Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

270 results about "Callback" patented technology

In computer programming, a callback, also known as a "call-after" function, is any executable code that is passed as an argument to other code that is expected to call back (execute) the argument at a given time. This execution may be immediate as in a synchronous callback, or it might happen at a later time as in an asynchronous callback. Programming languages support callbacks in different ways, often implementing them with subroutines, lambda expressions, blocks, or function pointers.

Method and module for data asynchronous processing with synchronous information callback function

ActiveCN106502773AEfficient use ofProblems that don't waste system resourcesProgram initiation/switchingHardware monitoringComputer moduleThread pool
The invention discloses a method and module for data asynchronous processing with a synchronous information callback function and relates to the field of asynchronous data processing. The method comprises the steps that a thread pool with a designated maximum thread quantity is established, a priority is added to a thread of each asynchronous data processing task, and the threads are added into the pool; when the threads in the pool are started, information executed by the asynchronous data processing task corresponding to the current thread is returned; time counting is started for the current thread according to a preset time counting cycle; the pool is used to call the current thread to start working, and stack information during abnormity occurrence is determined and returned when an abnormity takes place during work of the current thread; and whether the current thread is completed is detected at scheduled time. According to the invention, the running quantity of the multiple threads can be controlled, and whether execution of the threads is completed is detected at scheduled time; and execution states of the asynchronous data processing tasks can be known, occupied resources of a CPU and consumed electric energy are reduced, and system performance can be ensured.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Application programming interface for data transfer and bus management over a bus structure

In a first embodiment, an applications programming interface (API) implements and manages isochronous and asynchronous data transfer operations between an application and a bus structure. During an synchronous transfer the API includes the ability to transfer any amount of data between one or more local data buffers within the application and a range of addresses over the bus structure using one or more asynchronous transactions. An automatic transaction generator may be used to automatically generate the transactions necessary to complete the data transfer. The API also includes the ability to transfer data between the application and another node on the bus structure isochronously over a dedicated channel. During an isochronous data transfer, a buffer management scheme is used to manage a linked list of data buffer descriptors. During isochronous transfers of data, the API provides implementation of a resynchronization event in the stream of data allowing for resynchronization by the application to a specific point within the data. Implementation is also provided for a callback routine for each buffer in the list which calls the application at a predetermined point during the transfer of data. An isochronous API of the preferred embodiment presents a virtual representation of a plug, using a plug handle, to the application. The isochronous API notifies a client application of any state changes on a connected plug through the event handle. The isochronous API also manages buffers utilized during a data operation by attaching and detaching the buffers to the connected plug, as appropriate, to manage the data flow.
Owner:SONY CORP +1

Voice interaction method and device of application program, equipment and medium

The embodiment of the invention discloses a voice interaction method and device of an application program, equipment and a medium, and relates to the technical field of voice. According to the specific implementation scheme, a voice instruction registration request about an application program is responded, a registration voice instruction set supported by the application program in a target program state is obtained, and the registration voice instruction set comprises voice instructions and callback instructions which correspond to the voice instructions and can be recognized by the application program; a user voice instruction is acquired for the application program in the target program state; the user voice instruction matches in a registered voice instruction set, and a callback instruction corresponding to the user voice instruction is determined; and a callback instruction is sent to the application to enable the application to execute an operation matched with the user voice instruction according to the callback instruction. According to the embodiment of the invention, the response accuracy of the user voice instruction can be improved, and the implementation process of the voice interaction function of each application program is simplified.
Owner:APOLLO INTELLIGENT CONNECTIVITY (BEIJING) TECH CO LTD

JSAX (joint simple API (application program interface) for XML (extensible markup language)) parser and parsing method based on syntactic analysis of backtracking automaton

The invention relates to a JSAX (joint simple API (application program interface) for XML (extensible markup language)) parser and a parsing method based on syntactic analysis of a backtracking automaton. An action transfer rule delta of the backtracking automaton is redefined and the improved backtracking automaton is applied to a syntactic parser, so that the design and the implementation of the syntactic parser are simplified, and the efficiency of the XML parser is effectively improved. During the syntactic parse, the backtracking automaton uses a mark flow provided by a lexer parser as the input and compresses the current state to the stack top when the mark read by the backtracking automaton is a start mark; when the read mark is an end mark, the automaton pops a state out of the stack top as the next state of the automaton; and the automaton does not carry out any stack operation for other marks. During the syntactic parse, the XML document information meeting the syntactic specifications returns to the user through a standard callback function. The JSAX parser and the parsing method solve the problems that the syntactic parser of the XML document parser is complex in structure and low in performance, have the characteristics of easy implementation and high efficiency, and can be applied to parsing the XML documents.
Owner:XIDIAN UNIV

Identification number generation method and device, computer equipment and storage medium

ActiveCN111291424AMake sure not to repeatSolve the problem of duplicate identification numbersInternal/peripheral component protectionCallbackTimestamping
The embodiment of the invention discloses an identification number generation method and device, computer equipment and a storage medium, and the method comprises the following steps: obtaining historical queue information which is used for recording a timestamp code and a sequence code of a generated identification number; determining whether a preset first identification number meets a preset repetition condition according to the historical queue information, the first identification number being an identification number generated by time callback; and when the first identification number meets the repetition condition, generating a second identification number according to the historical queue information. A used timestamp and a used sequence code are recorded by setting historical queue information; whether the identification number is repeated or not is determined according to the historical queue when the identification number is generated by time callback, and when the identification number is repeated, the new identification number is generated by using the sequence code which is not used before according to the historical queue information, so that the generated identification number is effectively ensured not to be repeated.
Owner:望海康信(北京)科技股份公司

Implementation method for retransmitting and controlling congestion control in separating system

InactiveCN103051560AImprove QoS performanceProspects for widespread practical useData switching networksQuality of serviceData pack
The invention discloses an implementation method for retransmitting and controlling congestion control in a separating system. The implementation method comprises the following steps of: 1.calculating whether the occupying ratio of a total buffer-area queue exceeds a preset threshold value or not by a control element according to a dispatcher in a transmission mapping layer; 2. if judging that a message in the queue is in a local congestion state, redistributing the residual service time of the round by the dispatcher to meet the requirement of the queue to the greatest degree; 3. managing a module through the control element by a transmission-mapping layer module and notifying a protocol-layer module in the mode of a callback function; and constructing a congestion feedback message by the protocol-layer module and sending the congestion feedback message to the opposite end of the transmission mapping layer through the transmission-mapping layer module; and 4. delivering the congestion feedback message to the protocol-layer module through the module at the opposite end of the transmission mapping layer, and actively adjusting the sending rate of a data packet by the protocol-layer module in the modes of additive increase and multiplicative decrease. The implementation method is applied to an existing ForCES prototype system, so that the overall QoS (Quality of Service) performance of the system is improved.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Method of using cryptographic equipment by JAVASCRIPT

InactiveCN105071922AAvoid instability, security and other issuesDon't worry about updatingSecuring communicationCallbackSoftware engineering
The invention relates to a Method of using cryptographic equipment by JAVASCRIPT. The method comprises the following steps: step 1) of accessing the HTTPS (Hyper Text Transfer Protocol) service of the cryptographic equipment by the applied WEB page JavaScript script through an SRC (Source) attribute of a <script> tag by an HTTPS protocol, and putting the parameter data into an URL (Uniform Resource Locator) link; step 2) of requiring a caller to verify the identity after acquiring the parameters in the URL required by the HTTPS by the HTTPS service of the cryptographic equipment, after the identity verification is passed, operating the cryptographic equipment according to the parameters; step 3) of returning an operating result of the cryptographic equipment by means of balling back a JavaScript function in the WEB page after the operation is finished; acquiring the operating result in the JavaScript callback function by the applied WEB page, and then processing the operating result according to an own business process. The method of using the cryptographic equipment by JAVASCRIPT provided by the invention has the advantages of being free from a browser plug-in, cross-platform, flexible in deployment, high in security, convenient, supporting very long data and saving cost and the like.
Owner:ZHEJIANG ICINFO TECH

Method and device for injecting application probe in docker container environment

The invention relates to the technical field of computers. The invention provides a method and a device for injecting an application probe in a docker container environment. The method comprises the following steps: a process detection step: establishing a callback channel, monitoring a docker container management process, and automatically mounting a file directory where an application probe module is located to a corresponding directory in a file system of a new container when monitoring that the docker container management process starts the new container; a step of automatically injectinga probe: when it is monitored that a new application process is started on a docker container, starting the new application process, analyzing an execution environment of the new application process,setting an environment variable of the new application process or changing a starting parameter of the new application process after determining that the new application process meets the condition ofautomatically injecting the application probe, and injecting the corresponding application probe before the new application process executes the service logic. Through the technical scheme, the problem that in the docker container environment in the prior art, an operating system cannot monitor the transaction-level performance of the application process in the container is solved.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Vulnerability detection method and device, computer equipment and storage medium

The invention relates to a vulnerability detection method and device, computer equipment and a storage medium. The method comprises the following steps: identifying a target process running in an operating system, and injecting a preset library file into the target process; wherein the preset library file is used for performing explicit calling on a running target process; obtaining system attribute information and a target detection code, and constructing a callback function corresponding to the target process by utilizing a preset callback function according to the system attribute information and the target detection code; performing callback configuration on the target process by utilizing a preset process function and a callback function; returning the system call of the target process from the operating system through the callback function, obtaining the returned system call, and analyzing a return address corresponding to the system call by utilizing the callback function; and when the return address is not matched with the offset address of the target process, determining that the system call corresponding to the return address has security vulnerabilities. By adopting the method, the vulnerability detection efficiency and accuracy can be effectively improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method, device and equipment for determining program by utilizing privileged bug and storage medium

The invention discloses a method for determining a program by utilizing a privileged bug, and belongs to the technical field of computers. The method comprises the steps of obtaining a process identifier of a target process from a process creation component; in the process of monitoring the target process, obtaining a first permission level of the target process from a system kernel through a process identifier of the target process and a first callback function; obtaining a second permission level; and when the first permission level is higher than the second permission level, obtaining a program corresponding to the target process as a program utilizing the permission-enhancing vulnerability. The method comprises the steps of obtaining a process identifier of a target process from a process creation component; obtaining an authority level of the target process from a system kernel according to the process identifier, and determining whether the program corresponding to the target process utilizes the privilege-offering vulnerability or not according to the privilege levels acquired twice successively; the process does not need to monitor various privilege-offering behaviors in the system, and which processes utilize the privilege-offering vulnerability is judged according to the privilege change of the processes, so that the detection accuracy and the detection efficiency areimproved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Control flow obfuscation method and system based on a callback function

The invention belongs to the technical field of network security, and particularly relates to a control flow obfuscation method and system based on a callback function, aiming at a loop structure in aprogram, a basic block loop hop is converted into inter-function repeated calling through the callback function, so that the original execution logic of the program is hidden, and the original control flow of the program is merged into a sequence structure in a unified manner; through program analysis, data dependence is reconstructed in a callback function so as to maintain functional consistency before and after cyclic jump conversion. According to the method, the callback function is cyclically called; program key algorithm logic is hidden; the detection cannot be easily performed by an automatic analysis technology; the problem that a traditional confusion method is difficult to confront an automatic analysis means is effectively solved; because only a small number of function calls and necessary parameter transfer instructions are introduced into the original program, the influence on the program overhead is effective, the anti-analysis capability is greatly enhanced under the condition of ensuring the program execution efficiency, the program size and the execution efficiency are not obviously changed before and after an actual application test, and the method has good applicability.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Identifier generation method and device based on snowflake

The invention discloses an identifier generation method and device based on snowflake, and relates to the technical field of computers. One specific embodiment of the method comprises the following steps: judging whether the current time is less than the time of generating an identifier last time or not; if the current time is greater than or equal to the time of generating an identifier last timesetting the anti-clock-callback flag bit as a first numerical value, determining a difference value between the current time and the basic time, converting the difference value to obtain a first timestamp, and further generating an identifier based on the sign bit, the first numerical value, the first timestamp and the serial number; and if the current time is less than the time of generating anidentifier last time, determining that clock callback occurs, and obtaining a first identifier corresponding to the second timestamp after clock callback so as to overturn the clock callback prevention flag bit in the first identifier from the first numerical value to the second numerical value to obtain an identifier. According to the implementation mode, on the basis of a traditional snowflake algorithm, the distributed IDs are subjected to segmentation processing, so that the problem of ID repetition caused by clock callback is solved; and the ID length can be shortened by setting idle bits, so that subsequent dynamic expansion of other identification bits is facilitated.
Owner:CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products