-
公开(公告)号:US11934383B2
公开(公告)日:2024-03-19
申请号:US17824349
申请日:2022-05-25
Applicant: ZHEJIANG LAB
Inventor: Peilei Wang , Ruyun Zhang , Tao Zou , Peilong Huang
CPC classification number: G06F16/2365 , G06F16/21 , G06F16/275
Abstract: The disclosure discloses a mimetic database-based network operating system design method, including: designing a mimetic data structure; designing a mimetic data object; designing a synchronization mechanism and a decision mechanism, designing a mimetic database safe storage command processing system, and designing a classification storage mechanism for interacting data between service modules and a master database in a network operating system. By means of vertical hierarchy and horizontal classification, the problem of compatibility of the database subjected to mimetic transformation and a network operating system is solved. By means of a memory random distribution storage mechanism and a memory hardware heterogeneous storage mechanism, the cost caused by mimetic transformation can be reduced, and the cost is controllable while the safety is improved.
-
公开(公告)号:US11917523B2
公开(公告)日:2024-02-27
申请号:US18325139
申请日:2023-05-30
Applicant: ZHEJIANG LAB , INFORMATION ENGINEERING UNIVERSITY
Inventor: Zhongxia Pan , Peng Yi , Le Tian , Tao Zou , Juan Shen
IPC: H04W40/26 , H04L45/7453 , H04W76/25 , H04L45/02
CPC classification number: H04W40/26 , H04L45/04 , H04L45/7453 , H04W76/25
Abstract: A polymorphic network control system and a polymorphic network control system method supporting terminal mobile access. A network architecture is redesigned based on the idea of separation of an identifier from a locator. In this network mode, the three-layer protocol is no longer a traditional IP message, but a message carrying a locator and an identifier. The polymorphic SDN network controller is responsible for forwarding the data packet to a destination corresponding to a destination locator. When the network location of a mobile device is changed, the transmission connection established based on the identifier will suspend communication due to the disconnection of the physical link. When the mobile device is re-accessed and a new forwarding path is established, the transmission connection can recover communication.
-
公开(公告)号:US11870560B2
公开(公告)日:2024-01-09
申请号:US17966917
申请日:2022-10-17
Applicant: ZHEJIANG LAB
Inventor: Congqi Shen , Shaofeng Yao , Zhongxia Pan , Hanguang Luo , Tao Zou
IPC: H04L45/00 , H04L45/76 , H04L45/745
CPC classification number: H04L45/76 , H04L45/54 , H04L45/745
Abstract: A geographical identification forwarding method for area-oriented addressing. The geographic location information is used as a transmission identification, and the communication process based on the geographical identification is realized by constructing the SDN-based geographical identification transmission architecture. In this method, a geographical identification is used instead of a traditional IP identification for network transmission, which effectively alleviates the problem of narrow waist of IP single bearing in the current network. At the same time, through a flow table decomposition design, the flow table size of the switch is effectively controlled. The method provided by the present invention can be extended to a plurality of geographical identification areas to realize large-area real-time cross-domain transmission. The method is simple to operate, easy to realize and high in real-time; the method has a wide application range, and can be used to build new networks and improve network performance.
-
公开(公告)号:US11789639B1
公开(公告)日:2023-10-17
申请号:US18193623
申请日:2023-03-30
Applicant: ZHEJIANG LAB
Inventor: Hong Zhang , Yuan Liang , Tao Zou , Ruyun Zhang
IPC: G06F3/06 , G06F16/215
CPC classification number: G06F3/0652 , G06F3/0608 , G06F3/0673 , G06F16/215
Abstract: A method and an apparatus for screening TB-scale of incremental data. In the present application, according to the memory capacity of the device, the raw data is divided into a plurality of raw data blocks, and the data is cleaned. By adopting a single-block index sorting algorithm, the de-duplicating ordering in the data blocks is completed without dropping operation, and the processed data blocks and a matrix hash index table are respectively generated and saved as initial data after completion. For the subsequent incremental data, the inter-block index-sorting algorithm is adopted, and the processed data blocks and the matrix hash index table are loaded in turn. The data is preliminarily screened on the basis of the matrix hash index table, and an incremental binary search algorithm is used for fine screening. Finally, the indexing and de-duplication screening of all data are completed.
-
公开(公告)号:US12177072B1
公开(公告)日:2024-12-24
申请号:US18555805
申请日:2023-07-13
Applicant: ZHEJIANG LAB
Inventor: Peilei Wang , Ruyun Zhang , Jun Zhu , Tao Zou , Shunbin Li , Qi Xu
IPC: H04L41/082 , H04L41/0894 , H04L67/1097
Abstract: A data storage system includes: a server, a client and a control end; the control end is configured to generate a configuration file, and send the configuration file to the client and the server; the client is configured to generate an encapsulation rule based on the configuration file, generate a storage request, perform encapsulation on the storage request to obtain a message packet, and send the message packet to the server; the server is configured to generate an extraction unit and an action unit based on the configuration file, analyze the message packet to obtain the target information, write the target information into each extraction unit, read action information and determine an action unit matching the action information as a target action unit, and execute the storage actions corresponding to the target action unit to store byte stream data of the target information.
-
公开(公告)号:US12149642B2
公开(公告)日:2024-11-19
申请号:US17876553
申请日:2022-07-29
Applicant: Zhejiang Lab
Inventor: Hanguang Luo , Tao Zou , Shunbin Li , Qi Xu , Huifeng Zhang
Abstract: The present disclosure belongs to an identity authentication technology in network security field, and relates to a lightweight identity authentication method. The method utilizes lightweight operations of the physical unclonable function, Hash operation, XOR operation, etc. for bidirectional authentication between an authentication server and an Internet of Things resource-limited device, and particularly utilizes uniqueness of an integrated circuit (IC) physical microstructure created by the physical unclonable function in the resource-limited device in a manufacturing process to design an engineering-implementable information desynchronization recovery mechanism of two authentication parties by optimizing an interaction mode of input challenge and output response of the physical unclonable function, thereby solving the problem that the same lightweight identity authentication type solution cannot ensure forward security and resist desynchronization attack, further reducing resource cost for an identity authentication process, and effectively improving security and operation efficiency of identity authentication of the Internet of Things resource-limited device.
-
公开(公告)号:US12120039B2
公开(公告)日:2024-10-15
申请号:US18389820
申请日:2023-12-20
Applicant: ZHEJIANG LAB
Inventor: Xiaoyu Yi , Yuan Liang , Geyang Xiao , Xingchang Guo , Tao Zou , Ruyun Zhang , Linlin Yan
IPC: H04L47/6275 , H04L47/12
CPC classification number: H04L47/6275 , H04L47/12
Abstract: A traffic alarm method and apparatus based on a programmable switch, a device and a medium. The method monitors traffic with different priorities, when the traffic is greater than or equal to a threshold, the programmable switch may give a real-time alarm on a data plane and return low priority traffic information in a current network back to a sending end, and the sending end may adjust a task priority through alarm information. The present disclosure uses a programmable switch device, the lower priority traffic information may be alarmed to the sending end in real time on the data plane without passing through a controller, an alarm delay is significantly reduced, the sending end may adjust a sending rate timely, real-time scheduling of network traffic is achieved, high priority traffic transmission is ensured, and meanwhile link utilization is improved.
-
公开(公告)号:US12095862B1
公开(公告)日:2024-09-17
申请号:US18565436
申请日:2023-07-05
Applicant: ZHEJIANG LAB
Inventor: Peilei Wang , Ruyun Zhang , Tao Zou , Shunbin Li , Peilong Huang
IPC: H04L67/1097 , G06F9/54
CPC classification number: H04L67/1097 , G06F9/54
Abstract: The present disclosure provides a data processing system and a data processing method. The system includes: a client interaction module, a subscribing and publishing module, a storage module, and a sub-database management module. The client interaction module is configured to: receive an interaction request sent by a client, analyze the interaction request to obtain an analyzing result, and based on the analyzing result, determine a process type to be started and start a response process of the process type, and repackage the interaction request and send the repackaged interaction request to the response process, where the process type includes a first process type corresponding to the subscribing and publishing module, a second process type corresponding to the storage module and a third process type corresponding to the sub-database management module.
-
19.
公开(公告)号:US12056533B2
公开(公告)日:2024-08-06
申请号:US18354601
申请日:2023-07-18
Applicant: ZHEJIANG LAB
Inventor: Huifeng Zhang , Congqi Shen , Tao Zou , Jun Zhu , Ruyun Zhang , Qi Xu , Hanguang Luo , Xingchang Guo
CPC classification number: G06F9/5038 , G06N20/00
Abstract: A method, an apparatus and a medium for optimizing allocation of switching resources in the polymorphic network. The method selects the ASIC switching chip, FPGA and PPK software switching on the polymorphic network element based on machine learning, and specifically comprises the following steps: manually pre-configuring, formulating basic rules for polymorphic software and hardware co-processing; offline learning, designing training configuration in the offline learning stage to capture different switching resource usage variables, running experiments to generate the original data of a training classifier, and using the generated performance indices to train the model offline; and online reasoning, obtaining switching resource allocation advises, and updating modality codes according to the switching resource allocation advises.
-
-
-
-
-
-
-
-