Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1406 results about "Breaking point" patented technology

Secure execution of unsecured apps on a device

An app is secured on a mobile device by being deconstructed or unbundled into multiple modules, where a module is a segment of app code that performs a particular function. It is then determined which modules from the multiple modules perform some type of security function, for example, a function dealing with confidential or security-related data. These modules, forming a group of modules, are loaded into a trusted execution environment. The app is then re-bundled so that it has the first plurality of modules and the second plurality of modules. The app executes in a manner where the high security functions execute so that break points cannot be inserted into the app code. The re-bundling is done automatically in an app security wrapping process. Security constraints are added to the app.
Owner:BLUE CEDAR NETWORKS INC

Self-upgrade method for equipment in remote online monitoring system

The invention belongs to the field of wireless communication, and particularly relates to a self-upgrade method for equipment in a remote online monitoring system. The method is characterized in that: each piece of terminal equipment performs self-upgrade and self-maintenance through the remote online monitoring system consisting of a terminal table tool, a data acquisition unit and a background server based on a GPRS (General Packet Radio Service). The method mainly comprises the following steps that: the background server manages an application program and version information; the data acquisition unit periodically inquires a version log and downloads a new version program; the data acquisition unit realizes self-upgrade and upgrades the terminal table tool; and after the new version program is updated successfully, skipping is performed and an old version program is still kept for later use. In the method, the GPRS, storage space management, a file sub-package mechanism, a transmission response mechanism, a mode for continuous transmission at break-points and an IAP (Internet Access Provider) program programming mode are combined, and the accuracy and reliability of data transmission are ensured; and under the condition of not influencing normal use of a user, the equipment upgrading and maintaining problems of large quantity and wide distribution are solved quickly and efficiently.
Owner:杭州先锋电子技术股份有限公司

Providing break points in a malware scanning operation

A computer virus scanning system is described in which during the scanning operation a measurement value indicative of the amount of data processing performed is calculated and this measurement value used to trigger breaks in the virus scanning operation. The triggered breaks can be used to perform a determination as to whether or not the virus scanning operations should be early terminated. One possibility is to measure the total size of the data processed during the virus scanning operation and calculate a ratio of this compared to the size of the computer file being virus scanned. If this calculated ratio exceeds a predetermined threshold, then virus scanning may be terminated. Another possibility is to associate a complexity value with each of a plurality of tests applied in the virus scanning operation. A total for these complexity values may be used to trigger the breaks and also to trigger early termination upon exceeding of respective threshold levels.
Owner:MCAFEE LLC

Method for Carrying Out a Process of Parking a Vehicle by Means of a Driver Assistance System

A method for performing an automatic parking process of a vehicle involves offering a user a selection between at least two parking maneuver for implementing by a driver assistance system in the vehicle. The first parking maneuver is a direct parking maneuver in which an automatic parking process is performed from the start position directly to the target position along the trajectory. The second parking maneuver involves providing a break point the parking trajectory so that a user can disembark the vehicle at the break point and prior to the target position.
Owner:DAIMLER AG

Automatic grading method and automatic grading equipment for read questions in test of spoken English

ActiveCN103065626ADoes not deviate from human scoringSpeech recognitionTeaching apparatusSpoken languageAlgorithm
The invention provides an automatic grading method and automatic grading equipment for read questions in a test of spoken English. According to the automatic grading method, preprocessing is carried out on input voice; the preprocessing comprises framing processing; phonetic feature is extracted from the preprocessed voice; by means of a linear grammar network and an acoustic model set up by reading texts, phonetic feature vector order is forcedly aligned to acquire information of the each break point of each phoneme; according to the information of the each break point of each phoneme, the posterior probability of each phoneme is calculated; based on the posterior probability of each phoneme, multi-dimensional grading characteristics are extracted; and based on the grading characteristics and manual grading information, a nonlinear regression model is trained by means of a support vector regression method, so that the nonlinear regression model is utilized to grade on reading of spoken English. The grading model is trained by means of expert scoring data, and therefore a result of machining grading is guaranteed not to deviate from a manual grading result in statistics, and the high simulation of a computer on the expert grading is achieved.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI +1

Ranked break points and method for debugging a computer program

Ranked breakpoints are defined in a computer program that allow a debugger to determine whether or not to halt execution of the computer program when a ranked breakpoint is encountered based on the rank of the breakpoint compared to a threshold rank. In a preferred embodiment, the threshold rank is the rank of a RunTo function, and the ranked breakpoints only halt execution of the computer program if their rank is higher than the threshold rank of the RunTo function. The present invention thus provides a mechanism for ignoring some or all breakpoints in a computer program when performing debugger functions, such as a RunTo function.
Owner:IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products