Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

423 results about "Process identifier" patented technology

In computing, the process identifier (normally referred to as the process ID or PID) is a number used by most operating system kernels—such as those of UNIX, macOS and Microsoft Windows—to uniquely identify an active process. This number may be used as a parameter in various function calls, allowing processes to be manipulated, such as adjusting the process's priority or killing it altogether.

Multi-tasking method for application program and terminal

ActiveCN105224322ADouble realizationConvenient and Smart Twin ExperienceSpecific program execution arrangementsApplication softwareComputer engineering
The invention provides a multi-tasking method for application program. The multi-tasking method for application program comprises: receiving a multi-tasking request aimed at the application program; according to the multi-tasking request, establishing a multi-tasking application icon of the application program; using an instance identifier to mark the multi-tasking application icon, wherein the instance identifier is corresponding to a process identifier of a multi-tasking process of the application program; when the multi-tasking application icon is detected to be clicked, according to the instance identifier, generating a corresponding multi-tasking process. The invention also provides a corresponding terminal. The multi-tasking method for application program can realize multi-tasking of the application program, and operation is simple, so as to bring about convenient and intelligent application program multi-tasking experience.
Owner:VIVO MOBILE COMM CO LTD

Model-free adaptive process control

A model-free adaptive controller is disclosed, which uses a dynamic artificial neural network with a learning algorithm to control any single-variable or multivariable open-loop stable, controllable, and consistently direct-acting or reverse-acting industrial process without requiring any manual tuning, quantitative knowledge of the process, or process identifiers. The need for process knowledge is avoided by substituting 1 for the actual sensitivity function .differential.y(t) / .differential.u(t) of the process.
Owner:GEN CYBERNATION GROUP

Method and apparatus for determining computer program flows autonomically using hardware assisted thread stack tracking and cataloged symbolic data

A method, apparatus, and computer instructions for determining computer flows autonomically using hardware assisted thread stack and cataloged symbolic data. When a new thread is spawned during execution of a computer program, new thread work area is allocated by the operating system in memory for storage of call stack information for the new thread. Hardware registers are set with values corresponding to the new thread work area. Upon context switch, values of the registers are saved in a context save area for future restoration. When call stack data is post-processed, the operating system or a device driver copies call stack data from the thread work areas to a consolidated buffer and each thread is mapped to a process. Symbolic data may be obtained based on the process identifier and address of the method / routine that was called / returned in the thread. Corresponding program flow is determined using retrieved symbolic data and call stack data.
Owner:IBM CORP

Method for islanding microgrid control and optimization based on rotating coordinate virtual impedance

The invention discloses a method for islanding microgrid control and optimization based on rotating coordinate virtual impedance. Aiming to a fact that the actual microgrids have complicated impedance characteristics, the method for islanding microgrid control and optimization based on the rotating coordinate virtual impedance includes utilizing the coordinate rotation orthogonal transformation to design the coordinate rotation virtual impedance, improving the impedance characteristics of the microgrid, compensating errors of power distribution and improving power decoupling performance; establishing a complete small-signal dynamic model of the microgrid, wherein the small-signal dynamic model comprises distributed energy sources, power converters, loads and power grids, and guiding the selection of an optimal value on the basis of the small-signal dynamic analytical method; and simultaneously, providing a theoretical basis for the optimization selection of islanding microgrid control parameters by using the small-signal dynamic analytical method, wherein the islanding microgrid control parameters comprise droop control coefficients of the power distribution, process identifier (PI) parameters of a voltage current feedback controller, feedforward control coefficients and the like. The microgrid after being subjected to optimization design in an islanded operational mode is capable of effectively achieving power decoupling and improving the accuracy of the power distribution, the stability of the system and the dynamic performances.
Owner:SHANDONG UNIV

Method and device for simultaneously starting multiple same applications on intelligent terminal

InactiveCN104866342ASolve the problem that multiple identical applications cannot be opened at the same timeSave storage spaceProgram loading/initiatingApplication softwareComputer science
The application discloses a method and a device for simultaneously starting multiple same applications on an intelligent terminal. The method comprises following steps: receiving selecting operation of a user to applications of the intelligent terminal; determining whether activity instances of selected applications are present in the process of the intelligent terminal; distributing process identifiers for the applications if the activity instances do not exist and creating activity instances of applications based on process identifiers; and distributing process identifiers, having different process identifier values from the intelligent terminal, for the applications and recreating activity instances of the applications based on process identifiers or switching to activity instances of the selected applications of the intelligent terminal. By adoption of the above scheme, the problem that multiple same applications cannot be started on a conventional intelligent terminal is solved by distributing process identifiers, having different process identifier values from the intelligent terminal, for the applications and recreating activity instances of the applications.
Owner:北京数字天域科技有限责任公司

Method and system for authenticating application software of Android platform on mobile internet

The invention discloses a method and a system for authenticating application software of an Android platform on the mobile internet. The authenticating method comprises receiving by an authentication server a signature request of the application software, generating a key pair and sending a public key and an application identifier to a certificate authority center, receiving a signature certificate, signing a digital signature on the application software by using a private key, downloading by a terminal the signed application software, inquiring the installation information of the application software according to a process identifier, acquiring a user identifier from the installation information, judging whether a corresponding relation of the application identifier, the process identifier and the user identifier of the application software is stored, if not, then verifying the signature certificate and using the public key to check, establishing and storing the corresponding relation of the application identifier, the process identifier and the user identifier of the application software when the checking is successful, processing the business request and returning the business processing result. When the technical scheme of the invention is implemented, the authenticity, the integrality and the anti-counterfeit property of the source of the application software are guaranteed.
Owner:卓望数码技术(深圳)有限公司

Audio mixing control method and apparatus for Wince vehicle-mounted multimedia

ActiveCN104023305ASolve the problem of inaudibleEasy to useStereophonic systemsComputer scienceLower priority
The invention discloses an audio mixing control method and apparatus for Wince vehicle-mounted multimedia. The audio mixing control method comprises: A, when supplications are started, generating corresponding process IDs, and when the already started applications need to play sound, creating corresponding audio streams; B, pairing the audio stream of each application and the corresponding process IDs for marking, and identifying the types of sounding applications according to the process IDs; and C, according to preset sound priorities, controlling the volume of an application whose priority is the highest to be highest, and closing or reducing the sound of an application whose priority is low. According to the invention, the volume of the application whose priority is the highest can be controlled to be highest according to the sound priorities, and the sound of the application whose priority is low can be reduced or closed, and such an automatic sound adjusting mode reduces the influence of other unnecessary sound, so that the problem can be solved that a user cannot listen clearly due to simultaneous playing of multiple sound at the same volume, manual operation by the user is unnecessary, the use of the user is greatly facilitated, and driving is not affected.
Owner:SHENZHEN APICAL TECH CO LTD

White list creation in behavior monitoring system

A white list (or exception list) for a behavior monitoring system for detecting unknown malware on a computing device is maintained automatically without human intervention. A white list contains process IDs and other data relating to processes that are determined to be (or very likely be) free of malware. If a process is on this list, the rule matching operations of a conventional behavior monitor are not performed, thereby saving processing resources on the computing device. When a process start up is detected, the behavior monitor performs a series of checks or tests. If the process has all valid digital signatures and is not launched from a removable storage device (such as a USB key) and is not enabled to make any inbound or outbound connections, it is eligible for being on the white list. The white list is also automatically maintained by removing process IDs for processes that have terminated or which attempt to make a new outbound or inbound connection, such as a TCP / UDP connection. Scheduled integrity checks on the white list are also performed by examining the process stack for each process to ensure that there are no abnormal files in the process stack.
Owner:TREND MICRO INC

Enabling interactive screenshots within collaborative applications

A resource link within a selected portion of an interface can be identified. The link can include a visible interface element and a non-visible reference to a resource. The reference can be a Uniform Resource Identifier. The identity of an application associated with the interface can be established. The identity can be an application or process identifier. The position / dimensions of the element within the selected portion can be determined. A screenshot image of the current state of the selected portion can be captured. The state can include a visual representation of the element. The position / dimensions of the element can be encoded within an image map. The encoding can map a bounded region surrounding the representation of the element within the screenshot corresponding to the element position / dimension of the link within the interface. The region can be associated with the identity of the application and the reference.
Owner:IBM CORP

Secure virtual interface

A network interface for secure virtual interface data communication includes a doorbell circuit, a processor, memory, and a bridge circuit. The doorbell circuit responds to physical I/O addresses of the host that are mapped by a memory management unit by a registration process. An application program seeking to use a channel of a virtual interface must register the virtual address of host memory where data for communication is or will be stored and register the virtual address of a page of I/O addresses. Access to the doorbell functions and to the host memory via the memory management unit are therefore denied when the requesting process identifier does not successfully compare with the process identifier for the process that performed the registrations. A password may be stored in the network interface in association with a virtual interface (VI) channel identifier and stored in association with the virtual to physical map used for VI communication. The network interface may abandon a requested or implied data communication function when passwords so not successfully compare. Methods for virtual interface (VI) communication performed by an application program may include one or more of the steps of (a) establishing a VI channel where physical I/O addresses of a network controller are secured; (b) registering host memory for use with a VI channel where physical memory addresses are secured; (c) describing blocks of host memory with reference to a memory handle; and (d) accomplishing data communication of a described block of host memory via an established VI channel where the data and controls of the VI channel are secured and the data and controls of other VI channels are secured. Security is provided against both erroneous operations and operations intentionally effected by rouge processes.
Owner:MARVELL ASIA PTE LTD

Information processing apparatus and cache memory control method

There is provided with an information processing apparatus, including: a CPU; a register that stores a task ID or a process ID that identifying a task or a process; and a cache memory that records data specified by the CPU on a cache line corresponding to a memory address specified by the CPU, and writes a task ID or a process ID stored in the register in one part of a tag that manages the cache line as an owner ID; wherein the CPU executes a cache control instruction instructing to write back only cache lines having an owner ID that is the same as a task ID or a process ID in the register.
Owner:KK TOSHIBA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products