Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

40results about How to "Achieve concurrency" patented technology

Block chain system-based digital asset transaction method and block chain system

The invention discloses a block chain system-based digital asset transaction method and a block chain system. The block chain system is a tree-shaped distributed block chain system including a plurality of levels of block chains. The method comprises the following steps that: a first block chain receives a digital asset transaction request from a client, and determines digital assets corresponding to the digital asset transaction request; whether an attribution block chain corresponding to the digital assets is a first block chain is judged; if the attribution block chain corresponding to the digital assets is the first block chain, the first block chain processes the digital asset transaction request; and if the attribution block chain corresponding to the digital assets is not the first block chain, the first block chain rejects the digital asset transaction request, wherein the attribution block chain corresponding to the digital assets is a block chain that generates the digital assets. The method is especially suitable for the transactions of one-time one-use digital assets, wherein the digital assets can be only used once; and moreover, the method can also realize a cross-chain transactions between the digital assets, and the digital assets are corresponding to different attribution block chains before and after the cross-chain transactions are executed, and therefore, the security of the assets can be improved.
Owner:北京博晨技术有限公司

Encoding method and apparatus for multi-carrier time division duplex system service transmission channel

The invention discloses three realization proposals of an encoding method of a multicarrier TDD system business transmission channel, wherein, one of the realization proposals comprises the following steps: sending end equipment divides data to be sent into N routes and respectively carries out CRC addition, code block segmentation, channel encoding and physical layer HARQ functional module processing; the N routes of processed data are combined into one route of data in sequence, and data scrambling processing is carried out uniformly; processed data is carried out with data intertwined processing; when a high-order modulation mode is adopted, the N routes of the processed data are carried out with M Yuan constellation rearrangement; the N routes of the processed data are respectively carried out with physical channel mapping, and at last the N routes of the data are respectively modulated to N carriers to be sent to receiving end equipment. The invention also discloses three realization proposals of an encoding or/and decoding device of the multicarrier TDD system business transmission channel, when the method and the device are adopted, uplink data rate of the TDD system can be greatly promoted.
Owner:CHINA ACAD OF TELECOMM TECH

Telephone service executing method and device of double-network double-standby terminal

The invention discloses a telephone service executing method and a telephone service executing device of a double-network double-standby terminal. The double-network double-standby terminal comprises an application subsystem, a 3rd generation (3G) wireless communication subsystem, a 2nd generation (2G) wireless communication subsystem and an identification module, wherein an identification card is inserted into the identification module; when a user of the double-network double-standby terminal uses a voice telephone service, the application subsystem selects the 2G wireless communication subsystem, the 2G wireless communication subsystem uses information in the identification card and the voice telephone service is executed through a 2G network; and when the user of the double-network double-standby terminal uses a video telephone service, the application subsystem selects the 3G wireless communication subsystem, the 3G wireless communication subsystem uses information in the identification card and the video telephone service is executed through the 3G network. Due to the adoption of the method and the device, concurrence of a voice telephone and a video telephone can be realized under a single-card single-number double-network double-standby condition.
Owner:ZTE CORP

Method of jointly initiating high-speed downlink packet access (HSDPA) service and multimedia broadcast multicast service (MBMS)

The invention discloses a method of jointly initiating high-speed downlink packet access (HSDPA) service and multimedia broadcast multicast service (MBMS), comprising the following steps: when initiating the MBMS, user equipment (UE) initiates the HSDPA service and informs the network side of the MBMS; when the network side determines that the carrier resources used for establishing the HSDPA service are different from the carrier resources used for establishing the MBMS, the HSDPA service is dispatched according to principle of different frequency across time slots; when initiating the HSDPAservice, the UE initiates the MBMS and informs the network side of the MBMS; when the network side determines that the carrier resources used for establishing the MBMS are different from the carrier resources used for establishing the HSDPA and determines that the following dedicated physical channel (DPCH) of the HSDPA service and the time slot resources occupied by the MBMS can meet the requirement of different frequency across time slots, the HSDPA service is dispatched according to principle of different frequency across time slots. The invention can jointly initiate the HSDPA service andthe MBMS on the UE side.
Owner:TD TECH COMM TECH LTD

Data synchronization method and device, electronic equipment and storage medium

The embodiment of the invention relates to the field of databases, in particular to a data synchronization method and device, electronic equipment and a storage medium. The data synchronization method provided by the invention comprises the following steps: acquiring a to-be-played-back sub-transaction log according to a fragmented transaction log; detecting whether a global transaction to which the to-be-played-back sub-transaction log belongs belongs to a submitted global transaction or not according to a global transaction snapshot table updated in a preset period; wherein the global transaction snapshot table is used for recording the submission state of the global transaction; and after determining that the global transaction to which the to-be-played-back sub-transaction log belongs belongs to the submitted global transaction, the to-be-played-back sub-transaction log is played back to the downstream database, so that the problem that unsubmitted data is synchronized to the downstream database is avoided, and in addition, the embodiment takes fragments as granularity, so that the data synchronization efficiency is improved. And the fragments in the distributed database determine the sub-transaction logs capable of being played back according to the global transaction snapshot table, so that concurrence among the fragments is realized conveniently, and the data synchronization efficiency is improved.
Owner:金篆信科有限责任公司

A Workflow-Based Information Detection and Penetration Testing Method

The invention provides a method for information investigation and penetration testing based on workflow, and relates to the technical field of computer software information. Based on the workflow, the method realizes the detection, filtering and de-duplication of the domain name, IP, IP port, URL and fingerprint of the test target through the information detection pipeline and the penetration test pipeline, and conducts information detection and penetration testing for various vulnerabilities. The information detection pipeline is used to detect the information of the input target. Through the input IP and URL, the IP, URL, port and fingerprint information are obtained and stored based on multiple plug-ins, which are used for the penetration test pipeline call; the penetration test pipeline is connected with the information detection pipeline. , based on different multiple plug-ins, use the IP, URL, port and fingerprint obtained by the reconnaissance pipeline to perform penetration testing on various vulnerabilities, store the tested vulnerability information and output the test report at the same time. The method can detect and collect the information of the test target in a short time, and automatically carry out the vulnerability penetration, which improves the efficiency of the penetration test.
Owner:北方实验室(沈阳)股份有限公司

A method and device for real-time virtual reproduction of remote sound field

The invention discloses a method and device for real-time virtual reproduction of a remote sound field. The method includes: (1) Using an end-to-end convolutional neural network to infer the personalized elevation angle positioning factor from the user's ear image, and based on this, the general HRTF is customized, and the customized personalized HRTF is further applied Based on the synthesis of binaural virtual sound signals; (2) Based on the real-time detection of the user's head position, the playback of dynamic binaural virtual sound signals that track the head position is realized. The above-mentioned personalized customization and real-time dynamic virtual sound signal processing method can enhance the user's sense of presence and immersion. The device includes a remote sound field multi-channel pickup module, a cloud processing module, a client module and a 5G communication module. The implementation of the present invention is based on cloud computing technology and 5G network transmission, which can effectively reduce the computing load of the user end and meet the parallel requirements of multiple users. The present invention can be regarded as a sound module solution based on virtual reality of mobile portable equipment.
Owner:SOUTH CHINA UNIV OF TECH

A Communication Method for Integrating Multiple Conference Systems with Low Bandwidth

The invention relates to a communication method for integrating various conference systems under low bandwidth, including a hardware video conference system, a software video conference system, a voice conference system, a video monitoring system, and a multipoint control center. The multipoint control center, as a super user, can Perform overall control over each conference system, establish a connection and retrieve audio and video data after arbitrarily specifying the participating users, and use its built-in protocol capability set to perform data interaction and unified processing, and then output data in the form of preset priorities to match Adapt to the minimum bandwidth of the transmission data format to ensure the data transmission under the minimum bandwidth. At the same time, after the conference connection is established, the multi-point control center polls the conference in real time, which not only ensures the real-time detection of the conference situation, but also provides support for low-bandwidth Integration provides the foundation. The communication method of the present invention solves the technical problems that communication systems in the construction industry are applied independently of each other, data cannot communicate with each other, high bandwidth requirements, large deployment costs, and poor compatibility.
Owner:SHANXI FIRST CONSTR GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products