控制各种数据体系结构功能的实现。
国际标准化组织(ISO)颁发的结构化查询语言(Structured Query Language, SQL)是关系数据库的标准语言。尽管 关系数据库有各种差异,但是仍然可以通过 s 对数据库操作。
各种数据库结构自成体系,并且不能通过因特网,使它们相互之间安全和可靠的互操作。
数据仓库(data warehouse, Dff):集成的、面向主题的具有决策支持(DSS)功能的数据库的集合。
数据挖掘 (data mining, DM):一种用于发现数据中新的、隐藏的或者未预期的模式的行为集合。
数据可视化(data visualization):将巨量数据转化为有意义的图像的过程。
"云计算(Cloud Computing) "是计算机远程访问模型; 由基础设施、平台和服务三个互相关联的部分组成。它不是 分布式计算模型。与其相关 "云资源"是资源远程访问模型;也是一种中心模型;不是分布式资源模型。
"云安全 Cloud Security) "是计算机远程访问安全系统;它需要解决四大难点:需要海量的客户端、需要专业的反 病毒技术和经验、需要大量的资金和技术投入、必须是开放的系统而且需要大量合作伙伴的加入。
群体智慧:一群独立的千差万别的个体做出某些好于专家的决定或者预测;是一种自组织系统之人工智能集合体。 生命元(generative):一种必须经过产生、成长、培育、给养而成的价值、品质或属性。
百科全书 ( iki):使用简化的标记语言让任何访问它的用户都可以贡献或修改其内容的网页集合。 网络日志(B g):使用标记语言对某些事件的描述,或其他诸如图形、视频一类的材料;是由个人维护的网页。 网络硬件、软件和终端设备所包含的人类对事实、概念、实体、可理解现象的记录、数据、信息等,称为资源(Data) . 硬件和软件是资源的基础设施,包括支撑系统和计算机设备等;软件也是资源服务的工具等。它可以存储、检索、处理、服 务(包括计算机数据库、数据挖掘、数据可视化、网络日志、百科全书等)。
同一领域的各个概念及其相互之间关系的形式化的一种表达体系,称为计算机信息科学中的本体,简称本体。它提供一 个共享的词汇集,可用来对领域建模:客观存在的对象与概念的类型,及其属性与关系等。
"高可信"的定义涵盖了 "可靠性"和 "安全性"两个方面。
无线网络中的无线终端、访问台、无线计算机类设备、无线交换机或无线路由器等,都自含有无线收发装置。
以下所指的公用网络:是指因特网(Internet)和 /或公用无线网络(包括公用光网络)以及它们组合系统。
发明内容 本发明任务是采用新型的网络互联 术和资源流技术等,将若干个资源优机网络等,分别通过辨机与同一 个公用网络相连接,构成各种资源网络。资源网络与电子资源器共同构成的资源的应用和服务系统,就是网络资源。
信息网络上以服务方式变成用户动态需求的有形物质或无形知识等的形式化表达,称为信息资源,简称资源。它包括存 储资源、计算资源、软件资源、数据资源、多媒体资源等;还有网络日志、群体智慧、百科全书、本体、生命元等。
单位采用网络物理拓扑结构,将网络的硬件和软件组成一个其拥有完全支配权的互操作的互联网络(Internetwork) , 称为其一个独立网络。它为局域网、城域网或广域网;可以是有线的或无线(包括光)的。单位可同时拥有若干独立网络。
在独立网络中,含有网络地址转换(Network Address Translation, NAT)程序的、功能配备最佳的或者人为指定的一 台通用计算机,称为该网络中优势功能计算机,简称优机。优机也是一台主机(host computer) 。
有并且只有一台优机的独立网络,称为优机网络。一般情况,优机网络采用局域网,或有线广域网等。
优机网络可以只是一台通用计算机,则该台计算机就是优机。它是优机网络的特例。单位可以同时拥有若干独立网络。 能够在一个独立网络中传输的信息资源,称为电子资源。例如电子商务资源、电子政务资源、电子机械资源等。
需要通过公用网络进行安全和可靠传输的信息资源,称为网络资源。例如网络商务资源、网络政务资源等。
若干个优机网络分别通过辨机,与同一个公用网络的路由器相连,组成能安全和可靠互操作 Ctnteroperability)系统, 称为单位的专有(私有)互联网络(图 1),简称专有网(Private Network) 。
专有网综合了优机网络的安全和服务质量,以及公用网络结构简单和成本低廉等优点,建立安全的信息通道。该系统的 信息流在通过公用网络时,是经过加密和 /或完整处理的。这就保证信息的保密性和 /或完整性。
业务程序或服务程序中不同功能的各个组件单元,称为业务元。驱使业务元在专有网中优机网络之间互相传送的软件架 构域软件模块),称为业务元调度。辨机提供业务元调度的接口和协议。这种接口是中立的:独立于实现业务元的硬件平 台、操作系统、编程语言。专有网中一个业务元的改变或失效不影响其他业务元。业务元调度分布于各个辨机中;是可互操 作的、独立的、模块化的、位置透明的、以通用和统一方式进行交互的。它是常驻辨机内存的具有独立服务功能的程序块, 软件架构是一个自包含的业务元集合。用户可以访问、使用这些业务元而不管它们位于何处。应用流程是业务元的组合。
专有网通过公用网络发送业务元,是基于辨机的 IP协议。它突破了业务元的私有技术对互操作性的限制。
若干个资源优机网络分别通过辨机,与同一个公用网络相连,组成能安全和可靠互操作的系统,称为资源网络(S1)。 能够对资源采集、运营、处理和存储的设备,称为电子资源器。资源网络和电子资源器构成的资源系统,称为网络资源。 根据单位资源应用或服务的需要,可以对资源网络动态扩展和配置组合并开展资源服务。
资源网络可以分类为:分布式资源网络、万维网(Web)资源网络、数据仓库资源网络、多媒体资源网络、业务元调度 资源网络和专用资源网络等。网络资源可以分类为:分布式资源系统、集中式资源系统或综合式资源系统。
资源网络的备份系统,可以由备份客户端、主备份服务器、介质服务器、备份存储单元和备份管理软件等组成。
1、分别与优机(或其网络)和公用网络互相连接的、并控制它们之间能够安全和可靠地信息互操作的通用计算机,称 为能辨别身份的通用计算机,简称为辨机(图 1) 。
与辨机相连的公用网络 包括辨机),称为辨机网络。辨机通过控制功能,实现优机网络之间可以 "高可信"互操作, 辨机可以是对等机(Peer) ,也可以是客户机类计算机(client—ciass computer)或服务器类计算机。
辨机解决了利用因特网组建的单位资源的专有网中的安全性、真实性、匿名性和可分性四个关键的技术问题。
资源安全(Data security)是指对资源设备中的资源信息的保护, 以防止未授权的泄露、修改或破坏。
对于小型优机网络,优机的软件模块可以直接插在辨机的扩展功能槽上。辨机与优机可以合并为同一台辨机。
1. 1《检查程序的程序》功能:宿端的辨机对明文信息进行检査,发现其中的任意程序,都把它们排列在一起,并且依 次循环地存放在外存储器中的固定区域,将其中第一道程序呈现在指定的信息显示屏上。如果该程序是允许其访问的合法程 序;则用户在第一次出现提示时,选择"以后都允许"复选项,辨机以后碰到这个程序时,不会再次询问,并允许其访问. 当用户在一定时间内没有答复或者选择 "^允许"复选项,辨机就丢弃该程序。宿端辨机运行〈验査程序的程序》,可清除 计算机病毒,从而防止病毒攻击辨机保护的优机网络。
1.2《源端加密程序》功能:源端辨机把欲通过公用网络发送的明文信息后面,添加对称加密的密钥;将此组合数据输 入单向散列函数(MessageDigest),得出散列 (Hash)值 为源端散列值);将明文信息 (^包含密钩)后面添加源端 散列值,用密钥进行加密,变成密文;将该密文通过公用网络送行宿端辨机。
《宿端解密程序》功能:宿端辨机用事先约定的共享的对称密钥,将接收的密文解密变成明文,得到明文信息和源端散 列值;把明文信息 包含散列值)后面添加密钥;将此组合数据,输入事先约定的单向散列函数,得到散列值翁为宿端 散列值);该宿端散列值与接收到的源端散列值相比较;如果这两个散列值相同;则确认该信息是从合法源端辨机发出的, 接受该信息; 否则丢弃该信息。
1.3《对用户的身份认证加密和授权程序》功能:用户(指其他单位、合作伙伴单位或者远程客户)对其在某单位留下 的密码,用用户私钥加密,作为用户的数字签名;用单位公钥对数字签名、用户名、用户公钥和对称密钥加密,作为密件; 将明文信息用对称密钥加密,作为密文;源端辨机将该密件、密文;通过互联网,传给宿端辨机;该辨机用私鉬对密件进行 解密,得到用户名、用户公钥、对称密钥和用户数字签名;利用用户公钥将用户数字签名解密,获得用户密码;该宿端辨机 将用户名、 IP地址和用户密码,与单位保存的相关信息对照。如果完全正确,单位确认该信息是用户发出的;然后用其中 的对称密钥将密文解密,得到用户发送的明文信息;辨机通过访问控制列表,确定用户权限;再通过宿端优机,转给相应权 限的计算机。否则丢弃该信息。
1.4《对单位身份认证加密和授权程序》功能:某个单位用其私钥对用户(指其他单位、合作伙伴单位或者远程客户) 在该单位留下的密码加密,作为单位数字签名;将用户的公钥对单位数字签名、单位名、单位公钥和对称密钥加密,作为密 件;将明文信息用对称密钥加密,作为密文;源端辨机将该密文、密件;通过互联网,传给用户的客户机域者其他单位辨 机);用户用其私钥,对密件进行解密,得到单位名、单位公钥、对称密钥和单位数字签名;用单位公鉬将单位数字签名解 密;得到用户在单位留下的密码;然后用户 域者其他单位辨机)将密码与其预留在单位的密码对照。如果完全正确,则用 户确认该信息是单位发出的;用对称密钥将该密文解密,得到单位发送的明文信息。否则丢弃信息。
1.5《源端分级加密程序》: 明文信息中安全等级高一级的段落,首先用另一把共享的对称加密算法的密钥,将该部分 段落进行加密他可用非对称密钥等方法);在该部分段落加密的明文后面,添加指示加密段落位置的数列或者符号,再添 加密钥,求出散列值(源端);后面部分同《源端加密程序》功能程序。
《宿端分级解密程序》:前面部分同縮端解密程序》功能程序;接着将部分段落加密的明文后面,添加加密段落的指 示位置的数列或者符号,再添加一把事先约定的密钥,求出散列值(宿端)。该宿端散列值与接收到的源端散列值相比较; 如果这两个散列值相同;则确认该信息是从合法源端辨机发出的,接受该信息;否则丢弃该信息。如果接受该信息;分别用 另一把事先约定的共享的对称密钥,对相应位置的密文解密,就得出整个明文。
辨机可以根据具体资源服务需要,选择以上五套程序中的任意一套程序或者由它们组合的各种不同程序组。
1.6辨机还会详细记录所有的外部访问;同时防止因特网上外部信息的非法访问。它使外界优机或者单位的资源设备对 于其优机网络的访问, 只能先集中在辨机上;保证资源优机网络上的所有优机或者资源设备的 "高可信"。
1. 7辨机还允许与其相连的优机,通过因特网,传送和接收本系统的其他资源优机网络的各种不同的加密信息。
《检查程序的程序》称为辨机标准程序。 《源端加密程序》和《宿端解密程序》也称为辨机标准程序。
现有的防火墙(包括硬件设备、相关的软件代码和安全策略)无法防御计算机病毒攻击,是其主要缺陷。
2、将一台优机、若干台浏览器、客户机、资源服务器、资源计算机类设备等,采用网络物理拓扑结构技术,通过介质 (可以是有线的或无线的)互相连接而形成的私有独立网络,称为资源优机网络(图 1) 。
资源库(包括数据库、软件库、网络日志库、群体智慧库、百科全书库、本体库、生命元库等)的硬盘,是存储和备份 资源的设备和场所。足够大的硬盘空间是实现资源设备功能的前提:较高的输入 /输出 α/ο)处理能力是保证资源设备效率 的必要条件。由于服务器的内存容量和微处理器的性能也对资源设备的效率有影响。因此,所选资源设备和服务器性能,必 须与资源规模相匹配等。
资源设备或服务器可以是资源优机网络中资源的目的端,也可以是资源的源端。优机网络中的浏览器,可以把电子资源 器上的资源信息,发送到资源网络的资源设备上;或者将用户需要的资源,通过浏览器递交给用户的电子资源器。
资源优机网络可以采用的网络操作系统(NOS): UNIX, Li腹或 Windows;它可以根据需要选择适合的操作系统。 资源优机网络具有互操作性(interoperability)、可移植性(portability)、可扩展性(expandability)、可縮放 性(scalability)和即插即用(plug&play)特征。它一般是以分布式控制为原则,可以采用系统、子系统和模块分级式 的控制结构;其构造是可移植的和透明的;并提供一种不依赖于具体资源设备结构的中性机制平台,是一种崭新的构造方式。
依据优机(专有)网络原理, 同一个资源优机网络中的任意一台服务器都可以对资源业务和资源设备进行操作。 构建资源优机网络需要遵守一些核心设计理念:简单、灵活、可扩展、模块化。
利用资源优机网络对单位的资源业务的可重构性和资源通信的兼容性,可以为大批资源业务和服务采集或提供资源。 资源优机网络向单位(包括公众)提供资源业务;它解决各行各业所面临的资源库(包括数据库)的封闭性问题。 资源优机网络是一个完整的体系结构。它包括资源的源端、资源的抽取和转换工具、资源建模工具、资源的存储设备 资源设备管理工具、资源访问和分析工具等主要组成部分。各个组成部分互相依存,组成一个有机的体系。根据优机网络的 服务目标,确定相关模块和接口,达到资源的高效利用, 为资源深入分析和决策提供最可靠的支持。
资源优机网络中的资源设备和计算机类设备相互之间也可以直接进行通信和信息交流。
辨机将各个优机网络的差异,通过网络协议转换而进行统一的业务或服务的管理。人们可以在专有网的任意优机网络上 开发程序, 并可以随时方便地在各个优机网络之间进行资源调度,实现资源的按需分配。开发的程序可以被专有网共享。
2. 1资源优机网络根据具体情况,可以采用客户 /服务器模式(Client-Server paradigm, C/S)或者浏览器 /服务器模 式 (Browser - Server paradigm, B/S)。
2.2资源优机网络根据具体情况,可以采用业务元调度技术。业务元调度是一种技术积累,包含了从结构化编程到客户 端 /服务器模式以及程序设计方法的全过程。它是一种全新的软件模式:业务元在优机网络上是应用或服务程序的组件。业 务元可以透过主机的 "窗口",将它的应用编程接口(Application Programing Interface, API)分享出来,直接给优机 网络上的其他应用或服务程序调用。这种技术可实现 <不论资源应用或服务采用何种软件,使用何种硬件,都能在资源优机 网络中无缝地集成在一起"。各个优机网络中传输信息的标准可以不同,但最好是基于互联网协议。
2.3资源优机网络根据具体情况,可以采用 Web2.0湎向服务架构 S0A)技术。 Web2.0提供了一个 ^物皆资源"平台; 用户变成为 '参与者" 卿生产者与消费者)。各个用户主动地向资源库贡献内容,共同主动地创造资源库的价值。优机网 络成为资源服务共享的平台,是一种可读可写的网络。在资源优机网络中百科全书(Siki)常用来创建协作性的网站,提供 社区网站;网络日志只允许添加评论,不许修改资料。优机网络具有创造性、交互性、安全性的资源共享、合作和网络功能。
2.4资源优机网络根据具体情况,还可以采用智能代理技术 Φ分布式人工智能)。智能代理可以被集成于含有解决问 题的特殊的功能单元、资源设备与优机中。智能代理技术支持资源与知识的技术揉和。它也可以使吸收推理能力 如将商 业规则包装于代理之中)变得更为简单。智能代理也可在基础实施(自适应地选择路线)与程序(g适应的用户界面)这两 个层面上包含学习与自我促进的能力。优机网络处理的资源信息,有时不包含在应用或服务之间交换的商业资源之中。相反 它们包含低级事件的信息。这些低级事件由智能代理组合成一定模式,可能因群体智慧而显示出高级的商业智能。
在优机网络中,群体智慧基于资源优机网络的低级事件可生成资源智能。
本体为资源优机网络提供能够被计算机所理解的确定的语义 ( eta data);智能代理技术可完成语义所规定的资源服 务。专有网中的信息抽取,可以实现一批全新的搜索技术。它可以避免现有的从搜索弓 I擎返回结果中进行繁琐的极易出错的 筛査工作。智能代理可以被集成于含有解决问题的特殊的功能单元、资源设备和资源优机网络中。专有网可以处理随着因特 网而出现的大量非结构化资源类型(如图像、音频、视频)。
资源优机网络是第三代基于互联网的资源应用或服务。它利用电子资源器,实现资源可读、可写、可执行的功能。
3、某个单位的若干个资源优机网络(或者其优机),分别通过辨机,与同一个公用网络的路由器相连接,组建成的这
Sft机网络之间能够 "高可信"互操作的专有网,就是资源网络(图 1) 。
优机网络通过辨机接入公用网络的方式,是一种发生了质的变化的方式。辨机具有将与互联网协议 αρ)不同的优机网 络的协议,都转化为互联网协议的功能。每一个资源优机网络域者优机),都通过辨机的协议转换功能,与公用网络互通。
资源网络满足交互式应用和稳定性要求;具有互操作性;可以区分一个具体资源文件的各部分不同安全性要求;可以使 用公钥基础结构,进行认证和密钥分配。
资源网络中不同优机网络中的两台计算机之间,通过同一个公用网络的 "高可信"的通信(图 1)如下: 从源端计算机发送的信息;经源端优机,到达源端的装有嫌端加密程序》等的源端辨机;经过加密之后;通过公用网 络;到装有縮端解密程序》和啦查程序的程序》等的宿端辨机;信息经过解密和检查病毒后;转到宿端优机;最后到达 宿端计算机。辨机拒绝非法对资源优机网络的访问。
资源网络具有:可自愈、辨机驱动、多方租赁、面向服务、虚拟化、线性扩展等特征。它向单位泡括公众)提供资源 业务;它可以解决各行各业所面临的专用网络中的数据库封闭性的问题。
专有网可以实现基础设施即服务 infrastructure as a Service, IaaS)、平台即服务 Platform as a Service, PaaS) 软件即服务(Software as a Service, SaaS) 。
将优机网络中的服务或个性化的信息组件结合起来,通过融合了的业务元调度与 Web 2.0功能的用户接口,将它们、提供 给用户的能力,称为揉和。揉和不但用于辨机的软件,也用于商业的应用软件。软件揉和使得商业揉和成为可能。例如、卫星 定位系统的电子地图为实际资源信息添加位置信息, 以此产生新的、独特的、不为之前的任何一种信息源所提供的服务。
现有的防火墙或者虚拟专用网(VPN)技术,容易被黑客采用 "反端口"技术攻克,入侵到防火墙后面的计算机中。 资源网络还可以具有以下性能:
3. 1资源网络可以采用业务元调度技术。其中资源服务流程指协作性的、事务性的、为客户利用或创造价值的、完整而 动态调整的业务元集合。资源网络使用业务元调度,通过标准化、流程化和自动化的耦合组件为用户提供资源信息。
业务元调度使得用户的资源,可以被直接转换成为能够通过网络访问的一组相互连接的资源模块。资源网络中可以只有 本地优机网络是业务元调度的优机网络(本地网);或者两个以上优机网络是业务元调度的优机网络(外地网)。
3.2资源网络中资源、数据、应用和服务都分别存储在各个资源优机网络中的某些设备上。并行计算、集群计算、服务 性的硬件或者网格计算 (Grid Computing),要求所有的分布式资源能够统一地管理。辨机可以使优机网络之间的差异和兼 容性对公用网络是透明的,从而允许资源网络对不同的优机网络进行统一的管理。这些资源可以动态扩展和配置;实现在逻 辑上以单一整体形式呈现的特性。同时各种资源和服务驻留在各自的优机网络中,可以通过辨机有效地形成了隔离。一个与 优机网络相连的辨机崩溃,不会影响到该优机网络的服务,也不会影响到其他优机网络中资源服务的正常运行。
3.3资源网络可以将软件直接提供为资源服务。软件即服务(Software as a Service, SaaS); "软件资源"被打包 为可重复的商业任务或商业流程步骤。对于中小型单位,可消除购买、安装和维护基础设施、中间件和程序的投资环节。 "长 尾理论"是 SaaS在商业上取得成功的理论基础。任何企业无需配备专业人员进行管理,却可以获得最新的技术应用。
3.4客户机或优机网络接入互联网,是用户获取资源网络中丰富资源的基础。资源网络的稳定性、可靠性、安全性、可 用性、灵活性、可管理性、自动化、节能环保等以及互联网随时随处可用,可以实现跨地域的资源共享与资源提供等。
4、网络资源是资源网络与电子资源器共同构成的服务系统。电子资源器具有采集、运营、处理和存储资源等功能。 网络资源符合资源管理方式。对于跨地区或者全球性单位资源设备,它们之间联系紧密。其管理方式既有局部的分散管 理,又有全局的协调控制。网络资源满足了这种需要局部处理和全局处理能协同工作的资源系统。
网络资源可以提高性能价格比。随着单位资源业务的扩大,资源量呈爆炸式增长。如果大量资源集中存取咖远程访问) 将对主机性能的要求越来越高,甚至原来的主机无法满足要求而不得不被抛弃。利用网络资源,可以使众多的已有设备和环 境可以联合工作,可以获得更高的性能价格比。资源通过电子资源器,可以脱机使用。
商业流程 (Business Processing)是协作性的、事务性的、为客户创造价值的、完整而动态调整的工作单元的集合。 网络资源中商业流程指如何完成资源的配置和调度等各种工作和服务。在以工作为导向的架构中,工作单元取代了功能化的 在网络资源中商业流程管理(Business Process Management, BPM)是用于管理资源的商业流程(发现、设计、部署、 分析、优化)的整个活动周期的技术。它首先是而且主要是一种整体的由流程管理的商业模式。
网络资源中的资源设备是物理分布在各个优机网络上的。每一个优机网络都是一个集中式(或者分散式)资源系统;具 有自治处理的能力,可以完成本地优机网络的局部资源业务。而这些优机网络并不是互不相关的;它们构成一个逻辑整体, 统一在资源优机网络系统软件管理下,共同参与并完成全局资源业务。
优机网络中资源设备的逻辑集合,由两部分组成:一是关于服务所需要的资源的集合,称为物理资源设备,是资源优机 网络的主体;二是关于资源结构的定义, 以及全局资源的分片、发布的描述,称为资源字典(Data dictionary)„
网络资源具有如下特点-
4. 1资源不是存储在一个优机网络中而是分散存储在由同一个公用网络连接的多个优机网络上。
4.2资源在物理上是分散的,但它们是一个逻辑整体。网络资源对资源处理是在统一逻辑框架上进行的。
4.3优机网络的资源由其本地的服务器管理,具有自行处理能力,可以完成本地优机网络的应用或服务。
4.4通过公用网络传输的信息流,也可以是经过完整性处理的; 以保证信息的完整性。
4.5网络资源还可以具有身份认证的功能,以保证信息的真实性。由于集中式数据的局限性越来越明显,迫切需要一种 局部处理和全局处理能够协同工作的资源服务系统;网络资源正是这种需求的体现。
现有的数据库系统无法通过公用网络进行 '寫可信"的互操作。它不适合进行病毒检测;无法防范数据驱动型病毒攻击。
5、能够与优机网络进行资源信息交互的可脱机使用的通用计算机,就是电子资源器。它是具有资源采集、资源运营、 资源处理和资源存储等的软件并能够显示信息的微型计算机。它具有微处理器 (Microprocessor Unit, 简称 CPU)、信息 显示器;其集成电路含有数据存储器€EPR0M)、工作存储器(RAM)和程序存储器(EPRd)的电路。它还可以增加输入按 键等。电子资源器程序包含辨机的标准程序;还可以有信息完整检查程序。它可以直接插在资源浏览器的专门插槽上,与资 源网络协同工作。电子资源器的存储容量一般为 64KB以上。
电子资源器解决了脱机信息的安全性、保密性、匿名性和完整性等关键的技术问题。
电子资源器还可根据需要,增加身份认证等的硬件和软件;保证其信息传输的可分性和真实性。
电子资源器既需要联机进行信息处理,又不需要联机授权处理。因此允许它脱机使用。
电子资源器的输出域者输入)插头,能够插入其他电子资源器的输入域者输出)插槽中,它们可直接交互资源信息。 电子资源器也是一种商业流程管理系统(BP S)。它能够跨越多个机构向单位的领导和工作人员显示适当的工作流程: 给领导是一个指导性的系统;给工作人员是一个有助于他的决策和运营的内容。它可以完成战略决策、工作计划、任务制定、 资源处理等。现有的单位中完成战略决策、工作计划、任务制定、资源处理基本是手工完成的。
现有的数据存储设备由于受硬件、软件和网络技术与环境的限制,实现联机或脱机工作仍是困难重重。
电子资源器还可以具有:
5. 1电子资源器可以在资源优机网络的资源浏览器上,存取本地优机网络中的资源信息。它也可以通过公用网络,输 入或输出外地资源优机网络中的资源信息。
5.2电子资源器的 CPU对信息的加密处理、完整检验和身份认证可以采用新方法。
5.3电子资源器由密码方式保护。持有人如果将电子资源器丢失或者损坏,其中资源信息并不会泄密。 5.4电子资源器还可以采用数字签名和访问控制策略等程序;并且借助应用层,对传输的各种信息实行安全性等级管 理。它对于一个信息中的某些部分段落,可以根据其不同的安全等级,进行相应的安全加密。
5.5电子资源器以独立方式或者联机方式进行工作-
5.5. 1独立工作的电子资源器,不与资源浏览器相接触。电子资源器之间依靠其存储器中的软件独立运行。它们可以 通过其不同的输入接口与输出接口直接进行连接。这种电子资源器具有读、译其所有的逻辑功能,能独立检验各自电子资源 器的合法性和持有人的身份。
5.5.2联机工作的电子资源器,插进资源浏览器上的专用插头上。资源浏览器通过专线、电话线路等,可以直接与资 源优机网络相连。每笔资源服务均由电子资源器实时传输到资源优机网络进行处理,文件可以实时更新。电子资源器对其持 有人的身份识别,还可以采用指紋扫描、声音确认和虹膜认证等生物测定技术。
5.6电子资源器的安全软件,也可以具有对电子资源器持有人进行检验个人身份证识别号 (personal identification number),而确定持有人合法性的功能。它可以含有并且显示个人二代身份证号和其中个人相片,实行实名制。
5.7电子资源器的存储容量高,足以存储所需的软件、身份证的全部信息和多次存取资源信息和服务费的所有记录。 它的硬件有电压和时钟检测器、曝光自动死机逻辑、防解剖等加密措施;软件有密码保护、安全加密算法等加密方法。
电子资源器制作容易、成本低、使用寿命长,可以重复使用。
6、单位总 及其分支机构的若干个资源优机网络和特定功能的优机网络等,分别通过辨机与同一个公用网络的路由器 相连接,共同构建一个 '寫可信 "互操作的单位内部的资源内联网络,称为资源内联网络(®2);简称内联网。由于特定 功能的优机网络不同,就形成不同类型的内联网系统: Web内联网、业务元调度内联网和多媒体内联网等。
内联网中各个辨机可以装有相同的《检查程序的程序》和 /或《源端加密程序》 《宿端解密程序》标准程序。这样,每 台辨机对进出资源优机网络或者特定功能优机网络的信息进行监控,并拒绝非法对单位内部网络访问。
现有的各种数据内联网络是封闭式的网络;其无法或者很难描述非结构化资源类型。现有的关系数据库模型太简单,不 利于表达复杂的多媒体结构。现有的 "云"技术只是一种远程访问技术。
内联网根据需要,还可以有分布式资源库 (Distributed Data )系列:万维网 (Seb)内联网、多媒体内联网、业务元 调度内联网、知识内联网、模糊内联网和专用内联网等各种类型。
6. 1特定功能优机网络主要是含有 Web数据库系统的内联网,称为 Web内联网(图 2) 。
在 B/S模式中也可以出现一种新的资源服务模式:采购资源库服务 (Outsourcing)。它可以向用户提供 Web服务器和 资源库的接入服务:用户注册后,会得到一个用户名、口令、域名和一定的磁盘与资源库空间。用户可以用浏览器登录该资 源库;开发自己的服务程序:也可以在本单位开发完成后,再上传到服务器的指定目录中。这样,用户只要集中精力于服务 程序的开发工作,而不必考虑服务器的管理、维护和资源备份等工作。它为提高中、小单位的资源服务水平提供了很好平台。
Web内联网技术综合了关系网络和因特网技术的优点,融合了因特网技术、存储技术与检索技术的成果,以全新的功能 结构来适应以因特网为基础的资源服务。通过 Web技术来访问资源库,不需要开发专门的客户端程序;资源服务可以通过浏 览器来实现。用户能方便地访问资源库信息: Web信息的组织方式是 HTML语言,使用的 Web服务器与浏览器均遵循这个标 准;各种操作系统上都有现成的浏览器可供使用,为一个 Web服务器书写的 ΗΊΜί文档,可以被所有平台的浏览器所浏览, 可以实现真正的跨平台操作。
现有数据库系统模型简单,不利于表达复杂的数据结构。它除了结构化的数字或者字符,无法包容更多的数据类型。 6.2特定功能优机网络主要是具有业务元调度功能的资源库系统的内联网,称为业务元调度内联网(图 2) 。
业务元调度内联网是业务元调度技术与资源网络技术相结合的产物。它采用业务元调度的程序设计方法,以一种稳定的 客观存在的业务元为基本元素,并以 "类" '和 "继承"表示事物间具有的共性和它们之间存在的内在关系。
业务元调度内联网满足两个标准:首先它是一个资源库系统,具备资源库系统的基本功能;其次它是一个业务元调度系 统,支持完整的业务元调度机制。一个业务元调度内联网是一个可共享业务元的专有网。
业务元调度内联网,还可以将资源作为能自动重新得到和共享的对象存储,包含在对象中的是完成每一项资源服务处理 指令。这些对象可能包含不同类型的资源,既包括原有的数据和处理过程,也包括声音、图形和视频信号。对象可以共享和 重用这些资源。业务元调度内联网的这些特性,可以通过重用和建立新的多媒体资源应用或服务能力,使软件开发变得容易, 这些应用可以将不同类型的资源结合起来,完成各种任务。
现有的面向对象数据库系统不能与关系数据库兼容,没有提供使关系数据库和面向对象数据库相互转化的 "通道" 或 "桥",以便用户根据需要,发挥两种数据库各自的优势。同时它不支持 SQL,需要与 SQL不同的程序接口。这就失去通用 性方面的优势,使其应用领域受到很大限制。
6.3特定功能优机网络主要是多媒体(Multimedia )资源库系统的内联网,称为多媒体内联网(图 2) 。
多媒体内联网的对象可以从传统的单一的字符类型的信息媒体发展为包括图形、图像、声音和字符等多种类型的信息媒 体。它综合多媒体技术和资源库技术;是一个由若干多媒体对象所构成的集合。其中多媒体资源对象按一定的方式被组织在 一起,可为其他服务所共享。
多媒体内联网主要特征为-
6.3. 1能表示和处理多种多样媒体资源。多媒体资源在计算机内的表示方法决定于多媒体资源所固有的特性和关联。对 常规的格式化资源使用常规的资源项表示;对非格式化资源,如图形、图像、声音和视频等,就要根据多媒体的特点来决定 表示方法。同时同种媒体也会有不同的存储格式。
6.3.2能反映和管理各种媒体资源的特性,或各种媒体资源之间的空间或者时间的关联。在客观世界里,各种媒体信息 有其本身的特性或各种媒体信息之间存在一定的自然关联。这些关联包括时序关系咖时间上的同步特性)和空间结构咖 相关信息集成在一个合理布局的表达空间内)。
6.3.3能提供比传统数据库管理系统更强的适合非格式化资源査询和搜索的功能。它允许同时搜索多个资源库中的资 源,允许通过对非格式化资源的分析建立图示等索引来搜索资源,允许通过范围、知识和其他描述符的确定値和模糊値搜索 各种媒体资源等。这些资源之间能交叉调用和融合访问。
6.3.4能实时交互。没有多媒体资源与用户之间的交互性,就无法利用多媒体资源。
6.3.5能提供资源服务处理与版本管理的功能。
现有的大多数多媒体数据库管理系统只限制在特定的多媒体服务领域。多媒体的服务领域还只涉及到对多媒体文件的处 理,很少有利用多媒体资源库作为多媒体资源的源泉。
6.4特定功能优机网络主要是知识资源库(Knowledge Database)系统的内联网,称为知识内联网(图 2) 。
知识内联网能够把由大量的事实、规则、概念组成的知识存储起来,进行管理,并向用户提供方便快速的检索、査询等 手段。它是针对某一 (或某些)领域问题求解的需要,采用某种域若干)知识表示方式在计算机存储器中存储、组织、管理 和使用的互相联系的知识集合。这些知识包括与领域相关的理论知识、事实资源, 由专家经验得通 启 Jl^ft退等。 知识内联网具有智能性,其特点为:
6.4. 1根据知识的服务领域特征、背景特征、使用特征和属性特征等,而被构成便于利用的、有结构的组织形式。知识 资源库一般是模块化的。
6.4.2知识资源库中的知识一般是有层次的。最低层是事实知识, 中间层是用来控制事实的知识,最高层次是策略,它 以中间层知识为控制对象。策略被认为是规则的规则。
6.4.3知识资源库中有一种不只属于某一层次(或者在任一层次都存在)的特殊形式的知识一可信度。对某一问题, 有关事实、规则和策略都可标以可信度。因为在资源库的处理中一切都属于确定型的;所以不存在不确定性度量。
6.4.4知识资源库中存在一个通常被称为典型方法库的特殊部分。如果对于某些问题的解决途径是肯定和必然的,就可 以把其作为一部分相当肯定的问题解决途径,直接存储在典型方法库中。这种宏观的存储将构成知识资源库的另一部分。在 使用这部分时,机器推理将只限于选用典型方法库中的某一层体部分。
现有的具备对知识的表示方法;对知识系统化的组织管理;知识数据库的操作、査询和检索;知识的获取与学习;知识 的编辑;库的管理等功能。但知识数据库系统是封闭的、只能在专用网络上进行传输。
6.5特定功能优机网络主要是模糊资源库系统的内联网,称为模糊内联网(图 2) 。
模糊资源库是资源库技术和模糊理论的结合。模糊性是客观世界的一个重要属性。模糊内联网是存储、组织、管理和操 作模糊资源的网络。模糊内联网中资源结构和资源联系、资源上的运算和操作、对资源的约束(包括完整性和安全性)、用 户使用的资源库窗口、用户视图、资源的一致性和无冗余性的定义等都是模糊的。精确资源是模糊资源的特例。
模糊资源库系统具备对模糊资源的表示方法;对模糊系统化的组织管理;对模糊资源库的操作、査询和检索;对模糊资 源的获取与存储;对模糊资源的编辑;对模糊资源库的管理等功能。
现有的数据库技术的发展呈现出与多种学科知识相结合的趋势,凡是有数据(Γ义)产生的领域,就可能需要数据库技 术的支持。它们相结合后,就会出现一种新的数据库成员。但整个系统还不能通过互联网进行 "高可信"的传输。
6.6当特定功能优机网络技术被应用到特定领域时, 出现工程资源库(Engineering Database)、 地理资源库、统计 资源库 (Statistical Data base)、科学资源库、空间资源库(Spatial Data base)和文献资源库等内联网。
现有的特定领域中数据库采用防火墙技术,无法防御计算机病毒的攻击,是其主要缺陷之一。
6.7在内联网中各个辨机还可以装有相同的树单位身份认证和授权程序》等程序,并且每个辨机中都有这些辨机的 IP 地址表和与其相连接的资源优机网络或者特定功能优机网络中的各个主机名称域者地址)和访问控制列表。辨机都会对进 出资源优机网络或特定功能优机网络的信息进行监控,并且拒绝非法对内联网的访问。
现有的防火墙技术容易被黑客采用 "反端口"技术攻克,入侵到防火墙后面的计算机或者数据库。
7、单位的资源网络或者内联网,与合作伙伴的一个或几个优机网络,分别通过辨机与同一个公用网络的路由器相连, 构建一个"高可信"的信息互操作的外联网络,称为单位资源外联网络,简称外联网(图 1) 。
与专有网一样,辨机可根据需要而含有标准程序、身份认证程序、授权程序及其组合体。
外联网可以通过质量追踪系统,将资源质量的反馈融入到修改系统中,通过改进获得更好的资源。
现有虚拟外联网络技术,对于通过伪装外联网络或者专用网络的地址进行非法的访问和欺骗,无能为力。
8、与同一个公用网络(包括无线、光网络)相连接的单位远程客户机,能够登录资源网络或者内联网,实现它们之间 "高可信"信息互操作。这些客户机和内联网共同组成系统,称为资源访问互联网络,简称资源访问网(图 1)。
资源访问网是由装有辨机的〈验査程序的程序》、 親端加密程序》和縮端解密程序》等软件的远程客户机,连接到 因特网的路由器,与资源网络或内联网组成的系统,用于提供远程用户与内联网的 "高可信"互操作。
远程客户机还可以装有辨机树单位的身份认证和授权程序》的软件等,能够识别从互联网进来的各种不同身份的信息。 辨机软件会对进出资源优机网络、远程客户机的信息进行监控,并且拒绝非法访问。
8. 1远程客户机身份验证要实现的授权访问方法: 因特网上的访问信息,要经过其辨机软件进行身份认证和授权。
8.2远程客户机实现文件中的部分段落不同的安全等级方法:其辨机软件能够进行相应的安全加密。
现有的远程访问技术,客户机只能对一台计算机进行访问。资源访问网中客户机,可以对许多优机网络访问。
9、资源优机网络通过辨机,接入公用网络,形成资源网络,也适用于电信网络和有线电视网络中的接入网, 以及其他 的各种接入网。优机网络作为人类商业交互新平台,使现有的行业界限变成模糊不清。它可以将公司的商业流程流线化而产 生廉价的、优秀的、快捷的产品与服务。客户、零售商、分销商、生产商整合成一个商业系统。
9. 1电话交换网(PSTN)、综合业务数字网(Integrated Services Digital Network , ISDN)、窄带 N— ISDN、数字 数据网(■)、喊中继(FR)网、异步传输模式(ATM)网等的输出接口,与优机相连接,就是电信优机网络。
各地电信优机网络分别通过辨机,接入公用网络的路由器,就构成电信资源网络。用户可获取其中各种各样的电信资源。 现有的电信接入网是一种封闭式的网络;网络节点过多,用户数据分散,维护管理困难;业务开发复杂, 能力有限;其 中大量的交换机面临淘汰的命运。
9.2有线电视网络中光纤同轴电缆混合网络(HFC)等的输出接口,与优机相连接,就是电视优机网络。它是一种高速 廉价的综合网络;具有频带宽、容量大、多功能、低成本、双向性、支持多种业务和连接千家万户的优势。
各地电视优机网络分别通过辨机,接入公用网络的路由器,就构成电视资源网络。用户可获取其中丰富多彩的电视资源。 现有的有线电视网络也是一种封闭式的网络;是一个专门传送模拟电视节目的网络,采用单向广播型。
10、资源挖掘(Data mining)是利用原始资源推导而发现新的、重要的服务关系和被隐藏资源的过程。它是功能强大 的资源分析技术的集合。这些技术可以用于分析和开发极其巨大的分布式资源网络。
资源可视化 (Data visualization)是为了揭示资源本质关系模式,而使用动态图像表示的一种过程。它可以将巨量 资源的数据转化为有意义的图像。这些技术可以使特定的大量资源数据转化为有意义的分布式形状或图像。它包括层次资源 的可视化、多维资源的可视化、文档资源的可视化、 Web可视化等。
优机网络中的资源挖掘和资源可视化的所有资源,通过辨机可以在公用网络中进行 "高可信"互操作。
具有资源挖掘和资源可视化的资源网络是分布式网络、即求即应式网络、集群网络、 自主网络、公共服务网络等。
10. 1资源挖掘是从现有资源库中发现新的、隐藏的或者未预期的新资源的行为和过程。资源相关(Data correlation) 是资源的两个或多个变量之间的各种数学关系。一个元素可以同时与多个变量(时间因数、地理因数、人口统计因数等湘 关。例如它可以是一个元素与另一个元素相关;一个元素与另一个跨越不同时间间隔的元素相关;一个元素与一组元素相关; 一个元素与一个地理区域相关;一个元素与外部资源相关;一个元素与人口统计学上的分段人口相关等。资源挖掘采用互相 组合的一组技术,利用资源相关(Data correlation)而从资源库中提取最有价值的内容。 10.2资源可视化:将巨量数据转化为有意义的图像的过程。原始资源可以来自于很多个不同的资源库,包括卫星照片, 水下音感测量装置、测量图或者计算机仿真等。这些资源的信息和模式,具有很大的数量与复杂性。资源可视化技术通过将 物理属性与资源相对应,利用人类的视觉系统来辅助分析复杂的资源集合。这种从原始资源创建多维构造和模型的能力,可 将资源映射为物理属性;利用人类视觉系统的优点来帮助分析复杂的资源集合。资源中的隐藏模式可被标识出来。
现有数据挖掘(data mining)和数据可视化(data visualization)无法利用互联网进行 "高可信"传输。
阱图说明
图 1资源优机网络、资源网络、内联网、外联网、资源访问网等结构示意图。它们分别是将优机、若干计算机类设备, 资源设备等组成资源优机网络;资源优机网络和 /或特定功能优机网络,通过辨机与公用网络的路由器相连而构成的专有网。
图 2业务元调度内联网、多媒体内联网、知识内联网、模糊内联网等结构示意图。它们分别是由特定功能优机网络和 / 或资源优机网络,通过辨机与公用网络的路由器相连接共同组成的内联网。
具体实施方式 自由、开放式的资源信息网络及其各种组合,能够在整合的各种计算机平台上运行,可以和其他系统 的优机网络 "高可信"互操作,并且能够给用户提供一种统一风格的资源交互方式。
备份系统一般设置在重要优机网络中 dl )。其中的备份客户端通常是指程序和资源设备;表示能从在线存储上读取 资源并且将资源传送到备份服务器的软件系列;主备份服务器用于安排备份和恢复工作,并维护资源的存放介质;介质服务 器是按主备份服务器的指令将资源复制到备份介质上。备份存储单元为资源磁带、磁盘或者光盘等。
软件提供完整的资源保护。例如 Veritas NetBackup软件采用四级层次结构,集中管理,适应多种服务结构。其 技术特点为灵活设置、灾难恢复、并行处理、资源可靠、使用简便、监控能力和系统资源恢复等。
专有网中的优机网络, 目前可能办理的各种资源设备,放在在线存储 (OnStore)设备中,保证随时读取这些信息。为防 范可能发生的资源灾难,使用离线存储 (OffStore)设备对这些设备的资源进行备份存储。
故障发生后,可以利用资源设备备份 (Backup)对资源设备进行还原 (Restore),然后在还原的基础上利用日志文件 (Log) 对资源设备进行恢复,重新建立一个完整的资源设备。只有完整的资源设备备份和日志文件,才有完整的恢复。
虚拟存储 (Storage Virtualization)备份管理软件,可以提供一个透明的存储系统。按照资源优机网络的指令,自动 将归档备份目录下非活动资源自动归档备份到近线存储 (NearStore)设备中,将历史资源自动归档到离线存储设备中。
1、辨机一般采用 CPU32位以上;主机频率 20MHz以上; 内存 8MB以上并配有足够容量的硬盘存储器。辨机有控制器、 数据存储器(EEPR0M)、工作存储器(RAM)和程序存储器(EPR0M)等。它运行网络操作系统软件,管理资源优机网络之间 通过公用网络(包括无线、光网络)的通信。它是优机网络与公用网络之间的咽喉。
辨机可以是对等机(Peer);也可以是客户机、服务器等。它除了标准程序之外,还可以有所需的其他程序。
辨机根据需要,还可以有以下程序- 身份验证 (Authentication)最简单办法,是在辨机中建立一个用户名和密码信息表。
辨机通过访问控制列表 (Access Control List , ACL)来进行身份验证。该用户名和密码信息列表,简单地对不同类 型的源端优机网络(以其辨机 IP地址为代表)身份进行识别。
授权(Authorization)则规定了用户在获得访问该网络资格后,可以执行的操作。
身份验证和授权新办法,是建立一个用户或单位名、 IP地址、密码和授权权限信息表。 单位的辨机访问控制列表,用来进行用户 其他单位、合作伙伴单位、远程客户或者组织)身份验证。该列表对不同 类型的源端佣户名)^IIP地址和用户的密码进行身份识别。只有用户名、 IP地址和用户的密码,与该访问控制列表中 相同时,基于地址的身份验证才能保证生效,并决定授权权限等。
辨机还具有最灵活处理单个文件安全性的手段。例如,一个单位可以对其发出的文件的个别段落,实施加密或者数字签 名。辨机能够提供这种安全服务的层次。它可以区分一个具体文件的不同的安全性要求。
辨机不但可以含有工作站的程序,而且还可以采用信息验证码(message authentication code, MAC)技术对传输资源 进行编码,确保受到恶意攻击的信息的完整性。其典型的编码机制是密码散列(cryptographic hashing)机制。
2、 资源优机网络(S1)是网络物理拓扑结构技术和资源技术相结合的产物。优机具有微处理器和存储器,并装有输 入按键、信息显示器等。其有数据存储器(EEPRQH0、工作存储器(RAM)和程序存储器(EPR0M) 。
优机一般采用 CPU32位以上;主机频率 20MHz以上;内存 8MB以上并配有足够容量的硬盘存储器。它是资源优机网络的 核心,运行网络操作系统软件,管理资源优机网络中的计算机类设备之间的通信,管理单位的资源和用户对这些资源的使用. 优机一般采用波分、时分或者实时控制;具有多功能、多任务的处理能力。
优机具有读、译资源设备和计算机类设备的所有逻辑功能,能辨识单位的资源设备的各种功能。
优机除了有各种标准接口电路之外,还有一些专用接口, 以便与特殊的资源设备等的接口相互连接。
资源优机网络中的浏览器是提供给用户使用的装有浏览器软件的微处理器和显示器等的装置。其中装有存取和显示资源 信息的程序(包含多个服务程序,并利用对象名所确定的程序解决该对象)。
资源优机网络的网络文件系统(Net舊 k File System, NFS)允许服务程序打开一 程文件,在文件中移动到一个指 定位置,并且在该位置开始读写资源。它拒绝辨机具有这种服务程序。即辨机不会对优机进行远程访问。
优机可以采用 DOS、 UN /Linux赫 Windows等的操作系统软件。—般釆用 Linux。
Linux在字符界面下利用 Shell命令以及相关程序和文件,就能够实现系统管理、网络服务等基本功能。 Shell是用户 态与操作系统内核之间的接口,起着协调用户与系统的一致性和在用户与系统之间进行交互。
计算机类设备软件是为实现资源设备各项功能所编制的专用软件,也称为控制软件。其存放在计算机类设备的 EPRffl 中。各种单位的资源设备的功能设置和控制方案各不相同,主要根据具体的要求而确定。
单位的资源设备的基本功能由多个功能模块组成;不同的软件结构对这些功能模块的安排与管理方式也不同。它的特点 是多任务和实时性,可以采用的相应软件技术为多任务实时处理和多重实时中断处理。多任务实时处理是使计算机类设备在 同一时刻或者同一时间间隔内完成两种或两种以上性质相同或不同的工作。多重实时中断处理系统中,中断管理主要由硬件 完成,而资源设备的软件结构则取决于系统的中断结构。资源设备各项实时任务被安排成不同优先级别的中断服务程序或在 同一个中断程序中按优先级高低顺序执行。
中断型结构软件除了初始化程序之外,将资源设备的各种功能模块分别安排在不同级别的中断服务程序中。资源设备的 管理调度主要靠各中断程序之间的相互通信来解决。
3、某个单位的若干个资源优机网络中的一台优机,各自都通过输入 /输出接口,分别与一台辨机的输出 /输入接口相连 接;各个辨机都通过路由器与因特网连接。这就组建成资源网络(图 1) 。
资源网络中的设备是资源设备结构的多元化,适用于各个行业。它可以将一组不同功能的计算机类设备通过 RS— 232 和 RS— 422近距离串行接口,组成各种类型的资源系列;与计算机类设备进行多种资源交换。 资源网络可以采用 DOS、 UNIX/Linux Windows等网雜作系统。一般采用 Linux软件。
资源网络中的设备使用大规模和超大规模集成电路,可大幅度降低资源设备的故障率。同时它还具有人工智能(AI)¾ 能的故障诊断系统,即把专家们所掌握的各种故障原因及其处置方法作为知识库储存到资源设备中,以知识库为依据来开发 软件,分析并査找故障原因,提出排除故障的方法。资源网络满足交互式服务和稳定性要求;具有互操作性。资源优机网络 遭到因特网上计算机病毒攻击,最多也只有辨机瘫痪,并不会影响到资源优机网络正常运行。
分布式网络(包括资源网络、内联网、外联网、资源访问网等)必须考虑以下几个重要部分:
硬件是支撑分布式网络的物质基础。硬盘是存储资源及其备份的设备和场所。足够大的硬盘空间是实现分布式 网络的前提;较高的 I/O处理能力是保证分布式网络效率的必要条件。优机、服务器和辨机的内存容量和 CPU处理速度也对 系统效率有影响。如内存太少,使得缓存空间受限,资源的存取速度会下降。故主机性能必须与服务规模相匹配。
②软件:除了网络操作系统以外,分布式网络必须选择一个合适的数据库管理系统(Data Base Management System, DBMS)。如果编制应用或服务程序,还应选取与 DBMS协调的高级语言及其应用或服务的开发工具。
③对于跨地区或全球性大型单位来说,部门虽然分散但是联系紧密,管理方式既有局部的分散管理,又有全局的协同控 制。分布式网络是一种适应局部处理和全局处理能够协同工作的应用或服务系统。
④分布式网络和现有的分散式网络的主要区别在于是否支持全局服务。所谓全局服务是指服务中涉及两个或者两个以上 节点的资源设备。
⑤分布式网络和现有的多处理机系统的主要区别在于是否支持局部服务。分布式网络不仅要求资源的物理分布,而且要 求这种分布是面向服务的。
资源网络中的资源是物理分布在其中的各个优机网络上的。每一个优机网络都是一个集中式或者分散式的资源系统; 具有自治处理的能力,可以完成本地优机网络的业务应用。而每个优机网络并不是互不相关的;它们构成一个逻辑整体,统 一在优机网络系统软件管理下,共同参与并完成网络资源的服务。
节点上资源的逻辑集合, 由两部分组成:一是关于服务所需要的资源的集合,称为物理资源,是资源网络的主体;另 一部分是关于资源结构的定义, 以及全局资源的分片、分布的描述,称为资源字典(Data directory)或资源目录。
4、网络资源是资源网络与电子资源器共同构成的服务系统。
资源网络和电子资源器共同组成联机的网络资源的业务或服务系统的硬件和软件。资源浏览器和电子资源器的软件, 都具有加码、加密、调制和解调、解密、解码等软件。资源浏览器还具有对电子资源器的安全加密算法的识别软件。电子资 源器采用个人标识码(PIN)来识别持有人的身份。电子资源器中的重要数据,经加密后还增加信息识别码(MAC)。联机资 源服务系统检验识别码,可辨认电子资源器是否被篡改,并在浏览器的显示器上显示。
电子资源器的集成电路中含有微处理器、随机存贮器、只读存储器、中断系统、定时器 /计数器和输入 /输出等主要微 型计算机的基本部件和电路等。所有部件的电路之间通过地址总线、数据总线和控制总线连接在一起,再通过输入 /输出接 口电路与外界计算机的电路联络。电子资源器上的微控制器具有控制信息显示器显示字符和图像的重要作用,不但负责对电 子资源器整体的协调与控制,而且负担电子资源器的资源和参数的读写和存储的控制。
资源网络的浏览器,与以下的电子资源器的结构基本相同,一般体表尺寸比电子资源器大。它们的软件是互相匹配的。
5、电子资源器是具有采集、运营、处理和存储资源等功能的硬件和软件的微型计算机。它具有读写和处理资源等计 算机功能;其采用信息显示器一般为小型液晶显示器。其尺寸一般为 4英寸至 8英寸。 电子资源器含有辨机标准程序(锻査程序的程序》或者〈源端加密程序》和縮端解密程序》)。这样,每个电子资 源器都会对进出其的资源进行监控,并且拒绝非法的访问。
电子资源器一 用 CPU16位以上;主机频率 10MHz以上; 内存 64KB以上。
电子资源器的存储容量高达 64KB以上,足以存储所需的软件、一次服务的全部资源信息和多次服务的所有资源记录, 它的硬件有电压和时钟检测器、曝光自动死机逻辑、防解剖等加密措施;软件有密码保护、安全加密算法等加密方法。它可 以显示网络资源的业务或服务的所需信息。
每个电子资源器都有互相匹配的输入接口电路和 /或输出接口电路。它们分别位于电子资源器的不同位置;一般是分别 位于电子资源器的两边。其中一个资源器的输出插头域者插槽)接口电路,可以恰好插入另一个资源器的输入插槽域者 插头)的接口电路。它们之间可以通过接口,直接进行资源交流。
电子资源器的最小化传输差分信号(Transition Minimized Differential Signaling, T DS)不仅适应液晶显示器主 板的数字信号接口电路(Digital Visual Interface, DW),而且进行数字传输时也需要一个发送器和一个接收器。
电子资源器需要和外界计算机互通。它需要提供其身份识别信号,给外界计算机检测识别.在其液晶显示器的输入 / 输出接口电路中,设置显示器数据通道(Display Data Chnnel, DDC)存储器电路。该存储器是一片可擦除及可编程式只读 存储器(EEPRffl),存储了显示器识别数据,即显示器的电子档案资料信息,例如可接收行 /场频范围、生产厂商、 曰期、 产品序列号、型号、标准显示器模式及其参数、设备数据和运行中所需要数据等。
电子资源器的 DDC存储器通过 DDC串行数据脚、 DDC串行时钟脚和外界计算碰行信息互通,完成液晶显示器的身份 识别。只有外界计算机识别液晶显示器,两者才能同步、协调、稳定地工作。
电子资源器中的液晶显示器的数字输入接口电路,接收到外界计算机 览器)中 器输出的 TDS数字信号; 送到液晶显示器主板中的 IDS接收器;其输出的时钟信号送到时钟发生器。数字信号经解码送往主控电路的图像缩放处理 器(SCALER)进行处理。主控电路对输入图像信号进行格式判断,对图像进行缩放处理、图像定位等操作。
在电子资源器的液晶显示器主控电路中经过处理的行同步信号,送往锁相环式时钟发生器电路,使其产生的时钟脉冲 与输入行同步信号锁定;另一路送往屏显电路(On Screen Display , 0SD)。屏显电路需要的行 /场同步信号(HS、 VS), 不是直接取自外部输入的行 /场同步信号,而是取自主控电路输出的行 /场同步信号。即使液晶显示器在没有信号输入时,其 主控电路送往屏显电路的行 /场同步信号,根据预先编程好的定时数据,在图像缩放处理器(SCALER)中产生的行 /场同步信 号,可以确保液晶显示器在没有信号输入时,也能有正常的屛显和菜单显示。
电子资源器的数字信号经过液晶显示器的主控电路的图像缩放处理器(SCALER)处理,使之能够适合液晶板物理分辨 率的数字信号,连同数字行 /场同步信号,送往液晶板接口电路,将数字视频信号转换为符合液晶板接口电路要求的数字视 频信号。
电子资源器的液晶板接口电路将转换后的数字视频信号,单独 果本身包含显示行 /场同步信号)或连同显示行 /场 同步信号,送往液晶板的定时电路和驱动控制电路:驱动显示器的液晶显屏上显示字符、图像。
电子资源器的数字输入接口电路接收到的行 /场同步信号,还有一路送往微控制器,对液晶显示器进行节能管理,并 且控制液晶显示器进入正常工作、待机、挂起、关闭状态等。
电子资源器中的液晶显示器使用 DisplayPort接口电路,可以实现低成本的直接驱动式液晶显示器,同时仅需要一条 连接线就可以把所有信号都输入到主板的视频处理器中。 6、单位的内联网(图 2)中,各个辨机装有相同的《检査程序的程序》或《源端加密程序》 《宿端解密程序》等标准 程序。每台辨机都会对进出资源优机网络或者专用网的信息进行监控,并且拒绝非法对内联网中优机网络的访问。
建立在客户机 /服务器的一个资源设备服务程序,在服务器端完成的是资源的管理、组织和处理,即提供资源服务;在 网络上传输的是客户机的请求和服务器返回的结果或信息;在客户机端完成的是资源设备处理和用户交互界面。因此客户机. 服务器和中间件构成客户机 /服务器模式的基础结构。
服务器能提供高速、大容量的存储功能,强大的资源处理和管理功能,以及并发运行多个进程的功能。它还提供通信和 资源处理等功能;一般分为文件服务器、资源服务器、资源业务器等。
客户机由图形用户界面(Graphic User Interface, GUI)和服务程序代码组成,服务程序提出对资源设备査询请求, 并把这样的请求传送到优机域者服务器)。它主要完成界面表示和一些资源设备逻辑功能。界面表示逻辑一方面反映服务 程序的资源设备处理逻辑,另一方面提供最终用户的使用接口。用户通过客户机接口访问各种服务器,得到相应的资源服务, 包括与所有外设(终端)和其他 I/O设备的交互。客户机査询一般是用 SQL、 MIRS和 QBIC(Query By Image Content)等提 出的。资源服务器接受并执行来自多个客户机的 SQL、 MIRS或 QBIC查询。资源服务器在执行 SQL、 MIRS或 QBIC请求时,只 选择满足 SQL MIRS或 QBIC査询条件的资源,然后把选出的资源按照要求进行处理,完成之后传回发出请求的客户机。
中间件(Middleware)是软件技术的集粹,泛指客户机和服务器之间的连接部分,也称为接口软件。
它可以分为通用中间件和专用中间件。通用中间件为各种网络操作系统和各种网络传输协议。专用中间件为资源设备中 间件(基于 SQL、 MIRS或 QBIC的异构资源设备互操作)、资源处理中间件(基于 RPC等,共享不同服务器资源)、组件中 间件(电子邮件和 Lotus Notes等)、对象中间件(客户机可调用驻留在远程服务器上的对象)和 DDSM中间件(管理者与 代理可进行对话)等。
为了构造出符合实际服务的各种资源设备,必须解决从体系结构到因特网连接等一系列问题。分层存储器系统可以是一 个独立的系统,或者是网络中的一个节点,但这时高速缓冲存储只提供给节点内部的存储器。在这种类型的系统中,带有光 盘驱动器的光盘资源设备与系统直接相连或者通过局域网(LAN)相连。系统以具有大型高速磁盘(硬盘)为特点。
资源服务器是相当于文件服务器或多处理器的高档 PC机,通常有一个单独的并配备光盘库的 PC机与广域网 (WAN)中的 辨机相连,作为光盘对象服务器。高速缓冲存储服务器可以放在若干不同的地方。另一方法是用与辨机相连的资源服务器或 另一个单独的带有大型硬盘的 PC机作为登录资源设备的高速缓冲存储服务器。而网络高速缓冲存储器是在全部存储于网络 高速缓冲存储器的对象,都由所有或多数广域网上的用户共享这种情况下实现的。
辨机可以将与其相连的优机网络,直接与因特网发生信息交互。当该优机网络为不同的功能优机网络时,就形成以下各 种不同的内联网。
6. 1、 Web内联网(图 2)主要采用 C/S和 B/S两种模式。
随着因特网技术和服务的发展,胃成为核心服务之一。用户通过浏览器上统一资源定位器(URL),不仅能进行超文 本的浏览査询,而且还能收发电子邮件,进行文件上下传输等工作。 B/S模式是以 Web技术为中心的一种服务。浏览器上只 要安装一个很小的支持库,如 Java或 VB的动态链接库。在中间层采用 Web服务器。该服务器接受浏览器的请求,并将其转 ¾¾SQL语句,通过开放性资源设备接口标准 ODBC或其他手段传给资源库服务器,并将资源库服务器返回的结果用 HTML 文件格式传回给浏览器。浏览器实际是一个将标准语言转化为界面的解析器,服务程序安装在 Web服务器上。
在 B/S模式中,用户访问服务器资源以动态交互或互相合作的方式进行,其主流语言是 Java、 HTML和 XML等。它最主 要的特点是与软件、硬件平台的无关性。浏览器的功能可以只是一个多媒体浏览器或 Java虚拟机。在 C/S模式中,不同的 操作系统(OS)与网络操作系统(N0S)对应着不同的语言和开发工具。
Web资源设备技术主要特点是采用字表多维处理、变长存储与业务元调度等网络技术和资源设备技术,使资源设备服务 转为全面基于因特网的服务。它釆用字表多维处理方式支持非结构化的多媒体资源,使各种类型的资源能存储在同一个资源 设备中,大大縮短执行复杂处理的时间;另一方面,它支持 ActiveX等新的编程工具,能开发越来越复杂的资源处理系统程 序,大大简化系统开发与管理的难度。
6. 2、 业务元调度内联网 7)可以将关系资源设备管理系统处理资源能力,与业务元调度处理复杂关系和新型资源 的能力结合起来。业务元调度资源模型语义丰富,描述能力强,并且可扩充,能方便地让用户定义新的资源类型及其操作, 封装性和扩充性是业务元调度技术的精髓。业务元调度内联网是一个基于网络的分布式资源库系统。它由一个以上的节点 进行管理,使得资源库设备的物理布局对用户是透明的。资源共享可在对象级别上以并行共享和串行共享两者意义上的实现。
业务元调度内联网存储结构可分为两大类:一类是基于关系的方法;另一类是符合对象的存储结构。
关系方法的每个对象类存放在一个关系中,任何对象一进入系统, DBMS自动分配给它一个全库唯一的系统标识符。这 个标识符在对象的生命周期里是不能由系统也不能由用户改变的。对象间的联系是通过存放在对象元组中增加另一对象的系 统标识符来体现的。系统对相关对象类建立索引,当用户要求按 合"或 IS括"联系査询时,系统就可以使用连接索引 满足其所有査询要求。
符合对象的存储结构方法,最简单是将其按逻辑模型中定义的拓扑顺序存放。它适合多媒体资源的特点。比较适合多媒 体资源特点的存储结构和存取方法有 EXODUS的 B+树索引结构或 R+树索引结构等。
6. 3 多媒体内联网(图 2)上的任意一台计算机都可以与另一台计算机进行安全和精密的资源传输。它的多媒体索引 和检索系统 MIRS是指使用 DBMS、信息检索 IR和基于内容的检索等相结合的技术,提供多媒体信息检索的一个基本系统。
多媒体内联网结构是灵活的和扩展的,可以支持各种服务、查询类型和内容(特征)。 MIRS包括大量的功能模块或管 理器。它能增加新的管理器以便扩展 MIRS的功能。新的管理器可以删除或替代原管理器, 以便对功能进行更新。
多媒体内联网另一个特征为分布式的,包括大量的服务器和客户机。它的存储介质:可更换的硬盘、磁带备份介质和光 盘档案介质。多媒体内联网满足物理资源独立性和逻辑资源独立性外,还满足媒体资源独立性。
多媒体内联网的资源操作系统,除了能完成与传统网络相同的操作外,还提供许多新功能。多媒体内联网具有开放功能, 搬 DB的服务程序接口(API) ,并提供独立于外设和格式的接口。
多媒体内联网包含概念模拟和表达模拟的多媒体资源模型。
6. 知识内联网(图 2)是人工智能技术与资源库技术的结合。
知识内联网能够把资源设备方法服务到科学技术的数据处理领域中产生的一类资源网络。其中存放的信息是科技人员在 科学研宄、实验以及开发等各项活动中产生和积累的资源。
知识内联网具有对知识的表示方法;对知识系统化的组织管理;知识资源设备的操作、查询和检索;知识的获取与学习; 知识的编辑;库的管理等功能。
6. 5 模糊内联网(图 2)是网络技术和模糊理论的结合。
模糊关系资源库己经在模式识别、过程控制、案情侦破、医疗诊断、工程设计、营养咨询、公共服务和专家系统等领域 得到较好的服各。 7、外联网(图 1)中,单位合作伙伴的一个或者几个优机网络(或其优机),分别通过辨机,与互联网相连接。那么 单位的内联网和这个单位合作伙伴的一个或者几个优机网络,各自的辨机以及互联网,就构建一个 可信"的外联网(S 1)。其中装有《检査程序的程序》或者《源端加密程序》和《宿端解密程序》等相同程序的合作伙伴的辨机和单位的资源 网络中的辨机,都会对进出优机网络的信息进行监控,并且拒绝非法对内联网的访问。
在外联网中,单位的各个辨机与合作伙伴指定的网络相连接的辨机, 也可以装有相同的《对单位身份认证和授权程 标准程序,并且这些辨机中都有各个辨机的 IP地址表和与其相连的资源优机网络(或合作伙伴指定的网络)中的每个主机 名称或者地址的访问控制列表。这样,每台辨机都会对进出外联网的信息进行监控,并且拒绝非法对单位优机网络和合作伙 伴网络的访问。
8、装有单位的《检査程序的程序》或者《源端加密程序》和《宿端解密程序》等程序的远程客户机和资源网络共同组 成的系统,为资源访问网 dl)。远程客户机与互联网相连接后,能够登录单位的资源网络。用户的远程客户机和单位资 源网络的辨机功能,使用户发送或接收的信息在互联网上被密文传送或清除病毒,保证信息传输的既定目标。
辨机软件模块能够以插件的形式安装在远程客户机上。用户利用资源远程客户机,可以通过互联网按需地访问和使用资 源优机网络。
为了确保远程客户机和单位内联网或外联网之间,通过互联网进行互操作,也可以采用加密强度高的加密和身份认证方 法。一般采用公钥密码算法 (Public-Key Crypto-graphic Algorithms)技术进行身份认证和密钥交换:采用对称加密解 密技术进行大容量信息的加密和解密。
内联网和远程客户机之间通过因特网;安全通信(图 1)如下:
内联网中源端计算机发送的信息;经源端优机,到达源端的装有〈源端加密程序》等源端辨机域者远程客户机)的信 1;经过加密之后;通过因特网;到装有縮端解密程序》和〈验査程序的程序》等的远程客户机域者宿端辨机);经过 解密和检查病毒后;转到宿端目标。
远程客户机根据需要,可以装有树单位身份认证和授权程序》;单位资源网络的辨机相应装有树用户的身份认证和 授权程序》,并且单位的各个辨机中都有这些远程客户机和辨机的 IP地址表和被允许访问的资源优机网络中的每个主机名 称域者地址)的访问控制列表。远程客户机和单位资源网络辨机的功能,可以使远程机发送或接收的信息在互联网上被密 文传送,保证信息传输的 "高可信",防止重要资源在互联网上被窃。
资源访问网用于提供远程用户对单位内联网的安全访问,是非固定线路的专用网;对于不同形式的访问技术,只要更新 专用网的访问策略,就可以实现该技术。
9、电信系统中的数字线路标准不同于因特网中使用的标准。因此需要一个专门的硬件,安装在辨机,作为因特网与电 信公司数字线路之间的接口。这种被称为数据服务单元 /信道服务单元 Data ServiceUnit/Channel Service Unit, DSU/CSU) 的装置包含两个功能部分,通常集成在单个底板上。其中 DSU端口处理数据。它将数据在两种格式之间进行转换;即转换因 特网上的数字格式与电信优机网络的计算机类设备所要求的数字格式。因特网的接口标准种类,取决于电信优机网络的运行 速率。如果数据速率低于 56Kbps,交换设备可以使用 RS— 232标准。至于 56Kbps以上的速率,交换设备必须使用支持更高 速率的硬件接口(例如 RS-449或 V.35标准的硬件)。 CSU端口处理线路中断和诊断等。
移动通信网通过辨机,与因特网的融合主要方式是:将移动终端当作 PC机。
有线电视系统中的光纤同轴电缆混合网络(HF«不足之处是靠同轴电缆向用户传送电视节目,还处于模拟水平。它的 馈线网,选择光纤作为传输介质的干线网;采用密集波分复用(DTO)光纤技术。在 HFC网中传送模拟电视节目的同时,还 可传送数字电视和交互式电视,提供图像、数据和语音通信三种资源服务。其中电缆调制解调器除了有信号调制解调的功能 之外,还有路由、桥接、调谐和编码等功能。 HFC利用电缆调制解调器,通过辨机接入因特网,不仅数据的传输速率快,而 且三种资源可以互不干扰;可以同时进行看电视、通过因特网上网访问、打电话等。
10、资源挖掘技术和资源可视化技术利用共同信息仓库(corporate information warehouse, CIF)。它是包容操作数 据存储 (operational data store, ODS)、操作资源存储(operational Data store, )、数据仓库、资源仓库、集成 /转化 (integration/transformation program I/T程序)接口和操作型环境的体系框架。它在逻辑上由资源元(Data elements)结合在一起,在物理上由资源网络结合在一起。其中资源元是实体的一个属性;是一种唯一命名的、定义良好的 资源类型, 由资源项组成并包含在行为的记录中。
10. 1资源挖掘技术是统计学的扩展;具有一定的人工智能和机器学习能力;能解决服务决策问题。用户可以利用客户 关系管理(Customer Relationship Management, CRM)软件分析大型资源库,将资源库中的信息转化为推动与客户之间的 交互行为的服务决策。
多维联机分析处理(Multidimention Online Analytical Processing, MOLAP)中,将资源当做保存在一个三维立方体 或者 n维空间(®立方体)中;每个维度可以容纳一个或多个成员。 MQLAP可以同步地对任何数目的维度进行分析,而且可 以从任意数目的维度的视角察看资源。
关系联机分析处理(Relational Online Analytical Processing, RO P)将大型的关系资源库服务器取代了多维资源 库服务器。这种超关系资源库包含了综合资源和细节资源,可以允许对资源集采用下挖技术。在某些情况下,关系联机分析 处理中的客户工具可以动态地生成资源库中没有的综合资源。 R(MP可提供强大的管理工具和开放的 SQL接口。
10.2资源可视化引入计算机先导,通过用依赖于图像和手势操作数据的交互式设备取代键盘而努力减少人们与计算机 交互的障碍。虚拟现实技术最典型的代表是飞行仿真器;计算机产生的图形取代了录像和模型。仿真软件、硬件以及运动控 制平台的出现,使人们可以在非常逼真的虚拟世界里如临亲身。
计算机图形学是促使娱乐业、电子游戏等虚拟现实技术中很多有价值的产品产生的源头。资源可视化使用计算机图形学 将很多列的资源转换为图像: 即从一个复杂的大型资源集合中获取的资源可视化模型。
资源可视化和资源网络技术相结合,可以使电子监控设施(JP交通监控、医院手术室、工厂车间等)中动态的、实时的 3D场景经由多台安置在适当的位置的视频摄像机捕获。从这些摄像机得到的图像流,可以经过几种技术综合起来形成动态 变化的 3D视频信息流。这种动态信息流通过资源网络或者资源访问网,可以传输到远程优机网络或者远程客户机。
资源可视化环境将关键的组件连接在一起。这些组件是人、计算机平台、显示设备以及存储系统;同时可视化环境使资 源在这些组件之间平滑地流动和转化。资源可视化的技术并不特定于某个特别领域或单位。各个领域中高、新技术需要多学 科的、地理上分散的科研小组,将从复杂的仿真中得出的结果与观察数据混杂在一起,并且能够操控这些数据集合。这些都 依赖于新的网络系统(资源网络)和通信方法(使用辨机)。
资源可视化是对资源进行筛选,从中去粗取精,将有效内容转化为视觉形式以方便人们更快地识别、理解、浏览、观测。

Claims

1、 资源是包括数据、 软件、 群体智慧、 百科全书、 本体、 生命元等有形物质或无形知识的形式化表达; 分别与优机(或其网络)和公用网络(包括无线、 光网络) , 互相连接的并控制这两个网络 "高可信"互操作的 计算机, 就是辨机;
1. 1《检査程序的程序》功能: 宿端的辨机对明文信息进行检査, 发现其中的任意程序, 都把它们排列在一起,并 且依次循环地存放在外存储器中的固定区域, 将其中第一道程序呈现在指定的信息显示屏上; 如果该程序是允许其访 问的合法程序; 则用户在第一次出现提示时, 选择 ^后都允许"复选项,辨机以后碰到这个程序时,不会再次询问, 并允许其访问; 当用户在一定时间内没有答复或者选择 "不允许"复选项, 辨机就丢弃该程序; 宿端辨机运行《检査 程序的程序》 , 可清除计算机病毒, 从而防止病毒攻击辨机保护的优机网络;
1.2《源端加密程序》功能: 源端辨机把欲通过因特网和 /或公用无线(或光) 网络发送的明文信息后面, 添加对 称加密的密钥; 将此组合数据输入单向散列函数(Message Digest) , 得出散列 (Hash)值 (称为源端散列值) ; 将 明文信息 (^包含密钥)后面添加源端散列值,用密钥进行加密,变成密文;将该密文通过因特网和 /或公用无线 域 光) 网络送行宿端辨机;
《宿端解密程序》功能: 宿端辨机用事先约定的共享的对称密钥, 将接收的密文解密变成明文, 得到明文信息和 源端散列值; 把明文信息(不包含散列值)后面添加密钥; 将此组合数据, 输入事先约定的单向散列函数, 得到散列 值(称为宿端散列值) ; 该宿端散列值与接收到的源端散列值相比较; 如果这两个散列值相同; 则确认该信息是从合 法源端辨机发出的, 接受该信息; 否则丢弃该信息;
1. 3 «用户的身份认证加密和授权程序》功能:用户 其他单位、合作伙伴单位或者远程客户)对其在某单位 留下的密码, 用用户私钥加密, 作为用户的数字签名; 用单位公钥对数字签名、 用户名、 用户公钥和对称密钥加密, 作为密件; 将明文信息用对称密钥加密, 作为密文; 源端辨机将该密件、 密文; 通过互联网, 传给宿端辨机; 该辨机 用私钥对密件进行解密, 得到用户名、 用户公钥、 对称密钥和用户数字签名; 利用用户公钥将用户数字签名解密, 获 得用户密码: 该宿端辨机将用户名、 IP地址和用户密码, 与单位保存的相关信息对照; 如果完全正确, 单位确认该信 息是用户发出的; 然后用其中的对称密钥将密文解密, 得到用户发送的明文信息; 辨机通过访问控制列表, 确定用户 权限; 再通过宿端优机, 转给相应权限的计算机; 否则丢弃该信息;
1. 4树单位身份认证加密和授权程序》功能:某个单位用其私钥对用户 其他单位、合作伙伴单位或者远程客 户)在该单位留下的密码加密, 作为单位数字签名; 将用户的公钥对单位数字签名、 单位名、 单位公钥和对称密钥加 密, 作为密件; 将明文信息用对称密钥加密, 作为密文: 源端辨机将该密文、 密件: 通过互联网, 传给用户的客户机 (或者其他单位辨机) ; 用户用其私钥, 对密件进行解密, 得到单位名、 单位公钥、 对称密钥和单位数字签名; 用单 位公钥将单位数字签名解密; 得到用户在单位留下的密码; 然后用户 (或者其他单位辨机)将密码与其预留在单位的 密码对照; 如果完全正确, 则用户确认该信息是单位发出的; 用对称密钥将该密文解密, 得到单位发送的明文信息; 否则丢弃信息;
1. 5 〈源端分级加密程序》: 明文信息中安全等级高一级的段落, 首先用另一把共享的对称加密算法的密钥,将该 部分段落进行加密 (也可用非对称密钥等方法) ; 在该部分段落加密的明文后面, 添加指示加密段落位置的数列或者 符号, 再添加密钥, 求出散列值(源端) ; 后面部分同《源端加密程序》功能程序;
《宿端分级解密程序》 : 前面部分同 《宿端解密程序》功能程序; 接着将部分段落加密的明文后面, 添加加密段 落的指示位置的数列或者符号, 再添加一把事先约定的密钥, 求出散列值(宿端) ; 该宿端散列值与接收到的源端散 列值相比较; 如果这两个散列值相同; 则确认该信息是从合法源端辨机发出的, 接受该信息; 否则丢弃该信 1; ¾果 接受该信息; 分别用事先约定的共享的对称密钥, 对相应位置的密文解密, 得出整个明文;
辨机可根据具体资源服务需要, 选择以上五套程序中的任意一套程序或者由它们组合的各种不同程序组:
1.6辨机还会详细记录所有的外部访问;同时防止因特网上外部信息的非法访问;它使外界优机或者单位的资源设 备对于其优机网络的访问, 先集中在辨机上; 保证资源优机网络上的所有优机或资源设备 "高可信";
1. 7辨机还允许与其相连的优机, 通过因特网, 传送和接收本系统的其他优机网络的各种不同的加密信息。
2、将一台优机、若干台浏览器、客户机、服务器、资源设备等计算机类设备,采用网络拓扑结构技术,通过介质 (可以是有线的或无线的)互相连接而形成的网络, 就是资源优机网络;
2. 1资源优机网络根据具体情况, 可以采用客户 /服务器模式或者浏览器 /服务器模式;
2.2资源优机网络可采用业务元调度架构:程序在优机网络上提供应用或服务,程序可以透过优机的 "f口"将它 的应用编程接口分享出来,直接给资源网络上的其他程序调用;它传输信息的标准可以不同,最好是基于互联网协议;
2.3资源优机网络可以采用¥ 2.0技术; Web2.0提供了一个 "万物皆资源"平台; 用户成为 "参与者"; 2.4资源优机网络还可以采用智能代理技术; 智能代理可以被集成于含有解决问题的特殊的功能单元。
3、某个单位的若干个资源优机网络 者其优机), 分别通过辨机,与公用网络 (包括无线、光网络)的路由器 相连接, 组建成的这些优机网络之间能够 "高可信"互操作的资源专有网, 就是资源网络;
资源网络具有: 可自愈、 辨机驱动、 多方租赁、 业务元调度、 虚拟化、 线性扩展等特征; 它向单位(包括公众) 提供资源业务; 它可以解决各行各业所面临的资源库 (包括数据库)问题;
揉和不但用于辨机的软件, 也用于商业; 软件揉和使得商业揉和成为可能;
3. 1资源网络可采用业务元调度技术。其中资源服务流程指协作性的、事务性的、为客户利用或创造价值的、完整 而动态调整的业务元集合; 资源网络使用业务元调度,通过标准化、流程化和自动化的耦合组件为用户提供资源信息; 业务元调度使得用户的资源, 可以被直接转换成为能够通过网络访问的一组相互连接的资源模块; 资源网络中可 以只有本地优机网络是业务元调度的优机网络 体地网);或者两个以上优机网络是业务元调度的优机网络 (^地网);
3.2资源网络中数据、应用和服务都分别存储在各个资源优机网络中设备上 ·'辨机可以使优机网络之间的差异和兼 容性对因特网和 /或公用无线 减光)网络是透明的,从而允许资源网络对不同的优机网络进行统一的管理; 实现在逻 辑上以单一整体形式呈现的特性
3.3资源网络将软件直接提供为资源服务; "软件资源"被打包为可重复的商业任务或商业流程步骤;
3. 客户机或优机网络接入互联网,是用户获取资源网络中丰富资源的基础;资源网络的稳定性、可靠性、安全性、 可用性、 灵活性、 可管理性、 自动化、 节能环保等以及互联网随时随处可用, 可以实现跨地域的资源共享与提供等。
4、网络资源是资源网络与电子资源器共同构成的服务系统;电子资源器具有采集、运营、处理和存储资源等功能: 网络资源具有如下特点-
4. 1资源不是存储在一个优机网络中而是分散存储在由同一个因特网和 /或公用无线(或光)网络连接的多个优机 网络上;
4. 2资源在物理上是分散的, 但它们是一个逻辑整体; 网络资源对资源处理是在统一逻辑框架上进行的;
4. 3各个优机网络的资源由本地的服务器管理, 具有自行处理能力, 完成本地优机网络的应用或服务;
44通过因特网和 /或公用无线 域光)网络传输的信息流,也可以是经过完整性加密处理的; 以保证信息保密性、 完整性和真实性;
4. 5网络资源还可以具有身份认证的功能;由于集中式资源的局限性越来越明显,迫切需要一种局部处理和全局处 理, 能够协同工作的资源设备服务系统; 网络资源正是这种需求的体现。
5、 电子资源器是具有资源采集、 资源运营、 资源处理和资源存储等软件和信息显示器等的微型计算机; 电子资源器还可根据需要, 增加身份认证等的硬件和软件; 保证其信息传输的可分性;
电子资源器既需要联机进行信息处理, 又不需要联机授权处理; 因此允许它脱机使用;
电子资源器是一种商业流程管理系统 (BP S)。它能够跨越多个机构向单位的领导和工作人员显示适当的工作流 程:给领导是一个指导性的系统;给工作人员是一个有助于他的决策和运营的内容。它可以完成战略决策、工作计划、 任务制定、 业务处理等。
电子资源器还可以具有:
5. 1电子资源器可以在资源优机网络的资源浏览器上,存取本地优机网络中的资源信息; 它也可以通过因特网和
/或公用无线(或光) 网络, 输入或输出外地资源优机网络中的资源信息;
5. 2电子资源器的 CRJ对信息的加密处理、 完整检验和身份认证可以采用新方法;
5. 3电子资源器由密码方式保护; 持有人如果将电子资源器丢失或者损坏, 其中资源信息并不会泄密;
5.4电子资源器还可以釆用数字签名和访问控制策略等程序; 并且借助应用层, 对传输的各种信息实行安全性等 级管理; 它对于一个信息中的某些部分段落, 可以根据其不同的安全等级, 进行相应的安全加密;
5. 5电子资源器能够以独立方式或者联机方式进行工作:
5.6电子资源器内存储的安全控制软件, 也可以具有对电子资源器持有人进行检验个人身份证识别号, 而确定持 有人合法性的功能; 它可以含有并且显示个人二代身份证号和其中个人相片, 实行实名制;
5. 7电子资源器的存储容量高,足以存储所需的软件、身份证的全部信息和多次存取资源信息和收费的所有记录; 它的硬件有电压和时钟检測器、曝光自动死机逻辑、防解剖等加密措施;软件有密码保护、安全加密算法等加密方法。
6、单位总部及其分支机构的若干个优机网络和一些特定功能独立网络等,分别通过辨机,与公用网络(包括无线、 光网络)路由器相连接, 共同构建一个 "高可信"互操作的单位内部的资源内联网络, 就是资源内网; 由于联网的特 定功能独立网络不同,就可以形成各种不同类型的资源内网系列: Web资源内网、业务元调度资源内网和多媒体资源内 网;
6. 1特定功能独立网络主要是含有 Web数据库系统的资源内网, 就是 Web资源内网;
6. 2特定功能独立网络主要是含有业务元调度资源库系统的资源内网, 就是业务元调度资源内网;
6. 3特定功能独立网络主要是多媒体资源库系统的资源内网, 就是多媒体资源内网;
6. 4特定功能独立网络主要是知识资源库系统的资源内网, 就是知识资源内网;
6. 5特定功能独立网络主要是模糊资源库系统的资源内网, 就是模糊资源内网:
6.6资源内网还有工程资源库、 地理资源库、统计资源库、科学资源库、空间资源库和文献资源库多种资源内网; 6. 7在资源内网中各个辨机还可以装有相同的树单位身份认证和授权程序》等程序,拒绝非法对资源内网的访问。
7、 单位的资源网络或者资源内网, 与合作伙伴的一个或者几个优机网络, 分别通过辨机与公用网络(包括无线、 光网络)的路由器相连, 构建一个 "高可信"的信息互操作的外联网络, 就是资源外网。
8、与公用网络 (包括无线、光网络)相连接的单位远程客户机, 能够登录资源网络或者资源内网,可以实现它们 之间 "髙可信"信息互操作; 这些客户机和资源内网共同组成的系统, 就是资源访问网;
8. 1远程客户机身份验证要实现的授权访问的方法:因特网上的访问信息,要经过其辨机软件进行身份认证和授权;
8.2远程客户机实现文件中的部分段落不同的安全等级方法: 其辨机软件能够进行相应的安全加密。
9、资源优机网络通过辨机接入公用网络 (包括无线、光网络)形成资源网络, 也适用于电信网络和有线电视网络 中的接入网 (优机网络) , 以及其他的各种接入网。优机网络作为人类商业交互新平台, 使现有的行业界限变成模糊 不清。 它可以将公司的商业流程流线化而产生廉价的、 优秀的、 快捷的产品与服务。 客户、 零售商、 分销商、 生产商 整合一个商业系统:
9. 1电话交换网、综合业务数字网、窄带 N~ISDN、数字数据网、帧中继网等的输出接口与优机相连接,就是电信 优机网络;
9.2有线电视网络中光纤同轴电缆混合网络(HFC)等的输出接口与优机相连接, 就是电视优机网络。
10、 资源挖掘是利用原始资源推导而发现新的、 重要的服务关系和被隐藏资源的过程; 它是功能强大的资源分析 技术的集合;
资源可视化是为了揭示本质关系模式而使用动态图像表示资源的一种过程;它可将巨量数据转化为有意义的图像; 各个资源优机网络中的资源挖掘和资源可视化的所有资源,可通过资源网络中的公用网络 (包括无线、光网络), 进行 "高可信"互操作;
资源挖掘和资源可视化在资源网络系统中是分布式网络、即求即应式网络、集群网络、自主网络、公共服务网络; 10. 1资源挖掘是从现有资源库中发现新的、 隐藏的或者未预期的新资源的行为和过程; 资源相关是资源的两个或 多个变量之间的各种数学关系:一个元素可以同时与多个变量(时间因数、 地理因数、 人口统计因数等)相关; 例如 它可以是一个元素与另一个元素相关;一个元素与另一个跨越不同时间间隔的元素相关; 一个元素与一组元素相关; 一个元素与一个地理区域相关; 一个元素与外部资源相关; 一个元素与人口统计学上的分段人口相关等; 资源挖掘采 用互相组合的一组技术, 利用资源相关, 而从资源库中提取最有价值的内容:
10.2资源可视化: 将巨量数据转化为有意义的图像的过程; 原始资源可以来自于很多个不同的资源库, 包括卫星 照片、 水下音感测量装置、 测量图或者计算机仿真等; 这些资源的信息和模式, 具有很大的数量与复杂性: 资源可视 化技术通过将物理属性与资源相对应, 利用人类的视觉系统来辅助分析复杂的资源集合; 这种从原始资源创建多维构 造和模型的能力, 可以将资源映射为物理属性; 利用人类视觉系统的优点来帮助分析复杂的资源集合; 资源中的隐藏 模式可以被标识出来。
PCT/CN2010/000745 2010-05-25 2010-05-25 网络资源 WO2011147046A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/000745 WO2011147046A1 (zh) 2010-05-25 2010-05-25 网络资源

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2010/000745 WO2011147046A1 (zh) 2010-05-25 2010-05-25 网络资源

Publications (1)

Publication Number Publication Date
WO2011147046A1 true WO2011147046A1 (zh) 2011-12-01

Family

ID=45003179

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/000745 WO2011147046A1 (zh) 2010-05-25 2010-05-25 网络资源

Country Status (1)

Country Link
WO (1) WO2011147046A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610190A (zh) * 2009-07-22 2009-12-23 刘文祥 数据网络和系统
CN101615318A (zh) * 2009-05-11 2009-12-30 刘文祥 电子收费系统及其装置
CN101668013A (zh) * 2009-03-30 2010-03-10 刘文祥 网络联接技术及其系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101668013A (zh) * 2009-03-30 2010-03-10 刘文祥 网络联接技术及其系统
CN101615318A (zh) * 2009-05-11 2009-12-30 刘文祥 电子收费系统及其装置
CN101610190A (zh) * 2009-07-22 2009-12-23 刘文祥 数据网络和系统

Similar Documents

Publication Publication Date Title
CN110351381B (zh) 一种基于区块链的物联网可信分布式数据共享方法
CN112765245A (zh) 一种电子政务大数据处理平台
CN113711536B (zh) 从区块链网络中提取数据
Khare et al. Big data in IoT
CN110543464B (zh) 一种应用于智慧园区的大数据平台及操作方法
Liang et al. Search engine for the internet of things: Lessons from web search, vision, and opportunities
CN112398860A (zh) 一种安全控制的方法和装置
CN101610190A (zh) 数据网络和系统
CN105931168A (zh) 一种基于信息栅格服务的智慧城市服务架构
WO2010139167A1 (zh) 用于政务商务决策的专家支持应用系统平台及其建构方法
CN101453398A (zh) 一种新型分布式网格超级计算系统及方法
CN112527873B (zh) 一种基于链数立方体的大数据管理应用系统
CN112291264B (zh) 一种安全控制的方法、装置、服务器和存储介质
CN112837194A (zh) 一种智慧系统
CN116168820A (zh) 基于虚拟集成与区块链融合的医疗数据互操作方法
Nan et al. Multimedia learning platform development and implementation based on cloud environment
CN116415203A (zh) 一种基于大数据的政务信息智能融合系统及方法
US11924284B1 (en) Automated security, orchestration, automation, and response (SOAR) app generation based on application programming interface specification data
Ince et al. Planning and Architectural Design of Modern Command Control Communications and Information Systems: Military and Civilian Applications
CN112511515B (zh) 一种用于数据上链的链数立方体
WO2011147046A1 (zh) 网络资源
CN113886061A (zh) 一种工业物联网运维平台
CN116260732A (zh) 一种多云统管的共享系统和方法
CN113239367A (zh) 一种核电网络化协同计算环境下的标识数据加密存取方法
Li Federated search to merge the results of the extracted functional requirements

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10851918

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10851918

Country of ref document: EP

Kind code of ref document: A1