Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

78results about How to "Avoid monopoly" patented technology

Multi-cloud cooperative storage middleware system based on existing cloud storage platform

The invention relates to the technical field of cloud storage and in particular discloses a multi-cloud cooperative storage middleware system based on an existing cloud storage platform. The multi-cloud cooperative storage middleware system comprises a client terminal and a metadata server, wherein the client terminal is connected to a cloud platform through a network and is used for authenticating users, fragmenting and distributing files, operating and managing files, distributing data, restoring fault of data, encrypting and decrypting data; the metadata server is connected to the client terminal and is used for authenticating accounts and storing a file organization directory tree, a data encrypting key and a user operation log. The multi-cloud cooperative storage middleware system is used for cooperatively storing by using the existing multiple cloud storage platforms; through comprehensive consideration of multi-cloud storage resource and network service quality, a user data self-adaption distribution and integration algorithm is disclosed; an information security safeguard mechanism with separable data storage, data management and user visit is disclosed; a data fragmentation storage and key management method based on the metadata server is provided; the problem of leakage of the cloud storage data is solved.
Owner:陕西骏途网文化旅游科技股份有限公司

Anti-theft method based on compass short message function and anti-theft system based on compass short message function

The invention provides an anti-theft method based on a compass short message function. The anti-theft method based on the compass short message function comprises the following steps: arranging an alarm information receiving address in advance; collecting gesture data of a target device in real time; judging whether a carrier is in a static state according to acceleration data, when the carrier is not in the static state, judging whether the acceleration data and replacement exceed preset values, when the acceleration data and the replacement exceed the preset values, judging that the target device is stolen, and retransmitting alarm information to the alarm information receiving address through a compass communication satellite or a mobile network. The invention further provides an anti-theft system based on the compass short message function. The anti-theft system based on the compass short message function comprises a compass receiving and transmission terminal, a gesture sensor and a controller. The controller is used for storing the preset alarm information receiving address, and judging whether the target device is stolen. The compass receiving and transmission terminal is used for retransmitting the alarm information through the compass communication satellite. The gesture sensor contains compass navigation location, and is used for collecting the gesture data of the target device. The anti-theft method based on the compass short message function and the anti-theft system based on the compass short message function are capable of timely carrying out effective alarms.
Owner:CHENGDUSCEON ELECTRONICS

Credible privacy intelligent service computing system and method based on block chain

The invention provides a credible privacy intelligent service computing system based on a block chain, which performs computing service, encryption service and credible right and interest service, andcomprises a user end, a model providing end and a cloud server end , the user side is a user of service computing and is provided with a data and public and private key generator, and the user end puts forward demand and request service and starts the whole service process after authority is obtained; the model providing end obtains the encrypted public key from the cloud server end, encrypts thetrained prediction model by using the public key, provides the encrypted prediction model to the cloud server end, provides a classification label at the same time, and obtains a rights and interestsdistribution result and corresponding cost after the calculation service is completed; and the cloud server end is used for providing computing resources and model services and completing the requestof the user end. The invention further provides a calculation method and a calculation model, a homomorphic encryption method is adopted, and the calculation model comprises a credible privacy service calculation sub-model, a prediction service privacy calculation sub-model and a prediction service rights and interests evaluation sub-model.
Owner:BEIJING WUZI UNIVERSITY

Substation distribution room full-view inspection-tour monitoring system and management method thereof

ActiveCN103545934AAvoid the problem of refusal and misoperationLightning protectionCircuit arrangementsPower factorHigh pressure
The invention provides a substation distribution room full-view inspection-tour monitoring system and a management method of the substation distribution room full-view inspection-tour monitoring system, and belongs to the field of substation distribution room full-view inspection-tour monitoring systems. The substation distribution room full-view inspection-tour monitoring system comprises a terminal control system, a branch-shaped looped-network optical-fiber communication system and a dispatching monitoring center. According to the substation distribution room full-view inspection-tour monitoring system, dispatching personnel in front of a dispatching computer can remotely see voltage values, current values, power values, phase-angle values and power factor values of power supply circuits, the input and exit situation of the protection function and a protection constant value of a switch, the working state of the switch and the on-site video of electricity transformation and distribution switching stations, and send a remote-control instruction to a high-voltage switch, and the five-remote-control function which integrates telecommands, telemetering, remote control, remote regulation and remote vision is achieved.
Owner:山东兰德勘察设计有限公司

Manufacturing method of stainless steel square pipe

ActiveCN106938285AMeet the design requirementsSpecial section shapeHigh surfaceHeat treated
The invention discloses a manufacturing method of a stainless steel square pipe. A forged round ingot is adopted as a pipe billet and subjected to hot extrusion, cold deformation, heat treatment and surface treatment to form a finished product. The method comprises the specific steps that 1, a semi-finished round pipe corresponding to the finished product in size is prepared from the stainless steel pipe billet through the seamless forming technology comprising hot extrusion and cold rolling/cold drawing; 2, a square pipe meeting size requirements is prepared from the semi-finished round pipe through a two-pass drawing method, wherein the first pass is sink drawing, and the second pass is short mandrel liner drawing; and 3, heat treatment is carried out, wherein a roller bottom type heat treatment furnace is adopted for the finished product for solid solution heat treatment, and the heat treatment process comprises four stages. The stainless steel square pipe can be applied to waste heat exhaust heat exchangers of third-generation nuclear reactors such as AP1000, CAP1000, CAP1400 and Hualong One, has the special section shape, high corrosion resistance, high surface smoothness and high boundary dimension precision and is required to pass strict ultrasonic flaw detection and liquid penetrating tests.
Owner:SHANXI TAIGANG STAINLESS STEEL CO LTD

File system resource isolation method for Docker container

The invention relates to a file system resource isolation method for a Docker container. The method includes: allocating host file system resources according to the access request of the container anddetermining a lock resource corresponding to the access request, the file system resource isolation method at least comprises the following steps: dividing a lock resource into a first lock capable of being refined and a second lock incapable of being refined based on the granularity of the lock resource, and creating a plurality of new containers in a manner of configuring refined copies of thefirst lock to form independent locks; allocating the host file system resources according to the file resource request parameters required by the new containers, and dividing the plurality of new containers into a first marking container and a second marking container based on the allocation result; and controlling the execution of the file system operation according to the use amount of the filesystem resources allocated to the first marking container or the second marking container under the condition that the lock competition exists or the file system resources need to be used when the first marking container or the second marking container executes the file system operation.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products