CN109213573A - The equipment blocking method and device of virtual desktop based on container - Google Patents

The equipment blocking method and device of virtual desktop based on container Download PDF

Info

Publication number
CN109213573A
CN109213573A CN201811073054.5A CN201811073054A CN109213573A CN 109213573 A CN109213573 A CN 109213573A CN 201811073054 A CN201811073054 A CN 201811073054A CN 109213573 A CN109213573 A CN 109213573A
Authority
CN
China
Prior art keywords
hardware resource
container
hardware
resource
pool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811073054.5A
Other languages
Chinese (zh)
Inventor
杨立群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Hotdoor Technology Co Ltd
Original Assignee
Zhuhai Hotdoor Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Hotdoor Technology Co Ltd filed Critical Zhuhai Hotdoor Technology Co Ltd
Priority to CN201811073054.5A priority Critical patent/CN109213573A/en
Publication of CN109213573A publication Critical patent/CN109213573A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances

Abstract

A kind of equipment blocking method of the virtual desktop based on container, comprising the following steps: for the hardware resource for being newly added to server, the Resource Properties of its at least one ability are identified for the hardware resource;Identified Resource Properties are utilized, the hardware resource is associated with a hardware resource pool in multiple hardware resource pools, so that each of hardware resource pool hardware resource is associated with one in multiple Resource Properties;Each of respectively multiple hardware resource pools hardware resource distributes the ID of a unique identification;By container engine, hardware resource in hardware resource pool is assigned to cell therefor and from cell therefor recycling hardware resource into hardware resource pool by the ID according to each hardware resource.Disclosed herein as well is a kind of corresponding equipment blocking devices for the virtual desktop based on container.

Description

The equipment blocking method and device of virtual desktop based on container
Technical field
The present invention relates to field of computer technology more particularly to a kind of equipment blocking methods of the virtual desktop based on container And device.
Background technique
Operating system virtualization distinguishes several users by simulating to true computer hardware equipment Hardware resource is used by the way that the operating system after virtualization is shared, so as to high efficiency utilization of hardware resources.Simultaneously as Operating system virtualizes so that each application program and its relevance are isolated, so that every user as grasped on a personal computer Make independent operating system.
For example, the typical example as operating system virtualization, it is hard that virtual machine is normally operated in the bottoms such as server On the host equipment of part, and by the hardware resources to more virtual machines such as virtual machine management program storage allocation and CPU.Cause This, can dynamically be allocated according to the current each requested computer hardware resource of virtual machine.However, in order to each Position user provides a complete independent application program running environment, and virtual machine needs while including complete virtual hardware storehouse (including virtual network adapter, storage and CPU etc.).This means that its own also possesses complete operating system, and needle To hardware resource abstract and be isolated, thus need by part by the shared resource that host equipment provides occupy for itself Private resource and the overall performance for reducing host equipment.
On the contrary, another example as operating system virtualization, container is a kind of operating system virtualization of lightweight Technology.Each container realizes the lightweight of itself by the system kernel on shared host equipment, and utilizes process access control Respective user's space is isolated in the modes such as isolation technology and process group management control technique processed, so that more sleeve containes can be simultaneously It is operated on same host equipment capablely.But in existing technical solution, due to sharing same set of system between multiple containers System kernel allows to by the system by the related driver programs installation of hardware resource on the host device, thus easily It is used for each container.Therefore, the isolation between container is simply by modes such as the conversion in path or access privilege control strategies It realizes, it is veritably not mutually isolated, so that mutually isolated very weak between container.This to deposit between container In apparent security breaches and biggish attack face.In extreme situations, the user with high permission even can be to system Kernel issues system and calls, break through hardware resource that the isolation and arbitrarily calling between container is assigned in other containers (such as It accesses the camera of other containers and is shot).
Summary of the invention
The purpose of the application is to solve the deficiencies in the prior art, provides a kind of equipment for the virtual desktop based on container Partition method and device, by that can obtain and realize container itself using to the ID for identifying unique identification on each hardware resource Lightweight simultaneously, the effect for avoiding the hardware resource between different vessels from maliciously being called.
To achieve the goals above, the following technical solution is employed by the application.
Firstly, the application proposes a kind of equipment blocking method for the virtual desktop based on container.The equipment blocking side Method is suitable for the multiple containers being isolated from each other established in server.Wherein, each of multiple containers are respectively created one A independent virtual desktop example, and be that corresponding container configures independent file pipe by the virtual desktop example of each container Manage structure.Above equipment partition method the following steps are included:
S100) for the hardware resource for being newly added to server, its at least one ability is identified for the hardware resource Resource Properties;
S200 identified Resource Properties) are utilized, by a hardware in the hardware resource and multiple hardware resource pools Resource pool is associated, so that each of hardware resource pool hardware resource is associated with one in multiple Resource Properties;
S300) be respectively each of multiple hardware resource pools hardware resource distribute a unique identification ID;And
S400) by container engine, hardware resource in hardware resource pool is assigned to by the ID according to each hardware resource Cell therefor and from cell therefor recycling hardware resource into hardware resource pool.
Further, in the above method of the application, step S400 further includes following sub-step:
S401 corresponding hardware resource) is assigned to cell therefor according to the ID of hardware resource;
S402) the hardware resource locked according to the ID of hardware resource to distribute, so that other containers be forbidden to access corresponding ID Hardware resource;
S403) from container recycling hardware resource into hardware resource pool, and it is corresponding by being unlocked according to the ID of hardware resource Hardware resource.
Alternatively, in the above method of the application, step S400) may include following sub-step:
S404 associated trigger event) is set for each hardware resource pool;
S405) hardware resource pool corresponding to the hardware resource of each container is distributed in confirmation, to be based on the hardware The trigger event of resource pool monitors the correspondence hardware resource in each container;
S406) when detecting that trigger event occurs, corresponding hardware resource is recycled from container and is provided to corresponding hardware In the pond of source.
Still further, the trigger event is the frequency of use of hardware resource lower than pre- in the above method of the application If threshold value, wherein the threshold value is initialised when trigger event is arranged, and according to the average frequency of use of hardware resource And/or the frequency of use upper limit is adaptively adjusted.
Alternatively, in the above method of the application, the trigger event be apply hardware resource application program into Journey terminates.
Further, in the above method of the application, the application program run in a reservoir is by distributing to the container The ID of hardware resource access the hardware resource.
Still further, the application program run in a reservoir is by distributing to the appearance in the above method of the application It includes following sub-step that the ID of the hardware resource of device, which accesses the hardware resource:
S601 it) is recorded in from hardware resource pool distribution hardware resource to cell therefor, and by the ID of the hardware resource In the hardware resource table of container;
S602 hardware resource table) is searched for, when there are applications when respective resources attribute, run in container in hardware resource table Program accesses corresponding hardware resource according to the ID of hardware resource, otherwise by container engine to associated with the Resource Properties Hardware resource pool application;
S603 it) when hardware resource is recovered to corresponding hardware resource pool from container, deletes corresponding in hardware resource table ID。
Further, further comprising the steps of in the above method of the application: S500) according to preset frequency periodic detection Each hardware resource pool, and will test the hardware resource being removed from corresponding hardware resource pool and corresponding container It removes.
Secondly, the application also proposes a kind of equipment blocking device for the virtual desktop based on container.The equipment blocking Device is suitable for the multiple containers being isolated from each other established in server.Wherein, each of multiple containers are respectively created One independent virtual desktop example, and be that corresponding container configures independent file by the virtual desktop example of each container Manage structure.Above equipment isolating device comprises the following modules: mark module, for for the hardware money for being newly added to server Source identifies the Resource Properties of its at least one ability for the hardware resource;Relating module, for utilizing identified resource category Property, the hardware resource is associated with a hardware resource pool in multiple hardware resource pools, so that every in hardware resource pool One hardware resource is associated with one in multiple Resource Properties;Distribution module, in respectively multiple hardware resource pools Each hardware resource distribute a unique identification ID;And management module, for passing through container engine, according to each Hardware resource in hardware resource pool is assigned to cell therefor and recycles hardware resource from cell therefor by the ID of hardware resource Into hardware resource pool.
Further, in the above-mentioned apparatus of the application, management module further includes following submodule: resource module is used for Corresponding hardware resource is assigned to cell therefor by the ID according to hardware resource;Module is locked, for according to hardware resource The hardware resource that ID locks to distribute, so that other containers be forbidden to access the hardware resource for corresponding to ID;Unlocked state, for calm Device recycles hardware resource into hardware resource pool, and will unlock corresponding hardware resource according to the ID of hardware resource.
Alternatively, in the above-mentioned apparatus of the application, management module further includes following submodule: setup module is used for For each hardware resource pool, associated trigger event is set;Monitoring module, for confirming the hardware money for distributing to each container Hardware resource pool corresponding to source, so that the trigger event based on the hardware resource pool monitors the money of the correspondence hardware in each container Source;Recycling module, for recycling corresponding hardware resource from container to corresponding hardware when detecting that trigger event occurs In resource pool.
Still further, the trigger event is the frequency of use of hardware resource lower than pre- in the above-mentioned apparatus of the application If threshold value, wherein the threshold value is initialised when trigger event is arranged, and according to the average frequency of use of hardware resource And/or the frequency of use upper limit is adaptively adjusted.
Alternatively, in the above-mentioned apparatus of the application, the trigger event be apply hardware resource application program into Journey terminates.
Further, in the above-mentioned apparatus of the application, the application program run in a reservoir is by distributing to the container The ID of hardware resource access the hardware resource.
Still further, the application program run in a reservoir is by distributing to the appearance in the above-mentioned apparatus of the application It includes following submodule: logging modle that the ID of the hardware resource of device, which accesses the hardware resource, for hard from hardware resource pool distribution Part resource is recorded in the hardware resource table of container to cell therefor, and by the ID of the hardware resource;Search module, for searching Rope hardware resource table, when, there are when respective resources attribute, the application program run in container is provided according to hardware in hardware resource table The ID in source accesses corresponding hardware resource, otherwise passes through container engine to hardware resource pool associated with Resource Properties Shen Please;Removing module, it is corresponding in hardware resource table for deleting when hardware resource is recovered to corresponding hardware resource pool from container ID.
Further, further include with lower module in the above-mentioned apparatus of the application: remove module, for according to preset frequency The each hardware resource pool of periodic detection, and will test the hardware resource that has been removed from corresponding hardware resource pool and correspondence Container in remove.
Finally, the application also proposes a kind of computer readable storage medium, it is stored thereon with computer instruction.The computer The multiple containers being isolated from each other for instructing performed method to be suitable for establishing in server.Wherein, each in multiple containers It is a that an independent virtual desktop example is respectively created, and be the configuration of corresponding container by the virtual desktop example of each container Independent document structure management.The step of following methods are realized when the instruction is executed by processor:
S100) for the hardware resource for being newly added to server, its at least one ability is identified for the hardware resource Resource Properties;
S200 identified Resource Properties) are utilized, by a hardware in the hardware resource and multiple hardware resource pools Resource pool is associated, so that each of hardware resource pool hardware resource is associated with one in multiple Resource Properties;
S300) be respectively each of multiple hardware resource pools hardware resource distribute a unique identification ID;And
S400) by container engine, hardware resource in hardware resource pool is assigned to by the ID according to each hardware resource Cell therefor and from cell therefor recycling hardware resource into hardware resource pool.
Further, during the above-metioned instruction of the application is executed by processor, step S400 further includes following son Step:
S401 corresponding hardware resource) is assigned to cell therefor according to the ID of hardware resource;
S402) the hardware resource locked according to the ID of hardware resource to distribute, so that other containers be forbidden to access corresponding ID Hardware resource;
S403) from container recycling hardware resource into hardware resource pool, and it is corresponding by being unlocked according to the ID of hardware resource Hardware resource.
Alternatively, during the above-metioned instruction of the application is executed by processor, step S400) it may include following son Step:
S404 associated trigger event) is set for each hardware resource pool;
S405) hardware resource pool corresponding to the hardware resource of each container is distributed in confirmation, to be based on the hardware The trigger event of resource pool monitors the correspondence hardware resource in each container;
S406) when detecting that trigger event occurs, corresponding hardware resource is recycled from container and is provided to corresponding hardware In the pond of source.
Still further, the trigger event is hardware money during the above-metioned instruction of the application is executed by processor The frequency of use in source is lower than preset threshold value, and wherein the threshold value is initialised when trigger event is arranged, and according to hardware The average frequency of use and/or the frequency of use upper limit of resource are adaptively adjusted.
Alternatively, during the above-metioned instruction of the application is executed by processor, which is application hardware The process of the application program of resource terminates.
Further, during the above-metioned instruction of the application is executed by processor, the application journey that runs in a reservoir Sequence accesses the hardware resource by distributing to the ID of the hardware resource of the container.
Still further, during the above-metioned instruction of the application is executed by processor, the application that runs in a reservoir Program includes following sub-step by distributing to the ID of the hardware resource of the container to access the hardware resource:
S601 it) is recorded in from hardware resource pool distribution hardware resource to cell therefor, and by the ID of the hardware resource In the hardware resource table of container;
S602 hardware resource table) is searched for, when there are applications when respective resources attribute, run in container in hardware resource table Program accesses corresponding hardware resource according to the ID of hardware resource, otherwise by container engine to associated with the Resource Properties Hardware resource pool application;
S603 it) when hardware resource is recovered to corresponding hardware resource pool from container, deletes corresponding in hardware resource table ID。
Further, further comprising the steps of during the above-metioned instruction of the application is executed by processor: S500) to press According to the preset each hardware resource pool of frequency periodic detection, and it will test the hardware resource being removed and provided from corresponding hardware It is removed in source pond and corresponding container.
The application's has the beneficial effect that by that can obtain using to the ID for identifying unique identification on each hardware resource The lightweight for realizing container itself simultaneously, ensures the effect of the hardware resource safety between different vessels.
Detailed description of the invention
Fig. 1 show existing virtual machine and structure of container schematic diagram;
The configuration diagram of the virtual desktop in embodiment based on container is disclosed for this application shown in Fig. 2;
The Use Case Map of the virtual desktop in embodiment based on container is disclosed for this application shown in Fig. 3;
Fig. 4 show the flow chart of the equipment blocking method disclosed in the present application for the virtual desktop based on container;
Fig. 5 show the submethod flow chart that hardware resource is accessed in first embodiment disclosed in the present application;
Fig. 6 show the schematic diagram that hardware resource process is accessed in embodiment illustrated in fig. 5;
Fig. 7 show the submethod flow chart that hardware resource is accessed in second embodiment disclosed in the present application;
Fig. 8 show the schematic diagram that hardware resource process is accessed in 3rd embodiment disclosed in the present application;
Fig. 9 show the submethod flow chart that hardware resource is accessed in embodiment illustrated in fig. 8;
Figure 10 show the structure chart of the equipment blocking device disclosed in the present application for the virtual desktop based on container.
Specific embodiment
It is carried out below with reference to technical effect of the embodiment and attached drawing to the design of the application, specific structure and generation clear Chu, complete description, to be completely understood by the purpose, scheme and effect of the application.It should be noted that the case where not conflicting Under, the features in the embodiments and the embodiments of the present application can be combined with each other.The identical attached drawing mark used everywhere in attached drawing Note indicates the same or similar part.
With reference to existing virtual machine shown in FIG. 1 and structure of container schematic diagram.Two typical cases as virtualization technology Son, virtual machine and container include application program and run the application program necessary component (such as system binary system text Part and library), and respectively by operating in the monitor of virtual machine on physical computer (Hypervisor) and container engine (Docker Engine) application is located at the computer hardware resource of system bottom.For virtual machine and container, the single meter of bottom Calculation machine hardware resource (such as server, storage equipment, central processing unit, the port I/O and network port etc.) is due to being virtualized And multiple logical resources being shared can be served as.Meanwhile host operating system (Operation System, OS) can also It provides and advanced optimizes for the interaction of above-mentioned monitor of virtual machine and container engine and underlying computer hardware resource.For example, main Machine OS can support multiple spatially mutually isolated users to share the computer hardware resource of bottom by virtual machine or container.Its Some examples of middle host OS can beWithHowever, as noted previously, virtual machine Since its own operating system needs specially to occupy more resources and includes more processing expenses, set to reduce host Standby overall performance.Although container realizes itself lightweight by sharing the kernel of host OS, it is between container and It is not carried out real isolation, to leave security risk for user.
Therefore, in order to make full use of the lightweight advantage of container, and the degree of isolation between hoisting container, different appearances are avoided Hardware resource between device is by error calls, and present applicant proposes a kind of equipment blocking sides for the virtual desktop based on container Method.This method is suitable for the virtual desktop based on container as shown in Figure 2.In the virtual desktop based on container, server Multiple containers being isolated from each other of interior foundation.Wherein, an independent virtual desktop is respectively created in each of multiple containers Example, and be that corresponding container configures independent document structure management by the virtual desktop example of each container.In each appearance The application program run in device is obtained from computer hardware resource pond by container engine by the hardware resource management device of host Corresponding computer hardware resource.When issuing file operation requests to corresponding container, application program passes through virtual desktop reality The file that example calls document structure management to be related to this document operation requests operates.For every user of container, it is based on Virtual desktop example provided by container is just as an independent personal operating system, rather than just from host operating system It marks off, the operation performing environment isolated as host operating system a part.Further, referring to Fig. 3 institute The Use Case Map shown, local server are that each container configures corresponding system environments, personal document and void by container engine The configuration file at quasi- interface, and virtual desktop example is formed using the DockerClient of container.For every user of container, Container is just as an independent personal operating system, rather than just what is marked off from host operating system, as host The operation performing environment that operating system is a part of and isolates.Further, needle can be further arranged in above-mentioned configuration file To the differential file of the kernel of host OS, and personalized virtual opetrating system environment is formed on each container, and realization pair The kernel of host OS redirects.In addition, for the application program in container, when operation necessary computer hardware resource all It is by container engine application.Therefore, private resource must on the one hand be occupied for virtual machine itself relative to virtual machine Operating system, the container more light weight in above-mentioned technical proposal, so as on the same server be more users Create container;On the other hand, since application program needs to share the computer hardware resource of bottom by container engine, and work as When it issues file operation requests, it is necessary to call the document structure management of container by virtual desktop example to grasp to the file Make the file that request is related to be operated, to ensure that degree of isolation between container, improves the level of security of container.Into one Step ground, the client of container can be set in strange land.As shown in figure 3, being provided between the client and local server of user Interchange box is provided with embedded system on the interchange box to execute relevant image and generate and File Transfer Protocol, thus with Corresponding pattern manipulation interface is formed on the end of family.
Specifically, referring to method flow diagram shown in Fig. 4, above equipment partition method includes the following steps:
S100) for the hardware resource for being newly added to server, its at least one ability is identified for the hardware resource Resource Properties;
S200 identified Resource Properties) are utilized, by a hardware in the hardware resource and multiple hardware resource pools Resource pool is associated, so that each of hardware resource pool hardware resource is associated with one in multiple Resource Properties;
S300) be respectively each of multiple hardware resource pools hardware resource distribute a unique identification ID;And
S400) by container engine, hardware resource in hardware resource pool is assigned to by the ID according to each hardware resource Cell therefor and from cell therefor recycling hardware resource into hardware resource pool.
Wherein, Resource Properties can be is divided according to the function of hardware resource, such as but is not limited to use in calculating Computing hardware resource pool (such as CPU and GPU), storage hardware resource pool (such as caching at different levels and nonvolatile for storage Property storage medium) and for communication network hardware resources pond (such as bandwidth).At this point, for the application program in container, Necessary hardware resource is all by container engine application when its operation.Container engine provides hardware according to the ID of hardware resource Hardware resource in the pond of source is filtered, it is ensured that each hardware resource is distributed only to multiple share the hardware at any time One (such as the printer or scanner shared in office by multiple users) in the container of resource, or any Moment can be only assigned to a specified container (such as camera on personal notebook).In addition, those skilled in the art It can be obtained by customary technical means in the art and identification hardware Resource Properties (such as are associated in embodiment illustrated in fig. 2 CPU in computing hardware resource pool, disk or the I/O being associated in network hardware resources pond in storage hardware resource pool are associated with Port etc.), and marker appropriate is arranged to the ID of hardware resource, with distinguish hardware resource Resource Properties and above-mentioned two class (can be shared by multiple containers or can only be designated what container was shared) hardware resource.The application couple and the ID of hardware resource are specifically marked The information that knowledge mode and mark are included not limits.In addition, it will be understood by those skilled in the art that shown element in attached drawing Number and shape only as illustrative reference, not as the limitation to the application.
Submethod flow chart referring to Figure 5, in one or more embodiments of the application, step S400) also wrap Include following sub-step:
S401 corresponding hardware resource) is assigned to cell therefor according to the ID of hardware resource;
S402) the hardware resource locked according to the ID of hardware resource to distribute, so that other containers be forbidden to access corresponding ID Hardware resource;
S403) from container recycling hardware resource into hardware resource pool, and it is corresponding by being unlocked according to the ID of hardware resource Hardware resource.
At this point, referring to the schematic diagram of access hardware resource process shown in fig. 6, for the user of container, related hardware money Source is comprised in its container as the personal computer of user is a part of.It can lead in the application program of container internal operation It crosses container engine and accesses the hardware resource.However for the application program of other containers, since the hardware resource is locked, So its can not the ID based on hardware resource to the container engine application hardware resource, to improve hardware resource between container Safety.
Referring to submethod flow chart shown in Fig. 7, in one or more embodiments of the application, step S400 further includes Following sub-step:
S404 associated trigger event) is set for each hardware resource pool;
S405) hardware resource pool corresponding to the hardware resource of each container is distributed in confirmation, to be based on the hardware The trigger event of resource pool monitors the correspondence hardware resource in each container;
S406) when detecting that trigger event occurs, corresponding hardware resource is recycled from container and is provided to corresponding hardware In the pond of source.Specifically, trigger event is to apply for that the process of the application program of hardware resource terminates, i.e., when the process knot of application program Shu Shi recycles relevant hardware resource immediately.Alternatively, in order to avoid continually distributing/recycle brought by hardware resource Overhead, the trigger event can be the frequency of use of hardware resource lower than preset threshold value.The frequency of use is for example still It is not limited to data processor utilization rate, memory utilization rate, data space utilisation and network utilization.Correspondingly, threshold value is There is the value of same units with the frequency of use.Wherein, which be initialised when trigger event is arranged, and according to hardware The average frequency of use and/or the frequency of use upper limit of resource are adaptively adjusted.For example, working as the average frequency of use of hardware resource When being the 80% of the frequency of use upper limit, present threshold value is raised 10%.Those skilled in the art can provide according to specific hardware The initialization value and the adaptive adjustment rule of the threshold value is arranged in source, and the application not limits this.
Referring to the configuration diagram and access hardware resource mistake shown in Fig. 8 of the virtual desktop shown in Fig. 2 based on container The schematic diagram of journey, in one or more embodiments of the application, the application program run in a reservoir is by distributing to the appearance The ID of the hardware resource of device accesses the hardware resource.Specifically, maintenance has portion hard in the virtual desktop example of each container Part resource table, the application program (such as in the application program A1 and application program A2 of 1 internal operation of container in Fig. 2) in container are logical The hardware resource table is crossed to the corresponding hardware resource of container engine application.Further, referring to submethod process shown in Fig. 9 Figure, in the said one or multiple embodiments of the application, the application program run in a reservoir is by distributing to the container It includes following sub-step that the ID of hardware resource, which accesses the hardware resource:
S601 it) is recorded in from hardware resource pool distribution hardware resource to cell therefor, and by the ID of the hardware resource In the hardware resource table of container;
S602 hardware resource table) is searched for, when there are applications when respective resources attribute, run in container in hardware resource table Program accesses corresponding hardware resource according to the ID of hardware resource, otherwise by container engine to associated with the Resource Properties Hardware resource pool application;
S603 it) when hardware resource is recovered to corresponding hardware resource pool from container, deletes corresponding in hardware resource table ID.In one or more embodiments of the application, above equipment partition method is further comprising the steps of with the hardware that timely updates Actually available hardware resource in resource pool:
S500) according to the preset each hardware resource pool of frequency periodic detection, and it will test the hardware money being removed Source is removed from corresponding hardware resource pool and corresponding container.
Similarly, those skilled in the art can be according to specific hardware resource initial frequencies value and the setting frequency values Adaptive adjustment rule, the application to this not limit.
Correspondingly, function structure chart shown in 0 referring to Fig.1, it is disclosed herein for the virtual desktop based on container Equipment blocking device comprises the following modules: mark module, for being provided for the hardware for the hardware resource for being newly added to server Source identifies the Resource Properties of its at least one ability;Relating module, for utilizing identified Resource Properties, by the hardware resource It is associated with a hardware resource pool in multiple hardware resource pools, so that each of hardware resource pool hardware resource and more One in a Resource Properties is associated;Distribution module, for each of respectively multiple hardware resource pools hardware resource Distribute the ID of a unique identification;And management module, for by container engine, the ID according to each hardware resource will be hard Hardware resource is assigned to cell therefor and from cell therefor recycling hardware resource into hardware resource pool in part resource pool.This When, for the application program in container, necessary hardware resource is all by container engine application when running.Container engine The hardware resource in hardware resource pool is filtered according to the ID of hardware resource, it is ensured that each hardware resource at any time One be distributed only in multiple containers for sharing the hardware resource (such as is shared in office by multiple users Printer or scanner), or can be only assigned to (such as the camera shooting on personal notebook of a specified container at any time Head).In addition, those skilled in the art can by customary technical means in the art obtain and identification hardware Resource Properties (such as The CPU that is associated in embodiment illustrated in fig. 2 in computing hardware resource pool, disk or association in storage hardware resource pool are associated with To the port I/O etc. in network hardware resources pond), and marker appropriate is arranged to the ID of hardware resource, to distinguish hardware money Hardware resource (can be shared by multiple containers or can only be designated what container was shared) to the Resource Properties in source and above-mentioned two class.This Shen Please the information that mode and mark are included is specifically identified to the ID with hardware resource not to limit.In addition, those skilled in the art It will be appreciated that the number and shape of shown element are only as illustrative reference in attached drawing, not as the limitation to the application.
In one or more embodiments of the application, management module further includes following submodule: resource module, for according to Corresponding hardware resource is assigned to cell therefor according to the ID of hardware resource;Module is locked, for the ID according to hardware resource The hardware resource locked to distribute, so that other containers be forbidden to access the hardware resource for corresponding to ID;Unlocked state is used for from container Hardware resource is recycled into hardware resource pool, and corresponding hardware resource will be unlocked according to the ID of hardware resource.At this point, referring to figure The schematic diagram that hardware resource process is accessed shown in 6, for the user of container, individual calculus of the associated hardware resource such as user Machine is a part of and is comprised in its container.The hardware can be accessed by container engine in the application program of container internal operation Resource.However for the application program of other containers, since the hardware resource is locked, so it can not be provided based on hardware The ID in source is to the container engine application hardware resource, to improve the safety of hardware resource between container.
In one or more embodiments of the application, management module further includes following submodule: setup module, for for Associated trigger event is arranged in each hardware resource pool;Monitoring module, for confirming the hardware resource for distributing to each container Corresponding hardware resource pool, so that the trigger event based on the hardware resource pool monitors the money of the correspondence hardware in each container Source;Recycling module, for recycling corresponding hardware resource from container to corresponding hardware when detecting that trigger event occurs In resource pool.Specifically, trigger event is to apply for that the process of the application program of hardware resource terminates, i.e., when the process of application program At the end of, relevant hardware resource is recycled immediately.Alternatively, it is brought in order to avoid continually distributing/recycling hardware resource Overhead, which can be the frequency of use of hardware resource lower than preset threshold value.The frequency of use for example but It is not limited to data processor utilization rate, memory utilization rate, data space utilisation and network utilization.Correspondingly, threshold value It is the value that there are same units with the frequency of use.Wherein, which be initialised when trigger event is arranged, and according to hard The average frequency of use and/or the frequency of use upper limit of part resource are adaptively adjusted.For example, when the average of hardware resource uses frequency When rate is the 80% of the frequency of use upper limit, present threshold value is raised 10%.Those skilled in the art can be according to specific hardware The initialization value and the adaptive adjustment rule of the threshold value is arranged in resource, and the application not limits this.
Referring to the configuration diagram and access hardware resource mistake shown in Fig. 8 of the virtual desktop shown in Fig. 2 based on container The schematic diagram of journey, in one or more embodiments of the application, the application program run in a reservoir is by distributing to the appearance The ID of the hardware resource of device accesses the hardware resource.Specifically, maintenance has portion hard in the virtual desktop example of each container Part resource table, the application program (such as in the application program A1 and application program A2 of 1 internal operation of container in Fig. 2) in container are logical The hardware resource table is crossed to the corresponding hardware resource of container engine application.Further, the application program run in a reservoir is logical It crosses and distributes to the ID of the hardware resource of the container to access the hardware resource include following submodule: logging modle, for from hardware Resource pool distribution hardware resource is recorded in the hardware resource table of container to cell therefor, and by the ID of the hardware resource;It searches Rope module, for searching for hardware resource table, when there are application journeys when respective resources attribute, run in container in hardware resource table Sequence accesses corresponding hardware resource according to the ID of hardware resource, otherwise by container engine to associated with the Resource Properties hard Part resource pool application;Removing module, for when hardware resource is recovered to corresponding hardware resource pool from container, deleting hardware money Corresponding ID in the table of source, to realize the hardware resource table for dynamically maintaining and updating in each container.
In one or more embodiments of the application, above equipment isolating device further include with lower module and when update Actually available hardware resource in hardware resource pool: remove module, for being provided according to each hardware of preset frequency periodic detection Source pond, and will test the hardware resource being removed and removed from corresponding hardware resource pool and corresponding container.It is similar Ground, those skilled in the art can be according to the adaptive adjustment of specific hardware resource initial frequencies value and the setting frequency values Rule, the application not limit this.
It should be appreciated that embodiments herein can be by computer hardware, the combination of hardware and software or by depositing The computer instruction in non-transitory computer-readable memory is stored up to be effected or carried out.Standard program can be used in this method Technology-include realized in computer program configured with the non-transitory computer-readable storage media of computer program, wherein Configured in this way storage medium make computer operated in a manner of specific and is predefined-according in a particular embodiment describing Method and attached drawing.Each program can be realized with the programming language of level process or object-oriented with logical with computer system Letter.However, if desired, the program can be realized with compilation or machine language.Under any circumstance, the language can be compiling or The language of explanation.In addition, the program can be run on the specific integrated circuit of programming for this purpose.
Further, this method can be realized in being operably coupled to suitable any kind of computing platform, wrap Include but be not limited to PC, mini-computer, main frame, work station, network or distributed computing environment, individual or integrated Computer platform or communicated with charged particle tool or other imaging devices etc..The various aspects of the application can be to deposit The machine readable code on non-transitory storage medium or equipment is stored up to realize no matter be moveable or be integrated to calculating Platform, such as hard disk, optical reading and/or write-in storage medium, RAM, ROM, so that it can be read by programmable calculator, when Storage medium or equipment can be used for configuration and operation computer to execute process described herein when being read by computer.This Outside, machine readable code, or part thereof can be transmitted by wired or wireless network.When such media include combining microprocessor Or when other data processors realization instruction or program of the step above, application as described herein includes that these and other are different The non-transitory computer-readable storage media of type.When being programmed according to methods and techniques described herein, the application is also Including computer itself.
Computer program can be applied to input data to execute function as described herein, to convert input data with life At storing to the output data of nonvolatile memory.Output information can also be applied to one or more output equipments as shown Device.In the application preferred embodiment, the data of conversion indicate physics and tangible object, including the object generated on display Reason and the particular visual of physical objects are described.
Therefore, should be with descriptive sense rather than restrictive sense understands the specification and drawings.However, by apparent It is:, can be to the application in the case where not departing from the broader spirit and scope of the application as described in claims Make various modifications and change.
Other modifications are in spirit herein.Therefore, although disclosed technology may be allowed various modifications and substitution structure It makes, but has shown that in the accompanying drawings and its some embodiments shown in being described in detail above.It will be appreciated, however, that not It is intended to for the application to be confined to disclosed one or more concrete forms;On the contrary, its intention covers such as the appended claims Defined in fall in all modifications, alternative constructions and equivalent in spirit and scope.

Claims (10)

1. a kind of equipment blocking method for the virtual desktop based on container, suitable for established in server it is multiple each other An independent virtual desktop example is respectively created in the container of isolation, each of plurality of described container, and by every The virtual desktop example of a container is that corresponding container configures independent document structure management, be the described method comprises the following steps:
S100) for the hardware resource for being newly added to server, the resource of its at least one ability is identified for the hardware resource Attribute;
S200 identified Resource Properties) are utilized, by a hardware resource in the hardware resource and multiple hardware resource pools Pond is associated, so that each of hardware resource pool hardware resource is associated with one in multiple Resource Properties;
S300) be respectively each of multiple hardware resource pools hardware resource distribute a unique identification ID;And
S400) by container engine, hardware resource in hardware resource pool is assigned to accordingly by the ID according to each hardware resource Container and from cell therefor recycling hardware resource into hardware resource pool.
2. equipment blocking method according to claim 1, which is characterized in that step S400 further includes following sub-step:
S401 corresponding hardware resource) is assigned to cell therefor according to the ID of hardware resource;
S402) the hardware resource locked according to the ID of hardware resource to distribute, so that other containers be forbidden to access the hard of corresponding ID Part resource;
S403) from container recycling hardware resource into hardware resource pool, and corresponding hardware will be unlocked according to the ID of hardware resource Resource.
3. equipment blocking method according to claim 1, which is characterized in that step S400 further includes following sub-step:
S404 associated trigger event) is set for each hardware resource pool;
S405) hardware resource pool corresponding to the hardware resource of each container is distributed in confirmation, to be based on the hardware resource The trigger event in pond monitors the correspondence hardware resource in each container;
S406) when detecting that trigger event occurs, corresponding hardware resource is recycled from container to corresponding hardware resource pool In.
4. equipment blocking method according to claim 3, which is characterized in that the trigger event is the use of hardware resource Frequency is lower than preset threshold value, wherein the threshold value is initialised when trigger event is arranged, and according to hardware resource Average frequency of use and/or the frequency of use upper limit are adaptively adjusted.
5. equipment blocking method according to claim 3, which is characterized in that the trigger event is application hardware resource The process of application program terminates.
6. equipment blocking method according to claim 1, which is characterized in that the application program run in a reservoir is by dividing The ID of the hardware resource of the dispensing container accesses the hardware resource.
7. equipment blocking method according to claim 6, which is characterized in that the application program run in a reservoir is by dividing It includes following sub-step that the ID of the hardware resource of the dispensing container, which accesses the hardware resource:
S601) container is recorded in from hardware resource pool distribution hardware resource to cell therefor, and by the ID of the hardware resource Hardware resource table in;
S602 hardware resource table) is searched for, when there are application programs when respective resources attribute, run in container in hardware resource table Corresponding hardware resource is accessed according to the ID of hardware resource, otherwise passes through container engine to hardware associated with the Resource Properties Resource pool application;
S603) when hardware resource is recovered to corresponding hardware resource pool from container, corresponding ID in hardware resource table is deleted.
8. equipment blocking method according to claim 1, which is characterized in that further comprising the steps of:
S500) according to the preset each hardware resource pool of frequency periodic detection, and will test the hardware resource that has been removed from It is removed in corresponding hardware resource pool and corresponding container.
9. a kind of equipment blocking device for the virtual desktop based on container, suitable for established in server it is multiple each other An independent virtual desktop example is respectively created in the container of isolation, each of plurality of described container, and by every The virtual desktop example of a container is that corresponding container configures independent document structure management, and described device comprises the following modules:
Mark module, for identifying its at least one energy for the hardware resource for the hardware resource for being newly added to server The Resource Properties of power;
Relating module, for utilizing identified Resource Properties, by one in the hardware resource and multiple hardware resource pools Hardware resource pool is associated, so that each of hardware resource pool hardware resource is related to one in multiple Resource Properties Connection;
Distribution module, for being respectively the ID of each of multiple hardware resource pools hardware resource one unique identification of distribution; And
Management module, for by container engine, the ID according to each hardware resource to divide hardware resource in hardware resource pool It is fitted on cell therefor and from cell therefor recycling hardware resource into hardware resource pool.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, method performed by the instruction is suitable for taking An independent void is respectively created in the multiple containers being isolated from each other established in business device, each of plurality of described container Quasi- desktop example, and be that corresponding container configures independent document structure management by the virtual desktop example of each container, It is characterized in that realizing when the instruction is executed by processor such as the step of method described in any item of the claim 1 to 8.
CN201811073054.5A 2018-09-14 2018-09-14 The equipment blocking method and device of virtual desktop based on container Pending CN109213573A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811073054.5A CN109213573A (en) 2018-09-14 2018-09-14 The equipment blocking method and device of virtual desktop based on container

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811073054.5A CN109213573A (en) 2018-09-14 2018-09-14 The equipment blocking method and device of virtual desktop based on container

Publications (1)

Publication Number Publication Date
CN109213573A true CN109213573A (en) 2019-01-15

Family

ID=64984387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811073054.5A Pending CN109213573A (en) 2018-09-14 2018-09-14 The equipment blocking method and device of virtual desktop based on container

Country Status (1)

Country Link
CN (1) CN109213573A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110120940A (en) * 2019-04-12 2019-08-13 华中科技大学 A kind of file system resource partition method towards Docker container
CN112527513A (en) * 2021-02-09 2021-03-19 南京飞灵智能科技有限公司 Method and system for dynamically distributing multiple GPUs
US11354148B2 (en) 2019-02-22 2022-06-07 Vmware, Inc. Using service data plane for service control plane messaging
US11368387B2 (en) 2020-04-06 2022-06-21 Vmware, Inc. Using router as service node through logical service plane
US11405431B2 (en) 2015-04-03 2022-08-02 Nicira, Inc. Method, apparatus, and system for implementing a content switch
US11438267B2 (en) 2013-05-09 2022-09-06 Nicira, Inc. Method and system for service switching using service tags
US11496606B2 (en) 2014-09-30 2022-11-08 Nicira, Inc. Sticky service sessions in a datacenter
WO2022252510A1 (en) * 2021-06-04 2022-12-08 深圳前海微众银行股份有限公司 Resource management method, apparatus and device
US11595250B2 (en) 2018-09-02 2023-02-28 Vmware, Inc. Service insertion at logical network gateway
US11611625B2 (en) * 2020-12-15 2023-03-21 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
WO2023045467A1 (en) * 2021-09-26 2023-03-30 中兴通讯股份有限公司 Container cpu resource scheduling and isolation method and apparatus, and storage medium and electronic device
US11659061B2 (en) 2020-01-20 2023-05-23 Vmware, Inc. Method of adjusting service function chains to improve network performance
US11722367B2 (en) 2014-09-30 2023-08-08 Nicira, Inc. Method and apparatus for providing a service with a plurality of service nodes
US11722559B2 (en) 2019-10-30 2023-08-08 Vmware, Inc. Distributed service chain across multiple clouds
US11734043B2 (en) 2020-12-15 2023-08-22 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
US11750476B2 (en) 2017-10-29 2023-09-05 Nicira, Inc. Service operation chaining
US11805036B2 (en) 2018-03-27 2023-10-31 Nicira, Inc. Detecting failure of layer 2 service using broadcast messages
CN117369950A (en) * 2023-12-04 2024-01-09 上海凯翔信息科技有限公司 Configuration system of docker container

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015109593A1 (en) * 2014-01-27 2015-07-30 华为技术有限公司 Virtualization method and apparatus, and computer device
CN105824688A (en) * 2016-03-16 2016-08-03 合网络技术(北京)有限公司 Method for solving start concurrence bottleneck of docker container
CN107045530A (en) * 2017-01-20 2017-08-15 华中科技大学 A kind of method that object storage system is embodied as to local file system
CN107423108A (en) * 2017-04-25 2017-12-01 华中科技大学 A kind of ARM container running environment construction methods based on Android device
CN107632879A (en) * 2017-10-31 2018-01-26 中国人民解放军国防科技大学 Cloud simulation platform
US20180067682A1 (en) * 2016-09-02 2018-03-08 International Business Machines Corporation Allocation of Hardware Resources to a Logical Grouping of Software Applications
CN107844539A (en) * 2017-10-19 2018-03-27 广州阿里巴巴文学信息技术有限公司 Isolated data management method, device, system, computing device and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015109593A1 (en) * 2014-01-27 2015-07-30 华为技术有限公司 Virtualization method and apparatus, and computer device
CN105824688A (en) * 2016-03-16 2016-08-03 合网络技术(北京)有限公司 Method for solving start concurrence bottleneck of docker container
US20180067682A1 (en) * 2016-09-02 2018-03-08 International Business Machines Corporation Allocation of Hardware Resources to a Logical Grouping of Software Applications
CN107045530A (en) * 2017-01-20 2017-08-15 华中科技大学 A kind of method that object storage system is embodied as to local file system
CN107423108A (en) * 2017-04-25 2017-12-01 华中科技大学 A kind of ARM container running environment construction methods based on Android device
CN107844539A (en) * 2017-10-19 2018-03-27 广州阿里巴巴文学信息技术有限公司 Isolated data management method, device, system, computing device and storage medium
CN107632879A (en) * 2017-10-31 2018-01-26 中国人民解放军国防科技大学 Cloud simulation platform

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11805056B2 (en) 2013-05-09 2023-10-31 Nicira, Inc. Method and system for service switching using service tags
US11438267B2 (en) 2013-05-09 2022-09-06 Nicira, Inc. Method and system for service switching using service tags
US11496606B2 (en) 2014-09-30 2022-11-08 Nicira, Inc. Sticky service sessions in a datacenter
US11722367B2 (en) 2014-09-30 2023-08-08 Nicira, Inc. Method and apparatus for providing a service with a plurality of service nodes
US11405431B2 (en) 2015-04-03 2022-08-02 Nicira, Inc. Method, apparatus, and system for implementing a content switch
US11750476B2 (en) 2017-10-29 2023-09-05 Nicira, Inc. Service operation chaining
US11805036B2 (en) 2018-03-27 2023-10-31 Nicira, Inc. Detecting failure of layer 2 service using broadcast messages
US11595250B2 (en) 2018-09-02 2023-02-28 Vmware, Inc. Service insertion at logical network gateway
US11467861B2 (en) 2019-02-22 2022-10-11 Vmware, Inc. Configuring distributed forwarding for performing service chain operations
US11397604B2 (en) 2019-02-22 2022-07-26 Vmware, Inc. Service path selection in load balanced manner
US11604666B2 (en) 2019-02-22 2023-03-14 Vmware, Inc. Service path generation in load balanced manner
US11354148B2 (en) 2019-02-22 2022-06-07 Vmware, Inc. Using service data plane for service control plane messaging
US11609781B2 (en) 2019-02-22 2023-03-21 Vmware, Inc. Providing services with guest VM mobility
CN110120940A (en) * 2019-04-12 2019-08-13 华中科技大学 A kind of file system resource partition method towards Docker container
US11586468B2 (en) 2019-04-12 2023-02-21 Huazhong University Of Science And Technology Docker-container-oriented method for isolation of file system resources
US11722559B2 (en) 2019-10-30 2023-08-08 Vmware, Inc. Distributed service chain across multiple clouds
US11659061B2 (en) 2020-01-20 2023-05-23 Vmware, Inc. Method of adjusting service function chains to improve network performance
US11438257B2 (en) 2020-04-06 2022-09-06 Vmware, Inc. Generating forward and reverse direction connection-tracking records for service paths at a network edge
US11528219B2 (en) 2020-04-06 2022-12-13 Vmware, Inc. Using applied-to field to identify connection-tracking records for different interfaces
US11743172B2 (en) 2020-04-06 2023-08-29 Vmware, Inc. Using multiple transport mechanisms to provide services at the edge of a network
US11792112B2 (en) 2020-04-06 2023-10-17 Vmware, Inc. Using service planes to perform services at the edge of a network
US11368387B2 (en) 2020-04-06 2022-06-21 Vmware, Inc. Using router as service node through logical service plane
US11611625B2 (en) * 2020-12-15 2023-03-21 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
US11734043B2 (en) 2020-12-15 2023-08-22 Vmware, Inc. Providing stateful services in a scalable manner for machines executing on host computers
CN112527513A (en) * 2021-02-09 2021-03-19 南京飞灵智能科技有限公司 Method and system for dynamically distributing multiple GPUs
WO2022252510A1 (en) * 2021-06-04 2022-12-08 深圳前海微众银行股份有限公司 Resource management method, apparatus and device
WO2023045467A1 (en) * 2021-09-26 2023-03-30 中兴通讯股份有限公司 Container cpu resource scheduling and isolation method and apparatus, and storage medium and electronic device
CN117369950A (en) * 2023-12-04 2024-01-09 上海凯翔信息科技有限公司 Configuration system of docker container
CN117369950B (en) * 2023-12-04 2024-02-20 上海凯翔信息科技有限公司 Configuration system of docker container

Similar Documents

Publication Publication Date Title
CN109213573A (en) The equipment blocking method and device of virtual desktop based on container
CN109388454A (en) Virtual desktop method and system based on container
US10409781B2 (en) Multi-regime caching in a virtual file system for cloud-based shared content
CN103853596B (en) For the method and system for migrating virtual machine between working group
CN105978704B (en) System and method for creating new cloud resource instruction set architecture
CN104067288B (en) Storage encryption method
EP3380937A1 (en) Techniques for analytics-driven hybrid concurrency control in clouds
CN100454278C (en) Control method for accessing computer system and I/0 ports
CN103220364A (en) Cloud-based system management training platform architecture
CN102981907A (en) System and method for virtual machine allocation
CN103970607A (en) Computing Optimized Virtual Machine Allocations Using Equivalence Combinations
US20130283267A1 (en) Virtual machine construction
US9436601B2 (en) Categorizing memory pages based on page residences
WO2016047814A1 (en) Resource allocation method using cloud api key, and apparatus therefor
US20120185528A1 (en) Session allocation for distributed virtual desktop architecture
CN107370835A (en) A kind of cloud computing center network architecture based on SDN and NFV technologies
CN105359088A (en) Method to optimize provisioning time with dynamically generated virtual disk contents
US20220138015A1 (en) Shared enterprise cloud
WO2014208909A1 (en) Simulation device and distribution simulation system
CN114418828B (en) Video memory management method, device, equipment, storage medium and program product
CN105683928A (en) Data caching policy in multiple tenant enterprise resource planning system
CN103034526B (en) A kind of implementation method of virtualization services and device
CN103262035A (en) Device discovery and topology reporting in a combined CPU/GPU architecture system
CN109343974A (en) The inter-process communication methods and device of virtual desktop based on container
CN103294556A (en) Method and system for host system admission control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190115

RJ01 Rejection of invention patent application after publication