Disclosure of Invention
The application provides a microprogram configuration method and a microprogram configuration system, which are used for solving the technical problems of low configuration efficiency, low accuracy and insufficient flexibility caused by manual intervention in microprogram configuration in the prior art.
In view of the above, the present application provides a method and a system for configuration of a micro program.
The application provides a micro program configuration method, which comprises the steps of receiving a micro program request of a first user, carrying out authentication according to the first user to obtain a first user authentication result, activating a matching micro program when the first user authentication result is passed, generating a micro program configuration scheme according to the micro program request, and configuring the matching micro program according to the micro program configuration scheme by combining a micro program controller.
In a possible implementation manner, the method comprises the steps of carrying out identity authentication according to the first user to obtain a first user identity authentication result, carrying out request authority authentication according to the first user to obtain a first user authority authentication result, activating a user authentication model, inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
In a possible implementation manner, the following processing is executed, wherein when the authentication result of the first user is that the first user fails, a first user early warning signal is generated.
In a possible implementation manner, when the authentication result of the first user passes, a matching micro-program label is generated according to the micro-program request, a micro-program processor is activated, the matching micro-program label is input into the micro-program processor, and the matching micro-program is activated.
In a possible implementation mode, the method comprises the steps of carrying out task feature recognition according to the microprogram request to obtain microprogram request task information, collecting configuration constraint parameters of the matched microprogram to obtain microprogram configuration constraint information, constructing a microprogram configuration analysis model, and inputting the microprogram request task information and the microprogram configuration constraint information into the microprogram configuration analysis model to obtain the microprogram configuration scheme.
In a possible implementation manner, the method comprises the steps of loading a microprogram configuration record set, cleaning data according to the microprogram configuration record set to obtain a microprogram configuration record database, training and testing according to the microprogram configuration record database, and generating the microprogram configuration analysis model.
In a possible implementation manner, the following processing is executed, namely configuration monitoring information of the matched micro program is obtained, the configuration monitoring information is compared with the micro program configuration scheme to obtain micro program configuration deviation comparison information, a micro program configuration deviation coefficient is generated according to the micro program configuration deviation comparison information, whether the micro program configuration deviation coefficient is larger than a micro program configuration deviation threshold value is judged, and if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value, a micro program configuration deviation early warning signal is generated.
The application provides a micro program configuration system, which comprises a request receiving module, an authentication result obtaining module, an authentication result judging module and a configuration scheme generating module, wherein the request receiving module is used for receiving a micro program request of a first user, the authentication result obtaining module is used for carrying out authentication and authentication according to the first user to obtain a first user authentication and authentication result, the authentication result judging module is used for judging that a matching micro program is activated when the authentication and authentication result of the first user is passed, the configuration scheme generating module is used for generating a micro program configuration scheme according to the micro program request, and the micro program configuration module is used for configuring the matching micro program according to the micro program configuration scheme and combining a micro program controller.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
The method comprises the steps of receiving a micro-program request of a first user, carrying out authentication according to the first user to obtain a first user authentication result, activating a matching micro-program when the first user authentication result is passed, generating a micro-program configuration scheme according to the micro-program request, and configuring the matching micro-program according to the micro-program configuration scheme and combining a micro-program controller. The method has the advantages of greatly reducing manual intervention, reducing error probability, realizing efficient and flexible configuration of the micro program, and improving configuration efficiency and accuracy.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent. It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the application or to delineate the scope of the application. Other features of the present application will become apparent from the description that follows.
Detailed Description
The application provides a microprogram configuration method and a microprogram configuration system, which are used for solving the technical problems of low configuration efficiency, low accuracy and insufficient flexibility caused by manual intervention in microprogram configuration in the prior art. The method has the advantages of greatly reducing manual intervention, reducing error probability, realizing efficient and flexible configuration of the micro program, and improving configuration efficiency and accuracy.
In the following, the technical solutions of the present invention will be clearly and completely described with reference to the accompanying drawings, and it should be understood that the described embodiments are only some embodiments of the present invention, but not all embodiments of the present invention, and that the present invention is not limited by the exemplary embodiments described herein. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention. It should be further noted that, for convenience of description, only some, but not all of the drawings related to the present invention are shown.
Example 1
As shown in fig. 1, the present application provides a microprogram configuration method, which includes:
a first user's microprogram request is received.
Specifically, to implement the configuration of the micro program, a first user's request for the micro program from the first user or a user with a specific identifier is received, where the micro program refers to a method for implementing an instruction set on a hardware level of a computer, specifically, a complex machine instruction is decomposed into a series of simpler micro programs, each micro program includes a plurality of micro instructions, each micro instruction corresponds to one or more micro operations, and the micro program requests are used to obtain data, including a request type, a request content, and the like. By receiving the micro-program request of the first user, a basis is provided for the follow-up judgment of whether to start configuration and meeting the requirements of personalized customization, and the smooth progress of the micro-program configuration work and the accuracy and the high efficiency of the configuration result are ensured.
And carrying out authentication according to the first user to obtain a first user authentication result.
Specifically, before the micro-program operation, the primary task is to perform strict authentication on the first user, and the authentication and authentication process is divided into two core links, namely identity verification and authority check. Authentication is intended to confirm the authenticity of a user's identity, while entitlement checking is intended to verify whether the user has authorization to perform a particular operation. The authentication phase requires the user to provide valid credentials, either a traditional username and password combination, a more secure digital certificate, or a modernized authorization token. And then accurately comparing the certificate provided by the user with the authorization data pre-stored in the security database, checking the authority level and the operation range of the user, and generating an authentication result of the first user by comparing the checking result, wherein the result indicates whether the user passes the verification or not, so that only legal and authorized users can be ensured to access and operate the micro program.
And when the authentication result of the first user is that the first user passes, activating a matching micro program.
Specifically, if the authentication result of the first user shows that the first user passes, the authentication result indicates that all the checks of the user pass smoothly, and the authentication is successful. And further activates the micro program matching the user request and starts the corresponding micro program sequence in preparation for executing the operation required by the user. The activation process includes loading the necessary microinstructions into the control memory and setting the associated hardware state.
And generating a microprogram configuration scheme according to the microprogram request.
Specifically, after the matching micro program is activated, a specific micro program configuration scheme is generated according to the specific micro program request of the user, wherein the micro program configuration scheme comprises the steps of determining the execution sequence of micro instructions, the selection of data paths, the allocation of registers and the like, and the micro program can be ensured to execute the instructions of the user in an expected mode, so that the requirements of the user are met.
And according to the microprogram configuration scheme, the matching microprogram is configured by combining a microprogram controller.
Specifically, according to the generated configuration scheme, the micro program controller is used to perform actual configuration on the activated micro program. The micro-program controller is a hardware component responsible for executing micro-instructions, and adjusts own control logic according to a configuration scheme so as to flexibly configure and execute various operations according to different instruction requirements, thereby ensuring that the micro-program is executed according to a given plan. The method can achieve efficient and flexible configuration of the micro program, and improves configuration efficiency and accuracy.
Further, the authentication is performed according to the first user to obtain a first user authentication result, which comprises the steps of performing identity authentication according to the first user to obtain a first user identity authentication result, performing request authority authentication according to the first user to obtain a first user authority authentication result, activating a user authentication model, inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
Further, when the authentication result of the first user is that the authentication result is not passed, a first user early warning signal is generated.
Specifically, first user identification information is acquired and authenticated, the identification authentication including verifying personal information of the user, such as a user name, a password, biometric information, such as fingerprint, facial recognition, and the like. And then, comparing the information provided by the user with the pre-stored identity verification data to obtain a first user identity authentication result. After the identity authentication is judged to pass according to the identity authentication result, whether the user has permission to execute a specific request is verified according to the access control strategy, the permission authentication comprises checking information such as roles, groups or access control lists of the user, obtaining a permission authentication result, namely a first user permission authentication result, and activating a user authentication model, wherein the user authentication model is constructed based on machine learning and is a trained neural network model and used for automatically evaluating the user authentication result. And transmitting the authority authentication result of the first user as input data to a user authentication and authentication model, wherein the user authentication and authentication model calculates according to the input data and outputs data information representing the user authentication and authentication result, namely the first user authentication and authentication result. If the user passes the authentication, the user can continue to process the micro program request of the user, otherwise, the user request is refused and a first user early warning signal is generated, the first user early warning information comprises a user identification, an authentication failure type, a safety warning and the like, and the early warning information is recorded in a log so as to be convenient for subsequent audit and tracing. Through the process, the identity and the authority of the user can be comprehensively and accurately estimated, so that only legal and authorized users can execute corresponding operations, and the safety of data is improved.
Further, when the first user authentication result is passing, a matching micro program is activated, wherein the method comprises the steps of generating a matching micro program label according to the micro program request when the first user authentication result is passing, activating a micro program processor, inputting the matching micro program label into the micro program processor, and activating the matching micro program.
Specifically, when the authentication result of the first user passes, the micro program request of the user is further processed. First, based on the specific content and attributes of the microprogram request, a microprogram tag is generated that matches the microprogram tag, which is used to identify and process a particular microprogram task. Next, a microprogram processor, which is a component for processing and executing the microprogram, is started. The generated matching microprogram label is then input to the microprogram processor, providing the processor with explicit task instructions. Finally, by inputting a specific microprogram tag, the microprogram processor activates and executes the microprogram matched with the tag, thereby completing the operation or service requested by the user. The whole process ensures that only the authenticated user can trigger and execute the corresponding micro program, thereby greatly improving the safety of the system and the accuracy of operation, and the micro program corresponding to the user request can be accurately identified and executed through the matching of the micro program labels, avoiding misoperation or resource waste and improving the accuracy of execution.
Further, the method for generating the micro program configuration scheme comprises the steps of carrying out task feature recognition according to the micro program request to obtain micro program request task information, collecting configuration constraint parameters of the matched micro program to obtain micro program configuration constraint information, constructing a micro program configuration analysis model, and inputting the micro program request task information and the micro program configuration constraint information into the micro program configuration analysis model to obtain the micro program configuration scheme.
Specifically, when a micro-program request is processed, task feature identification is firstly carried out according to specific content of the micro-program request, specific task requirements of the micro-program request are analyzed and known in detail, and the task feature identification comprises key information such as the type, the scale and the priority of the task, so that complete task information of the micro-program request is obtained. And then collecting configuration constraint parameters related to the matched micro program, wherein the configuration constraint parameters are used for ensuring the correct execution of the micro program and the stable operation of the system, including environmental requirements, performance indexes, resource limitation, safety strategies and the like required by the execution of the micro program, and acquiring and integrating the configuration constraint parameters according to the collected configuration constraint parameters to obtain the configuration constraint information of the micro program.
Next, a microprogram configuration analytical model is constructed. The model is constructed based on machine learning algorithms or heuristic rules by utilizing the specific contents of the microprogram configuration constraint information and the microprogram request task, and based on predefined rules, algorithms and strategies, the microprogram request task information and the configuration constraint information are analyzed and processed to generate a microprogram configuration scheme meeting the requirements. And finally, inputting the micro-program request task information and the micro-program configuration constraint information into a micro-program configuration analysis model, and generating a micro-program configuration scheme which meets the micro-program request task requirement and accords with the configuration constraint through calculation and analysis of the model, wherein the scheme comprises an execution sequence of micro-instructions, a resource allocation strategy, a concurrency control mechanism and the like, so that clear guidance is provided for correct execution of the micro-program, and the efficiency and the reliability of the whole system are improved.
The method comprises the steps of loading a microprogram configuration record set, cleaning data according to the microprogram configuration record set to obtain a microprogram configuration record database, training and testing according to the microprogram configuration record database, and generating the microprogram configuration analysis model.
Specifically, a set of microprogram configuration records containing configuration information of the historical microprogram including various configuration parameters such as environment settings, resource allocation, execution parameters, etc., is first retrieved and extracted from a database, file system, etc. data source. And then data cleaning is carried out on the data in the micro program configuration record set, including repeated record removal, error value correction, missing data filling, data format conversion, standardization unit conversion and the like, so as to improve the data quality, and the cleaned data form a micro program configuration record database. And then, randomly dividing the data in the microprogram configuration record database into a training set and a testing set, selecting a proper machine learning algorithm such as a decision tree, a random forest, a neural network and the like, training a model by using the training set, testing and evaluating the performance of the training model by using the testing set, and when the model training is completed and passes the test verification, taking the model as a final microprogram configuration analysis model to ensure that the model can accurately generate a configuration scheme. By constructing the micro-program configuration analysis model, a proper configuration scheme can be quickly and accurately generated, the efficiency and the accuracy of the configuration scheme are improved, and the efficiency and the accuracy of the micro-program configuration are further improved.
The method further comprises the steps of obtaining configuration monitoring information of the matched micro program, comparing the configuration monitoring information with the micro program configuration scheme to obtain micro program configuration deviation comparison information, generating a micro program configuration deviation coefficient according to the micro program configuration deviation comparison information, judging whether the micro program configuration deviation coefficient is larger than a micro program configuration deviation threshold value, and generating a micro program configuration deviation early warning signal if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value.
Specifically, during the execution of the micro-program, configuration information thereof is continuously monitored and recorded, including but not limited to resource usage, environment variable settings, network configuration, security settings, etc. And then comparing and analyzing the collected configuration monitoring information with parameters in the micro-program configuration scheme output by the model, finding out the difference between the actual configuration and the ideal configuration, and combining all the differences together to form micro-program configuration deviation comparison information. And (3) distributing a weight to all the configuration parameters according to the importance degree, and calculating a quantized micro-program configuration deviation coefficient according to the micro-program configuration deviation comparison information and the weight, wherein the coefficient represents the degree of deviation of the whole configuration from an ideal state. And setting a microprogram configuration deviation threshold according to the historical data and expert experience, wherein the microprogram configuration deviation threshold represents the maximum degree of the allowed microprogram configuration deviation, and comparing the calculated configuration deviation coefficient with the microprogram configuration deviation threshold to judge whether the coefficient is larger than the threshold. When the configuration deviation coefficient exceeds a set threshold value, a micro-program configuration deviation early warning signal is immediately generated, the configuration deviation coefficient exceeds the set threshold value to indicate that a large difference exists between the actual running configuration and the ideal configuration of the micro-program, the difference possibly has negative effects on the performance, stability or safety of the system, and the early warning signal can be triggered in various modes, such as mail sending, push notification, alarm triggering and the like, so that related personnel can know and process the configuration deviation problem in time. Configuration deviation in the execution process of the micro program can be found in time through comparison and analysis, related personnel are reminded to process through early warning signals, stable operation of the micro program is ensured, and potential risks caused by configuration errors are reduced.
Example two
Based on the same inventive concept as one of the micro-program configuration methods in the foregoing embodiments, as shown in fig. 2, the present application provides a micro-program configuration system, wherein the system includes:
a request receiving module 11, wherein the request receiving module 11 is used for receiving a micro program request of a first user;
The authentication result obtaining module 12, wherein the authentication result obtaining module 12 is configured to perform authentication according to the first user to obtain a first user authentication result;
an authentication result judging module 13, where the authentication result judging module 13 is configured to judge that when the authentication result of the first user is that the authentication result is passed, activate a matching micro program;
A configuration scheme generating module 14, where the configuration scheme generating module 14 is configured to generate a microprogram configuration scheme according to the microprogram request;
the microprogram configuration module 15 is used for configuring the matching microprogram according to the microprogram configuration scheme and combining a microprogram controller.
Further, the authentication result obtaining module 12 is configured to perform the following steps:
according to the identity authentication of the first user, a first user identity authentication result is obtained;
According to the request authority authentication of the first user, a first user authority authentication result is obtained;
activating a user authentication model;
and inputting the first user authority authentication result into the user authentication model, and outputting the first user authentication result.
Further, the authentication result obtaining module 12 is further configured to perform the following steps:
And when the authentication result of the first user is that the first user fails, generating a first user early warning signal.
Further, the authentication result judging module 13 is further configured to perform the following steps:
When the authentication result of the first user passes, generating a matching micro-program label according to the micro-program request;
activating the microprogram processor;
inputting the matching micro-program label into the micro-program processor, and activating the matching micro-program.
Further, the configuration scheme generation module 14 is further configured to perform the following steps:
task feature recognition is carried out according to the micro program request, and task information of the micro program request is obtained;
Acquiring configuration constraint parameters of the matched micro program to obtain configuration constraint information of the micro program;
constructing a microprogram configuration analysis model;
And inputting the micro program request task information and the micro program configuration constraint information into the micro program configuration analysis model to obtain the micro program configuration scheme.
Further, the configuration scheme generation module 14 is further configured to perform the following steps:
Loading a microprogram configuration record set;
performing data cleaning according to the micro-program configuration record set to obtain a micro-program configuration record database;
training and testing according to the micro-program configuration record database to generate the micro-program configuration analysis model.
Further, the micro-program configuration module 15 is further configured to obtain configuration monitoring information of the matching micro-program;
Comparing the configuration monitoring information with the micro-program configuration scheme to obtain micro-program configuration deviation comparison information;
Generating a microprogram configuration deviation coefficient according to the microprogram configuration deviation comparison information;
judging whether the micro-program configuration deviation coefficient is larger than a micro-program configuration deviation threshold value or not;
and if the micro program configuration deviation coefficient is larger than the micro program configuration deviation threshold value, generating a micro program configuration deviation early warning signal.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.
The specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, it is intended that the present application cover the modifications and variations of this application provided they come within the scope of the application and its equivalents.