Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

136 results about "Acquisition Protocol" patented technology

Rights Object Acquisition Protocol is a suite of XML-based Digital Rights Management (DRM) security protocols which enables Open Mobile Alliance-conformant user devices to request and acquire viewing and/or editing rights, permissions, privileges and other attributes from a Rights Issuer.

Method and system for arbitrating between bus masters having diverse bus acquisition protocols

A data processing system is disclosed which includes a first processor having an m-byte data width, an n-byte data bus, where n is less than m, and a second processor electrically coupled to the bus which performs bus transactions utilizing n-byte packets of data. An adaptor is electrically coupled between the first processor and the bus which converts n-byte packets of data input from the bus to m-byte packets of data, and converts m-byte packets of data input from the first processor to n-byte packets of data, thereby enabling the first processor to transmit data to and receive data from the bus utilizing m-byte packets of data. In a second aspect of the present invention, a method and system are provided for arbitrating between two bus masters having disparate bus acquisition protocols. In response to a second bus master asserting a bus request when a first bus master controls the bus, control of the bus is removed from the first bus master. Thereafter, in response to a signal transmitted from an arbitration control unit to the first bus master instructing the first bus master to terminate its bus transactions, control of the bus is granted to the second bus master. In response to the second bus master terminating its bus request, control of the bus is granted to the first bus master and a signal is transmitted from the arbitration control unit to the first bus master acknowledging the grant of control.
Owner:IBM CORP

Industrial intelligent manufacturing data acquisition apparatus and method based on Internet of Things

The invention discloses an industrial intelligent manufacturing data acquisition apparatus and method based on the Internet of Things. The apparatus comprises a data acquisition module, a data transmission module, a data analysis module, a data processing module, a data storage module, a data interaction display module and a monitoring module, the data acquisition module is connected with a control system of an industrial Internet of Things equipment machine tool through an acquisition protocol, the data acquisition module, the data transmission module, the data analysis module, the data processing module, the data storage module and the data interaction display module are connected in sequence, and the monitoring module is connected with the control system of the industrial Internet of Things equipment machine tool through the acquisition protocol. According to the method and apparatus, data acquisition, analysis, transmission, storage and monitoring are performed for industrial Internet of Things factory equipment machine tools and robot equipment etc., the work efficiency is improved, the production cost is reduced, the information interaction between industrial equipment and production management personnel is enhanced, the efficiency of the equipment is improved, and intelligent and datamation management of factory processing equipment can be realized.
Owner:银川华信智信息技术有限公司

Call center monitoring method, device and system

The invention discloses a call center monitoring method, a call center monitoring device and a call center monitoring system, wherein the method comprises the steps that the operating parameters of each piece of communication equipment are collected according to the acquisition protocol of each piece of communication equipment, and the operating parameters include the state parameter and the performance parameter; the collected operating parameters of each piece of communication equipment are stored; alarm inquiries of different communication equipment are carried out according to the stored operating parameters of different communication equipment; the alarm inquiry comprises: whether the stored operating parameters of the communication equipment are matched with the preset parameter target values or not are judged, and alarm information is sent when mismatching occurs. According to the method, the device and the system, one monitoring platform is adopted to monitor a call center as one integral monitoring object, and the invention avoids the situation in the prior art that multiple monitoring platforms are used, each monitoring platform corresponds to one type of communication equipment, and communication equipment in the call center is monitored in a centralized manner. When communication equipment is in fault, alarm information can be sent automatically, monitoring staff do not need to query and find out the fault actively, and the maintenance efficiency of the call center is improved.
Owner:SHANGHAI EAST CHINA COMPUTER CO LTD

Cross-network communication method and communication system

The invention discloses a cross-network communication method and a communication system. Data transmission process between a far-end field device and a third-party application program running on a third-party application mainframe is achieved, only a conversion unvarnished transmission channel is needed to be established between the third-party application program and the far-end field device, unvarnished transmission type transmitted-data packing and unpacking processing is performed according to an unvarnished transmission protocol, matched specific software or a matched acquisition protocol under specific network development condition is not needed, and if the network environment where the far-end field device is located changes, only the unvarnished transmission channel is needed to be established between the far-end field device and the cross-network mainframe. A large amount of time and cost is saved, so that the technical problem that the mode that the far-end field device exists in a maintenance industrial control network in the prior art causes high development cost and long development period is solved, the industrial field device networking process of various special protocols is simplified, and a solution is also provided for remote access of the industrial field device.
Owner:BC P INC CHINA NAT PETROLEUM CORP +2

Method for improving network application security and the system thereof

A method for improving network application security and the system thereof are disclosed in the invention, relating to the field of information security. The method includes: a proxy server in a customer terminal host receives a protocol message, generated and sent by the customer terminal software according to the information input by a user, and obtains the protocol content after parsing the protocol message, and determines whether critical information is included in the protocol content, if it is, the server sends the protocol content to the smart key device; and the smart key device obtains the critical information by parsing it and sends it to the user, and after a confirmation information is gotten from the user, the smart key device signs the protocol content and sends the signature result to the server; and then the server generates a new protocol message to an application server according to the signature result and the protocol content; after an error confirmation or no confirmation is received within a predetermined time period by the user, the smart key device performs the exception handling. The system includes a smart key device and a proxy server in the customer terminal host. The invention improves network application security on the premise of no change to the customer terminal, and it is usable and compatible.
Owner:FEITIAN TECHNOLOGIES

Dot product protocol-based protocol security quantizing method and system

The invention discloses a dot method product protocol-based protocol security quantizing method and a dot product protocol-based protocol security quantizing system. The method comprises the following steps of: acquiring the variable value ranges before and after protocol execution of all parties respectively; computing the differences between the maximal values and the minimal values of the variable value ranges before and after the protocol execution of all the parties respectively; multiplexing the differences before the protocol execution of all the parties to obtain security parameters before the protocol execution; multiplexing the differences after the protocol execution of all the parties to obtain the security parameters after the protocol execution; and acquiring a protocol security value according the security parameters before and after the protocol execution. The method of the invention realizes the aim of quantizing the protocol security by processing the variable value ranges of all the parties before and after the protocol execution and using the processing results as representative values of the protocol security. The method and the system can quantify the security of different protocols, are favorable for selecting the protocol of which the security meets actual demands according to actual application conditions and improve the service efficiency of secure multi-party computation.
Owner:ANHUI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products