Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

106 results about "Dependency network" patented technology

The dependency network approach provides a system level analysis of the activity and topology of directed networks. The approach extracts causal topological relations between the network's nodes (when the network structure is analyzed), and provides an important step towards [[inference of causal activity relations between the network nodes (when analyzing the network activity). This methodology has originally been introduced for the study of financial data, it has been extended and applied to other systems, such as the immune system, and semantic networks.

Load balancing method for a wireless area netowrk

The present invention relates to a load balancing method for a wireless local area network, which including the following steps: initializing the load balancing group, self-organizing to select an online access point from the load balancing group as a load balancing agent center, each access point of the said balancing group managing and processing the load balance in accordance with the load level and balance optimizing policy, therefore implements the network load balance. The method of the invention improves reliability of the network load information, prevents the load information from invalidly broadcasting in the wireless local area network, therefore reduces the additional overhead for managing the load balance of the wireless network, particularly in the network that having three layers switching equipment, self-organizing to select the agent center can utilize the network resource in effect, therefore managing the dynamic load balance information much more effect, reducing the dependence on the upper server, and managing the network much more flexible.
Owner:ZTE CORP

Content synchronizing method between television and intelligent apparatus

The invention provides a content synchronization method used for a television and intelligent equipment, which is applicable to the field of communication technique. The method of the invention comprises the steps as follows: a digital media adapter detects content subscription information on the television; according to the content subscription information, match content file memorized in the intelligent equipment is synchronized into the television. The content synchronization of the invention only relates to the transmission of file and relates to no playing of code stream, thus relating to no experience effect of the subscriber; once the synchronization is completed, the network is not relied on, and the subscriber can watch the synchronized multimedia content off-line and is not needed to worry about that the signal of the wireless network affects the watching effect.
Owner:SHENZHEN TCL IND RES INST

Multi-module version dependency relationship establishment method and apparatus, server and storage medium

InactiveCN107678776ABe notified of version changesVersion controlComputer moduleComputer terminal
The invention relates to a multi-module version dependency relationship establishment method. The method comprises the steps of receiving version information uploaded by multiple module terminals; bytaking each module as an independent node, and taking a dependency relationship between module version identifiers as a directed edge, establishing a version dependency network graph, wherein each independent node comprises at least one sub-node, and the directed edge is associated with corresponding dependency detail information; monitoring version update dynamics released by the module terminals, and extracting version modification description information; determining the independent nodes corresponding to the version update dynamics in the version dependency network graph, and searching forthe dependency detail information of all the directed edges connected with the independent nodes; comparing the obtained dependency detail information with the version modification description information, and generating a directed edge modification policy; and according to the directed edge modification policy, updating the version dependency network graph, and pushing the updated version dependency network graph to the module terminals. According to the method, related modules can be automatically located during visual display of the dependency relationship between the modules, and versionupgrading.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Off-line and on-line fused e-payment method and system

The invention discloses an off-line and on-line fused e-payment method and system. Two sub-accounts are established under one account, wherein one sub-account is used for off-line payment, and the other one is used for online payment, so that a member not only can carry out online payment through a mobile phone or a card, but also can finish off-line payment through the card; and after a payment terminal is reconstructed, the mobile phone can be utilized to realize online payment and a membership card can also be utilized to carry out offline payment. When the membership card is utilized for consumption, if the network is unobstructed, the consumption sum is deducted from the on-line account first by default; and if the online account balance is insufficient, the consumption sum is deducted from the balance of a recharge card. The method and system solve the problem that since online payment must depend on a network, and offline payment must depend on chip card encrypted storage balance information, cards cannot be integrated to the mobile phone, and are inconvenient to carry.
Owner:HUNAN KIMMA INTELLIGENT EQUIP MFR

System And Method Providing Dependency Networks Throughout Applications For Attack Resistance

A method and system is provided to automatically propagate dependencies from one part of a software application to another previously unrelated part. Propagation of essential code functionality and data to other parts of the program serves to augment common arithmetic functions with Mixed Boolean Arithmetic (MBA) formulae that are bound to pre-existing parts of the program. A software application is first analyzed on a compiler level to determine the program properties which hold in the program. Thereafter, conditions are constructed based on these properties and encoded in formulae that encode the condition in data and operations. Real dependencies throughout the application are therefore created such that if a dependency is broken the program will no longer function correctly.
Owner:IRDETO ACCESS

Virtual machine single sign-on method and system in cloud computing environment

The invention discloses a virtual machine single sign-on method in the cloud computing environment. The method includes the steps of right allocation and single sign-on. The invention further discloses a virtual machine single sign-on system in the cloud computing environment. The system comprises a user control center used for allocating user rights and a sign-on module used for executing single sign-on. The virtual machine single sign-on method is simple in operation, free of modifying a virtual machine system kernel and free of depending on a network, and virtual machine single sign-on in the cloud computing environment can be simply and rapidly achieved. The virtual machine single sign-on system has the advantages that users with the single sign-on right can automatically sign onto a virtual machine system while signing on to a cloud management platform and being connected to a virtual machine, and user experiences are greatly improved.
Owner:CHINA STANDARD SOFTWARE

Air traffic dependent network vulnerability identification and control method and system

The invention provides an air traffic dependent network vulnerability identification and control method and system. According to the method and the system, firstly, an air traffic dependency network model connected by airport network, airway network and control sector network is established; disturbance strategies of random disturbance and deliberate disturbance are used for disturbing nodes of the air traffic dependent network; calculating a change rate of a structure vulnerability related characteristic index and a change rate of a function vulnerability related index of the dependent network; and identifying a change rule of the structure vulnerability and the function vulnerability of the dependent network, and finally, optimizing the vulnerability of the dependent network by performing flow coordination control on the dependent network according to an identification result. In combination with the vulnerability analysis result of the air traffic dependency network, the traffic flow of the network is subjected to coordination control again, so that the traffic flow of the air traffic dependency network tends to be ordered, and the vulnerability of the network is reduced.
Owner:CIVIL AVIATION UNIV OF CHINA

Method for prompting user of current roaming position, system, mobile terminal and intelligent card

The invention relates to the mobile communication field, and in particular relates to a technology for carrying out roaming greeting on a user and informing the user of roaming positions in time. The invention provides a method for prompting the user of the current roaming position and a mobile terminal and an intelligent card. The method comprises the following steps of: acquiring LAI carried in broadcast messages of a base station by a terminal; searching corresponding relation of all pre-stored LAIs and attaching locations and determining the acquired attaching locations corresponding to the LAIs; prompting the user of the current roaming position when judging that the determined attaching location are different from the pre-stored attaching location of the user, and updating the attaching location of the user as determined attaching location. As the terminal judges that the attaching location of the user changes according to the broadcast of the base station, the user is prompted of the current roaming position, thus avoiding the dependence on a network side for realizing judgment on the roaming situation of the user, being capable of informing the user of roaming positions in time and saving the occupation to the network side resources.
Owner:CHINA MOBILE GRP BEIJING

Processing method, apparatus and system of storage voucher

The invention discloses a processing method, apparatus and system of a storage voucher. The method comprises: the processing apparatus receives a first request transmitted by a first interaction terminal and used for generating an electronic storage voucher, wherein the first request comprises storage information of an article or data; responding to the first request, generating the electronic storage voucher, and setting a processing link used for generating a processing request of the electronic storage voucher, wherein the electronic storage voucher serves as a permission proof for obtaining the article or the data and is used for recording the storage information of the article or data. According to the method, apparatus and system, the processing of the storage voucher can be realized, the dependence on a network platform or a webpage is avoided, and the processing efficiency is improved.
Owner:SHENZHEN CIFPAY NETWORK BANK TECH

Fault handling method and device

The invention discloses a fault handling method and device. The method comprises the following steps: sending detected fault information to a server in a sound wave mode after being encoded; handling the fault according to a fault solution scheme returned by the server, wherein the fault solution scheme is the fault solution determined by the server according to the fault information and returned in the sound wave mode. Since the information is transmitted in the sound wave mode, the problem that the remote detection on the fault of a family gateway in the prior art is overly dependent on the network is solved, the dependence of the remote detection of the family gateway fault on the network environment is lowered.
Owner:ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products