Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

1269 results about "Static data" patented technology

Equipment monitoring system based on three-dimensional real scenes and system integration method based on three-dimensional real scenes

The invention discloses an equipment monitoring system based on three-dimensional real scenes and a system integration method based on three-dimensional real scenes. A database technology is fully utilized, and static data of a three-dimensional real scene model library is integrated and associated with dynamic data in an equipment monitoring subsystem to realize dynamism and instantaneity of three-dimensional real scene object information display; physical modeling is performed to smart equipment to form identifiable equipment three-dimensional pixel, feature information of the smart equipment is extracted to build a visual information data structure of the smart equipment; an industrial data bridge and an SOA (semiconductor optical amplifier) technology are utilized to integrate real-time date collected by the smart equipment to a three-dimensional real scene image so as to realize information display control and statistical analysis, accurate visualized dynamic information is provided for administrators in real time, and omnibearing monitoring requirements are met.
Owner:LOGISTICAL ENGINEERING UNIVERSITY OF PLA

Method for performing transactions on data and a transactional database

The present invention provides a method for performing transactions on data entities in a database and a transactional database. The database comprises an ordered set of data stores with at least one static data store, wherein said static data store uses an index structure based on a non-updatable representation of an ordered set of integers according to the principle of compressed inverted indices. The method allows to generate a modifiable data store when the performed transaction comprises an insert, update or delete operation, to execute operations of the transaction on the ordered set being present at the time when the transaction has been started and, if present, on the modifiable data store and to convert data stores to a new static data store, The insert, update or delete operation are executed on the modifiable data store which is the only data store modifiable for the transaction.
Owner:OPEN TEXT SA ULC

Voice and data encryption method using a cryptographic key split combiner

A cryptographic key split combiner, which includes a number of key split generators (42, 48, and 56) for generating cryptographic key splits (32, 34, 36, 38, and 64) and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key (62), and a process for forming cryptographic keys. Each of the key split generators (42, 48 and 56) generates key splits (32, 34, 36, 38, and 64) from seed data (40, 44, 46, 50, 52, 54, 58, and 60). The key split generators may include a random split generator (42) for generating a random key split (32) based on reference data (40) and encryption date/time (44). Other key split generators may include a token split generator (48) for generating a token key split (34) based on label data (46) and organization data (50), a console split generator (56) for generating a console key split (36) based on current maintenance data (52) and previous maintenance data (54), and a biometric split generator for generating a biometric key split (38) based on biometric data (58). All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The label data may be associated with label categories and subcategories of addresses, which are meaningful to a user who is specifying or determining the intended recipient(s) of the encrypted information or object. An array associated with a software component object may use key splits (32, 34, 36, 38, and 64) which determine which methods and properties are allowed and control access to the memory address for those allowed methods and properties. The resulting cryptographic key (62) may be, for example, a stream of symbols, at least one symbol block, or a key matrix.
Owner:TECSEC

Method and System for Dynamic Managing of Subscriber Devices in Mobile Networks

A system and method for managing subscriber mobile devices comprising:a home network (400) of a first mobile network operator (MNO1), in which data associated with at least one physical SIM of a subscriber device with an embedded SIM card (eUICC) is obtained, anda destination network (300) of a second mobile network operator (MNO2) which the device travels to, obtaining static data and dynamic data associated with at least one virtual SIM (503, 603) of the device.The dynamic data comprise a subscriber authentication key (Ki) and is obtained from a SIM provider platform (500, 600) on which the destination network (300) relies. The static data comprise IMSI / MSISDN identities and is stored in a pool (202) of the destination network (300).For a given virtual SIM, it is checked whether there is an association in a mapping table (106) of the first mobile network operator (MNO1) between the static data from the pool (202) and the physical SIM data from the home network (400).
Owner:TELEFONICA SA

Optimization method of network variable structure with distributed type power supply distribution system

The invention discloses an optimization method of a network variable structure with a distributed type power supply distribution system. The optimization method includes that basic static data of electric power network structure parameters, distributed type power supply distribution, load capacity, faulty lines and the like are extracted, under the condition of present line fault, the basic static data are utilized to perform islanding scheme calculation and correction, survivability indexes constructed by the method are combined to perform an online evaluation for islanding network safe operation performances and implement immediate control measures, finally, on account of residual network structure data after final islanding electric power network division is performed, by means of an ant colony algorithm, a reconfiguration optimal computation is performed for residual network with minimum network loss as a target, and finally the electric power network structure with high safe operation level is obtained. On the basis of the developed algorism and function modules, the invention further provides a large-scale power distribution network intelligent optimization decision system based on multi-stage computation correction and survivability evaluation, according to the technical scheme, the division and reconstruction of the network with the generalized model distributed type power supply distribution system are achieved, and accurate reference of network structure adjustment, schedule and operation can be excellently provided for regional electric power network schedule staffs.
Owner:SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products