Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

173 results about "Business software" patented technology

Business software (or a business application) is any software or set of computer programs used by business users to perform various business functions. These business applications are used to increase productivity, to measure productivity and to perform other business functions accurately.

E-commerce development intranet portal

An intranet providing a multiple-carrel public-access kiosk is disclosed. The intranet provides free access to foreign and domestic informational e-commerce intranet sites as well as e-mail and public service educational and informational materials. The kiosk accepts anonymous pre-paid cards issued by a local franchisee of a network of c-commerce intranets that includes the local intranet. The franchisee owns or leases kiosks and also provides a walk-in e-commerce support center where e-commerce support services and goods, such as pre-paid accounts for access to paid services at a kiosk, can be purchased. The paid services provided by the carrel include video-conference and chat room time, playing and / or copying audio-visual materials such as computer games and music videos, and international e-commerce purchase support services such as customs and currency exchange. The third-party sponsored public service materials include audio-visual instructional materials in local dialects introducing the user to the use of the kiosks services and providing training for using standard business software programs. Sponsors include pop-up market research questions in the sponsored public service information and receive clickstream date correlated with the user's intranet ID and answers to the original demographic questions answered by the user.
Owner:DE FABREGA INGRID PERSCKY

Method and device for generating and unloading software installation package

The invention discloses a method and device for generating and unloading a software installation package. The method comprises the following steps: acquiring the version information of business software, a file to be packed and information of the file to be packed, generating a configuration file according to the version information of the business software and the file to be packed and recording information corresponding to the configuration file; creating a software installation package and writing a business software installation unit into the header of the software installation package; and writing the information corresponding to the configuration file, the configuration file, the information of the file to be packed, the file to be packed and the tail structure information into the installation file of the software installation package in turn, and generating the software installation package of the business software. Through the technical scheme of the invention, the entire installation process can be automatically processed by the installation unit; therefore, the invention ensures normal use of all installed business software and can realize matching between the platform software and the business software and guarantee the compatibility of all installed business software and the switch flexibility among various versions of the business software.
Owner:南京浦口科创投资集团有限公司

Method of administering software components using asynchronous messaging in a multi-platform, multi-programming language environment

A method for performing life cycle management of business software applications and their components across a multiple-platform, multiple-language network. The method takes advantage of the inheritance properties of object-oriented programming (OOP) by developing all components of a business application from a set of base classes, thus deploying a common set of methods across all application components. These methods enable monitoring by a Central Administrator element without interdependence between any of the business application components and the Central Administrator. The Central Administrator then determines when a need to reconfigure one or more components of the business application has arisen. The Central Administrator then modifies or replaces existing components of the business application or installs entirely new components over the network without end user interaction. In one embodiment of the present invention, the Central Administrator is aided by a set of Distributed Administrators located on each virtual node server / host computer of a business application operating over a network. The business application can thus reconfigured without terminating the application's business function in a scaleable, extensible manner without regard to platform or language.
Owner:VERIFONE INTERMEDIATE HLDG INC & VERIFONE

Data flow distributing method, mobile terminal and data flow distributing system

The invention discloses a data flow distributing method. The data flow distributing method comprises the steps: carrying out HOOK on network operation of an application program corresponding to business software to acquire a HOOK result; and when the business software accesses a network, carrying out data flow distribution according to the HOOK result and the configured application-program-based tunnel flow distributing rules. The invention further discloses a mobile terminal and a data flow distributing system comprising the mobile terminal. Through carrying out HOOK on network operation of the application program corresponding to business software to acquire the HOOK result and carrying out data flow distribution according to the HOOK result and the configured application-program-based tunnel flow distributing rules when the business software accesses the network, the method has the beneficial effect that the mobile terminal can still access the network without the influence on access to enterprise intranet resources when the IP (Internet Protocol) segment distributed by WiFi (Wireless Fidelity) and the enterprise intranet segment are the same network segment, the configured tunnel flow distributing rules are not influenced no matter how a background server is modified, and a large amount of labor force is saved.
Owner:SANGFOR TECH INC

Joint-simulation-based on-bridge ballastless turnout structure system and dynamic analysis method thereof

The invention relates to a joint-simulation-based on-bridge ballastless turnout structure system and a dynamic analysis method thereof. The dynamic analysis method of the joint-simulation-based on-bridge ballastless turnout structure system comprises the following steps of firstly finishing the model establishment of a balastless track and bridge structure by utilizing the ABAQUS software; secondly finishing the model establishment of a vehicle and a turnout by utilizing the SIMPACK software; finally establishing rigid-flexible coupled wheel-track contact relationship in the SIMPACK software to form a vehicle-turnout-bridge coupling system model, and realizing the connection and the coupled solution of a vehicle model, a turnout model and a bridge model. According to the joint-simulation-based on-bridge ballastless turnout structure system and the dynamic analysis method thereof, which are disclosed by the invention, the complex wheel-track contact relationship of a turnout zone is fully considered, and the model establishment of a turnout and bridge structure is finished according to the actual state to the greatest extent so as to ensure the detailedness, the completion and the accuracy of the model; the model establishment is finished by utilizing the business software, so that the production, the design and the application are convenient, and the improvement is remarkable by comparing the modeling method provided by the invention with the traditional modeling method.
Owner:BEIJING JIAOTONG UNIV

Vulnerability testing method in attack and system thereof

The invention discloses a vulnerability testing method in attack and a system thereof, belonging to the field of network security. The method comprises: after programs which are analyzed is loaded into a virtual machine, whether the current running process of the virtual machine belongs to the analyzed program is recognized; if yes, whether the current code is in circulation is judged, the current status information is recorded when in circulation; if not, whether the current program is in attack is judged; if being in attack, the state s before variable which is depended by the last time program pointer can be looked for from the current recorded status information; the status information saved in the s is restored, and the program starts to run again from the state s; the concrete command which modifies the variable depended by the program pointer is found out, and the position of the command is returned; the system of the invention comprises a virtual environment module, a state selection module, a system monitoring module, a vulnerability-analysis module and a status record module. The invention has good maneuverability and high detection efficiency, and solves the problem that business software lacks a source code and can not be analyzed.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products