Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37 results about "Host model" patented technology

In computer networking, a host model is an option of designing the TCP/IP stack of a networking operating system like Microsoft Windows or Linux. When a unicast packet arrives at a host, IP must determine whether the packet is locally destined (its destination matches an address that is assigned to an interface of the host). If the IP stack is implemented with a weak host model, it accepts any locally destined packet regardless of the network interface on which the packet was received. If the IP stack is implemented with a strong host model, it only accepts locally destined packets if the destination IP address in the packet matches an IP address assigned to the network interface on which the packet was received.

Virtual environment for computer game

A multi-user virtual reality universe (VRU) process receives input from multiple remote clients to manipulate avatars through a modeled 3-D environment. A VRU host models movement of avatars in the VRU environment in response to client input, which each user providing input for control of a corresponding avatar. The modeled VRU data is provided by the host to client workstations for display of a simulated environment visible to all participants. The host maintains personalized data for selected modeled objects or areas that is personalized for specific users in response to client input. The host includes personalized data in modeling the VRU environment. The host may segregate VRU data provided to different clients participating in the same VRU environment according to limit personalized data to authorized users, while all users receive common data.
Owner:PFAQUTRUMA RES LLC

Systems and methods for generating floating desktop representation of extracted model object

Embodiments relate to systems and methods for generating a floating desktop representation of an extracted model object. Aspects relate to object-based modeling using modeling objects that can be extracted from spreadsheet cells, database entries, or other sources. A modeling client can host modeling logic and an application programming interface (API) to create, access, manipulate, and import / export modeling objects used in modeling applications, such as engineering, medical, financial, and other modeling platforms. In aspects, the source data can be accepted into the modeling client from consumer or business-level applications, whose cell, database, or other data content can be extracted and encapsulated in object-oriented format, such as extensible markup language (XML) format. An icon or other desktop representation can be generated to present the extracted model object for selection and use in the local environment of the modeling client. The extracted model object can also be exchanged with other applications or platforms.
Owner:RED HAT

Systems and methods for generating a set of linked rotational views of model objects

Embodiments relate to systems and methods for generating a set of linked rotational views of a model object. A modeling client can host modeling logic and an application programming interface (API) to create, access, manipulate, and import / export modeling objects used in modeling applications, such as engineering, medical, financial, and other modeling platforms. The source data accepted into the modeling client can include consumer or business-level applications, whose spreadsheet, database or other content can be extracted and encapsulated in object-oriented format, such as extensible markup language (XML) format. A set of layers of the model objects can be associated via a set of linkages. A rotator widget or other interface object can be presented to allow a user to traverse the linkages and rapidly rotate through layers in a view, without having to switch tabs, planes, database dimensions, or manually operate other dimensional control, enhancing viewing efficiency of large layers.
Owner:RED HAT

Systems and methods for generating dimensionally altered model objects

Embodiments relate to a unified management interface and related resources for generating dimensionally altered model objects. A modeling client can host modeling logic and an application programming interface (API) to create, access, manipulate, and import / export modeling objects used in modeling applications, such as engineering, medical, financial, and other modeling platforms. The source data accepted into the modeling client can include consumer or business-level applications, whose spreadsheet, database or other content can be extracted and encapsulated in object-oriented format, such as extensible markup language (XML) format. A modeling module can access the modeling objects, decode their row, column, depth, and / or other dimensional attributes, and scale those objects using scaling rules or other logic. In aspects, the dimensionally altered model object(s) can have their number of rows, columns, and / or other dimensions expanded or reduced to conform to dimensions of a destination data object, such as a spreadsheet, database, or other data structure.
Owner:RED HAT

Systems and methods for object-based modeling using composite model object having independently updatable component objects

Embodiments relate to systems and methods for object-based modeling using a composite model object having independently updatable component objects. A modeling client can host modeling logic and an application programming interface (API) to create, access, manipulate, and import / export modeling objects used in modeling applications, such as engineering, medical, financial, and other modeling platforms. In aspects, the source data accepted into the modeling client can include consumer or business-level applications, whose spreadsheet, database or other content can be extracted and encapsulated in extensible markup language (XML) or other object-oriented format. Various model objects can be extracted from source data, and aggregated into a composite model object encapsulating the underlying set of component model objects. In aspects, each of the component model objects can be accessed, updated, and stored independently of the other constituent objects. The modeling client can exchange composite or other modeling objects with external platforms on a programmatic basis.
Owner:RED HAT

Simulation verification method and system based on combination of virtual platform and FPGA

The invention discloses a simulation verification method and system based on combination of a virtual platform and an FPGA, and the method comprises a verification step: constructing a first conversion model, receiving a simulation request of a host model through the virtual platform based on TLM2.0, and converting the simulation request into a first data package; constructing an FIFO switching verification model according to a third-party PCIe DMA method, and simulating a data transceiving channel; constructing a second conversion model, receiving the first data packet, performing analysis according to a preset protocol, and sending an analysis result to an RTL design DUT according to an AHB / AXI protocol; and a simulation step: generating an executable file according to the host model andthe second conversion model, storing the executable file in an upper computer for simulation, generating a burning file according to a third-party PCIe DMA method, the first conversion model and RTLdesign DUT, downloading the burning file to the FPGA, and enabling the upper computer to run the executable file to be connected with the FPGA for joint simulation. According to the method and system,the economic cost and the verification cost of simulation are greatly reduced, and a user can conveniently and flexibly optimize and modify according to actual requirements.
Owner:ALLWINNER TECH CO LTD

Self-adaptive substation longitudinal encryption host verification method and terminal

ActiveCN113783837ASolve the automatic verification problemImplement Adaptive CalibrationNetworks interconnectionInformation technology support systemComputer hardwareSelf adaptive
The invention discloses a self-adaptive substation longitudinal encryption host verification method and a terminal. The method comprises the following steps: establishing connection with a longitudinal encryption host, and acquiring and identifying configuration information; establishing a virtual tunnel for the longitudinal encryption host according to the configuration information, and generating a verification case according to the configuration information; performing tunnel strategy verification on the virtual tunnel according to the verification case to obtain a verification result, and performing strategy consistency comparison with a preset strategy information table according to the verification result to obtain a comparison result; according to the comparison result, correcting the tunnel strategy, and generating an analysis report. According to the method, the problem of automatic verification of the longitudinal encryption host of the transformer substation is solved, automatic verification of a whole strategy information table covered by multiple channels is realized, adaptive verification and correction of different encryption host models are realized, manual intervention is not needed, and the working efficiency is greatly improved.
Owner:MAINTENANCE BRANCH OF STATE GRID FUJIAN ELECTRIC POWER

System and method for setting automobile commissioned management permission

The present invention provides a method for setting the trusteeship authority of an automobile, comprising the following steps: detecting the trusteeship authority setting instruction and generating a display instruction when the trusteeship authority setting instruction is detected; displaying a menu according to the display instruction for the car owner to adjust various parameters of the automobile Set and generate the first sending instruction when receiving the owner’s operation completion instruction; send the key password to the car key according to the first sending instruction; detect the escrow authority start instruction, and generate the second escrow authority start instruction when detecting the escrow authority start instruction A receiving command; receive the key password according to the first receiving command and generate an unlocking signal according to the key password; detect the car unlocking command and generate a second sending command when detecting the car unlocking command; send the unlocking signal according to the second sending command Send to the car to put the car into managed mode. The automobile trusteeship authority setting method provided by the invention improves the safety of the temporary trusteeship of the car. The invention also provides a system for setting the authorization of the car trusteeship.
Owner:OPTIMUM BATTERY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products