Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

78 results about "Data stream analysis" patented technology

Streaming data is an analytic computing platform that is focused on speed. This is because these applications require a continuous stream of often unstructured data to be processed. Therefore, data is continuously analyzed and transformed in memory before it is stored on a disk.

Streaming media server system supporting multi-protocol input and output

ActiveCN107222484AImprove experienceImplement adaptive playbackTransmissionMulti protocolMedia server
The invention discloses a streaming media server system supporting multi-protocol input and output. The streaming media server system comprises a protocol analysis module and a data stream analysis processing module; an access rule of a request message sent by a client is defined, the request message comprises the protocol type, the application type, the publishing point and the file name of a request, the application types comprise live broadcast and on-demand broadcast, and for a on-demand broadcast application, the request message further comprises a physical path corresponding to a request file; the data stream analysis processing module comprises an RTMP processing module, a live broadcast fragment generation module, a on-demand broadcast file real-time fragmentation module, an M3u8 file processing module, a TS file processing module, an FLV file processing module and an MP4 file processing module; the protocol analysis module is used for conducting analysis processing on the received request message according to the access rule and sending the request message to the corresponding data stream analysis processing module to be subjected to corresponding process according to an analysis result. The streaming media server system supports streaming media data broadcast of multiple terminals.
Owner:北京经纬中天信息技术有限公司

Privacy leakage vulnerability detection confirming method based on static stain data analysis

The invention discloses a method for detecting whether privacy leakage vulnerability exists in an Android application software APP or not. The method mainly solves the problems of low vulnerability detection speed, high detection environment requirements and low detection accuracy in the prior art. The method comprises the realization processes of configuring an optimization detection file; limiting an assembly and callback of the detected Android application software APP; performing static stain data stream analysis on the limited assembly and callback to obtain a stain data stream path; further processing the stain path, building a function node sequence; expanding and filling with function nodes, performing pruning and compression processing, and connecting the processed function nodes to form a detail stain data flowing path; performing deduplication processing on the detail stain data flowing path; then, performing graphical output. The method provided by the invention has the advantages that the speed of detecting the privacy leakage vulnerability of the Android application software APP is accelerated; the requirements on the detection environment and the vulnerability reproducing difficulty are reduced, so that the vulnerability analysis is faster and more accurate.
Owner:XIDIAN UNIV

Defensive installation for security of router, defense system and method

The invention relates to a defending device which has active defense function for routers, a defending system which consists of the defending device, routers and a remote control platform and a method which can actively defend routers. The defending device of the invention comprises a system administration module, an intrusion detection module, a router control module, an audit logging module and a remote control response module. The defending device, system and platform of the invention utilize the Libpcap function library, adopt a bottom-layer packet capture technique which is integrated with an intrusion detection technique, parse whether the data packets are normal or not by a method of data stream analysis, monitor and obstruct the illegal data stream according to whether the data packets are normal or not and give an alarm to the administrators of the remote control platform by the audit logging module. The defending device, system and platform of the invention greatly increase the safety performance and the anti-attack performance of routers and effectively protect the normal operation of the whole network, thereby providing a network administration platform where the network administrators can detect potential safety hazards, receive the feedback of the information of potential safety hazards and process the information of potential safety hazards in time.
Owner:SHENZHEN POLYTECHNIC

Method for realizing automatic pipeline parallelism

InactiveCN101944014ABalance workloadAdded optimization capabilities for automatic parallel optimizationConcurrent instruction executionArray data structureThread scheduling
The invention belongs to the technical field of program compilation and in particular relates to a method for realizing automatic pipeline parallelism. The method of the invention mainly comprises the following steps of: (1) identification of the pipeline parallelism, namely judging a loop structure which is provided with cross-loop iteration dependence and a dependence distance vector is a constant; (2) synchronization among threads, namely inserting the synchronization according to the dependence distance vector and deleting the redundant synchronization with the same distance vector; and (3) thread scheduling in a static step length, namely self-defining a thread scheduling strategy for balancing the workload of each thread and reducing the communication expense. The type identification of the loop structure is depended on the conventional array data stream analysis and dependence tests, while the pipeline parallelism only processes the regular loop structure with backward cross-loop iteration. The synchronization expense of the pipeline parallelism is high, so the pipeline parallelism is only performed on the outmost layer of a nested loop. Profit of the pipeline parallelism depends on programs, the number of the cyclic iteration is larger and the dependence distance is longer, the performance promotion is greater. The method for realizing the pipeline parallelism improvesthe capacity of automatic parallel optimization and contributes to further improving the performance of scientific calculation programs.
Owner:FUDAN UNIV

Software patch detection method and device based on data flow analysis

The invention relates to a software patch detection method based on data flow analysis. The software patch detection method comprises the following steps of: analyzing a patch code by using Extractor,and sequentially selecting and detecting modified semantics of an assignment statement, a conditional statement, a function call statement, a type related statement and other types of statements in the patch code as features of a patch to be detected; establishing a mapping relationship between a binary code and a source code; selecting VEX-IR as an intermediate code for binary code promotion ofequipment firmware in an Internet of Things environment, analyzing the binary code by using the open-source Angr, and extracting a control flow, wherein the control flow takes functions as units, andeach function comprises a control flow with nodes as basic blocks and program skip semanteme as sides; analyzing the data flow in the basic blocks, reversely analyzing codes of the basic blocks one byone, and extracting a use chain of a variable in each statement; analyzing the data flow across the basic blocks; optimizing the extracted data stream; and acquiring the patch features from the basicblocks, and performing multi-stage matching on the patch features.
Owner:BEIHANG UNIV

Information flow analysis method based on blockchain and mobile Internet, and cloud computing platform

The embodiment of the invention provides an information flow analysis method based on a blockchain and a mobile Internet, and a cloud computing platform. The method comprises the steps of according tothe protection label of each protection consensus verification project, creating a record dynamic link library file used for recording different protection analysis rule information of respective execution protection, analyzing rule information according to protection on the basis; configuring corresponding dynamic metric tables and payment verification metric rules for the protection consensus verification items, configuring the dynamic metric tables and the payment verification metric rules to the corresponding protection consensus verification items, executing protection data flow analysis, and further performing rule updating on the record dynamic link library file according to the obtained protection information flow analysis data. Thus, in the payment verification process, protection can be carried out based on the payment verification measurement rules of multiple different protection consensus verification items, rule updating is continuously carried out according to the protection information flow analysis data, a more accurate protection analysis rule mechanism can be realized, and the payment security can be improved.
Owner:上海百源嘉合信息技术有限公司

System and method for realizing water resource monitoring on basis of large-volume data stream analysis

The invention belongs to the technical field of water resource management and relates to a system and a method for realizing water resource monitoring on the basis of large-volume data stream analysis. The system comprises a site measurement and control station, a mobile terminal and a cloud computing service platform, wherein the site measurement and control station is provided with a water level meter, a water flow meter, a water quality sensor and a video monitoring device which are connected with a site intelligent controller through an analysis instrument; the mobile terminal has a data communication module and a GPS (global positioning system) positioning module; the cloud computing service platform adopts cloud storage and realizes distributive storage of massive data. Compared with the prior art, data information is acquired by the water level meter, the water flow meter, the water quality sensor and the video monitoring device and then simplified by the analysis instrument, the simplified data information is further screened through software in the mobile terminal, the data information exceeding a threshold value is uploaded to the cloud computing service platform, accordingly, the data processing load of the whole system is reduced, and the monitoring efficiency is improved.
Owner:BEIJING LIHESHUNDA ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products