Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

61 results about "Service virtualization" patented technology

In software engineering, service virtualization or service virtualisation is a method to emulate the behavior of specific components in heterogeneous component-based applications such as API-driven applications, cloud-based applications and service-oriented architectures. It is used to provide software development and QA/testing teams access to dependent system components that are needed to exercise an application under test (AUT), but are unavailable or difficult-to-access for development and testing purposes. With the behavior of the dependent components "virtualized", testing and development can proceed without accessing the actual live components. Service virtualization is recognized by vendors, industry analysts, and industry publications as being different than mocking.

Selective virtualization for security threat detection

Selective virtualization of resources is provided, where the resources may be intercepted and services or the resources may be intercepted and redirected. Virtualization logic monitors for a first plurality of requests that are initiated during processing of an object within the virtual machine. Each of the first plurality of requests, such as system calls for example, is associated with an activity to be performed in connection with one or more resources. The virtualization logic selectively virtualizes resources associated with a second plurality of requests that are initiated during the processing of the object within the virtual machine, where the second plurality of requests is lesser in number than the first plurality of requests.
Owner:FIREEYE SECURITY HLDG US LLC

System and Method for Service Virtualization in a Service Governance Framework

A service governance framework may provide a platform for development and hosting of virtual service offerings and generation of interfaces to operations thereof, dependent on configurable functional parameters and / or non-functional aspects associated therewith. Virtualization techniques may be applied at an endpoint level, binding level, message level, operation level, and / or service level at design time, and supported with corresponding changes at runtime. Users having various roles may access the framework to specify operations of services provided by computing service sources to include in a virtual service offering, specify configuration parameter values associated with them, and / or specify a contract of non-functional aspect clauses for the virtual service offering. The framework may produce the interface by modifying an interface provided by the computing service sources (e.g., a WSDL). The framework may include aspect enforcement methods and an underlying common information model, and may support versioning and life cycles of service offerings and / or components.
Owner:SUN MICROSYSTEMS INC

Undifferentiated service domains

Guest domains (virtual machines) may execute at a virtualization server. During execution, the guest domains may request various services to facilitate their operation. The virtualization server may disaggregate the services requested by the guest domains among various service domains. A service domain may be configured to provide one the services. The virtualization server may also maintain a pool of partially initialized service domains. When a guest domain requests a particular service, one of the partially initialized service domains may be selected from the pool, and the partially initialized service domain may complete initialization to become an initialized service domain. The initialized service domain may thus be configured to provide the service requested by a guest domain. The virtualization server may periodically replenish the pool of partially initialized service domains to ensure that a partially initialized service domain is available upon demand from one of the guest domains.
Owner:CITRIX SYST INC

Security system and method for internet of things

A security system and method for the Internet of Things integrates a multitude of devices and protocols. The security system includes an OAS security gateway that protects the local IoT devices from external network-based attacks through remote attestation requests to a remote attestation server. The remote attestation message is used by the remote attestation server to analyze the software execution history of the local IoT device, so as to detect malware or insecure software. A cryptographic chip operatively integrates in the security gateway. The security system also performs data packet encryption and decryption of communications between the local IoT devices and remote user devices with an encryption engine. A service virtualization engine converts incompatible communication protocols between the IoT device and the remote user device. A network traffic sanitization engine filters data packet communications between the local IoT device and the remote attestation server.
Owner:LEE SANGSOO

On-demand-service virtualization network intrusion detection method and device

The invention discloses an on-demand-service virtualization network intrusion detection method and device, and relates to the technical field of information security. The virtualization network intrusion detection device comprises an elastic service scheduling module, and a local detection resource pool management module, wherein the elastic service scheduling module is used for evaluating whether the residual resource in a local detection resource pool can provide a local detection service or not, sending a local detection resource regulation command to the local detection resource pool management module if the residual resource can provide the local detection service, and exporting flow to be detected to an external hardware network intrusion detection product if the residual resource cannot provide the local detection service; the local detection resource pool management module allocates corresponding resources to the local detection resource from the residual resource of the local detection resource pool when receiving the local detection resource regulation command. The invention further discloses an on-demand-service virtualization network intrusion detection method. According to the technical scheme provided by the invention, the safety protection problem of a server virtualization application scene under a virtualization network environment is effectively solved.
Owner:BEIJING VENUS INFORMATION TECH +1

Emergency command cloud service implementation method and system based on microkernel cluster

ActiveCN103617084AAssisted Synthetic ReasoningAuxiliary emergency decision-makingResource allocationTransmissionUnexpected eventsCommand system
The invention provides an emergency command cloud service implementation method and system based on a microkernel cluster. Various kinds of services with specific business processing capacity is virtually encapsulated into the microkernel cluster, mutual synergy is performed according to the service plans generated according to upper module application, and the microcosmic services provided each member in the cluster are combined and encapsulated to convert into macroscopic service manners capable of realizing emergency treatment task planning. The system comprises a physical resource layer, an emergency resource cloud pool, a platform service layer, a module application layer and a user layer. By the emergency command system built by the service method, dynamic searching of valuable emergency service resources in various fields can be achieved, the system capabilities of massive dynamic information and knowledge reasoning, complex function and process recombination calculation, storage and service are improved, and diversified emergency tasks such as emergency cross-department and cross-field real-time information processing, large-range public opinion analysis, complex module deduction, dynamic disaster situation prediction and remote monitoring can be achieved.
Owner:STATE GRID CORP OF CHINA +2

A method and a device for realizing dual-live disaster recovery for a server virtualization system

The invention provides a method and a device for realizing dual-live disaster recovery for a server virtualization system. The method includes: configuring a server virtualization system ICS, and creating a CFS storage domain and a shared storage pool; Modifying the storage domain profile to set the heartbeat timeout to be greater than the dual live storage recovery time. The device comprises a license adding module, which is used for adding an ICS license of a server virtualization system; A host adding module, configured to add a server virtualization system host; A storage domain creation module for creating a server virtualized system storage domain; A storage pool creation module for creating a server virtualization system storage pool; A virtual machine creation module for creating avirtual machine; The storage domain background configuration module used for modifying the storage domain background configuration file and setting the heartbeat timeout time to be greater than the dual-live storage recovery time. The invention enhances the safety of data access, more adapts to the needs of enterprise-level customers, and promotes the perfection of the functions of the company'svirtualized products.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

A method and apparatus for mixed orchestration of services

A method and apparatus for mix orchestration of services are provided in embodiments of that present invention. The method includes: logically associating one or more components of service virtualization components corresponding to the first virtual platform and / or logically associating one or more components of service containerization components corresponding to the second virtual platform according to the services received by the first virtual platform and / or the second virtual platform; logically associating one or more components of a common component with one or more components of a business virtualization component and / or one or more components of a business containment component; based on logical associations of components in a business virtualization component and / or logical associations of components in a business containment component, and logical associations of the common component with the service virtualization component and / or logical associations with the service containerization component, deploying the service, thus solving the problem of mixed orchestration of the service of the first virtual platform and the second virtual platform.
Owner:ZTE CORP

Social security card virtualization system and implementation method

The invention discloses a social security card virtualization system and a method. The social security card virtualization system includes a social security card management system, a social security card key management system, a social security card virtualization management system, a virtualized APP, a virtualized business application, a medical insurance system and a financial institution system; the social security card management system manages social security physical cards, and the management of the social security physical cards involves the card production and card issuance of the physical cards; the social security card key management system provides keys for the encryption of social security virtual cards; the social security virtual card management system performs management soas to provide services of applying for and generating virtual cards for insured people who have the physical cards; the virtualized APP provides mobile services of the social security virtual cards; the virtualized business application provides computer-side social security virtual card services; and the medical insurance system and the financial institution system provide settlement services. With the social security card virtualization system and the method of the invention adopted, online and offline integrated social security card services can be provided; the optimization of a service flow can be promoted; the use of two-dimensional codes is safer. The social security card virtualization system and the method can replace physical cards to perform online services. The social security card virtualization system and the method have the advantages of high efficiency and low cost.
Owner:DAREWAY SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products