Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

727 results about "Computer network technology" patented technology

A Computer Network Technician is an information technology professional engaged in various businesses to build and troubleshoot computer networks. These individuals focus on setup, repair, and troubleshooting of both hardware and software products that are incorporated in a business’s operations.

Wisdom skynet video behavior analyzing system

The invention discloses a wisdom skynet video behavior analyzing system which comprises a plurality of front end video collecting systems and a central monitoring system. The central monitoring system comprises a plurality of video behavior analyzing servers, a storage server, a monitoring server and a client side, wherein each video behavior analyzing server receives video information of one front end video collecting system respectively, automatically analyzes all kinds of exception behaviors by the adoption of an advanced image analyzing processing technology, a computer vision technology, a computer network technology and an artificial intelligent technology and generates alarming signals, the video behavior analyzing servers are respectively connected with the storage server, the monitoring sever and the client end through an interchanger, and the monitoring server is further connected with a third party alarm linkage server. The wisdom skynet video behavior analyzing system is provided with multiple detection modules, users can selectively install certain modules according to actual needs, installation is convenient, the operation is simple, and video behavior analysis can be carried out automatically. A distribution type structure is adopted by the wisdom skynet video behavior analyzing system, and data transmitting and processing speed can be improved.
Owner:四川天翼网络股份有限公司

Transaction commit method of distributed database system

The invention discloses a transaction commit method of a distributed database system, belonging to the technical field of computer network. The transaction commit method comprises the following steps: 1) a cache area is respectively allocated in memories of participant nodes and coordinator nodes and used for caching transaction logs; 2) the coordinator nodes determine the participant nodes and establishes connection with the participant nodes according to the transaction content, and simultaneously determines operation request information of the transaction; 3) the coordinator nodes send the one-step operation request messages of the transaction to the participant nodes and simultaneously records the transaction request logs of each operation request; 4) the participant nodes process local logs according to the completion condition of each operation request and send corresponding messages to the coordinator nodes; and 5) the coordinator nodes judge whether the transaction is completed according to the received messages sent by all the participant nodes, and if so, a final decision is given. Compared with the prior art, the transaction commit method greatly reduces the operation times of logs, improves system efficiency and transaction efficiency and has extremely high availability.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Dynamic configurable data monitoring system and method for distributed network

The invention relates to a system and a method for monitoring distributed network data with dynamic configuration in the technical field of computer network. In the invention, an agent module of data acquisition collects the data of an affiliated network data platform according to the configuration files set by users and carries out preprocessing of the collected data; the preprocessing comprises operations of data packet filtration and data packet disassembly, wherein, the data packet filtration refers to protocol filtration operation, namely, the invalid data pocket is discarded according to the filtration mechanism defined by the users; the data packet disassembly operation refers to that useful information in the data packets is extracted according to presented content by the users and the data required by the users is reported to a data center module in the form of XML document; the data center module is responsible for processing the data files reported by the agent module of data acquisition and in the form of XML, and carries out dynamic management on the agent module of data acquisition by inquiring, configuring and updating the XML documents. The system and the method of the invention simplify the design of the system, and improve the ability of the system to process data as well as usability and robustness of the system.
Owner:SHANGHAI JIAO TONG UNIV

Intelligent confidential article identification management system on basis of internet of things

The invention discloses an intelligent confidential article identification management system on the basis of an internet of things. The intelligent confidential article identification management system comprises intelligent identification storage systems and information management systems. Ultrahigh RFID (radiofrequency identification) and biometric identification technologies, computer network technologies and the like are fused in the intelligent identification storage systems, so that storage states and access behavior of confidential articles in intelligent storage cabinets can be effectively identified and monitored, and intelligent and informationized management tools can be provided for management institutions for strictly managing materials in the aspects of intelligent confidential material identification, real-time managed and controlled article information aggregation, real-time confidential article inventory, whole-course liability traceability and the like. The intelligent confidential article identification management system has the advantages that the intelligent confidential article identification management system is based on existing advanced technologies of article perception, sensing and personnel identity authentication, and requirements of article and material information construction and the requirement on updating and upgrading management and control on important materials are considered in a certain aspect, so that the traditional manual management mode of material management and control is transited to a modern information management mode, and informationized, digital and real-time material management and control can be implemented.
Owner:广东中韬信息科技有限公司

Vehicle-carried intelligent terminal system and realization method thereof

The invention discloses a vehicle-carried intelligent terminal system and realization method of the vehicle-carried intelligent terminal system, for the technical field of GPS (global positioning system) positioning. The system comprises a wireless positioning module for locating the current position of a vehicle to obtain current position data; a vehicle condition data acquisition module for acquiring the running state of the vehicle in a real-time manner via a CAN (controller area network) bus; a voice identification module for receiving and identifying a voice command of a host; a video monitoring module for performing human face identification on a driver and / or identification on a safety airbag; an automatic alarming module for giving a corresponding alarm according to the human face identification result, the safety airbag identification result and / or the vehicle internal running state; and a 3G data transmission module for transmitting the data acquired by the video monitoring module and / or the data for alarming sent out by the automatic alarming module. The invention adopts GPS technology combined with information technology such as CAN bus technology and computer network technology, so that the system function is complete, operation is convenient and practicability is high.
Owner:SHANGHAI QIHUI TELECOM TECH

Network contact list system achieving version management and authority management

InactiveCN103095829AModify at willFreedom to control accessData switching networksTerminal serverComputer network technology
The invention discloses a network contact list system achieving version management and authority management,and belongs to the technical field of computer networks. The network contact list system achieving version management and authority management comprises a mobile client, a web client and a cloud terminal server. The mobile client is connected with the cloud terminal server. User contact list information is transmitted by the mobile client. The web client is connected with the cloud terminal server. The user contact list information is transmitted by the web client. User contact list revising information transmitted by a client terminal is received by the cloud terminal server and the user contact list revising information is written to a data base and is carried through a version controlling management. Change of user personal information is pushed to each relevant friend of the user according to friend-permission setting by the cloud terminal server and is output to a synchronization module of the mobile client. By means of the network contact list system achieving version management and authority management, defects that the prior network contact list lacks a version management mechanism and the authority management can not be carried out are overcome. Contact person information can be carried through the version controlling management and the authority management. Contact list update can be pushed to members of the specified group.
Owner:SHANGHAI JIAO TONG UNIV

High-efficiency and low-cost traffic violation monitoring system and method

The invention discloses a high-efficiency and low-cost traffic violation monitoring system and method and mainly solves the problems of high mounting and maintaining costs and small monitoring coverage range of monitoring systems such as an electronic eye in the prior art. By applying a modern computer network technology, each car owner can utilize intelligent equipment such as a mobile phone and an automobile data recorder to prove and report seen traffic offences of others, and the system automatically informs a party of confirming violation evidences, and automatically punishes the people violating traffic rules and gives awards to people putting to the proof after the party confirms the violation evidences. Because proofing is self-confirmed, participation of people does not exit basically in the whole process, and in combination with zero-cost replicability of software, the new cost cannot be increased with the increase of the people for monitoring and proofing, and the high-efficiency and low-cost traffic violation monitoring system can be largely replicated and popularized after being deployed at a time. Therefore, through giving awards to the people for putting to the proof, all people are promoted and encouraged to particulate in monitoring, the monitoring coverage rate of 100 percent can be realized at the low cost, and finally the purpose of promoting all people to consciously observe traffic regulations is achieved.
Owner:刘莎

Boarding point recommendation processing method and system thereof

The invention discloses a boarding point recommendation processing method and a system thereof and relates to the computer network technology field. The method comprises the following steps of receiving vehicle order information sent by a user, wherein the vehicle order information at least includes a place of departure; and if historical orders which include the same place of departure exist, taking an actual boarding point of last one of the historical orders of the same place of departure as a recommended boarding point and carrying out recommending and displaying, or taking the actual boarding point having a highest number of occurrence in the historical orders of the same place of departure as the recommended boarding point and carrying out recommending and displaying. In the technical scheme, according to the actual boarding point of last one of the historical orders of the same place of departure or the actual boarding point having the highest number of occurrence, recommendation of the boarding point is performed so that boarding point recommending and displaying based on an actual demand of the user are realized; and a personalized demand of the user is satisfied and a user experience is improved.
Owner:BEIJING DIDI INFINITY TECH & DEV

Method for achieving hyper text transport protocol (http) service monitoring through embedding monitoring code

The invention relates to a method for achieving a hyper text transport protocol (http) service monitoring through embedding a monitoring code and belongs to the technical field of computer networks. By means of following steps, a monitoring to a monitored terminal http service by a monitoring terminal is achieved. The steps comprises a first step of embedding a dynamic page into a monitored terminal subscription address, the dynamic page is used for issuing a corresponding request of monitoring http service needing to be monitored and generating a visiting end value according to the http service response; a second step of starting a dynamic page visiting the subscription address at a fixed time; a third step of generating a corresponding visiting end value according to a returned value after receiving the corresponding request, of the monitoring http service needing to be monitored, issued by the visited dynamic page; a third step of issuing a processing instruction when the visiting end value is abnormal and abnormal times are more than fault tolerance threshold value, otherwise, going back to the second step. Therefor, even through the monitoring terminal is in a unattended-operation state, anomalies of the monitored terminal can be found timely and corresponding measures can be taken to enable the monitored terminal to return to normal, so that service quality is guaranteed, the personnel investment for maintaining and managing is greatly reduced and recovery time of the monitored terminal is shortened.
Owner:JIANGSU TIANZHI INTERCONNECTION TECH CO LTD

Control method and device for interface calling permission, computer equipment and storage medium

ActiveCN108924125AImprove the efficiency of authority controlTransmissionComputer network technologySoftware engineering
The invention relates to a control method and device for interface calling permission, computer equipment and a storage medium, and belongs to the technical field of a computer network. The method comprises the steps of: receiving user login information sent by an API gateway, and according to the user login information, determining product permission of a current login user; returning the productpermission to the API gateway to trigger the API gateway to forward a product interface calling request to a business service; receiving an interface authentication request sent by the business service, and according to the interface authentication request, carrying out authentication on product interface calling permission of the current login user; and if the product interface calling permission passes the authentication, returning an interface response instruction to the business service so as to trigger the business service to execute a function of an interface corresponding to the product. According to the technical scheme, problems of high complexity and low efficiency of permission control on interface calling of multiple users are solved, and effective permission control can be carried out on interface calling of a plurality of users in tenants.
Owner:招银云创信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products