Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

54results about How to "Eliminate attack" patented technology

Intelligent system infrastructure for financial data computation, report remittance and funds transfer over an interactive communications network

InactiveUS20050119955A1Eliminate eavesdroppingEliminate connection hijackingComplete banking machinesFinanceExtensibilityProtection system
This disclosure relates to a specific, illustrative multilayer architecture for a program controlled system for providing services relating to financial data computation, report remittance and funds transfer services over an interactive communications network. The system comprises a subscriber server for hosting a virtual portal having at least one application for providing e-content to end users, the application including a network browser for accessing, displaying and transmitting data over the network. A first service provider server allows a system administrator to access the system remotely. A first security system for protecting the system from entry of unwanted data during data transfer over the network between the subscriber and service provider servers and the interactive communications network level. Also provided are plurality of primary servers including a primary network server, a primary tax computation server, a primary report generation server and a primary tax remittance server. The network server receives a tax computation transaction request from the subscriber server, transmits the request to the primary tax computation server, and returns data processed by the tax computation server to the subscriber server. In addition, the system has a plurality of secondary servers redundant to the first. The secondary servers include a secondary network server, a secondary tax computation server, a secondary report generation server and a secondary tax remittance server. A load balancing and scalability system is utilized for load directing, routing and switching functions during data transfer from utilization of at least one function at one of the primary servers to a corresponding function at a secondary server for optimum management of system resources.
Owner:DANG HONG M +3

Preparation method for jasmine puer snake gall tea

The invention relates to a preparation method for jasmine puer snake gall tea. The preparation method is characterized by comprising the following steps: (1) taking snake galls from snakes, cleaning, placing in a shade place, shielding light, and naturally drying for later use; (2) taking the dried snake galls, soaking in cold water for 30-40min or soaking in hot water for 4-5min at 100 DEG C, and taking out the snake galls after swelling for later use; (3) preparing jasmine puer tea at the ratio of one snake gall to 10-50g tea leaves for later use; placing the swelling snake galls acquired in the step (2) above the jasmine tea leaves and puncturing, and uniformly dropping the outflow gall into the jasmine puer tea prepared at the appointed ratio in the step (3); uniformly stirring and then standing for 2-3 hours; and adopting a drying machine for drying for 15-20min, packaging in stereoscopic tea bags, sealing, bagging according to the specification quantity of external packing, and putting into a box, thereby acquiring the jasmine puer snake gall tea. The jasmine puer snake gall tea has blackish green appearance, color and luster, has pure and lasting fragrance and has the effects of decreasing lipid, losing weight, reducing pressure, relieving nerves and resisting against aging.
Owner:广西小燕蛇业有限公司

Abnormity detection and processing method of cloud virtual environment

The invention discloses an application layer abnormity detection and processing method of a cloud virtual environment. The method comprises that a cloud controller detects states of virtual machines in real time; if a virtual machine is an abnormal virtual machine, a comprehensive abnormity detection system carries out comprehensive detection to the abnormal virtual machine; if the comprehensive abnormity detection system judges that the comprehensive detection result value of the abnormal virtual machine is less than a preset threshold value Q, the cloud controller calculates the average logarithm likelihood probability value of the abnormity detection of the abnormal virtual machine; if the average logarithm likelihood probability value is more than a Pmax, the abnormal virtual machine is a high risk virtual machine; the abnormal virtual machine is isolated; if the average logarithm likelihood probability value is less than the Pmax, the abnormal virtual machine is a low risk virtual machine; and the abnormal behaviors of the abnormal virtual machine are eliminated. According to the method, the abnormity detection reliability of the cloud virtual machine is ensured; through adoption of multiple detection mechanisms, the abnormal virtual machine can be detected more reliably; false detection will not be carried out to certain normal virtual machines; and the service of the cloud tenants of the normal virtual machines will not be influenced by the false detection.
Owner:SHANGHAI MARITIME UNIVERSITY +1

Intelligent system infrastructure for financial data computation, report remittance and funds transfer over an interactive communications network

InactiveUS20050119953A1Eliminate eavesdroppingEliminate connection hijackingComplete banking machinesFinanceExtensibilityProtection system
This disclosure relates to a specific, illustrative multilayer architecture for a program controlled system for providing services relating to financial data computation, report remittance and funds transfer services over an interactive communications network. The system comprises a subscriber server for hosting a virtual portal having at least one application for providing e-content to end users, the application including a network browser for accessing, displaying and transmitting data over the network. A first service provider server allows a system administrator to access the system remotely. A first security system for protecting the system from entry of unwanted data during data transfer over the network between the subscriber and service provider servers and the interactive communications network level. Also provided are plurality of primary servers including a primary network server, a primary tax computation server, a primary report generation server and a primary tax remittance server. The network server receives a tax computation transaction request from the subscriber server, transmits the request to the primary tax computation server, and returns data processed by the tax computation server to the subscriber server. In addition, the system has a plurality of secondary servers redundant to the first. The secondary servers include a secondary network server, a secondary tax computation server, a secondary report generation server and a secondary tax remittance server. A load balancing and scalability system is utilized for load directing, routing and switching functions during data transfer from utilization of at least one function at one of the primary servers to a corresponding function at a secondary server for optimum management of system resources.
Owner:DANG HONG M +3

Intelligent system infrastructure for financial data computation, report remittance and funds transfer over an interactive communications network

InactiveUS20050119954A1Eliminate eavesdroppingEliminate connection hijackingComplete banking machinesFinanceExtensibilityProtection system
This disclosure relates to a specific, illustrative multilayer architecture for a program controlled system for providing services relating to financial data computation, report remittance and funds transfer services over an interactive communications network. The system comprises a subscriber server for hosting a virtual portal having at least one application for providing e-content to end users, the application including a network browser for accessing, displaying and transmitting data over the network. A first service provider server allows a system administrator to access the system remotely. A first security system for protecting the system from entry of unwanted data during data transfer over the network between the subscriber and service provider servers and the interactive communications network level. Also provided are plurality of primary servers including a primary network server, a primary tax computation server, a primary report generation server and a primary tax remittance server. The network server receives a tax computation transaction request from the subscriber server, transmits the request to the primary tax computation server, and returns data processed by the tax computation server to the subscriber server. In addition, the system has a plurality of secondary servers redundant to the first. The secondary servers include a secondary network server, a secondary tax computation server, a secondary report generation server and a secondary tax remittance server. A load balancing and scalability system is utilized for load directing, routing and switching functions during data transfer from utilization of at least one function at one of the primary servers to a corresponding function at a secondary server for optimum management of system resources.
Owner:DANG HONG M +3

Organic-inorganic nano-composite reinforced polyethylene material and preparation method thereof

ActiveCN106397912AReasonable compositionLong-lasting UV resistanceAntioxidantModified carbon
The invention discloses an organic-inorganic nano-composite reinforced polyethylene material and a preparation method thereof. The material is composed of 5-20wt% of rutile type titanium dioxide micrometer particles, 0.5-30wt% of modified carbon nanotubes, 0.5-2wt% of an antioxidant, 0.1-5wt% of an organic UV absorbent and the balance high density polyethylene. The preparation method consists of: firstly mixing sulfuric acid with nitric acid, then placing carbon nanotubes in the mixed acid to carry out stirring reaction, then performing solid-liquid separation, washing and drying treatment, then adding the obtained purified carbon nanotubes into a surface modifier solution to carry out reaction, and then performing drying to obtain modified carbon nanotubes, and then putting the rutile type titanium dioxide micrometer particles, the modified carbon nanotubes, the antioxidant, the organic UV absorbent and the high density polyethylene in a twin-screw extruder to conduct melt blending, and then performing extrusion, thus obtaining the target product. With high long-acting ultraviolet resistance, the organic-inorganic nano-composite reinforced polyethylene material can be widely used as films, pipes, wires and cables, plastic products and packaging materials under outdoor natural conditions.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products