Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "Guaranteed transactional" patented technology

Mobile-terminal-based general transaction method and its system

Purpose of the invention is to disclose secure general transaction system, which is capable of connecting to multiple bank system and diversified mobile terminals. Thus, mobile terminal possesses payment function and function of collection of payment. Main technique is to setup payment system between mobile terminal and bank system. Through payment system, mobile terminal can connect to multiple bank system to implement transaction. Through the payment system, security of transaction is guaranteed.
Owner:肖勇 +1

Interactive method based on command line data of network management system

ActiveCN105847041AReduce the number of interactionsReduce the difficulty of download status maintenanceData switching networksInteraction timeNetwork management
The invention discloses an interactive method based on command line data of a network management system. The method comprises the following steps: converting a network management data model into a command line configuration block; packaging the command line data, and transmitting the command line data to a network device; caching and executing the command line data in batches by the network device; and carrying out rollback on a network management error. According to the invention, the data of the network management system is converted into the command line configuration blocks in batches, and an error rollback mode is supported, in this way, the interaction times of the network management system and the network device are decreased, meanwhile the downloading state maintenance difficulty of the network management data model is reduced, and the network management system is supported to simultaneously release multiple items of data command line configuration blocks; the network management system adds an error rollback mark in the command line to ensure the execution transaction of the data command line configuration blocks, once an execution failure occurs, the original operation on the network device is cancelled by an effective reverse operation; and the network management system optimizes the Telnet echo character, reduces the redundant data and simplifies the data returned to the network management system.
Owner:FENGHUO COMM SCI & TECH CO LTD

Write-optimized persistent memory heap management method

The invention discloses a write-optimized persistent memory management method. The method comprises the steps of S1, performing root information registration in a persistent memory; s2, constructing adata structure of a heap management memory, and storing the data structure in a DRAM; and S3, in a system fault recovery stage, recovering residual free space in the persistent memory space based onthe registered root information, and reconstructing a data structure of the heap management memory stored in the DRAM to achieve heap management of the persistent memory. According to the method, allmetadata structures allocated to the management memory can be stored in the DRAM, and extra write operation on the persistent memory cannot be caused by allocation or release operation of any persistent memory space; in addition, in the fault recovery process, the reference count of the object can be accurately restored through the number of times of searching the same object while the allocated space is searched, so that the reference count of the object can be stored in the DRAM without worrying about the reference count error or loss caused by the fault.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Disaster recovery data processing method, device and system

The embodiment of the invention discloses a disaster recovery data processing method, device and system, and the method comprises the steps: after a disaster recovery database obtains a first serviceprocessing request sent by a service requester, judging whether the type of the first service processing request is an inflow type, and obtaining a first judgment result; if the first judgment resultis yes, determining a corresponding gateway account according to the user information in the first service processing request, performing gateway accounting on the transaction in the first service processing request according to the gateway account, and listing the corresponding user into a gateway blacklist; determining a real blacklist generated asynchronously, and combining the real blacklist with the gateway blacklist to obtain a total blacklist; and locking the users who do not belong to the real blacklist in the total blacklist, and carrying out merging and updating processing on the gateway account data corresponding to the locked users. By means of the embodiments of the present specification, normal transactions can be performed on the user accounts except the real blacklist in the disaster recovery period.
Owner:ADVANCED NEW TECH CO LTD

Buyer receiving information confidentiality method and system, storage medium and confidentiality processing method

The invention discloses a buyer receiving information confidentiality method and system, a storage medium and a confidentiality processing method, and the method comprises the steps that a network transaction platform receives receiving information written by a buyer, and generates an information confidentiality code according to the received receiving information; or the network transaction platform receives an information confidential code generated by the logistics platform according to the receiving information of the buyer; or the network transaction platform receives an information confidential code generated by the third-party application program according to the receiving information of the buyer; the network transaction platform receives the transaction application and provides the information confidential code for the seller; and the logistics decoder interprets the information confidential code according to the commodity with the information confidential code provided by theseller and then obtains the receiving information of the buyer. Based on this, according to the buyer receiving information confidentiality method provided by the invention, the seller can not obtainthe receiving information of the buyer, and the logistics company can decrypt the receiving information through the logistics decoder to obtain the receiving information, so that the normal network transaction is ensured.
Owner:深圳海普瑞丽科技有限公司

Ethereum-compatible distributed account book method, device and equipment and medium

The invention relates to the technical field of computer technology, in particular to an Ethereum-compatible distributed account book method, device and equipment and a medium, and the method comprises the steps of S10, if a transaction request message triggered by a user is obtained, obtaining the transaction amount data from the transaction request message; s20, comparing the transaction amountdata with a preset threshold value, and if the transaction amount data exceeds the threshold value, sending a joint lending message to an alliance chain; s30, generating a transaction completion message according to the joint lending message after the joint lending message is responded; and S40, obtaining the node information responding to the joint lending message from the transaction completionmessage, and respectively storing the transaction completion message into each node according to the smart contract of the alliance chain. The method has the effect of optimizing the throughput capacity of the block chain.
Owner:浙江泰链科技有限公司

Data compression method and device, computer equipment and storage medium

The invention relates to the field of data storage, in particular to a data compression method and device, computer equipment and a storage medium. The method comprises the steps of obtaining a current load condition of a storage system; when the current load condition meets a preset compression requirement, judging whether the data of the to-be-compressed object stored in the non-compression areais being read and written or not; when the data of the to-be-compressed object is not read and written, compressing the to-be-compressed object; forbidding the data of the to-be-compressed object from being read and written when the metadata corresponding to the to-be-compressed object is processed in the compressing process, and allowing the data corresponding to the to-be-compressed object to be read and written when the data of the to-be-compressed object is compressed; and storing the compressed data to a compression area. By adopting the method, data compression and read-write operationcan be both considered.
Owner:PING AN TECH (SHENZHEN) CO LTD

Method and system for generating electronic receipts and electronic signatures based on Ftp

PendingCN110942284AAvoid \"multiple tasks\"Avoid problems such as \"one order with multiple signatures\"Digital data information retrievalUser identity/authority verificationElectronic documentDatabase
The invention discloses an Ftp-based electronic receipt and electronic signature generation method and system. The method comprises the steps of receiving electronic receipts created by a plurality offirst clients; storing the electronized document and the unique number corresponding to the electronized document into a server based on an Ftp protocol; storing the unique number corresponding to the electronized document, the first client number corresponding to the electronized document and the storage path corresponding to the electronized document into a corresponding database according to the type of the electronized document; realizing association between the database and the server based on the Ftp protocol through the unique number corresponding to the electronic document; receivingan electronic receipt consulting request initiated by a second client; presenting the searched electronic receipt to a second client according to the consulting request; and receiving the electronic receipt after the electronic signature is completed by the second client, and sending the electronic receipt after the electronic signature is completed to the corresponding first client according to the first client number corresponding to the electronic receipt.
Owner:SHANDONG LUNENG SOFTWARE TECH +1

Trading method to eliminate interference from adjacent roads, roadside units and multi-lane systems in the same direction

The invention discloses a transaction method for eliminating the interference of adjacent lanes, which is applied to a multi-lane system in the same direction, wherein each lane is correspondingly provided with a roadside unit for wireless communication with a vehicle-mounted unit, and multiple roadside units cover There is an overlapping area in the range, and the method includes synchronizing the timing of multiple roadside units, and setting the transmission parameters of multiple roadside units to be the same; according to the timing, multiple roadside units send transactions at the same time command, the content of the transaction command is set according to the current transaction steps of each roadside unit itself; the roadside unit that receives the feedback signal from the vehicle-mounted unit completes the current transaction steps with the vehicle-mounted unit. Adopting the present invention can ensure that the vehicle-mounted unit cannot be traded in the overlapping area of ​​the roadside unit, and further ensures that the roadside unit of the current lane cannot trade with the vehicle-mounted unit of the adjacent lane, thereby completely eliminating the interference of the adjacent road.
Owner:SHENZHEN GENVICT TECH

Implementation method of fault-tolerant distributed security event data transmission protocol

The invention aims to provide an implementation method of a fault-tolerant distributed security event data transmission protocol. Security events are handled through a distributed cluster, and event nodes in the cluster are determined through a periodical election mechanism in order to ensure the transaction of message data. A message queue mechanism is adopted for the nodes in the cluster in order to ensure the concurrency and expandability of security event handling. Thus, a fault-tolerant security event transmission mechanism is implemented. The method comprises the following steps that: A, security events in a whole network are handled through an event handling distributed cluster; B, the event handling cluster periodically elects event nodes Transactional; C, scoring factors of event nodes Transactional election are determined; D, one Performer node can process security event transmission requests of a plurality of Performer nodes concurrently; and E, the Performer node processes messages.
Owner:中国南方电网有限责任公司信息中心 +1

An interactive method based on command line data of network management system

ActiveCN105847041BReduce the number of interactionsReduce the difficulty of download status maintenanceData switching networksNetwork managementRollback
The invention discloses an interactive method based on command line data of a network management system. The method comprises the following steps: converting a network management data model into a command line configuration block; packaging the command line data, and transmitting the command line data to a network device; caching and executing the command line data in batches by the network device; and carrying out rollback on a network management error. According to the invention, the data of the network management system is converted into the command line configuration blocks in batches, and an error rollback mode is supported, in this way, the interaction times of the network management system and the network device are decreased, meanwhile the downloading state maintenance difficulty of the network management data model is reduced, and the network management system is supported to simultaneously release multiple items of data command line configuration blocks; the network management system adds an error rollback mark in the command line to ensure the execution transaction of the data command line configuration blocks, once an execution failure occurs, the original operation on the network device is cancelled by an effective reverse operation; and the network management system optimizes the Telnet echo character, reduces the redundant data and simplifies the data returned to the network management system.
Owner:FENGHUO COMM SCI & TECH CO LTD

Transaction method and device, electronic equipment and computer readable storage medium

PendingCN112348683AMeet the needs of fast and easy transactionGuaranteed transactionalFinanceOffice automationEngineering managementSystems engineering
The embodiment of the invention provides a transaction method and device, electronic equipment and a computer readable storage medium. The method comprises the steps of determining a fund registrationbook corresponding to an incoming account message according to a preset clearing rule when the incoming account message of a client in the same industry for a specified account is received; and registering the transaction information corresponding to the incoming account message in the fund registration book, so that the client in the same industry can perform transaction based on the fund registration book. Based on the scheme, the enrollment of the same-industry clients can be registered through the fund registration book, and the same-industry clients can perform transaction based on the fund registration book, so that tedious procedures during account opening are avoided, the requirement of the same-industry clients for rapid and convenient transaction can be met, and the normal transaction of the same-industry clients is ensured.
Owner:CHINA CITIC BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products