Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

176results about How to "Avoid downloading" patented technology

Method of managing character fonts within multimedia scenes, and the corresponding computer program and terminal

A method is provided for managing fonts in a radio communication terminal, which can receive fonts in order to render contents on a screen. One such method involves the use of the following elements in the terminal, namely: a font database that lists all of the fonts or font portions stored by the terminal and matches at least one management parameter with each of the fonts; and set of font management commands including at least one command, which is applied to a font portion and which belongs to the group containing at least a command for transmitting a font portion for storage in the terminal, a command for updating a font portion stored in the terminal and a command for deleting a font portion stored in the terminal.
Owner:STREAMEZZO

Software distribution method and system with automatic prerequisite installation

InactiveUS20060048145A1Reduce needIncrease reliability and performanceProgram loading/initiatingMemory systemsPreconditionSoftware
A software distribution method (300) is proposed. The solution of the invention relates to the deployment (from a source host to selected endpoints) of main packages that require one or more prerequisite packages. In this case, the source host builds (304-326) and transmits (330-332) a multi-segment distribution structure that embeds the main package and any prerequisite package that is not available on at least one of the endpoints. Each endpoint receiving the distribution structure only installs (336-360) the prerequisite packages that are not available on the endpoint. The main package can then be installed (362-366) correctly (with the required configuration of the endpoint)
Owner:IBM CORP +1

Ip-based blocking of malware

A security module on a client monitors file download activities at the client and reports hosting website data to a security server. A download analysis module at the security server receives a hosting website data report from the client, where the hosting website data report describes a domain name and an IP address of a website hosting a file the client is attempting to download. The download analysis module analyzes the domain name and IP address of the website to generate file download control data indicating whether to allow downloading of the file to the client. The download analysis module reports the file download control data to the security module of the client. The security module uses the file download control data to selectively block downloading of the file.
Owner:CA TECH INC

Resource file updating method, device and system and server

The invention discloses a resource file updating method, device and system and a server, and belongs to the technical field of computers. The method comprises the steps of sending a request message to the server, wherein the request message comprises the name and the identification of a resource file, and the identification is acquired according to the name of the resource file and available data of the resource file; receiving latest data which correspond to the name of the resource file and are fed back according to the name and the identification of the resource file by the server, and replacing the available data of the resource file through the latest data of the resource file. According to the resource file updating method, device and system and the server, whether the resource file is updated or not is judged by comparing data corresponding to the resource file on a mobile terminal and the server, if updating exists, the latest data of the resource file are acquired, so that automatic updating of the resource file is achieved, the fact that an entire installing package is downloaded again under the condition that certain resource files are updated is avoided, and the downloading burden of the mobile terminal is lowered.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Programming system and programming method thereof

The invention discloses a programming system and a programming method thereof. The system comprises a programmer/PC, a transfer plate and at least one transmit plate, wherein level conversion circuits are arranged on the transfer plate and the transmit plate; the programmer is connected with the transfer plate; the transfer plate and the transmit plate are in communication connection through an RS-485 bus; the transmit plate is connected with a target chip in a one-to-one corresponding way; the transfer plate, the RS-485 bus and the transmit plate form a communication path. The method comprises the following steps: converting a target program into a binary BIN file; converting the binary BIN file into data meeting an IPS protocol; sending control signals through the communication path and controlling the target chip into an IPS download mode; sending a synchronization frame to the target chip through the programmer from the communication path to perform synchronization; reading the model and sector of the target chip through the programmer/PC after synchronization, and writing the model and sector into a program. The system has the advantages that off-line programming can be realized, one-to-multiple parallel programming can be realized, the programming efficiency is improved, and the system cost is low.
Owner:ZHANGZHOU CANNET ELECTRICAL APPLIANCE

File authorization access method, device and system based on block chain

The invention discloses a file authorization access method, device and system based on a block chain, and relates to the technical field of computers. One specific embodiment of the method comprises the following steps: receiving a file authorization request sent by a first user, wherein the file authorization request indicates an authorized user identifier list and a file identifier of the file,and the authorized user identifier list comprises an authorized user identifier of an authorized user having an operation authority for the file; respectively generating file certificate information for the authorized user to operate the file; respectively encrypting the file certificate information by using an authorized user public key of the authorized user; and correspondingly publishing the encrypted file certificate information for the authorized user and one or more of the authorized user identifier and the authorized user public key to a block chain. According to the embodiment, file uploading or downloading in the file authorization process is avoided, the file security is improved, and network resources are saved.
Owner:THE PEOPLES BANK OF CHINA DIGITAL CURRENCY INST

Method and device for updating network elements

InactiveCN103139245AAvoid downloading and business interruptionImprove download speed and service qualityProgram loading/initiatingData switching networksNetwork elementDistributed computing
The invention discloses a method and a device for updating network elements. The method comprises performing upgrade version downloading on at least one designated network element needing updating; and activating the upgrade versions downloaded by the network elements after upgrade versions of the at least one network element are downloaded, and updating the network elements. By means of the method and the device for updating network elements, the problem of service interruption of far-end network elements with near-end networks as starting points caused by reboot operation in near-end network element updating in correlation techniques can be solved, and the network bandwidth is fully used.
Owner:ZTE CORP

Method, apparatus and system for validating certificate state

An embodiment of the invention provides a validation method of certificate state, a certificate authenticating apparatus, a certificate revocation list (CRL) server and a CRL system; wherein the CRL system comprises the certificate authenticating apparatus and the CRL server; the certificate authenticating apparatus is used for transmitting a CRL downloading request message carrying a first CRL file identification information to the corresponding CRL server according to the obtained CRL downloading position information and validating the validity of the state of a user certificate by using a locally stored certificate revocation list (CRL) file when a received response message associated with the CRL downloading request message carries unmodified identification; and the CRL server is used for comparing the first CRL file identification information in the received CRL downloading request message with the second CRL file identification information of the corresponding CRL file on the CRL server and returning the response message carrying the unmodified identification when the comparison result is that the first CRL file identification information is the same as the second CRL file identification information. Such a technical proposal prevents from downloading the CRL repeatedly so as to ease network load.
Owner:HUAWEI DIGITAL TECH (CHENGDU) CO LTD

Low latency streaming media

Content streaming systems, such as systems that use HTTP compliant requests to obtain media segments for presentation of the content on a device. These content streaming systems can be optimized to reduce latency to a low level so that live events can be streamed to receiving devices in such a manner so that the time between an action in the live event and the presentation of the action on a receiving device that receives the streamed content is less than about 10 seconds. A client device can use rendition reports to tune-in to a new rendition (at a first bit rate) after presenting a prior rendition (of a second bit rate) when switching between the different bit rates; also, for example, a client device can use playlist annotations that indicate independent frames to avoid downloading depending frame media segments when switching between different renditions.
Owner:APPLE INC

Distributed mobile node file caching method based on social relation in cellular network

The invention discloses a distributed mobile node file caching method based on a social relation in a cellular network, and belongs to the field of wireless communication. After a mobile node meets a friend node (a one-hop social neighbor node) based on the social relation, the mobile node and the friend node transmit necessary files to each other, direct benefits and indirect benefits obtained by caching these files are calculated according to all files cached in the both parties to reallocate the caching schemes of the two nodes, wherein the direct benefits are system benefits of the two nodes by satisfying the demands of the respective friend nodes, and the indirect benefits are used for bringing larger opportunity for multi-hop social neighbor nodes to obtain the necessary files by direct communication through terminals so as to increase the direct benefits of other nodes. According to the distributed mobile node file caching method disclosed by the invention, the demands of the multi-hop social neighbor nodes are considered, so that the system obtains the maximum overall direct benefit. The distributed mobile node file caching method disclosed by the invention can be applied to node file caching methods in mobile cellular systems having caching functions and having the social relation.
Owner:ZHEJIANG UNIV

Third party application installation method and third party application installation system

The invention provides a third party application installation method which includes the following steps: obtaining a request of a user for installing a third party application; initiating a configuration file request of the third party application to an application repository, obtaining the configuration information of the third party application; judging whether the resource files of the third party application exist in local or not according to the configuration information, if the resource files exist in the local, installing the third party application according to the local resource files. According to the third party application method, the configuration information of the third party application which is installed specified according to the user is obtained from the application repository, whether the resource files of the third party application exist in the local or not is judged according to the configuration information, if the resource files of the third party application exist in the local, the third party application is installed according to the local resource files, unnecessary downloading is avoided, and the time of the user is saved. In addition, the user does not need to participate in the installation process, and thus convenience of the operation of the user is improved. Besides, the invention further provides a third party application installation system.
Owner:TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products