CN117221323B - Service dynamic forwarding method - Google Patents
Service dynamic forwarding method Download PDFInfo
- Publication number
- CN117221323B CN117221323B CN202311482692.3A CN202311482692A CN117221323B CN 117221323 B CN117221323 B CN 117221323B CN 202311482692 A CN202311482692 A CN 202311482692A CN 117221323 B CN117221323 B CN 117221323B
- Authority
- CN
- China
- Prior art keywords
- service
- proxy
- load balancing
- rule
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000004458 analytical method Methods 0.000 claims abstract description 12
- 238000000586 desensitisation Methods 0.000 claims description 16
- 238000013507 mapping Methods 0.000 claims description 8
- 230000008569 process Effects 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000003044 adaptive effect Effects 0.000 claims description 3
- 238000013135 deep learning Methods 0.000 claims description 3
- 238000009499 grossing Methods 0.000 claims description 3
- 238000010801 machine learning Methods 0.000 claims description 3
- 238000012423 maintenance Methods 0.000 abstract description 4
- 230000008901 benefit Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention belongs to the technical field of service components, and provides a service dynamic forwarding method, which comprises the following steps: acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding. The use of predictive policies will require proxied services to complete auto-proxy configuration and auto-complete configuration refresh. The delay is reduced, the throughput is improved, and the aim of improving the performance is fulfilled. The components can be expanded and maintained according to the needs, and the purposes of strong expandability and convenient maintenance are achieved. And the automatic configuration avoids the workload of manual maintenance configuration, and achieves the purpose of simple configuration.
Description
Technical Field
The invention belongs to the technical field of service components, and particularly relates to a service dynamic forwarding method.
Background
In the present digital age, the demands of enterprises and individuals on network services are increasing, and the network services have become an integral part of our lives and works from the fields of online shopping, social media to cloud computing, big data analysis and the like. As the diversity and complexity of network services continue to increase, developing and maintaining these services becomes increasingly challenging. The service broker component is to address the diversity, complexity and challenges of modern network services to provide a more powerful, efficient, secure service integration and management solution. This will help the enterprise better meet customer needs, increase competitiveness, and ensure that their web services are always in an optimal state.
Problems and challenges faced by the following service agent component:
1. performance problems: at high loads, service proxy forwarding components may become bottlenecks, resulting in latency and throughput problems.
2. Extensibility and maintainability: as the scale of systems grows, components may need to be able to be expanded and maintained without introducing additional complexity.
3. Configuration complexity: in handling complex agent rules and high-level functions, configuration errors may cause agents to be incorrect or introduce security vulnerabilities. And cannot dynamically update the configuration, requiring manual refreshing or restarting, etc.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a service dynamic forwarding method which at least partially solves the problems of low component performance, insufficient expansibility and complex configuration in the prior art.
In a first aspect, an embodiment of the present disclosure provides a service dynamic forwarding method, including:
acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding.
Optionally, the load balancing algorithm is combined to update the selected load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
Optionally, the load balancing algorithm includes polling, weighted polling, or weighted random.
Optionally, the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
Optionally, the threshold strategy and the predictive strategy include an adaptive learning algorithm or an exponential smoothing algorithm.
Optionally, before the step of obtaining the access log of the service analysis agent-based service in the service list, the method includes:
and accessing the proxy service in the service list, inquiring an actual service address through a route mapping, accessing the actual service address, recording an access log, and after the service of the actual service address returns the service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content.
Optionally, the step of accessing the proxy service in the service list includes resolving the proxy service to obtain a resolved result, where the resolved result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the resolved result.
Optionally, resolving the proxy service includes:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Optionally, the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm are preceded by:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
Optionally, the extracted key information includes:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
The service dynamic forwarding method provided by the invention detects the load through the load balancing algorithm and adjusts the resources according to the load condition. And (3) performing resource expansion or reduction operation based on a threshold strategy, predicting future loads based on a predictive strategy, and performing resource adjustment in advance. Resource requirements are determined using queuing theory to meet specific performance objectives. The use of predictive policies will require proxied services to complete auto-proxy configuration and auto-complete configuration refresh. The delay is reduced, the throughput is improved, and the aim of improving the performance is fulfilled. The components can be expanded and maintained according to the needs, and the purposes of strong expandability and convenient maintenance are achieved. And the automatic configuration avoids the workload of manual maintenance configuration, and achieves the purpose of simple configuration.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following more particular descriptions of exemplary embodiments of the disclosure as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts throughout the exemplary embodiments of the disclosure.
Fig. 1 is a flowchart of a service dynamic forwarding method provided in an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
It should be appreciated that the following specific embodiments of the disclosure are described in order to provide a better understanding of the present disclosure, and that other advantages and effects will be apparent to those skilled in the art from the present disclosure. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should also be noted that the illustrations provided in the following embodiments merely illustrate the basic concepts of the disclosure by way of illustration, and only the components related to the disclosure are shown in the illustrations, rather than being drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complex.
In addition, in the following description, specific details are provided in order to provide a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
The embodiment discloses a service dynamic forwarding method, which comprises the following steps:
acquiring an access log of service analysis proxy-based service in a service list, and updating and selecting a load balancing service and a load balancing strategy based on the access log and a load balancing algorithm; and dynamically adjusting resources based on the threshold strategy, the predictive strategy and the queuing theory so as to finish service dynamic forwarding.
Optionally, the load balancing algorithm is combined to update the selected load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
Optionally, the load balancing algorithm includes polling, weighted polling, or weighted random.
Optionally, the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
Optionally, the threshold strategy and the predictive strategy include an adaptive learning algorithm or an exponential smoothing algorithm.
Optionally, before the step of obtaining the access log of the service analysis agent-based service in the service list, the method includes:
and accessing the proxy service in the service list, inquiring an actual service address through a route mapping, accessing the actual service address, recording an access log, and after the service of the actual service address returns the service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content.
Optionally, the step of accessing the proxy service in the service list includes resolving the proxy service to obtain a resolved result, where the resolved result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the resolved result.
Optionally, resolving the proxy service includes:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Optionally, the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm are preceded by:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
Optionally, the extracted key information includes:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
As shown in fig. 1, in a specific application scenario, the service dynamic forwarding method specifically includes the following steps:
step 1: and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule (Route) and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
Step 2: the program automatically creates and starts service preprocessing tasks: according to different service protocols, a service calling client object is dynamically created, a client method is executed to call the service, return information of the service is transmitted into a text analysis model (transducer) to deeply analyze the service return content, and key information and Metadata (Metadata) information are automatically extracted.
Step 3: and (3) calling a key data processing engine, and performing secondary analysis processing on the key information extracted in the step (2): invoking a sensitive data processor to customize the desensitization rules for the critical information. And calling a key information checker to judge whether information related to the original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists. And automatically judging and selecting a proper encryption algorithm according to the key information. And stores the desensitization rule, the route rewriting rule and the encryption algorithm of the service into a database.
Step 4: and (3) sending the address after the agent in the step (1) to a dynamic agent processing engine, and storing the agent address into a service list after the dynamic agent processing engine analyzes the service address, the service key information and the metadata information obtained in the step (1) and the step (2) and automatically selects proper and load balancing service and load balancing rules.
Step 5: the user accesses the proxy service obtained in the step 4, finds the actual service address through the route mapping, the component accesses the actual service address and records the access log, the program intercepts after the service returns the content, and the desensitization rule, the route rewriting rule and the encryption algorithm obtained in the step 3 are called to process the returned service content and then return.
Step 6: the service inspection tool obtains the access log of the proxy service from the service analysis step 5 in the service list in the step 4. And intelligently updating the selected load balancing service and load balancing strategy by combining a load balancing algorithm. The hardware monitoring tool is used for dynamically adjusting resources based on a threshold strategy monitoring method, a predictive strategy and a queuing theory, so that high performance and high availability of proxy service are ensured.
The basic principles of the present disclosure have been described above in connection with specific embodiments, however, it should be noted that the advantages, benefits, effects, etc. mentioned in the present disclosure are merely examples and not limiting, and these advantages, benefits, effects, etc. are not to be considered as necessarily possessed by the various embodiments of the present disclosure. Furthermore, the specific details disclosed herein are for purposes of illustration and understanding only, and are not intended to be limiting, since the disclosure is not necessarily limited to practice with the specific details described.
In this disclosure, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Words such as "including," "comprising," "having," and the like are words of openness and mean "including but not limited to," and are used interchangeably therewith. The terms "or" and "as used herein refer to and are used interchangeably with the term" and/or "unless the context clearly indicates otherwise. The term "such as" as used herein refers to, and is used interchangeably with, the phrase "such as, but not limited to.
In addition, as used herein, the use of "or" in the recitation of items beginning with "at least one" indicates a separate recitation, such that recitation of "at least one of A, B or C" for example means a or B or C, or AB or AC or BC, or ABC (i.e., a and B and C). Furthermore, the term "exemplary" does not mean that the described example is preferred or better than other examples.
It is also noted that in the systems and methods of the present disclosure, components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered equivalent to the present disclosure.
Various changes, substitutions, and alterations are possible to the techniques described herein without departing from the teachings of the techniques defined by the appended claims. Furthermore, the scope of the claims of the present disclosure is not limited to the particular aspects of the process, machine, manufacture, composition of matter, means, methods and acts described above. The processes, machines, manufacture, compositions of matter, means, methods, or acts, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding aspects described herein may be utilized. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or acts.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the disclosure. Thus, the present disclosure is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the disclosure to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.
Claims (8)
1. A method for dynamic forwarding of services, comprising:
acquiring services in a service list, analyzing access logs of proxy-based services, and updating and selecting load balancing services and load balancing strategies based on the access logs and a load balancing algorithm; performing dynamic resource adjustment based on a threshold strategy, a predictive strategy and a queuing theory so as to finish dynamic forwarding of the service;
before the step of obtaining an access log for the service analysis agent-based service in the service list, it comprises:
accessing proxy service in the service list, inquiring an actual service address through route mapping, accessing the actual service address, recording an access log, and after the actual service address is accessed to return service content, calling a desensitization rule, a route rewriting rule and an encryption algorithm to process the returned service content;
the steps of invoking the desensitization rule, the route rewriting rule and the encryption algorithm are preceded by:
calling a key information checker to judge whether information related to an original service address exists, and calling a rule engine to generate a route rewriting rule if the information related to the original service address exists;
the load balancing algorithm is combined to update and select load balancing service and load balancing strategy; performing dynamic resource adjustment based on a threshold policy monitoring method, a predictive policy and a queuing theory to complete dynamic forwarding of services, including:
detecting a load through a load balancing algorithm;
managing load resources based on a threshold policy;
predicting a load based on a predictive strategy;
determining load resource requirements using queuing theory to meet corresponding performance objectives;
deep learning and machine learning techniques are used to build models to complete automatic proxy configuration and automatic configuration of services to be proxied.
2. The service dynamic forwarding method of claim 1 wherein the load balancing algorithm comprises polling or weighted random.
3. The service dynamic forwarding method of claim 1 wherein the threshold policy is based on CPU utilization, memory utilization, and/or request queue length.
4. The service dynamic forwarding method of claim 1 wherein the threshold policy, the predictive policy, comprises an adaptive learning algorithm or an exponential smoothing algorithm.
5. The method according to claim 1, wherein the step of accessing the proxy service in the service list includes, before the step of accessing the proxy service in the service list, parsing the proxy service to obtain a parsing result, where the parsing result includes a service address, service key information and metadata information, and storing the proxy address in the service list after automatically selecting a corresponding load balancing service and load balancing rule based on the parsing result.
6. The service dynamic forwarding method of claim 5 wherein resolving the proxy service comprises:
and resolving the service requiring the proxy, automatically matching and establishing the mapping relation between the routing rule and the actual service address, generating the proxy address and storing the proxy address into a relational database and a memory database.
7. The service dynamic forwarding method of claim 1 wherein before the steps of invoking the desensitization rule, the routing rewrite rule, and the encryption algorithm further comprise:
analyzing and processing the extracted key information, and calling a sensitive data processor to customize a desensitization rule for the key information; automatically selecting an encryption algorithm according to the key information; and storing the desensitization rule, the route rewriting rule and the encryption algorithm corresponding to the service into a database.
8. The service dynamic forwarding method of claim 7 wherein the extracted key information comprises:
and dynamically creating a service call client object according to a service protocol of the proxy service, executing a client method to call the service, transmitting the return information of the service into a text analysis model to deeply analyze the service return content, and automatically extracting key information and metadata information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311482692.3A CN117221323B (en) | 2023-11-09 | 2023-11-09 | Service dynamic forwarding method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311482692.3A CN117221323B (en) | 2023-11-09 | 2023-11-09 | Service dynamic forwarding method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117221323A CN117221323A (en) | 2023-12-12 |
CN117221323B true CN117221323B (en) | 2024-02-02 |
Family
ID=89039373
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311482692.3A Active CN117221323B (en) | 2023-11-09 | 2023-11-09 | Service dynamic forwarding method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117221323B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124670A (en) * | 2019-12-05 | 2020-05-08 | 航天科工网络信息发展有限公司 | Tactical cloud-oriented micro-service platform |
CN113746894A (en) * | 2021-07-23 | 2021-12-03 | 济南浪潮数据技术有限公司 | Method and device for realizing load balancing based on HDFS RBF routing layer |
CN113949707A (en) * | 2021-09-30 | 2022-01-18 | 上海浦东发展银行股份有限公司 | OpenResty and K8S-based container cloud service discovery and load balancing method |
CN113946450A (en) * | 2021-11-03 | 2022-01-18 | 北京航空航天大学 | Self-adaptive authorized polling load balancing system for K8S micro service framework |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10146593B2 (en) * | 2017-02-17 | 2018-12-04 | Sas Institute Inc. | Techniques for decentralized load balancing |
US20180287914A1 (en) * | 2017-03-30 | 2018-10-04 | Wipro Limited | System and method for management of services in a cloud environment |
-
2023
- 2023-11-09 CN CN202311482692.3A patent/CN117221323B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111124670A (en) * | 2019-12-05 | 2020-05-08 | 航天科工网络信息发展有限公司 | Tactical cloud-oriented micro-service platform |
CN113746894A (en) * | 2021-07-23 | 2021-12-03 | 济南浪潮数据技术有限公司 | Method and device for realizing load balancing based on HDFS RBF routing layer |
CN113949707A (en) * | 2021-09-30 | 2022-01-18 | 上海浦东发展银行股份有限公司 | OpenResty and K8S-based container cloud service discovery and load balancing method |
CN113946450A (en) * | 2021-11-03 | 2022-01-18 | 北京航空航天大学 | Self-adaptive authorized polling load balancing system for K8S micro service framework |
Also Published As
Publication number | Publication date |
---|---|
CN117221323A (en) | 2023-12-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3667500B1 (en) | Using a container orchestration service for dynamic routing | |
US10812409B2 (en) | Network multi-tenancy for cloud based enterprise resource planning solutions | |
US9729557B1 (en) | Dynamic throttling systems and services | |
US9686152B2 (en) | Techniques for tracking resource usage statistics per transaction across multiple layers of protocols | |
US8745202B2 (en) | Tracking remote browser crashes via cookies | |
US20220030007A1 (en) | Real-time scanning of ip addresses | |
US8631465B2 (en) | Terminal of an environment management station and a service user provided a service, method for processing an evaluation value of a terminal, a service request and a service providing | |
CN112087520B (en) | Data processing method, device, equipment and computer readable storage medium | |
SG191557A1 (en) | Methods and systems for service discovery and selection | |
US8600960B2 (en) | Processing proposed changes to data | |
US20110119373A1 (en) | Service workflow generation apparatus and method | |
CN112527504A (en) | Multi-tenant resource quota management method and device, and computer equipment | |
WO2017039576A1 (en) | Propagating belief information about malicious and benign nodes | |
US9891930B2 (en) | Rapid identification of object properties in an evolving domain model of an enterprise application on the cloud | |
US7526772B2 (en) | Method and apparatus for transforming systems management native event formats to enable correlation | |
CN117221323B (en) | Service dynamic forwarding method | |
US20200184014A1 (en) | Internet of everything | |
Scherb et al. | Execution plans for serverless computing in information centric networking | |
US20120066554A1 (en) | Application query control with cost prediction | |
US10866876B2 (en) | Dynamically configurable operation information collection | |
US11366648B2 (en) | Compiling monoglot function compositions into a single entity | |
US20120029961A1 (en) | Method, device and computer program product for service balancing in an electronic communications system | |
CN110768957B (en) | Network security cooperative processing method, system and storage medium | |
Sulaiman et al. | Mamoc-android: Multisite adaptive computation offloading for android applications | |
CN108833108B (en) | Signature verification method, device and medium based on content-centric network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |