Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

106results about How to "Reduce operating overhead" patented technology

Root-permission-free safe virtual mobile application program running environment system, method and application

The invention discloses a root-permission-free safe virtual mobile application program running environment system, method and application. A user opens a virtual running environment control program and selects a target mobile application program; a container process loads the target application program; a hook is arranged in the container process, and communication and interface calling of the target application program and an operation system is dynamically intercepted through the hook method; a proxy service agents target application program and operation system interaction according to a request for intercepting communication and interface calling; a safety module analyzes the target application program and operation system interaction, and dynamic permission control over the interaction is achieved through the proxy service; a log module records all system access time and contents, and bases are provided for further safety analysis. The system is a safe virtual environment which can directly run in an existing Android system and support and protect running of target mobile programs, the running cost is low, root permission does not need to be obtained, the existing Android system does not need to be modified, and compatibility and applicability are high.
Owner:JIN GUANG +1

Embedded-type system for ensuring completeness of program and realization method thereof

The invention discloses an embedded-type system for ensuring the completeness of a program, which comprises an embedded-type microprocessor, a storage device, a program completeness detection unit and a safety control unit wherein: the program completeness detection unit is used for detecting content of an appointed area of the storage device before the running, utilizing a standard hash function to calculate the hashed value of the area in the appointed area, for encrypting the hashed value and for transmitting the hashed value to the safety control unit; and the safety control unit is used for storing a correct hashed value of the content in the appointed area of the storage device, for comparing the correct hashed value with a running time hashed value which is transmitted by the completeness detection unit, and for judging whether the appointed area is altered. The invention also discloses a realization method of the embedded-type system for ensuring the completeness of the program, which comprises a configuration process and a running time detection process. The embedded-type system solves the safety problem that the code in the conventional system is easy to be altered, has the advantages of universality, low cost, less running expenditure and the like, and is particularly suitable for ensuring the completeness of the most basic trusted root of the embedded-type system.
Owner:SOUTH CHINA UNIV OF TECH

Grid-oriented configurable data transmission method and system

The invention discloses a transmission system of grid-oriental configurable data which solves the problems of insufficient reliability existing in the prior protocol and high spending of the system operation. The invention comprises the following processes: data communication connection is built between two parties of the communication with a mode of three times handshake; when a fault occurs, the linkage of permanent connection is closed; a receiving and sending synchronization and a flow controlling of the information are carried out by a sliding window; in the data transmission protocol, an authentication technology is adopted for assuring the reliable transmission of the data. The invention, through the receiving and sending synchronization and the flow controlling of the information carried out by the sliding window, achieves function of stabilizing the rate, resending the lost packet and transmitting in sequence. The protocol realizes flow controlling. When the receiver has a value which increases to a right value in the receiving window, the receiver then sends a window notice to the sender under the condition of that the receiving window can be zero for a longer time in a large flow. Through effective controlling carried out for controlling a sending rate of the sender, the phenomenon of occurrence of an over congestion in the network in big flow can be avoided.
Owner:ZTE CORP

A detection method and system for mobile terminal short message interception type malicious code

The invention discloses a detection method of mobile terminal short message intercepting type malicious code, comprising: registering a broadcast receiver in the mobile terminal system; using the broadcast processing function of the broadcast receiver to record all short messages newly received by the mobile terminal; After the set time, use all the short messages in the inbox of the mobile terminal to match all the short messages recorded by the broadcast processing function one by one; if the short messages recorded by the broadcast processing function fail to match the short messages in the inbox, the broadcast processing function The recorded short messages with unsuccessful matching are intercepted by malicious codes, and there are short message intercepting malicious codes in the mobile terminal system. The invention also discloses a detection system of mobile terminal short message interception type malicious code. The method and system can automatically run dynamic monitoring, detect malicious codes immediately when the interception occurs, and have more accurate detection and judgment results, and at the same time, the running cost is smaller, and the performance of the system is hardly affected.
Owner:SHENZHEN ANZHITIAN INFORMATION TECH

Integral graph algorithm-based fabric flaw detection method

An integral graph algorithm-based fabric flaw detection method is disclosed. An integral graph algorithm is used for rapidly extracting statistical characteristics of gradient energy, and the statistical characteristics of gradient energy are used for flaw detection; image learning operation on a flawless template is performed, statistics are run on characteristic distribution of the gradient energy, distribution peak values are extracted, threshold parameters are calculated in a self-adaptive manner and used for distinguishing subsequent flaws, gradient energy of a window where each pixel point of an image to be detected is positioned can be calculated via the integral graph algorithm, whether a current pixel point is a defect point can be determined based on the threshold parameters, and whether the current image is a flawed fabric can be determined after statistics are run on a total quantity of flaw points of the whole image. According to the method disclosed in the invention, based on principles of accelerated operation of integral graphs, the characteristic distribution of the gradient energy of the fabric image can be rapidly extracted, real time detection of fabric flaws can be realized, the peak values of the distribution are calculated, the self-adaptive threshold parameters for flaw determination are obtained, and accurate segmentation of fabric flaws can be realized. Via the method, real-time property and high accuracy can be ensured.
Owner:南通大学技术转移中心有限公司

A carrier frequency offset estimation method of a baseband signal and a device thereof

ActiveCN109067680ASimple calculationHigh carrier frequency offset estimation accuracyCarrier regulationFrequency spectrumCarrier frequency offset
A carrier frequency offset estimation method of baseband signal and device thereof, the carrier frequency offset estimation method comprises the steps of baseband signal acquisition, complex signal calculation, complex signal frequency spectrum shifting, complex signal resampling, useful spectrum line frequency point sequence number acquisition and carrier frequency offset estimation, etc. As thecomplex signal after spectrum shifting is resampled, the sampling rate of the system can be matched to a fixed value, so that FFT processing with a fixed number of points can be adopted to obtain a spectral sequence including useful spectral lines, so that the system can obtain the frequency point number corresponding to the useful spectral line without increasing the number of FFT points, but also simplifies the calculation process of obtaining the frequency point serial number. On the premise of guaranteeing the higher precision of carrier frequency offset estimation, it can speed up the processing speed, further reduce the calculation time and the running cost of the system, and finally help to improve the real-time performance of OQPSK signal in demodulation processing and carrier frequency offset estimation processing.
Owner:SHENZHEN CITY SIGLENT TECH

Android application program protection method based on Dex2C and LLVM

ActiveCN110245467AAvoid loopingRedundant cycle operationProgram/content distribution protectionVirtualizationModel selection
The invention discloses an Android application program protection method based on Dex2C and LLVM. The method comprises the following steps: decompressing an APK to obtain and analyze a Dex file, obtaining all necessary information, capable of recovering C codes, of each assembly instruction; selecting whether to carry out Dex2C conversion or not according to the evaluation model, and if the Dex2C conversion exceeds a threshold value, carrying out Dex2C conversion: carrying out conversion preprocessing operation, including searching a to-be-protected method, inserting assembly instruction statements, establishing an adjacency relation of instructions and the like, and selecting one of the three sets of conversion logics one by one according to the type of the assembly instruction to carry out conversion; achieving virtualization during compiling based on the LLVM, and if the threshold value is not exceeded, executing an LLVM compiling virtualization module directly; after the So file is generated through the framework, repackaging and signing are carried out, and generating the APK with the equivalent function. According to the invention, the protection methods of the Dex layer and the local layer are combined, on one hand, the execution efficiency of the APK can be improved, and on the other hand, the attack difficulty and cost of malicious attackers are greatly improved.
Owner:NORTHWEST UNIV(CN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products