Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

151results about How to "Avoid parsing" patented technology

Anti-deception method based on interactive distance measurement information and RNSS

The invention discloses an anti-deception method based on interactive distance measurement information and an RNSS. The anti-deception method is applied to a system comprising a user receiver, an interactive distance measurement platform, a measurement control center and a navigational satellite. The user receiver exchanges interactive distance measurement signals with the measurement control center through the interactive distance measurement platform; the navigational satellite sends an RNSS signal to the user receiver; the user receiver compares positioning results or distance information obtained based on the interactive distance measurement signals and the positioning results or distance information obtained based on the RNSS, and judges whether deception interference is received; and the measurement control center judges whether the user receiver is subjected to the deception interference based on the number of interactive distance measurement answering signals received from the same user receiver and the same interactive platform nodes. The anti-deception is achieved by utilizing the interactive distance measurement platform, so that analysis on signal features can be avoided, realization difficulty is reduced, and the anti-deception can be achieved.
Owner:ACAD OF OPTO ELECTRONICS CHINESE ACAD OF SCI

Method and system for acceleration of Webpage application execution

The invention provides a method and system for acceleration of Webpage application execution. Program source codes of hypertext markup language (HTML) or computer system simulation (CSS) or a JavaScriprt in Webpage application are compiled into binary format codes in an initial installation of Webpage application stage or a loading execution stage, source codes of the JavaScriprt are directly compiled into codes of a native machine, second type program source codes need loading can be confirmed by the native machine according to the binary format codes, codes of the native machine, corresponding to the second type program source codes need loading are found in an archived file, and then installation or execution is conducted, and a result of the installation or the execution is preserved in the archived file. According to the method and system for the acceleration of the Webpage application execution, in the process that the Webpage application is issued to be executed for multi-times, only one time of text mode code analyzing and binary translation is needed, and thus the text mode code analyzing and binary translation works conducted every time the Webpage application are executed, and thus the operating performance of the Webpage application is improved.
Owner:SHENGLE INFORMATION TECH SHANGHAI

System and method for implementing authentication on user of home base station

The invention provides a system and a method for implementing authentication on a user of a home base station. The method comprises the following steps that: in the process of requesting for access to the home base station in a closed access mode or a mixed access mode by a terminal, an access gateway sends user identification information, a home base station identifier and a home base station mode to an authentication and authorization server, or to a user server of a closed user group CSG through the authentication and authorization server; when the home base station is in the closed access mode, the authentication and authorization server or the CSG user server judges whether to allow the user to access the home base station or not and returns a judgment result to the home base station through the access gateway; and when the home base station is in the mixed access mode, the authentication and authorization server or the user server of the closed user group CSG determines user type information and returns the type information to the home base station through the access gateway. The system and the method can avoid transferring a real user identifier frequently at a hollow port, and reduce the burden of the home base station and the potential safety hazard of the home base station.
Owner:ZTE CORP

Unlocking method and unlocking system with mobile phone as automobile key

The invention provides an unlocking method and an unlocking system with a mobile phone as an automobile key, and relates to the technical field of vehicle control. The unlocking method with the mobilephone as the automobile key comprises the following steps: receiving a first unlocking instruction sent by a user mobile phone terminal, and performing user identity authentication based on the firstunlocking instruction and according to pre-stored registration information of the user mobile phone terminal capable of triggering code matching with an automobile; and after the user identity authentication succeeds, generating a random password and a second unlocking instruction, sending the second unlocking instruction and the random password to the vehicle-mounted terminal, verifying the random password by the vehicle-mounted terminal, and controlling the vehicle-mounted terminal to open the vehicle door through the second unlocking instruction after the random password is verified to belegal. When the vehicle receives the unlocking instruction, the user identity authentication needs to be conducted firstly, the vehicle can be started only after joint authentication of the mobile phone terminal and the vehicle-mounted terminal, the safety performance of the vehicle is improved, and the problem that the vehicle is stolen due to the fact that a mobile phone is lost is avoided.
Owner:GEELY AUTOMOBILE INST NINGBO CO LTD +1

Method of measuring and calculating distribution of water temperatures of river channel below dam of reservoir

Provided is a method of measuring and calculating distribution of the water temperatures of a river channel below a dam of a reservoir. Actually-measured data of the weather and the hydrology are combined, changes of the water temperatures along the river channel below the dam of the reservoir are measured and calculated, a position below the dam of the reservoir serves as the first measuring and calculating section, and the spacing distance of sections along the river channel is calculated according to an integral multiple of the one-day and one-night flow path of a river reach with the mean velocity. Heat exchange of water in the river channel is fully considered, detailed analysis does not need to be carried out on hydrodynamic processes, the mean velocity is used for replacing hydrodynamic calculation, the analysis of hydrodynamic equations required by numerical simulation calculation can be avoided, and workloads of calculation are reduced greatly. Meanwhile, according to the method, main factors leading to the changes of the water temperatures of the river channel are fully considered, and accuracy of calculation is guaranteed. As for the method, the good accuracy is obtained, the amount of calculation is relatively small, complex boundary condition data are not needed, work efficiency can be improved greatly, application fields can be widened, the accuracy and usability can be taken into account better, and the method can effectively assist in making discharging schemes of the water temperatures and the flow quantity of the reservoir.
Owner:CHANGJIANG RIVER SCI RES INST CHANGJIANG WATER RESOURCES COMMISSION

Two-dimensional code, and generation method and identification method thereof

The invention provides a two-dimensional code. The two-dimensional code comprises a plaintext information part and a ciphertext information part, wherein the plaintext information part is used for downloading address information for APP (Application) identification software used for analyzing the two-dimensional code; the ciphertext information part comprises enciphered information which is enciphered and consists of a character or a plurality of identical characters. A method for generating the two-dimensional code comprises the following steps: setting the application range of the two-dimensional code; inputting information contents needing to be enciphered, and converting the information contents into character string information of corresponding positional notation; enciphering the character string information to form the enciphered information; combining the mark number of application range identifier information, the mark number of enciphered mode instruction information and the enciphered information into the ciphertext information part; generating the two-dimensional code through the plaintext information part and the ciphertext information part. The plaintext information part can remind a user to download and install special two-dimensional code APP identification software used for analyzing the ciphertext information part so as to acquire the information contents corresponding to the ciphertext information part.
Owner:LEADER TECH BEIJING DIGITAL TECH

Activiti-based business event and flow separation method and system

The present invention discloses an activiti-based business event and flow separation method. The method includes the following steps that: activiti operation node data are structurized, and the structurized data are configured into a database so as to generate different forms; and the XML data of a business flow are analyzed, the analyzed configuration data are written into the forms generated in the above step. According to the activiti-based business event and flow separation method of the invention, the operation node data are structurized in the database; the specific forms formed by the structurized data are read; the XML data of the business flow are analyzed, and the analyzed data are written into the above generated forms; and therefore, the separation of business processing from the business flow can be realized, business can be independent from a flow line for analyzing the customized XML of the activiti in a processing process, the analysis of the XML data which is performed each time when business is processed can be avoided, the problem of data chaos caused by XML analysis can be solved, the problem of the failure of the business processing caused by the anomalies of the flow can be solved, and the update of the flow can be updated through modifying the configuration data. The invention also provides an activiti-based business event and flow separation system.
Owner:GUANGDONG ESHORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products