Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1293results about How to "Save storage resources" patented technology

Remote monitoring method and system based on driving safety

The invention discloses a remote monitoring method and a remote monitoring system based on driving safety. The method comprises the steps that an intelligent automobile data recorder acquires driving behavior information of a driver; the intelligent automobile data recorder performs dangerous behavior analysis on the driving behavior information to acquire dangerous driving behavior information based on the driving safety and submits the dangerous driving behavior information to a cloud server; the cloud server analyzes data on the intelligent automobile data recorder to generate a data report. According to the method, the information such as the driving behavior and an automobile is submitted to the cloud server, so that the whole driving habit of the driver can be marked or graded, monitored and proofed due to logic analysis of the cloud, and the information of the driving behavior and the automobile is effectively monitored and managed; therefore, not only is the driving safety improved, but also the automobile management flexibility is improved. Compared with the prior art, the remote monitoring method and the remote monitoring system have the advantages that only a process of a bad driving behavior which is detected by a vehicle-mounted terminal system is monitored and stored, so that a wireless transmission bandwidth and storage resources of a server are saved.
Owner:珠海大轩信息科技有限公司

Docker container building method and Docker management console

The invention discloses a Docker container building method and a Docker management console. By adding a layer combining instruction into an image building script, combining of multiple image layers can be realized according to the layer combining instruction in the process of Docker image building, so that number of Docker image levels and data size of an image file are reduced, working efficiency is improved, and storage resources are saved. The method includes: acquiring a related application file and an image building script of an application, wherein the image building script contains a layer combining instruction; performing image compiling on the related application file according to the image building script to acquire a Docker image layer; if a current instruction is the layer combining instruction, acquiring an image file of a current image layer in the Docker image layer, and acquiring an image file of a target image layer corresponding to a target image layer identity; acquiring a difference file according to the image file of the current image layer and the image file of the target image layer, and building a layer-combined image layer according to the difference file; submitting the layer-combined image layer to an image repository.
Owner:深圳市中润四方信息技术有限公司

System and method for required real-time transcoding and self-adaptive code rate stream media playing

ActiveCN104349178ASave computing resources and network resourcesSave storage resourcesSelective content distributionSelf adaptiveContent distribution
The invention relates to a system and a method for required real-time transcoding and self-adaptive code rate stream media playing. The system comprises a real-time transcoding subsystem, a stream media playing subsystem, a content distribution subsystem and a user terminal module, wherein the real-time transcoding subsystem is used for transcoding the original videos of a video source into video encoding data which is suitable for a user terminal to play, the stream media playing subsystem is used for packaging the video encoding data outputted by the real-time transcoding subsystem into video steams which are suitable for the stream media to transmit, and providing the stream media service for the user terminal, and the user terminal module is used for sending a request to the real-time transcoding subsystem or the stream media playing subsystem, and dynamically switching and transcoding in real time according to the network state information, so as to obtain the video streams with different code rates for playing. By adopting the structure, the system and the method for the required real-time transcoding and the self-adaptive code rate stream media playing have the advantages that the required real-time transcoding of the stream media is realized, the playing code rate is dynamically selected according to the change of the band width of the terminal network, different user terminals can be flexibly matched, and the application range is wider.
Owner:CERTUS NETWORK TECHNANJING

Voice abstract forming method and voice abstract forming system for conference

The invention discloses a voice abstract forming method and a voice abstract forming system for a conference, and relates to the field of voice recognition. According to the invention, the speaking position, the identity information, the personnel data and other information of a speaker in a conference are analyzed, and then the weight coefficient of the speaker is determined. As a result, candidate key speaking segments corresponding to different speakers can be obtained by using different preset strategies according to the weight coefficients of speakers. Furthermore, according to the characteristics of the speaking content, for example, the large-probability interval of the important content of the utterance on a speaking time axis, key transitional words and key connection words in theimportant content of statements, and the like, a set of candidate key speaking segments is intercepted. The intercepted set of candidate key speaking segments is processed and then a set of audio/video segments for forming a voice abstract is obtained. As a result, more content is extracted from important statements, while less content is extracted from non-important statements. The content of afinally formed abstract is more reasonable. The more effective help is provided for users.
Owner:SHENZHEN EAGLESOUL TECH CO LTD

Hierarchical memory system and logical volume management method thereof

The invention discloses a logical volume management method applied for a hierarchical memory system. A volume group bit chart is arranged, and the bits of the volume group bit chart correspond to the physical zones of a physical volume one to one; and the bits in the volume group bit chart indicate whether the corresponding physical zone is occupied or not. The method comprises the following steps: A. initializing a mapping array, wherein each element in the mapping array corresponds to one bit in the volume group bit chart, and the element value shows the position of the corresponding bit in the volume group bit chart; B. seeking a bit set to be invalid in the volume group bit chart and setting the value of the bit to be valid; C. recording the position of the sought bit in the volume group bit chart into the element corresponding to the mapping array of the logical volume; and D. creating a new logical volume which is mapped to the physical zone corresponding to the sought bit. The invention also discloses a memory system adopting the logical volume management method. With the scheme, the invention does not need to distribute a large number of physical zones in initialization, achieves the dynamic use of the physical zones, and greatly saves the memory resources.
Owner:UNITED INFORMATION TECH +1

Secret key management method, device and system

ActiveCN106712932ASolve the problem of requiring a lot of resources to manage symmetric keysSimplify complexityKey distribution for secure communicationCiphertextClient-side
The invention discloses a secret key management method, device and system, and belongs to the technical field of information security. The method comprises the steps that a client side generates a temporary secret key, and the temporary secret key is encrypted by using a public key provided by a background server so that a first cryptograph is obtained and transmitted to the background server; the background server applies a private key corresponding to the public key to decrypt the first cryptograph so as to obtain the temporary secret key, a session key and a key identifier are acquired, and the session key and the key identifier are encrypted by using the temporary secret key so that a second cryptograph is obtained and transmitted to the client side; and the client side applies the temporary secret key to decrypt the second cryptograph so as to obtain the session key and the key identifier, wherein the key identifier is used for identifying the session key, and the session key is used for encrypting the session data. The management complexity of the background server for the secret key can be simplified under the premise of considering the security of the secret key and the efficiency of encryption and decryption so that the processing and storage resources of the background server can be saved.
Owner:TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products