Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

283results about How to "Does not take up resources" patented technology

Method and system for integrally acquiring webpage information

ActiveCN103186670ADoes not take up resourcesSolve the problem that the link page dynamically generated by AJAX cannot be obtainedSpecial data processing applicationsDynamic web pageUniform resource locator
The invention relates to a method and a system for integrally acquiring webpage information. The method comprises the following steps of: (1) simulating the behavior that a user browses a browser in the browser provided with FireBug and Cookies Manager, and storing a first response result returned by Cookies information, all URL (uniform resource locator) requests and a server; (2) simulating the behavior that the user browses the browser and storing a second response result by the browser which is in background operation; (3) compensating the webpage information which is available in the first response result and unavailable in the second response result into the second response result; and (4) acquiring and storing the webpage information according to the compensated second response result by the browser which is in background operation. After the method and the system for integrally acquiring the webpage information provided by the invention are used, the browser which is in background operation can acquire all the webpage information according to the compensated second response result without occupying the resource of the browser, so that the problem that a link page dynamically generated by AJAX (asynchronous java and xml) can not be obtained by a dynamical webpage acquisition method in the prior art can be solved.
Owner:北京中金云网科技有限公司

Anomaly detection method of internal virtual machine of cloud system

The invention relates to an anomaly detection method of an internal virtual machine of a cloud system, which comprises the following steps: state information of a normal virtual machine of the cloud system is collected to train Hidden Semi-Markov Model (HsMM), and a corresponding algorithm is designed for detecting and computing probabilities and mahalanobis distances of resource dynamic change behaviors when various virtual machines in the cloud system are on line; if the mahalanobis distance in the online detection result of some virtual machine is more than a preset threshold value, the activities of the virtual machine are abnormal, so an anomaly detection and processing system in the cloud system is started for anomaly detection and processing of the virtual machine; if the anomaly rate of some virtual machine is detected to be less than the maximum threshold value of the anomaly detection and processing, after the anomaly is eliminated, a warning prompt is sent to a cloud tenant; otherwise, an alarm is given for the cloud tenant of the virtual machine, and the virtual machine is closed. According to the anomaly detection method, abnormal behaviors of the internal virtual machine of the cloud system can be detected in real time, the occupied system resources are less, and the high availability and high safety of the internal virtual machine of the cloud system can be fully ensured.
Owner:SHANGHAI MARITIME UNIVERSITY

LCD (Liquid Crystal Display) controller and display control method thereof

The invention relates to an LCD (Liquid Crystal Display) controller and a display control method thereof. The LCD controller comprises a slave module, a DMA (Direct Memory Access) channel module, an FIFO (First-In First-Out) buffer, a data format converting module, a 3D (3-Dimensional) processing module, an overly multi-layer overlay module, a DISP (Display) FIFO display cache module and a time sequence module, and supports the functions, such as naked-eye 3D visualization, multi-layer display and automatic restoration. The multi-layer display function is achieved by the LCD controller and isnot subjected to the operation processing of a processor any more, so that the operating speed is increased, and the load of the processor is reduced; the automatic restoration function means that the LCD controller can temporarily stop outputting image data if the condition that bandwidth is insufficient in a short term occurs when the LCD controller plays a high-definition video, and outputs the image data again until the bandwidth is enough, and the image data are sufficient; and as the condition that the bandwidth is insufficient is an occasional and short-term case, the display control method can solve the problems of screen cracking and screen blurring arising from short-term insufficient bandwidth on the basis of not affecting a watching effect.
Owner:SOUTHEAST UNIV

Hardware encryption protection method and system for cellphone data

The invention discloses a hardware encryption protection method and system for cellphone data. The hardware encryption protection method includes utilizing ID (identity) of a cellphone, IMEI (international mobile equipment identity) numbers of an SIM (subscriber identity module), SNs (serial numbers) of a storage chip and name of a source file as dynamic parameters, calling a key generating module and an AES (advanced encryption standard) encrypting and decrypting module to generate Keys for encryption and decryption by being matched with logic calculation; calling a hardware encrypting module to encrypt the file or data for the source file. The key generating module, the AES encryption and decryption module and the encryption and decryption module operate file storage equipment through the storage chip, data encryption and decryption are completed, and the storage chip is welded on a circuit board of the cellphone and provided with an independent core processor. The hardware encryption protection technology for the cellphone data overcomes the defects of the prior art, is free of system resource occupation, has high performance, safety and reliability, and can effectively meet the encryption protection requirements on important files of people.
Owner:深圳市中易通安全芯科技有限公司

Chip debugging device, debugging method and SOC (System of Chip) chip system

InactiveCN105808396AImprove soundnessDoes not take up resourcesFaulty hardware testing methodsAdvanced Microcontroller Bus ArchitectureEmbedded system
The invention discloses a chip debugging device, a debugging method and an SOC (System of Chip) chip system. The chip debugging device is characterized in that a conversion module carries out serial-parallel conversion on input debugging command data; an analysis module analyzes the debugging command data after serial-parallel conversion into an AMBA (Advanced Microcontroller Bus Architecture) bus command and obtains executive result data obtained by a chip through executing the AMBA bus command, so that a function module in the chip is accessed according to the AMBA bus command, read and write operations are carried out on the function module in the chip and an operation result is returned to the conversion module; and the conversion module outputs the operation result after serial-parallel conversion to complete debugging of the chip. In comparison with the prior art, a chip debugging process of the chip debugging device provided in the embodiments of the invention does not need participation of a CPU (Central Processing Unit), CPU resources are not occupied, and the chip is debugged based on the AMBA bus command, so that the function module in the SOC chip can be debugged, and thus the integrity of chip debugging is improved.
Owner:ZHEJIANG DAHUA TECH CO LTD

On-line early warning method of failure of cross-linked polyethylene power cable

The invention relates to an on-line early warning method for failure of a cross-linked polyethylene power cable, belonging to the field of on-line monitoring of power cables and comprising a cross-linked polyethylene power cable to be detected. The on-line early warning method for failure of the cross-linked polyethylene power cable is characterized in that when restorable failure of a certain cross-linked polyethylene power cable to be detected is detected and recorded on line in real time, an instantaneous electromagnetism transient signal flowing through a metal shielding layer earthing conductor of the power cable to be detected is generated, and the instantaneous electromagnetism transient signal is analyzed by utilizing a specific criterion so as to make an early warning for the power cable to be detected. By adopting the on-line early warning method of the restorable failure of the power cable, on-line early warning is performed on the restorable failure before the cable is damaged, which is beneficial for the power supply departments to overhaul in advance or in a planned way, avoiding sudden failure of the cable to cause power failure, reducing economic loss caused by the power failure and adverse effect brought for enterprise production and people's life, and improving the reliability of the power supply.
Owner:淄博文广电气有限公司 +1

Industrial personal computer safety protection system and industrial personal computer safety protection method based on security baseline

The invention provides an industrial personal computer safety protection system and an industrial personal computer safety protection method based on a security baseline. The method comprises the steps of establishing the security baseline for an industrial personal computer terminal according to information of each industrial personal computer terminal in an industrial control network; when unknown data enter the industrial control network, detecting security of the unknown data; updating the security baseline according to a security detecting result of the known data; allowing entering of the safe unknown data in the industrial control network, and preventing operation of unsafe unknown data in the industrial control network. According to the industrial personal computer safety protection system and the industrial personal computer safety protection method, security of equipment in the industrial control network is ensured through the closed security baseline; furthermore the security baseline of the equipment can be dynamically updated; and detection of the unknown data and establishment of the security baseline are performed in a service end, thereby preventing resource occupation of the industrial personal computer terminal and realizing no influence on service operation of the industrial personal computer terminal.
Owner:BEIJING ANTIY NETWORK SAFETY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products