Movatterモバイル変換


[0]ホーム

URL:


CN120066607B - A microprogram configuration method and system - Google Patents

A microprogram configuration method and system

Info

Publication number
CN120066607B
CN120066607BCN202510035526.1ACN202510035526ACN120066607BCN 120066607 BCN120066607 BCN 120066607BCN 202510035526 ACN202510035526 ACN 202510035526ACN 120066607 BCN120066607 BCN 120066607B
Authority
CN
China
Prior art keywords
microprogram
configuration
user
micro
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510035526.1A
Other languages
Chinese (zh)
Other versions
CN120066607A (en
Inventor
宋晓磊
张国强
周小波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lianxun Xingye Technology Co ltd
Original Assignee
Beijing Lianxun Xingye Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lianxun Xingye Technology Co ltdfiledCriticalBeijing Lianxun Xingye Technology Co ltd
Priority to CN202510035526.1ApriorityCriticalpatent/CN120066607B/en
Publication of CN120066607ApublicationCriticalpatent/CN120066607A/en
Application grantedgrantedCritical
Publication of CN120066607BpublicationCriticalpatent/CN120066607B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提供了一种微程序配置方法及系统,涉及微程序设计技术领域,通过接收第一用户的微程序请求,根据第一用户进行鉴权认证,获得第一用户鉴权认证结果,当第一用户鉴权认证结果为通过时,激活匹配微程序,根据微程序请求,生成微程序配置方案,根据微程序配置方案,结合微程序控制器对所述匹配微程序进行配置。达到了大幅减少了人工干预,降低了出错概率,实现高效、灵活地配置微程序,提高配置效率和准确性的技术效果。解决了现有技术中存在微程序配置依赖于人工干预,导致配置效率、准确度不高,且灵活性不足的技术问题。达到了大幅减少了人工干预,降低了出错概率,实现高效、灵活地配置微程序,提高配置效率和准确性的技术效果。

The present invention provides a microprogram configuration method and system, which relates to the field of microprogram design technology. By receiving a microprogram request from a first user, performing authentication and certification according to the first user, and obtaining the first user authentication and certification result, when the first user authentication and certification result is passed, a matching microprogram is activated, and a microprogram configuration plan is generated according to the microprogram request. According to the microprogram configuration plan, the matching microprogram is configured in combination with a microprogram controller. The method achieves the technical effect of significantly reducing manual intervention, reducing the probability of error, realizing efficient and flexible configuration of microprograms, and improving configuration efficiency and accuracy. The method solves the technical problem in the prior art that microprogram configuration relies on manual intervention, resulting in low configuration efficiency and accuracy, and insufficient flexibility. The method achieves the technical effect of significantly reducing manual intervention, reducing the probability of error, realizing efficient and flexible configuration of microprograms, and improving configuration efficiency and accuracy.

Description

Microprogram configuration method and system
Technical Field
The invention relates to the technical field of micro-program design, in particular to a micro-program configuration method and a system.
Background
In today's highly digitized world, the importance of micro-programs as a core component supporting complex systems and applications is self-evident. With the rapid development of technologies such as cloud computing, big data, artificial intelligence and the like, and continuous diversification and complicating of business demands of enterprises, the application range of micro programs is increasingly expanded, and the micro programs play a vital role in system performance and user experience. However, while microprograms offer many convenience and advantages, their configuration management faces a number of challenges and challenges. Conventional microprogrammed configuration methods often rely on manual intervention, which is not only inefficient, but also prone to error. Furthermore, as the scale of systems increases and the complexity increases, manual configuration has failed to meet the needs for fast response and flexible tuning.
In the prior art, the configuration of the micro program depends on manual intervention, so that the technical problems of low configuration efficiency, low accuracy and insufficient flexibility are caused.
Disclosure of Invention
The application provides a microprogram configuration method and a microprogram configuration system, which are used for solving the technical problems of low configuration efficiency, low accuracy and insufficient flexibility caused by manual intervention in microprogram configuration in the prior art.
In view of the above, the present application provides a method and a system for configuration of a micro program.
The application provides a micro program configuration method, which comprises the steps of receiving a micro program request of a first user, carrying out authentication according to the first user to obtain a first user authentication result, activating a matching micro program when the first user authentication result is passed, generating a micro program configuration scheme according to the micro program request, and configuring the matching micro program according to the micro program configuration scheme by combining a micro program controller.
In a possible implementation manner, the method comprises the steps of carrying out identity authentication according to the first user to obtain a first user identity authentication result, carrying out request authority authentication according to the first user to obtain a first user authority authentication result, activating a user authentication model, inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
In a possible implementation manner, the following processing is executed, wherein when the authentication result of the first user is that the first user fails, a first user early warning signal is generated.
In a possible implementation manner, when the authentication result of the first user passes, a matching micro-program label is generated according to the micro-program request, a micro-program processor is activated, the matching micro-program label is input into the micro-program processor, and the matching micro-program is activated.
In a possible implementation mode, the method comprises the steps of carrying out task feature recognition according to the microprogram request to obtain microprogram request task information, collecting configuration constraint parameters of the matched microprogram to obtain microprogram configuration constraint information, constructing a microprogram configuration analysis model, and inputting the microprogram request task information and the microprogram configuration constraint information into the microprogram configuration analysis model to obtain the microprogram configuration scheme.
In a possible implementation manner, the method comprises the steps of loading a microprogram configuration record set, cleaning data according to the microprogram configuration record set to obtain a microprogram configuration record database, training and testing according to the microprogram configuration record database, and generating the microprogram configuration analysis model.
In a possible implementation manner, the following processing is executed, namely configuration monitoring information of the matched micro program is obtained, the configuration monitoring information is compared with the micro program configuration scheme to obtain micro program configuration deviation comparison information, a micro program configuration deviation coefficient is generated according to the micro program configuration deviation comparison information, whether the micro program configuration deviation coefficient is larger than a micro program configuration deviation threshold value is judged, and if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value, a micro program configuration deviation early warning signal is generated.
The application provides a micro program configuration system, which comprises a request receiving module, an authentication result obtaining module, an authentication result judging module and a configuration scheme generating module, wherein the request receiving module is used for receiving a micro program request of a first user, the authentication result obtaining module is used for carrying out authentication and authentication according to the first user to obtain a first user authentication and authentication result, the authentication result judging module is used for judging that a matching micro program is activated when the authentication and authentication result of the first user is passed, the configuration scheme generating module is used for generating a micro program configuration scheme according to the micro program request, and the micro program configuration module is used for configuring the matching micro program according to the micro program configuration scheme and combining a micro program controller.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
The method comprises the steps of receiving a micro-program request of a first user, carrying out authentication according to the first user to obtain a first user authentication result, activating a matching micro-program when the first user authentication result is passed, generating a micro-program configuration scheme according to the micro-program request, and configuring the matching micro-program according to the micro-program configuration scheme and combining a micro-program controller. The method has the advantages of greatly reducing manual intervention, reducing error probability, realizing efficient and flexible configuration of the micro program, and improving configuration efficiency and accuracy.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent. It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly explain the drawings needed in the description of the embodiments, which are merely examples of the present invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for configuring a micro program according to the present application.
Fig. 2 is a schematic structural diagram of a micro-program configuration system provided by the present application.
Reference numerals illustrate the request receiving module 11, the authentication result obtaining module 12, the authentication result judging module 13, the configuration scheme generating module 14, and the microprogram configuration module 15.
Detailed Description
The application provides a microprogram configuration method and a microprogram configuration system, which are used for solving the technical problems of low configuration efficiency, low accuracy and insufficient flexibility caused by manual intervention in microprogram configuration in the prior art. The method has the advantages of greatly reducing manual intervention, reducing error probability, realizing efficient and flexible configuration of the micro program, and improving configuration efficiency and accuracy.
In the following, the technical solutions of the present invention will be clearly and completely described with reference to the accompanying drawings, and it should be understood that the described embodiments are only some embodiments of the present invention, but not all embodiments of the present invention, and that the present invention is not limited by the exemplary embodiments described herein. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. It should be further noted that, for convenience of description, only some, but not all of the drawings related to the present invention are shown.
Example 1
As shown in fig. 1, the present application provides a microprogram configuration method, which includes:
a first user's microprogram request is received.
Specifically, to implement the configuration of the micro program, a first user's request for the micro program from the first user or a user with a specific identifier is received, where the micro program refers to a method for implementing an instruction set on a hardware level of a computer, specifically, a complex machine instruction is decomposed into a series of simpler micro programs, each micro program includes a plurality of micro instructions, each micro instruction corresponds to one or more micro operations, and the micro program requests are used to obtain data, including a request type, a request content, and the like. By receiving the micro-program request of the first user, a basis is provided for the follow-up judgment of whether to start configuration and meeting the requirements of personalized customization, and the smooth progress of the micro-program configuration work and the accuracy and the high efficiency of the configuration result are ensured.
And carrying out authentication according to the first user to obtain a first user authentication result.
Specifically, before the micro-program operation, the primary task is to perform strict authentication on the first user, and the authentication and authentication process is divided into two core links, namely identity verification and authority check. Authentication is intended to confirm the authenticity of a user's identity, while entitlement checking is intended to verify whether the user has authorization to perform a particular operation. The authentication phase requires the user to provide valid credentials, either a traditional username and password combination, a more secure digital certificate, or a modernized authorization token. And then accurately comparing the certificate provided by the user with the authorization data pre-stored in the security database, checking the authority level and the operation range of the user, and generating an authentication result of the first user by comparing the checking result, wherein the result indicates whether the user passes the verification or not, so that only legal and authorized users can be ensured to access and operate the micro program.
And when the authentication result of the first user is that the first user passes, activating a matching micro program.
Specifically, if the authentication result of the first user shows that the first user passes, the authentication result indicates that all the checks of the user pass smoothly, and the authentication is successful. And further activates the micro program matching the user request and starts the corresponding micro program sequence in preparation for executing the operation required by the user. The activation process includes loading the necessary microinstructions into the control memory and setting the associated hardware state.
And generating a microprogram configuration scheme according to the microprogram request.
Specifically, after the matching micro program is activated, a specific micro program configuration scheme is generated according to the specific micro program request of the user, wherein the micro program configuration scheme comprises the steps of determining the execution sequence of micro instructions, the selection of data paths, the allocation of registers and the like, and the micro program can be ensured to execute the instructions of the user in an expected mode, so that the requirements of the user are met.
And according to the microprogram configuration scheme, the matching microprogram is configured by combining a microprogram controller.
Specifically, according to the generated configuration scheme, the micro program controller is used to perform actual configuration on the activated micro program. The micro-program controller is a hardware component responsible for executing micro-instructions, and adjusts own control logic according to a configuration scheme so as to flexibly configure and execute various operations according to different instruction requirements, thereby ensuring that the micro-program is executed according to a given plan. The method can achieve efficient and flexible configuration of the micro program, and improves configuration efficiency and accuracy.
Further, the authentication is performed according to the first user to obtain a first user authentication result, which comprises the steps of performing identity authentication according to the first user to obtain a first user identity authentication result, performing request authority authentication according to the first user to obtain a first user authority authentication result, activating a user authentication model, inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
Further, when the authentication result of the first user is that the authentication result is not passed, a first user early warning signal is generated.
Specifically, first user identification information is acquired and authenticated, the identification authentication including verifying personal information of the user, such as a user name, a password, biometric information, such as fingerprint, facial recognition, and the like. And then, comparing the information provided by the user with the pre-stored identity verification data to obtain a first user identity authentication result. After the identity authentication is judged to pass according to the identity authentication result, whether the user has permission to execute a specific request is verified according to the access control strategy, the permission authentication comprises checking information such as roles, groups or access control lists of the user, obtaining a permission authentication result, namely a first user permission authentication result, and activating a user authentication model, wherein the user authentication model is constructed based on machine learning and is a trained neural network model and used for automatically evaluating the user authentication result. And transmitting the authority authentication result of the first user as input data to a user authentication and authentication model, wherein the user authentication and authentication model calculates according to the input data and outputs data information representing the user authentication and authentication result, namely the first user authentication and authentication result. If the user passes the authentication, the user can continue to process the micro program request of the user, otherwise, the user request is refused and a first user early warning signal is generated, the first user early warning information comprises a user identification, an authentication failure type, a safety warning and the like, and the early warning information is recorded in a log so as to be convenient for subsequent audit and tracing. Through the process, the identity and the authority of the user can be comprehensively and accurately estimated, so that only legal and authorized users can execute corresponding operations, and the safety of data is improved.
Further, when the first user authentication result is passing, a matching micro program is activated, wherein the method comprises the steps of generating a matching micro program label according to the micro program request when the first user authentication result is passing, activating a micro program processor, inputting the matching micro program label into the micro program processor, and activating the matching micro program.
Specifically, when the authentication result of the first user passes, the micro program request of the user is further processed. First, based on the specific content and attributes of the microprogram request, a microprogram tag is generated that matches the microprogram tag, which is used to identify and process a particular microprogram task. Next, a microprogram processor, which is a component for processing and executing the microprogram, is started. The generated matching microprogram label is then input to the microprogram processor, providing the processor with explicit task instructions. Finally, by inputting a specific microprogram tag, the microprogram processor activates and executes the microprogram matched with the tag, thereby completing the operation or service requested by the user. The whole process ensures that only the authenticated user can trigger and execute the corresponding micro program, thereby greatly improving the safety of the system and the accuracy of operation, and the micro program corresponding to the user request can be accurately identified and executed through the matching of the micro program labels, avoiding misoperation or resource waste and improving the accuracy of execution.
Further, the method for generating the micro program configuration scheme comprises the steps of carrying out task feature recognition according to the micro program request to obtain micro program request task information, collecting configuration constraint parameters of the matched micro program to obtain micro program configuration constraint information, constructing a micro program configuration analysis model, and inputting the micro program request task information and the micro program configuration constraint information into the micro program configuration analysis model to obtain the micro program configuration scheme.
Specifically, when a micro-program request is processed, task feature identification is firstly carried out according to specific content of the micro-program request, specific task requirements of the micro-program request are analyzed and known in detail, and the task feature identification comprises key information such as the type, the scale and the priority of the task, so that complete task information of the micro-program request is obtained. And then collecting configuration constraint parameters related to the matched micro program, wherein the configuration constraint parameters are used for ensuring the correct execution of the micro program and the stable operation of the system, including environmental requirements, performance indexes, resource limitation, safety strategies and the like required by the execution of the micro program, and acquiring and integrating the configuration constraint parameters according to the collected configuration constraint parameters to obtain the configuration constraint information of the micro program.
Next, a microprogram configuration analytical model is constructed. The model is constructed based on machine learning algorithms or heuristic rules by utilizing the specific contents of the microprogram configuration constraint information and the microprogram request task, and based on predefined rules, algorithms and strategies, the microprogram request task information and the configuration constraint information are analyzed and processed to generate a microprogram configuration scheme meeting the requirements. And finally, inputting the micro-program request task information and the micro-program configuration constraint information into a micro-program configuration analysis model, and generating a micro-program configuration scheme which meets the micro-program request task requirement and accords with the configuration constraint through calculation and analysis of the model, wherein the scheme comprises an execution sequence of micro-instructions, a resource allocation strategy, a concurrency control mechanism and the like, so that clear guidance is provided for correct execution of the micro-program, and the efficiency and the reliability of the whole system are improved.
The method comprises the steps of loading a microprogram configuration record set, cleaning data according to the microprogram configuration record set to obtain a microprogram configuration record database, training and testing according to the microprogram configuration record database, and generating the microprogram configuration analysis model.
Specifically, a set of microprogram configuration records containing configuration information of the historical microprogram including various configuration parameters such as environment settings, resource allocation, execution parameters, etc., is first retrieved and extracted from a database, file system, etc. data source. And then data cleaning is carried out on the data in the micro program configuration record set, including repeated record removal, error value correction, missing data filling, data format conversion, standardization unit conversion and the like, so as to improve the data quality, and the cleaned data form a micro program configuration record database. And then, randomly dividing the data in the microprogram configuration record database into a training set and a testing set, selecting a proper machine learning algorithm such as a decision tree, a random forest, a neural network and the like, training a model by using the training set, testing and evaluating the performance of the training model by using the testing set, and when the model training is completed and passes the test verification, taking the model as a final microprogram configuration analysis model to ensure that the model can accurately generate a configuration scheme. By constructing the micro-program configuration analysis model, a proper configuration scheme can be quickly and accurately generated, the efficiency and the accuracy of the configuration scheme are improved, and the efficiency and the accuracy of the micro-program configuration are further improved.
The method further comprises the steps of obtaining configuration monitoring information of the matched micro program, comparing the configuration monitoring information with the micro program configuration scheme to obtain micro program configuration deviation comparison information, generating a micro program configuration deviation coefficient according to the micro program configuration deviation comparison information, judging whether the micro program configuration deviation coefficient is larger than a micro program configuration deviation threshold value, and generating a micro program configuration deviation early warning signal if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value.
Specifically, during the execution of the micro-program, configuration information thereof is continuously monitored and recorded, including but not limited to resource usage, environment variable settings, network configuration, security settings, etc. And then comparing and analyzing the collected configuration monitoring information with parameters in the micro-program configuration scheme output by the model, finding out the difference between the actual configuration and the ideal configuration, and combining all the differences together to form micro-program configuration deviation comparison information. And (3) distributing a weight to all the configuration parameters according to the importance degree, and calculating a quantized micro-program configuration deviation coefficient according to the micro-program configuration deviation comparison information and the weight, wherein the coefficient represents the degree of deviation of the whole configuration from an ideal state. And setting a microprogram configuration deviation threshold according to the historical data and expert experience, wherein the microprogram configuration deviation threshold represents the maximum degree of the allowed microprogram configuration deviation, and comparing the calculated configuration deviation coefficient with the microprogram configuration deviation threshold to judge whether the coefficient is larger than the threshold. When the configuration deviation coefficient exceeds a set threshold value, a micro-program configuration deviation early warning signal is immediately generated, the configuration deviation coefficient exceeds the set threshold value to indicate that a large difference exists between the actual running configuration and the ideal configuration of the micro-program, the difference possibly has negative effects on the performance, stability or safety of the system, and the early warning signal can be triggered in various modes, such as mail sending, push notification, alarm triggering and the like, so that related personnel can know and process the configuration deviation problem in time. Configuration deviation in the execution process of the micro program can be found in time through comparison and analysis, related personnel are reminded to process through early warning signals, stable operation of the micro program is ensured, and potential risks caused by configuration errors are reduced.
Example two
Based on the same inventive concept as one of the micro-program configuration methods in the foregoing embodiments, as shown in fig. 2, the present application provides a micro-program configuration system, wherein the system includes:
a request receiving module 11, wherein the request receiving module 11 is used for receiving a micro program request of a first user;
The authentication result obtaining module 12, wherein the authentication result obtaining module 12 is configured to perform authentication according to the first user to obtain a first user authentication result;
an authentication result judging module 13, where the authentication result judging module 13 is configured to judge that when the authentication result of the first user is that the authentication result is passed, activate a matching micro program;
A configuration scheme generating module 14, where the configuration scheme generating module 14 is configured to generate a microprogram configuration scheme according to the microprogram request;
the microprogram configuration module 15 is used for configuring the matching microprogram according to the microprogram configuration scheme and combining a microprogram controller.
Further, the authentication result obtaining module 12 is configured to perform the following steps:
according to the identity authentication of the first user, a first user identity authentication result is obtained;
According to the request authority authentication of the first user, a first user authority authentication result is obtained;
activating a user authentication model;
and inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
Further, the authentication result obtaining module 12 is further configured to perform the following steps:
And when the authentication result of the first user is that the first user fails, generating a first user early warning signal.
Further, the authentication result judging module 13 is further configured to perform the following steps:
When the authentication result of the first user passes, generating a matching micro-program label according to the micro-program request;
activating the microprogram processor;
inputting the matching micro-program label into the micro-program processor, and activating the matching micro-program.
Further, the configuration scheme generation module 14 is further configured to perform the following steps:
task feature recognition is carried out according to the micro program request, and task information of the micro program request is obtained;
Acquiring configuration constraint parameters of the matched micro program to obtain configuration constraint information of the micro program;
constructing a microprogram configuration analysis model;
And inputting the micro program request task information and the micro program configuration constraint information into the micro program configuration analysis model to obtain the micro program configuration scheme.
Further, the configuration scheme generation module 14 is further configured to perform the following steps:
Loading a microprogram configuration record set;
performing data cleaning according to the micro-program configuration record set to obtain a micro-program configuration record database;
training and testing according to the micro-program configuration record database to generate the micro-program configuration analysis model.
Further, the micro-program configuration module 15 is further configured to obtain configuration monitoring information of the matching micro-program;
Comparing the configuration monitoring information with the micro-program configuration scheme to obtain micro-program configuration deviation comparison information;
Generating a microprogram configuration deviation coefficient according to the microprogram configuration deviation comparison information;
judging whether the micro-program configuration deviation coefficient is larger than a micro-program configuration deviation threshold value or not;
and if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value, generating a micro program configuration deviation early warning signal.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.
The specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, it is intended that the present application cover the modifications and variations of this application provided they come within the scope of the application and its equivalents.

Claims (6)

Translated fromChinese
1.一种微程序配置方法,其特征在于,所述方法包括:1. A microprogram configuration method, characterized in that the method comprises:接收第一用户的微程序请求;receiving a micro-program request from a first user;根据所述第一用户进行鉴权认证,获得第一用户鉴权认证结果;Performing authentication on the first user to obtain an authentication result of the first user;当所述第一用户鉴权认证结果为通过时,激活匹配微程序;When the first user authentication result is passed, activating the matching micro program;根据所述微程序请求,生成微程序配置方案;generating a microprogram configuration scheme according to the microprogram request;根据所述微程序配置方案,结合微程序控制器对所述匹配微程序进行配置;According to the microprogram configuration scheme, configuring the matching microprogram in combination with a microprogram controller;根据所述微程序请求,生成微程序配置方案,包括:Generating a microprogram configuration solution according to the microprogram request, including:根据所述微程序请求进行任务特征识别,获得微程序请求任务信息;Performing task feature recognition according to the micro-program request to obtain micro-program request task information;采集所述匹配微程序的配置约束参数,获得微程序配置约束信息;Collecting configuration constraint parameters of the matching microprogram to obtain microprogram configuration constraint information;构建微程序配置解析模型;Build a microprogram configuration parsing model;将所述微程序请求任务信息和所述微程序配置约束信息输入所述微程序配置解析模型,获得所述微程序配置方案;Inputting the microprogram request task information and the microprogram configuration constraint information into the microprogram configuration parsing model to obtain the microprogram configuration solution;构建微程序配置解析模型,包括:Build a microprogram configuration parsing model, including:加载微程序配置记录集;Load the microprogram configuration record set;根据所述微程序配置记录集进行数据清洗,获得微程序配置记录数据库;Perform data cleaning according to the microprogram configuration record set to obtain a microprogram configuration record database;根据所述微程序配置记录数据库进行训练、测试,生成所述微程序配置解析模型。Training and testing are performed according to the microprogram configuration record database to generate the microprogram configuration parsing model.2.如权利要求1所述的方法,其特征在于,根据所述第一用户进行鉴权认证,获得第一用户鉴权认证结果,包括:2. The method according to claim 1, wherein performing authentication on the first user to obtain the first user authentication result comprises:根据所述第一用户进行身份认证,获得第一用户身份认证结果;Perform identity authentication according to the first user to obtain a first user identity authentication result;根据所述第一用户进行请求权限认证,获得第一用户权限认证结果;Performing permission authentication on the request of the first user to obtain a first user permission authentication result;激活用户鉴权认证模型;Activate the user authentication model;将所述第一用户权限认证结果输入所述用户鉴权认证模型,输出所述第一用户鉴权认证结果。The first user authority authentication result is input into the user authentication model, and the first user authentication result is output.3.如权利要求1所述的方法,其特征在于,当所述第一用户鉴权认证结果为不通过时,生成第一用户预警信号。3. The method according to claim 1 is characterized in that when the first user authentication result is failed, a first user warning signal is generated.4.如权利要求1所述的方法,其特征在于,当所述第一用户鉴权认证结果为通过时,激活匹配微程序,包括:4. The method according to claim 1, wherein when the first user authentication result is passed, activating the matching microprogram comprises:当所述第一用户鉴权认证结果为通过时,根据所述微程序请求,生成匹配微程序标签;When the first user authentication result is passed, generating a matching micro-program tag according to the micro-program request;激活微程序处理器;Activate the microprogram processor;将所述匹配微程序标签输入所述微程序处理器,激活所述匹配微程序。The matching microprogram tag is input into the microprogram processor to activate the matching microprogram.5.如权利要求1所述的方法,其特征在于,所述方法包括:5. The method according to claim 1, wherein the method comprises:获得所述匹配微程序的配置监测信息;Obtaining configuration monitoring information of the matching microprogram;将所述配置监测信息与所述微程序配置方案进行比对,获得微程序配置偏差比对信息;Comparing the configuration monitoring information with the microprogram configuration scheme to obtain microprogram configuration deviation comparison information;根据所述微程序配置偏差比对信息,生成微程序配置偏差系数;generating a microprogram configuration deviation coefficient according to the microprogram configuration deviation comparison information;判断所述微程序配置偏差系数是否大于微程序配置偏差阈值;Determining whether the microprogram configuration deviation coefficient is greater than a microprogram configuration deviation threshold;若所述微程序配置偏差系数大于所述微程序配置偏差阈值,生成微程序配置偏差预警信号。If the microprogram configuration deviation coefficient is greater than the microprogram configuration deviation threshold, a microprogram configuration deviation warning signal is generated.6.一种微程序配置系统,其特征在于,用于实施权利要求1至5中任意一项所述一种微程序配置方法的步骤,包括:6. A microprogram configuration system, characterized in that the steps for implementing the microprogram configuration method according to any one of claims 1 to 5 include:请求接收模块,所述请求接收模块用于接收第一用户的微程序请求;a request receiving module, configured to receive a micro-program request from a first user;认证结果获得模块,所述认证结果获得模块用于根据所述第一用户进行鉴权认证,获得第一用户鉴权认证结果;An authentication result obtaining module, configured to perform authentication on the first user and obtain an authentication result of the first user;认证结果判断模块,所述认证结果判断模块用于判断当所述第一用户鉴权认证结果为通过时,激活匹配微程序;An authentication result judgment module, configured to activate a matching microprogram when the authentication result of the first user authentication is passed;配置方案生成模块,所述配置方案生成模块用于根据所述微程序请求,生成微程序配置方案;A configuration scheme generating module, configured to generate a microprogram configuration scheme according to the microprogram request;微程序配置模块,所述微程序配置模块用于根据所述微程序配置方案,结合微程序控制器对所述匹配微程序进行配置。A microprogram configuration module is used to configure the matching microprogram in combination with a microprogram controller according to the microprogram configuration scheme.
CN202510035526.1A2025-01-092025-01-09 A microprogram configuration method and systemActiveCN120066607B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510035526.1ACN120066607B (en)2025-01-092025-01-09 A microprogram configuration method and system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510035526.1ACN120066607B (en)2025-01-092025-01-09 A microprogram configuration method and system

Publications (2)

Publication NumberPublication Date
CN120066607A CN120066607A (en)2025-05-30
CN120066607Btrue CN120066607B (en)2025-08-29

Family

ID=95803273

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510035526.1AActiveCN120066607B (en)2025-01-092025-01-09 A microprogram configuration method and system

Country Status (1)

CountryLink
CN (1)CN120066607B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116723247A (en)*2023-07-282023-09-08远光软件股份有限公司 Microservice calling methods, devices, equipment and storage media

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN107102881A (en)*2017-05-192017-08-29上海青橙实业有限公司Configuring management method and device for end application
US11252025B2 (en)*2020-04-162022-02-15Juniper Networks, Inc.Model driven configuration management for microservices
CN112231168B (en)*2020-09-032025-05-27平安信托有限责任公司 Micro server control method, device, equipment and storage medium
CN114168179B (en)*2020-09-112024-07-09腾讯科技(深圳)有限公司Micro-service management method, micro-service management device, computer equipment and storage medium
CN116149855B (en)*2023-01-032025-07-25安徽大学Method and system for optimizing performance resource cost under micro-service architecture
CN116820600A (en)*2023-05-162023-09-29曙光信息产业股份有限公司Configuration method, configuration device, computer apparatus, storage medium, and program product
CN118382099B (en)*2024-06-202024-08-20新华三技术有限公司Method and device for generating wireless local area network perception configuration scheme

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116723247A (en)*2023-07-282023-09-08远光软件股份有限公司 Microservice calling methods, devices, equipment and storage media

Also Published As

Publication numberPublication date
CN120066607A (en)2025-05-30

Similar Documents

PublicationPublication DateTitle
US20240427881A1 (en)Microservice adaptive security hardening
US20200327422A1 (en)Conditional Behavioural Biometrics
US8433922B2 (en)System and method of biometric authentication using multiple kinds of templates
US20050238207A1 (en)Biometric verification system and method utilizing a data classifier and fusion model
CN101571920A (en)Biometric authentication system, authentication client terminal, and biometric authentication method
US7487348B2 (en)System for authenticating and screening grid jobs on a computing grid
US20200125706A1 (en)Biometric authentication anomaly detection
CN111242230A (en)Image processing method and image classification model training method based on artificial intelligence
CN109446780B (en)Identity authentication method, device and storage medium thereof
CN113707157B (en)Voiceprint recognition-based identity verification method and device, electronic equipment and medium
US9521136B2 (en)Role-based access tool
CN112532655A (en)Login method and system
CN120066607B (en) A microprogram configuration method and system
US20070233667A1 (en)Method and apparatus for sample categorization
US11934510B2 (en)Using drawing capability as a credential or authentication mechanism via generative and adversarial network
CN107808082B (en)Electronic device, data access verification method, and computer-readable storage medium
CN119203088A (en) Rights management method, device, computer equipment and storage medium
CN113672888A (en)Cloud platform access method, device and system and cloud platform server
CN118194264A (en)Identity authentication method and device, equipment, storage medium and program product
CN112037062A (en)Transaction consensus method, device, electronic equipment and readable storage medium
US12423695B2 (en)Distributed evaluation platform for nonfungible tokens using virtual token cloning
US20170149831A1 (en)Apparatus and method for verifying detection rule
CN114722025B (en)Data prediction method, device, equipment and storage medium based on prediction model
CN109101813A (en)A kind of application program hold-up interception method and relevant apparatus
KR20230091132A (en) Speaker recognition performance evaluation

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp