Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

128 results about "Business domain" patented technology

A business domain in object-oriented programming is the set of classes that represent objects in the business model being implemented. The business domain is distinguishable from the business model in that the business model is an understanding and explanation of information and behaviors in the problem domain while the business domain is an implementation of that model in a specific programming language.

Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data

A computer system (20) having a security domain (22), at least one client business domain (26), and a plurality of client terminals (34) utilizes a hidden link dynamic key manager (24, 84) and a database structure that includes encrypted data entities (30C, 30D) and a security identification attribute (32) for storage of encrypted data. Methods for encrypting data and for storing, decrypting, and retrieving encrypted data operate on the computer system (20), which also includes an information database (62) and a key database (44). The key database (44) is isolated from the information database (62). The hidden link key manager is stored in the security domain (22) and includes a system key manager (84) operable to generate system keys with system key common names and an encryption key manager (24) operable to generate encryption keys having encryption key identifications. The key managers (24, 84) operate on a key server (40), which is mirrored by a secondary key server (42). A general security manager (82) also operates on the key server (40) to control access to the security domain (22). The security information attribute (32) is stored with a persistent data entity (30A) that is associated with the other encrypted data entities (30C, 30D) by a database schema. The encryption key identification (112) for the encryption key used to encrypt the data entities (30C, 30D) is encrypted by a system key and then stored as part of the security information attribute (32). The system key common name hash value (114) is also stored in the security information attribute (32). The information data entities (30) are stored on the information database (62), but the encryption key identification (153), encryption key (154), system key common name hash value (156, 157), and system key common name (158) are stored in the key database (44) inside the security domain (22). The system key itself is stored on a Smart Card reader (56) inside the security domain.
Owner:FARRUKH ABDALLAH DR +1

System for providing services of event-driven service-oriented internet of things and working method thereof

The invention provides a system for providing services of an event-driven service-oriented internet of things and a working method of the system. The system is composed of a plurality of parts of an internet of things service system, an access agent, a unified message distribution network based on a publish-subscribe mechanism, a complex event processing engine, a resource descriptive model base and a sensor system. The system and the working method solve the problems that an existing system for providing the services of the internet of things can not process large-scale sensing information in a distributed mode, events in a physical world can not be processed, effective cross-business-domain and cross-organization coordination is difficult to achieve by different enterprise business processes. According to the system, sensing information is effectively distributed in the open and distributed computing environment, various pieces of sensing information can be conveniently and quickly distributed as required among different internet of things heterogeneous service systems, event-driven cross-business-domain and cross-organization service dynamic coordination is achieved, time, space and control flow uncoupled network services are provided, and quick response to change of the physical world can be flexibly and dynamically achieved in real time.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Alarm root cause analysis method, device and equipment and storage medium

The invention provides an alarm root cause analysis method, device and equipment and a storage medium, and relates to the technical field of operation and maintenance. The invention provides a methodfor carrying out alarm root cause analysis based on double correlation, and the method can integrate the time sequence correlation of different alarms and the topological correlation of different alarms to mine root cause alarm information from a large amount of alarms. Time sequence association information based on alarm is obtained. clustering the plurality of alarms; obtaining root cause alarminformation according to the target class conforming to the topology association condition; The alarm root cause analysis method and device can screen out alarms with strong correlation in time sequence and topology at the same time and filter out accidental adjacent noise information in time and accidental adjacent noise information in topology, and therefore interference of the noise informationon alarm root cause analysis can be avoided, and the accuracy of the alarm root cause analysis is improved. Meanwhile, a large amount of business domain knowledge is not needed, and manual definitionof reasoning rules is not needed, so that the cost of alarm root cause analysis is saved.
Owner:HUAWEI CLOUD COMPUTING TECH CO LTD

Business rule decision-making method and device based on rule engine

The invention provides a business rule decision-making method and a business rule decision-making device based on a rule engine. The method includes the following steps: respectively obtaining business rule information of business objects of corresponding class options input by a user by using class options of the rule engine facing business domain languages, conducting analysis by using business object model comment libraries, comment analyzing processing programs, and business object model metadata descriptive database in the rule engine facing the business domain languages according to the business rule information of the business objects of the corresponding class options input by the user, and obtaining business rule decision-making results which are corresponding to the analyzed rule engine facing the business domain languages. According to the business rule decision-making method and the business rule decision-making device based on the rule engine, a method which uses the 'business domain language' which is close to natural languages to edit the business rules can be used, and edited rules can be used to conduct system automatic decision making. With the technical scheme, a business manger can successfully edit the business rules, the production efficiency is greatly increased, and response to market change is fast.
Owner:BANK OF COMMUNICATIONS

Attribute-oriented protection digital identity service method and system thereof

InactiveCN103312675AMeet attribute requirementsTransmissionDigital identityData connection
The invention discloses an attribute-oriented protection digital identity service method and a system thereof, which belong to the field of information safety. The method comprises the following steps: adopting an attribute supplier and a trust supplier to jointly form a trust domain, and supplying attribute service and trust certificate service to application systems in a management domain and a user; jointly deploying an identity service supplier and the application systems in a business domain, providing identity management service to the application systems, and meanwhile, calling service of the attribute supplier in the trust domain to replace a business system to finish demand service on the user attribute. The system comprises at least one trust domain and at least one business domain; the trust domain is respectively connected with the business domain through a network; each business domain comprises the identity service supplier and a plurality of application systems in data connection with the identity service supplier; each trust domain comprises the trust supplier and the attribute supplier in data connection with the trust supplier. According to the attribute-oriented protection digital identity service method and the system thereof, on the premise of guaranteeing privacy safety of a user, the user attribute demand of business is met.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Deployment optimization method of software defined firewall based on openstack cloud platform

ActiveCN108173842AMeet needsAvoid centralized deploymentData switching networksResource poolDelayed response
This invention discloses a deployment optimization method of a software defined firewall based on an openstack cloud platform. The firewall is taken as a specific implementation module of a FWAAS standard interface; business security domains are partitioned on the basis of tenant businesses; security resource pooling management is realized in independent business security domains; a pre-allocationmechanism is adopted for security resources inside a security resource pool; and nodes can be dynamically selected in the security business domains with an optimized scheduling module during creationof the firewall according to the demand of a tenant on traffic, and a firewall instance is deployed in a security node which meets the demand of the tenant. A quick response can be made to the demandof the tenant on a security business through the method; the ability to quickly deploy the security businesses is provided for the FWAAS of the Openstack through the optimized scheduling module; andsecurity demands corresponding to different businesses are separated through a business security domain module, and the tenant can quickly acquire the firewall instance, so that a security policy is quickly configured, and the problems of slow deployment of firewall instances, delayed response and the like in an original scheme of the Openstack are solved.
Owner:STATE GRID CORP OF CHINA +1

Business level method, apparatus and system for managing service information

The invention discloses a business level service information management method, a device and a system thereof. The method comprises that: domain semantic specifications are established; a business level service model is built on the basis of the domain semantic specifications; a business level service is built according to the business level service model. The device of business level service information management comprises a business specification management module used for inputting and managing the domain semantic specifications, a business level service model management module used for building and managing the business level service model based on the domain semantic specifications, a business level service management module used for building and managing the business level service according to the business level service model and a semantic database module used for storing the domain semantic specifications, the business level service model and the business level service. The method, the device and the system can support the effective storage and management of service information within a business domain, cause the service information to include rich business semantic and support the connection, matching and combination of business functions with concrete IT.
Owner:CHINA TECH EXCHANGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products