Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

147results about How to "Update flexible" patented technology

Shooting method and electronic equipment

An embodiment of the invention discloses a shooting method and electronic equipment, relates to the technical field of communication, and can solve the problem that an image shot by the electronic equipment is single. The method comprises the steps that under the condition that a first window and a second window are displayed, first input of a user to a target window is received, the first windowis used for indicating a first shooting preview picture of first electronic equipment, the second window is used for indicating a second shooting preview picture of second electronic equipment, and the target window comprises the first window and/or the second window; a target shooting preview image is updated in response to the first input, the target shooting preview image comprising a first shooting preview image and/or a second shooting preview image; a first camera of the first electronic equipment and a second camera of the second electronic equipment are controlled to execute shooting operation respectively based on the updated target shooting preview picture, and a target image is output, wherein the target image is an image obtained by synthesizing an image corresponding to the first shooting preview image and an image corresponding to the second shooting preview image.
Owner:VIVO MOBILE COMM HANGZHOU CO LTD

Method for realizing adaptive signaling in distributed control collaborative optical networks

ActiveCN101605278ASolve resource congestionFlexible updates and upgradesMultiplex system selection arrangementsTime-division multiplexRing protectionSignaling process
The invention relates to the communication field. The embodiment of the invention discloses a method for realizing adaptive signaling in distributed control collaborative optical networks. The method comprises collaborative transaction modules introduced into intelligent optical network control nodes, a real-time interaction method for optical network control and management, an implementation method for collaborative hardware equipment nodes, a ring-protection signaling implementation method in management-control collaborative systems, a networking proposal for management-control collaborative platforms, a collaborative operation signaling process and an operation mode thereof. The method combines management planes with control planes by introducing the collaborative transaction modules, assists in automatic connection control technology through management technology, reduces expenses of the centralized interaction of a great amount of data, and performs real-time interaction through short fast control messages so as to solve the disadvantage that distributed networks are not adjustable or controllable and provide a quick connection method supporting a plurality of QoS levels. The method can realize the quick resource announcement, quick resource discovery and the quick command transmission of managers through simple management-control interaction, and can solve resource jam, preemption and other problems in a signaling process through real-time or dynamic resource locking according to the resource blocking situation of nodes or links passed.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method and device for updating browser

The invention aims at providing a method and device for updating a browser. The method includes the steps of dividing the browser into a browser frame module and a browser kernel module with the interface technology, wherein the browser frame module is in communication with the browser kernel module; enabling a mobile device to transmit a page access request submitted by a user to a network device, wherein the page access request comprises module configuration information of the browser; enabling a network device terminal to obtain an access page corresponding to the page access request; determining updating information corresponding to the browser according to module version information, and providing the access page and the updating information for the user. Compared with the prior art, the method and device have the advantages that separable updating of the frame module and the kernel module is carried out on the browser according to the page access request of the user, the bandwidth resource, the flow resource and the processing resource of the mobile terminal are effectively used, the efficiency of the user for obtaining the information is improved, the resource utilization rate of the mobile terminal is improved, and the user experience is improved.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Automobile logo sample training and recognition method based on air-inlet grille positioning

The invention discloses an automobile logo sample training and recognition method based on air-inlet grille positioning. The training process comprises the following steps: a, obtaining air-inlet grille samples of different automobiles and converting the samples to grayness images; b, classifying the air-inlet grille samples obtained in the step a according to automobile brands, and respectively performing normalization gauge processing on various sample sets to enable the air-inlet grille samples to be unified to the same size; c, conducting Gabor function conversion on the various samples obtained in the step b to perform size conversion and rotation transformation to obtain a Gabor wavelet expression. The automobile logo sample training and recognition method has the following benefits: 1, the automobile air-inlet grille, rather than the automobile logo, is adopted as the identification target, so that more effective image information is guaranteed for identification of automobile brands; 2, the Gabor wavelet conversion is utilized to keep texture information in each direction of the air-inlet grille; 3, the template library for classifying provided by the invention has an elastic structure, so that flexible expansion and update can be realized.
Owner:叶茂

Industrial control security audit system based on protocol deep analysis and application thereof

InactiveCN112306019AReal-time monitoring of data trafficAdd preliminary identificationTotal factory controlProgramme total factory controlReliability engineeringIndustrial network
The invention relates to an industrial control safety audit system based on protocol deep analysis and an application thereof. The system comprises an on-site monitoring layer, a control layer, a physical layer, an industrial control safety audit module and a safety protection management platform, the industrial Ethernet and an on-site bus are located between the field monitoring layer and the physical layer, the on-site monitoring layer performs data transmission and behavior control on the control layer through the industrial Ethernet, the physical layer is connected with the on-site bus through a sensor, an actuator and the like, and the on-site monitoring layer is mainly used for abnormality detection of an industrial network; according to the invention, targeted detection of abnormalbehaviors can be carried out, the accuracy is high, a physical layer realizes effective physical blocking of malicious behaviors such as network attacks and illegal access in operation of industrial control system equipment by controlling an interface of an external control line, and loss is stopped in time; the industrial control system equipment terminal security protection method is good in compatibility, better in applicability, convenient in equipment increase and decrease, and capable of flexibly updating the alarm rule base and improving the protection capability.
Owner:北京珞安科技有限责任公司

Algorithm and key library generation and updating method

The invention provides an algorithm and key library generation and updating method, and belongs to the technique of computer network communication and the field of information security. The method comprises the steps of generating an algorithm and key library through configuration of a safe management system, wherein the algorithm and key library is composed of an algorithm serial number, an algorithm, a key serial number, a key and a strategy identifier; calculating an increment factor according to the algorithm and key library and the initial version of the algorithm and key library, and issuing the increment factor to an encryption/decryption server; and generating the new version of the algorithm and key library by the encryption/decryption server through PCode operation according to the increment factor and the initial version of the algorithm and key library. The initial version of the algorithm and key library provided by the method is encrypted and then is stored in a database, the security is high and the storage quantity is high. According to the method, the increment factor can be generated randomly; the algorithm and key library can be updated flexibly; the algorithm and key library is safe and reliable; even if a key is intercepted by an attacker; data information contents will not be leaked; the cracking difficulty is increased; the security of data information transmission and user privacy is improved; and the method is high in popularization and implementation value.
Owner:咪付(深圳)科技有限公司

NFV-oriented network function verification method and verification system

The invention discloses an NFV-oriented network function verification method and verification system. The verification method is based on a verification system which is composed of a user inputting device and a network function verifier, and specifically comprises a step 1 of obtaining a user network service demand and determining a resource demand category of network business instantiation; a step 2 of generating a logic topology model adaptive to the network service instantiation based on a network function virtual NFV service demand; a step 3 of analyzing a resource demand based on the logic topology model, performing the instantiation process of the logic topology model and building a mapping relationship between the logic topology and resources; a step 4, calculating parameters of a service flow based on the user NFV service demand configuring a generation mode of the service flow and distributing a corresponding service test script to instantiated resources; and a step 5 of executing the service test script for the instantiated resources. The NFV-oriented network function verification method can instantiate the network verification environment based on network service demandsof different users and can carry out service-flow-supporting test and analysis automatically.
Owner:JIANGSU FUTURE NETWORKS INNOVATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products