CN112799830A - Routing method and device for trusted computing request - Google Patents
Routing method and device for trusted computing request Download PDFInfo
- Publication number
- CN112799830A CN112799830A CN202110035270.6A CN202110035270A CN112799830A CN 112799830 A CN112799830 A CN 112799830A CN 202110035270 A CN202110035270 A CN 202110035270A CN 112799830 A CN112799830 A CN 112799830A
- Authority
- CN
- China
- Prior art keywords
- trusted computing
- algorithm
- computing algorithm
- resource load
- algorithms
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 520
- 238000012544 monitoring process Methods 0.000 claims abstract description 13
- 230000015654 memory Effects 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 4
- 238000004364 calculation method Methods 0.000 abstract description 12
- 238000005516 engineering process Methods 0.000 abstract description 7
- 238000012545 processing Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 6
- 230000000694 effects Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5005—Allocation of resources, e.g. of the central processing unit [CPU] to service a request
- G06F9/5027—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals
- G06F9/505—Allocation of resources, e.g. of the central processing unit [CPU] to service a request the resource being a machine, e.g. CPUs, Servers, Terminals considering the load
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5083—Techniques for rebalancing the load in a distributed system
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a routing method and a routing device for a trusted computing request, and relates to the field of block chains. Wherein, the method comprises the following steps: routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms; monitoring a relationship between a resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm; and under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be larger than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, distributing the first resource load to a second trusted computing algorithm in the plurality of trusted computing algorithms. The method and the device solve the technical problem that the calculation pressure of the credible calculation algorithm is large in the related technology.
Description
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for routing a trusted computing request.
Background
In a trusted computing scenario, there are currently a variety of trusted computing algorithms. The current trusted computing platform can only provide a single type of trusted computing algorithm for a multi-party application computing resource scenario, on one hand, the single type of trusted computing algorithm is not necessarily suitable for different applications, and on the other hand, the load that the single type of trusted computing algorithm can bear is limited, which may not satisfy a large amount of concurrent computing requests, and may cause a reduction in computing efficiency due to a large computing pressure.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The application provides a routing method and a routing device for a trusted computing request, which are used for at least solving the technical problem of high computing pressure of a trusted computing algorithm in the related art.
According to an aspect of an embodiment of the present application, there is provided a method for routing a trusted computing request, including:
routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
monitoring a relationship between a resource load of each trusted computing algorithm of the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm;
and under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be larger than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, distributing the first resource load to a second trusted computing algorithm in the plurality of trusted computing algorithms.
Optionally, allocating the first resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
obtaining a second resource load exceeding a second resource load threshold from the first resource load, wherein the second resource load threshold is less than or equal to the first resource load threshold;
allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
Optionally, allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
acquiring a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or taking a trusted computing algorithm with the smallest current resource load as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
Optionally, allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold value from a third trusted computing algorithm as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm except the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
Optionally, allocating the second resource load to the second trusted computing algorithm comprises one of:
load-sharing the second resource to the second trusted computing algorithm;
and allocating the second resource load to the second trusted computing algorithm according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, wherein the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
Optionally, routing the trusted computing request sent by the application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms includes:
determining a trusted computing algorithm corresponding to the application system according to the matching degree between each trusted computing algorithm in the plurality of trusted computing algorithms and the application system and/or the credibility of each trusted computing algorithm;
and routing the trusted computing request sent by the application system to a trusted computing algorithm corresponding to the application system.
Optionally, determining the trusted computing algorithm corresponding to the application system according to the matching degree between each of the plurality of trusted computing algorithms and the application system includes:
calculating the matching degree between each trusted computing algorithm and the application system;
and determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, determining, according to the reliability of each trusted computing algorithm, a trusted computing algorithm corresponding to the application system includes:
determining the credibility of each credible computing algorithm;
and determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, determining, according to the matching degree between each of the plurality of trusted computing algorithms and the application system and the credibility of each of the plurality of trusted computing algorithms, a trusted computing algorithm corresponding to the application system includes:
calculating the matching degree between each trusted computing algorithm and the application system;
determining the credibility of a credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
According to another aspect of the embodiments of the present application, there is also provided a routing apparatus for a trusted computing request, including:
the routing module is used for routing the trusted computing request sent by the application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
the monitoring module is used for monitoring the relation between the resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and the resource load threshold value corresponding to each trusted computing algorithm;
the allocation module is used for allocating a first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms to a second trusted computing algorithm in the plurality of trusted computing algorithms when the first resource load is monitored to be greater than or equal to a first resource load threshold corresponding to the first trusted computing algorithm.
Optionally, the allocation module comprises:
an obtaining unit, configured to obtain, from the first resource load, a second resource load that exceeds a second resource load threshold, where the second resource load threshold is less than or equal to the first resource load threshold;
an allocating unit configured to allocate the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
Optionally, the allocation unit is configured to:
acquiring a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or taking a trusted computing algorithm with the smallest current resource load as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
Optionally, the allocation unit is configured to:
obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold value from a third trusted computing algorithm as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm except the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
Optionally, the allocation unit is for one of:
load-sharing the second resource to the second trusted computing algorithm;
and allocating the second resource load to the second trusted computing algorithm according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, wherein the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
Optionally, the routing module includes:
a determining unit, configured to determine, according to a matching degree between each of the plurality of trusted computing algorithms and the application system and/or a reliability degree of each of the plurality of trusted computing algorithms, a trusted computing algorithm corresponding to the application system;
and the routing module is used for routing the trusted computing request sent by the application system to the trusted computing algorithm corresponding to the application system.
Optionally, the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
and determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, the determining unit is configured to:
determining the credibility of each credible computing algorithm;
and determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
determining the credibility of a credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
According to another aspect of the embodiments of the present application, there is also provided a storage medium including a stored program which, when executed, performs the above-described method.
According to another aspect of the embodiments of the present application, there is also provided an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the above method through the computer program.
In the embodiment of the application, a trusted computing request sent by an application system is routed to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms; monitoring a relationship between a resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm; under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be greater than or equal to a first resource load threshold value corresponding to the first trusted computing algorithm, the first resource load is distributed to a second trusted computing algorithm in the plurality of trusted computing algorithms, the computing requirements of various application systems are met by the plurality of trusted computing algorithms, trusted computing requests sent by the application systems can be routed to the trusted computing algorithm corresponding to the application systems for processing, the relation between the resource load of each trusted computing algorithm and the resource load threshold value corresponding to each trusted computing algorithm is monitored in real time in the processing process, the resource load borne by the first trusted computing algorithm with the first resource load greater than or equal to the first resource load threshold value is distributed, and the computing pressure is shared by the second trusted computing algorithm in the plurality of trusted computing algorithms, the method achieves the purpose of releasing pressure for the credible computing algorithm with overlarge bearing pressure and balancing and distributing the resource load among the credible computing algorithms, thereby achieving the technical effects of reducing the computing pressure of the credible computing algorithm and improving the computing efficiency of the credible computing algorithm, and further solving the technical problem of higher computing pressure of the credible computing algorithm in the related technology.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a schematic diagram of a hardware environment for a method of routing trusted computing requests according to an embodiment of the present application;
FIG. 2 is a flow chart of an alternative method for routing trusted computing requests according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a resource load off-peak automatic routing process according to an alternative embodiment of the present application;
FIG. 4 is a schematic diagram of an alternative trusted computing request routing apparatus according to an embodiment of the present application;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of embodiments of the present application, an embodiment of a method for routing of trusted computing requests is provided.
Alternatively, in the present embodiment, the above-described routing method for trusted computing requests may be applied to a hardware environment composed of terminals (101-1 to 101-m), a server 103, and servers (105-1 to 105-n) as shown in fig. 1. As shown in fig. 1, the server 103 is connected to the terminals (101-1 to 101-m) and the servers (105-1 to 105-n) through a network, which may be used to provide services (such as request routing services) for the terminals or clients installed on the terminals, and a database may be provided on the server or separately from the server, and may be used to provide data storage services for the server 103, and the network includes but is not limited to: the terminal (101-1 to 101-m) is not limited to a PC, a mobile phone, a tablet computer, a server device, or the like. The routing method of the trusted computing request of the embodiment of the present application may be executed by the server 103. The servers (105-1 to 105-n) may be, but are not limited to being, for providing a plurality of trusted computing algorithms. One or more application systems can be installed on the terminals (101-1 to 101-m), but are not limited to.
Fig. 2 is a flowchart of an alternative method for routing a trusted computing request according to an embodiment of the present application, and as shown in fig. 2, the method may include the following steps:
step S202, routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
step S204, monitoring the relation between the resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and the resource load threshold value corresponding to each trusted computing algorithm;
step S206, when it is monitored that a first resource load of a first trusted computing algorithm of the plurality of trusted computing algorithms is greater than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, allocating the first resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
Through the steps S202 to S206, the computing requirements of various application systems are met by providing a plurality of trusted computing algorithms, the trusted computing requests sent by the application systems can be routed to the trusted computing algorithms corresponding to the application systems for processing, the relationship between the resource load of each trusted computing algorithm and the resource load threshold corresponding to each trusted computing algorithm is monitored in real time in the processing process, the resource load borne by a first trusted computing algorithm with a first resource load greater than or equal to the first resource load threshold is distributed, the second trusted computing algorithm in the plurality of trusted computing algorithms shares the computing pressure, the pressure is released for the trusted computing algorithm with the overlarge bearing pressure, the resource load among the trusted computing algorithms is distributed in a balanced manner, and the computing pressure of the trusted computing algorithms is reduced, the technical effect of improving the calculation efficiency of the trusted calculation algorithm is achieved, and the technical problem that the calculation pressure of the trusted calculation algorithm is high in the related technology is solved.
Optionally, in this embodiment, the above-mentioned routing method for the trusted computing request may be applied, but not limited, to a scenario in which a trusted computing service is provided for an application system. Such as: in blockchain technology, trusted computing services are provided for blockchain applications.
In the technical solution provided in step S202, the application system may include, but is not limited to, an operating system including various types of application programs, such as: a gaming application, an educational application, a browser application, a shopping application, a financial application, a multimedia application, a live application, a short video application, an audio application, and the like.
Optionally, in this embodiment, the trusted computing request may be, but is not limited to, a request for trusted computing for the application system.
Optionally, in this embodiment, Trusted Computing, or Trusted Computing (TC) is a technology that is pushed and developed by a Trusted Computing group (TCPA). Trusted computing is a trusted computing platform widely used in computing and communication systems and based on the support of a hardware security module, so as to improve the security of the whole system.
Optionally, in this embodiment, the plurality of trusted computing algorithms may include, but are not limited to: homomorphic encryption (e.g., partially homomorphic encryption and fully homomorphic encryption), multiparty security computation (MPC), zero knowledge proof, and the like.
Optionally, in the present embodiment, each trusted computing algorithm may be, but is not limited to be, deployed as one or more trusted computing algorithm clusters, referred to as a trusted computing algorithm pool.
In the technical solution provided in step S204, each trusted computing algorithm corresponds to a resource load threshold value matched thereto, where the resource load threshold value may be set or calculated according to the carrying capacity of each trusted computing algorithm, but is not limited to.
Optionally, in this embodiment, the resource load of the trusted computing algorithm may be represented by, but is not limited to, using information such as a carrying capacity of the trusted computing request, an occupied amount of the computing resource, and an occupied amount of the storage resource.
In the technical solution provided in step S206, the first trusted computing algorithm is a trusted computing algorithm whose resource load is greater than or equal to a resource load threshold corresponding thereto in the plurality of trusted computing algorithms, and the number of the first trusted computing algorithms may be one or more.
Optionally, in this embodiment, the second trusted computing algorithm may be, but is not limited to, a trusted computing algorithm of the plurality of trusted computing algorithms whose resource load does not exceed the corresponding resource load threshold.
As an alternative embodiment, the load allocating the first resource to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
s11, obtaining a second resource load exceeding a second resource load threshold from the first resource load, wherein the second resource load threshold is smaller than or equal to the first resource load threshold;
s12, distributing the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
Optionally, in this embodiment, a portion of the first resource load exceeding the second resource load threshold may be allocated as the second resource load. The second resource load threshold is less than or equal to the first resource load threshold, i.e., the resource load of the first trusted computing algorithm may be reduced to the first resource load threshold, or the resource load of the first trusted computing algorithm may be reduced to a lower threshold than the first resource load threshold.
Such as: the first resource load is 150 and the first resource load threshold is 100, one way may be to assign 50 of the first resource load as the second resource load to the second trusted computing algorithm. Another way may be to set the second resource load threshold to 85 and assign 65 of the first resource loads as the second resource load to the second trusted computing algorithm.
As an alternative embodiment, allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
s21, obtaining a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or taking a trusted computing algorithm with a smallest current resource load as the second trusted computing algorithm, where the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
s22, distributing the second resource load to the second trusted computing algorithm.
Optionally, in this embodiment, one way to allocate the second resource load is to allocate the second resource load to one of the plurality of trusted computing algorithms other than the first trusted computing algorithm.
Optionally, in this embodiment, the trusted computing algorithm that receives the second resource load may be randomly selected, or may be selected according to the current resource load, and one trusted computing algorithm with the smallest current resource load is used as the second trusted computing algorithm.
As an alternative embodiment, allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
s31, obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold from a third trusted computing algorithm as the second trusted computing algorithm, where the third trusted computing algorithm is a trusted computing algorithm of the plurality of trusted computing algorithms except for the first trusted computing algorithm;
s32, distributing the second resource load to the second trusted computing algorithm.
Optionally, in this embodiment, a manner of allocating the second resource load is to allocate the second resource load to a trusted computing algorithm whose current resource load is smaller than the corresponding resource load threshold. If the allocated resource load exceeds the corresponding resource load threshold, the above process can be continuously executed to allocate the exceeded part to other trusted computing algorithms.
As an alternative embodiment, the allocation of the second resource load to the second trusted computing algorithm comprises one of:
s41, distributing the second resource load to the second trusted computing algorithm evenly;
s42, allocating the second resource load to the second trusted computing algorithm according to a relationship between the current resource load corresponding to the second trusted computing algorithm and a resource load threshold, where the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
Optionally, in this embodiment, the manner of allocating the second resource load to the trusted computing algorithm whose current resource load is smaller than the corresponding resource load threshold may include, but is not limited to, two ways: one is average distribution, and the other is distribution according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, so as to ensure that the distributed resource load is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
As an alternative embodiment, the routing the trusted computing request sent by the application system to the trusted computing algorithm corresponding to the application system in the plurality of trusted computing algorithms includes:
s51, determining a trusted computing algorithm corresponding to the application system according to the matching degree between each trusted computing algorithm in the plurality of trusted computing algorithms and the application system and/or the credibility of each trusted computing algorithm;
s52, routing the trusted computing request sent by the application system to the trusted computing algorithm corresponding to the application system.
Optionally, in the present embodiment, the trusted computing request may be routed according to, but not limited to, a matching degree between each trusted computing algorithm and the application system and/or a trustworthiness of each trusted computing algorithm. Therefore, the corresponding trusted computing algorithm of the application system can be suitable for the application system or can provide the required credibility for the application system.
As an optional embodiment, determining the trusted computing algorithm corresponding to the application system according to the matching degree between each of the plurality of trusted computing algorithms and the application system includes:
s61, calculating the matching degree between each trusted computing algorithm and the application system;
and S62, determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, in this embodiment, but not limited to, the trusted computing algorithm with the highest matching degree with the application system may be obtained from the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system. Thereby providing the best-matching trusted computing algorithm for the application system.
As an optional embodiment, determining the trusted computing algorithm corresponding to the application system according to the trustworthiness of each trusted computing algorithm includes:
s71, determining the credibility of each credible computing algorithm;
and S72, determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
Optionally, in this embodiment, but not limited to, the trusted computing algorithm with the highest degree of trust may be obtained from the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system. Thereby ensuring high reliability of the calculation results obtained by the application system.
As an optional embodiment, determining, according to the matching degree between each of the plurality of trusted computing algorithms and the application system and the credibility of each of the plurality of trusted computing algorithms, a trusted computing algorithm corresponding to the application system includes:
s81, calculating the matching degree between each trusted computing algorithm and the application system;
s82, determining the credibility of the credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and S83, determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
Optionally, in this embodiment, but not limited to, a trusted computing algorithm with a relatively high matching degree with the application system may be obtained from a plurality of trusted computing algorithms, and then a trusted computing algorithm with the highest reliability may be obtained from the trusted computing algorithm with the relatively high matching degree as the trusted computing algorithm corresponding to the application system. Therefore, the credibility of the credible calculation is ensured, and the adaptability of the credible calculation algorithm and the application program is also ensured.
The present application further provides an alternative embodiment that provides a resource load off-peak automatic routing platform. Fig. 3 is a schematic diagram of an automatic resource load peak shifting routing process according to an alternative embodiment of the present application, where, as shown in fig. 3, the automatic resource load peak shifting routing platform is connected to a plurality of application systems such as application systems (1, 2, … …, N), and the automatic resource load peak shifting routing platform is further connected to a plurality of trusted computing algorithm pools such as trusted computing algorithm pools (1, 2, … …, M). In general, a resource load peak-shifting automatic routing platform routes trusted computing requests sent by each application system to a corresponding trusted computing algorithm pool for processing and monitors resource loads of the trusted computing algorithm pools, for example: the trusted computing request sent by the application system 1 is routed to the trusted computing algorithm pool 4, the trusted computing request sent by the application system 2 is routed to the trusted computing algorithm pool N, and so on.
When the concurrency of the trusted computing requests is large, automatic allocation is carried out, so that the trusted computing algorithm pool with high computing pressure can reduce the pressure, and dynamic balance of resource load is achieved among the plurality of trusted computing algorithm pools. Such as: and when the resource load of the trusted computing algorithm pool N is greater than a certain threshold, routing the part exceeding the threshold to the trusted computing algorithm pool 2 with the current smaller resource load.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling an electronic device (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
According to another aspect of the embodiment of the present application, there is also provided a routing apparatus for a trusted computing request, which is used for implementing the above-mentioned routing method for a trusted computing request. Fig. 4 is a schematic diagram of an alternative trusted computing request routing apparatus according to an embodiment of the present application, and as shown in fig. 4, the apparatus may include:
a routing module 42, configured to route a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
a monitoring module 44, configured to monitor a relationship between a resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm;
an allocating module 46, configured to, when it is monitored that a first resource load of a first trusted computing algorithm of the plurality of trusted computing algorithms is greater than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, allocate the first resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
It should be noted that the routing module 42 in this embodiment may be configured to execute step S202 in this embodiment, the monitoring module 44 in this embodiment may be configured to execute step S204 in this embodiment, and the allocating module 46 in this embodiment may be configured to execute step S206 in this embodiment.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may operate in a hardware environment as shown in fig. 1, and may be implemented by software or hardware.
Through the modules, the calculation requirements of various application systems are met by providing a plurality of trusted calculation algorithms, the trusted calculation requests sent by the application systems can be routed to the corresponding trusted calculation algorithms for processing, the relationship between the resource load of each trusted calculation algorithm and the resource load threshold corresponding to each trusted calculation algorithm is monitored in real time in the processing process, the resource load borne by the first trusted calculation algorithm is distributed for the first trusted calculation algorithm with the first resource load being greater than or equal to the first resource load threshold, the second trusted calculation algorithm in the plurality of trusted calculation algorithms shares the calculation pressure for the first trusted calculation algorithm, the pressure is released for the trusted calculation algorithm with the overlarge bearing pressure, the resource load among the trusted calculation algorithms is distributed in a balanced manner, the calculation pressure of the trusted calculation algorithms is reduced, and the technical effects of improving the calculation efficiency of the trusted calculation algorithms are achieved, and the technical problem that the calculation pressure of a credible calculation algorithm is large in the related technology is solved.
As an alternative embodiment, the allocation module comprises:
an obtaining unit, configured to obtain, from the first resource load, a second resource load that exceeds a second resource load threshold, where the second resource load threshold is less than or equal to the first resource load threshold;
an allocating unit configured to allocate the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
As an alternative embodiment, the allocation unit is configured to:
acquiring a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or taking a trusted computing algorithm with the smallest current resource load as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
As an alternative embodiment, the allocation unit is configured to:
obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold value from a third trusted computing algorithm as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm except the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
As an alternative embodiment, the allocation unit is adapted to one of:
load-sharing the second resource to the second trusted computing algorithm;
and allocating the second resource load to the second trusted computing algorithm according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, wherein the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
As an alternative embodiment, the routing module includes:
a determining unit, configured to determine, according to a matching degree between each of the plurality of trusted computing algorithms and the application system and/or a reliability degree of each of the plurality of trusted computing algorithms, a trusted computing algorithm corresponding to the application system;
and the routing module is used for routing the trusted computing request sent by the application system to the trusted computing algorithm corresponding to the application system.
As an alternative embodiment, the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
and determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
As an alternative embodiment, the determining unit is configured to:
determining the credibility of each credible computing algorithm;
and determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
As an alternative embodiment, the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
determining the credibility of a credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
It should be noted here that the modules described above are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the above embodiments. It should be noted that the modules described above as a part of the apparatus may be operated in a hardware environment as shown in fig. 1, and may be implemented by software, or may be implemented by hardware, where the hardware environment includes a network environment.
According to another aspect of the embodiment of the present application, there is also provided an electronic apparatus for implementing the above-mentioned trusted computing request routing method.
Fig. 5 is a block diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 5, the electronic device may include: one or more processors 501 (only one of which is shown), a memory 503, and a transmission means 505. as shown in fig. 5, the electronic apparatus may further include an input/output device 507.
The memory 503 may be configured to store software programs and modules, such as program instructions/modules corresponding to the routing method and apparatus for a trusted computing request in the embodiment of the present application, and the processor 501 executes various functional applications and data processing by running the software programs and modules stored in the memory 503, that is, implements the routing method for a trusted computing request. The memory 503 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 503 may further include memory located remotely from the processor 501, which may be connected to the electronic device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission means 505 is used for receiving or sending data via a network, and may also be used for data transmission between the processor and the memory. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 505 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device 505 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Among them, the memory 503 is used to store an application program in particular.
The processor 501 may call the application stored in the memory 503 through the transmission means 505 to perform the following steps:
routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
monitoring a relationship between a resource load of each trusted computing algorithm of the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm;
and under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be larger than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, distributing the first resource load to a second trusted computing algorithm in the plurality of trusted computing algorithms.
By adopting the embodiment of the application, a scheme for routing the trusted computing request is provided. The method meets the computing requirements of various application systems by providing a plurality of trusted computing algorithms, the trusted computing requests sent by the application systems can be routed to the corresponding trusted computing algorithms to be processed, the relationship between the resource load of each trusted computing algorithm and the resource load threshold value corresponding to each trusted computing algorithm is monitored in real time in the processing process, the resource load borne by the first trusted computing algorithm with the first resource load greater than or equal to the first resource load threshold value is distributed, the second trusted computing algorithm in the plurality of trusted computing algorithms shares the computing pressure, the purpose of releasing the pressure for the trusted computing algorithm with overlarge bearing pressure and balancing and distributing the resource load among the trusted computing algorithms is achieved, the computing pressure of the trusted computing algorithms is reduced, and the technical effects of improving the computing efficiency of the trusted computing algorithms are achieved, and the technical problem that the calculation pressure of a credible calculation algorithm is large in the related technology is solved.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
It will be understood by those skilled in the art that the structure shown in fig. 5 is merely an illustration, and the electronic device may be a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc. Fig. 5 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 5, or have a different configuration than shown in FIG. 5.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program for instructing hardware associated with an electronic device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
Embodiments of the present application also provide a storage medium. Optionally, in this embodiment, the storage medium may be used to execute a program code of a routing method for a trusted computing request.
Optionally, in this embodiment, the storage medium may be located on at least one of a plurality of network devices in a network shown in the above embodiment.
Optionally, in this embodiment, the storage medium is configured to store program code for performing the following steps:
routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
monitoring a relationship between a resource load of each trusted computing algorithm of the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm;
and under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be larger than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, distributing the first resource load to a second trusted computing algorithm in the plurality of trusted computing algorithms.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, network devices, or the like) to execute all or part of the steps of the method described in the embodiments of the present application.
In the above embodiments of the present application, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.
Claims (20)
1. A method for routing a trusted computing request, comprising:
routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
monitoring a relationship between a resource load of each trusted computing algorithm of the plurality of trusted computing algorithms and a resource load threshold corresponding to each trusted computing algorithm;
and under the condition that the first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms is monitored to be larger than or equal to a first resource load threshold corresponding to the first trusted computing algorithm, distributing the first resource load to a second trusted computing algorithm in the plurality of trusted computing algorithms.
2. The method of claim 1, wherein the allocating the first resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
obtaining a second resource load exceeding a second resource load threshold from the first resource load, wherein the second resource load threshold is less than or equal to the first resource load threshold;
allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
3. The method of claim 2, wherein allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
acquiring a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or taking a trusted computing algorithm with the smallest current resource load as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
4. The method of claim 2, wherein allocating the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms comprises:
obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold value from a third trusted computing algorithm as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm except the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
5. The method of claim 4, wherein the allocating the second resource load to the second trusted computing algorithm comprises one of:
load-sharing the second resource to the second trusted computing algorithm;
and allocating the second resource load to the second trusted computing algorithm according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, wherein the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
6. The method of claim 1, wherein routing a trusted computing request sent by an application system to a trusted computing algorithm corresponding to the application system among a plurality of trusted computing algorithms comprises:
determining a trusted computing algorithm corresponding to the application system according to the matching degree between each trusted computing algorithm in the plurality of trusted computing algorithms and the application system and/or the credibility of each trusted computing algorithm;
and routing the trusted computing request sent by the application system to a trusted computing algorithm corresponding to the application system.
7. The method of claim 6, wherein determining the trusted computing algorithm corresponding to the application system based on the degree of match between each of the plurality of trusted computing algorithms and the application system comprises:
calculating the matching degree between each trusted computing algorithm and the application system;
and determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
8. The method of claim 6, wherein determining the trusted computing algorithm corresponding to the application system based on the trustworthiness of each trusted computing algorithm comprises:
determining the credibility of each credible computing algorithm;
and determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
9. The method of claim 6, wherein determining the trusted computing algorithm corresponding to the application system based on the degree of match between each of the plurality of trusted computing algorithms and the application system and the degree of trustworthiness of each of the plurality of trusted computing algorithms comprises:
calculating the matching degree between each trusted computing algorithm and the application system;
determining the credibility of a credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
10. An apparatus for routing a trusted computing request, comprising:
the routing module is used for routing the trusted computing request sent by the application system to a trusted computing algorithm corresponding to the application system in a plurality of trusted computing algorithms;
the monitoring module is used for monitoring the relation between the resource load of each trusted computing algorithm in the plurality of trusted computing algorithms and the resource load threshold value corresponding to each trusted computing algorithm;
the allocation module is used for allocating a first resource load of a first trusted computing algorithm in the plurality of trusted computing algorithms to a second trusted computing algorithm in the plurality of trusted computing algorithms when the first resource load is monitored to be greater than or equal to a first resource load threshold corresponding to the first trusted computing algorithm.
11. The apparatus of claim 10, wherein the assignment module comprises:
an obtaining unit, configured to obtain, from the first resource load, a second resource load that exceeds a second resource load threshold, where the second resource load threshold is less than or equal to the first resource load threshold;
an allocating unit configured to allocate the second resource load to a second trusted computing algorithm of the plurality of trusted computing algorithms.
12. The apparatus of claim 11, wherein the allocation unit is configured to:
acquiring a random trusted computing algorithm from a third trusted computing algorithm as the second trusted computing algorithm, or acquiring a trusted computing algorithm with the smallest current resource load as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm other than the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
13. The apparatus of claim 11, wherein the allocation unit is configured to:
obtaining a trusted computing algorithm with a current resource load smaller than a corresponding resource load threshold value from a third trusted computing algorithm as the second trusted computing algorithm, wherein the third trusted computing algorithm is a trusted computing algorithm except the first trusted computing algorithm in the plurality of trusted computing algorithms;
allocating the second resource load to the second trusted computing algorithm.
14. The apparatus of claim 13, wherein the allocation unit is configured to one of:
load-sharing the second resource to the second trusted computing algorithm;
and allocating the second resource load to the second trusted computing algorithm according to the relationship between the current resource load corresponding to the second trusted computing algorithm and the resource load threshold, wherein the allocated resource load corresponding to the second trusted computing algorithm is less than or equal to the resource load threshold corresponding to the second trusted computing algorithm.
15. The apparatus of claim 10, wherein the routing module comprises:
a determining unit, configured to determine, according to a matching degree between each of the plurality of trusted computing algorithms and the application system and/or a reliability degree of each of the plurality of trusted computing algorithms, a trusted computing algorithm corresponding to the application system;
and the routing module is used for routing the trusted computing request sent by the application system to the trusted computing algorithm corresponding to the application system.
16. The apparatus of claim 15, wherein the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
and determining the trusted computing algorithm with the highest matching degree with the application system in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
17. The apparatus of claim 15, wherein the determining unit is configured to:
determining the credibility of each credible computing algorithm;
and determining the trusted computing algorithm with the highest credibility in the plurality of trusted computing algorithms as the trusted computing algorithm corresponding to the application system.
18. The apparatus of claim 15, wherein the determining unit is configured to:
calculating the matching degree between each trusted computing algorithm and the application system;
determining the credibility of a credible computing algorithm with the matching degree between the credible computing algorithm and the application system higher than the target matching degree;
and determining the trusted computing algorithm with the highest reliability in the trusted computing algorithms with the matching degree higher than the target matching degree between the application systems as the trusted computing algorithm corresponding to the application systems.
19. A storage medium, characterized in that the storage medium comprises a stored program, wherein the program when executed performs the method of any of the preceding claims 1 to 9.
20. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the method of any of the preceding claims 1 to 9 by means of the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110035270.6A CN112799830B (en) | 2021-01-12 | 2021-01-12 | Routing method and device for trusted computing request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110035270.6A CN112799830B (en) | 2021-01-12 | 2021-01-12 | Routing method and device for trusted computing request |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112799830A true CN112799830A (en) | 2021-05-14 |
CN112799830B CN112799830B (en) | 2024-09-13 |
Family
ID=75810022
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110035270.6A Active CN112799830B (en) | 2021-01-12 | 2021-01-12 | Routing method and device for trusted computing request |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112799830B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276044A1 (en) * | 2017-03-27 | 2018-09-27 | International Business Machines Corporation | Coordinated, topology-aware cpu-gpu-memory scheduling for containerized workloads |
CN109639589A (en) * | 2018-12-27 | 2019-04-16 | 杭州迪普科技股份有限公司 | A kind of load-balancing method and device |
CN110597623A (en) * | 2019-08-13 | 2019-12-20 | 平安普惠企业管理有限公司 | Container resource allocation method and device, computer equipment and storage medium |
EP3622446A1 (en) * | 2017-05-08 | 2020-03-18 | British Telecommunications Public Limited Company | Load balancing of machine learning algorithms |
CN111934881A (en) * | 2020-07-14 | 2020-11-13 | 北京金山云网络技术有限公司 | Data right confirming method and device, storage medium and electronic device |
-
2021
- 2021-01-12 CN CN202110035270.6A patent/CN112799830B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180276044A1 (en) * | 2017-03-27 | 2018-09-27 | International Business Machines Corporation | Coordinated, topology-aware cpu-gpu-memory scheduling for containerized workloads |
EP3622446A1 (en) * | 2017-05-08 | 2020-03-18 | British Telecommunications Public Limited Company | Load balancing of machine learning algorithms |
CN109639589A (en) * | 2018-12-27 | 2019-04-16 | 杭州迪普科技股份有限公司 | A kind of load-balancing method and device |
CN110597623A (en) * | 2019-08-13 | 2019-12-20 | 平安普惠企业管理有限公司 | Container resource allocation method and device, computer equipment and storage medium |
CN111934881A (en) * | 2020-07-14 | 2020-11-13 | 北京金山云网络技术有限公司 | Data right confirming method and device, storage medium and electronic device |
Non-Patent Citations (1)
Title |
---|
张乾坤;李果;张福铮;: "基于OpenStack云平台的计算资源动态调度", 电子设计工程, no. 05, 5 March 2020 (2020-03-05) * |
Also Published As
Publication number | Publication date |
---|---|
CN112799830B (en) | 2024-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682397B (en) | Customer resources acquisition methods, device, terminal device and storage medium | |
CN106549878B (en) | Service distribution method and device | |
CN104395889A (en) | Application enhancement using edge data center | |
CN110750801A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN111163130B (en) | Network service system and data transmission method thereof | |
US20170171304A1 (en) | Service updating method and system for server cluster | |
CN110086886B (en) | Dynamic session holding method and device | |
US20180227139A1 (en) | Method of Terminal-Based Conference Load-Balancing, and Device and System Utilizing Same | |
CN111476572A (en) | Data processing method and device based on block chain, storage medium and equipment | |
CN103095824A (en) | File uploading control method and system | |
CN110691042A (en) | Resource allocation method and device | |
CN107506284A (en) | Log processing method and device | |
CN112866223B (en) | Routing method and device for homomorphic encryption request | |
Li et al. | A novel genetic service function deployment management platform for edge computing | |
CN111079164B (en) | Feature correlation calculation method, device, equipment and computer-readable storage medium | |
CN106681803B (en) | Task scheduling method and server | |
CN111131040A (en) | Route configuration method, device and system, storage medium and electronic device | |
CN112799830B (en) | Routing method and device for trusted computing request | |
US10552188B2 (en) | Virtual private cloud services with physical machine servers and virtual machines | |
CN112685163B (en) | Calculation unloading method based on mobile edge calculation and mobile edge calculation server | |
CN111539281B (en) | Distributed face recognition method and system | |
CN112596897A (en) | Method and system for multi-tenant isolation | |
CN105335362B (en) | The processing method and system of real time data, instant disposal system for treating | |
CN113783919B (en) | Access request distribution method, system, equipment and storage medium | |
US20210304884A1 (en) | Medical data processing method, cluster processing system and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |