Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

158 results about "Extended memory" patented technology

In DOS memory management, extended memory refers to memory above the first megabyte (2²⁰ bytes) of address space in an IBM PC or compatible with an 80286 or later processor. The term is mainly used under the DOS and Windows operating systems. DOS programs, running in real mode or virtual x86 mode, cannot directly access this memory, but are able to do so through an application programming interface called the eXtended Memory Specification (XMS). This API is implemented by a driver (such as HIMEM.SYS) or the operating system, which takes care of memory management and copying memory between conventional and extended memory, by temporarily switching the processor into protected mode. In this context the term "extended memory" may refer to either the whole of the extended memory or only the portion available through this API.

Hash table-based and extended memory-based high-performance IPv6 address searching method

The invention discloses a hash table searching-based and extended memory searching-based IPv6 address searching scheme. A system comprises one searching classifier, one updating classifier, seven parallel hash processing units, six extended memory processing units, seven hash collision processing units and one priority comparing unit. The first six hash processing units are correlated with the corresponding extended memories in two stages and combined with the corresponding hash collision processing units to form six paths of processing modules; the seventh hash processing unit and the corresponding hash collision processing unit form one path of processing module; and the seven paths of modules searches the IPv6 address in parallel so as to determine the next hop of information. Due to the adoption of the method, the searching operation of the IPv6 address is finished in one to two storage periods in combination with the principle of hash searching and extended memory searching according to the distribution rule of the prefix of the IPv6 address. The method has high searching and updating performance and high extensibility, so that the method is a searching scheme suitable for the high-performance IPv6 router.
Owner:XIAN UNIV OF POSTS & TELECOMM

Memory extending system and memory extending method

ActiveCN103488436ALarge memory capacityAvoid the problem of redundant processing powerInput/output to record carriersComputer architectureQuick path interconnect
An embodiment of the invention discloses a memory extending system and a memory extending method. The system comprises processors, extended memories, extended chips and multiple processor installation positions, and a memory installation position is arranged at each process installation position; the processor installation positions are connected mutually through QPI (quick path interconnect) interfaces, at least one processor installation position is provided with a processor, and at least one of the rest installation positions serves as extended installation position; the extended chips are installed in the extended installation position; the extended memories are installed to the memory installation positions connected with the extended chips. The memory extending system has the advantages that the extended chips are mounted at other processor installation positions to replace the processors, and the existing processors are enabled to be capable of accessing the extended memories carried by the extended chips through the extended chips, so that memory capacity of the existing processors is increased on the condition that processing capacity is not improved, and the problem of processing capacity redundancy caused by the fact that memories are extended by adding processors in the prior art is solved.
Owner:XFUSION DIGITAL TECH CO LTD

Methods and devices for encrypting and decrypting video file and mobile terminal

The invention discloses a method for encrypting a video file, a method for decrypting the video file, a device for encrypting the video file, a device for decrypting the video file, and a mobile terminal, and belongs to the field of mobile terminals. The method for encrypting the video file comprises the following steps of: acquiring the video file to be encrypted and a key; encrypting the video file to be encrypted by using the key to obtain an encrypted video file; acquiring a pre-scanned mobile terminal and partitions storing user data except hidden partitions in an extended memory on the mobile terminal; and determining a partition storing the video file to be encrypted in all the partitions, and moving the encrypted video file into a preset folder in the partition storing the video file to be encrypted. The method for decrypting the video file comprises the following steps of: acquiring a video file to be decrypted and the key; decrypting the video file to be decrypted by using the key to obtain a decrypted video file; and determining the storage position of the video file to be decrypted before encryption, and moving the decrypted video file to the storage position before encryption. The video file can be quickly encrypted.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Indicator for forecasting shelf life of cold fresh pork

The invention relates to an indicator for forecasting the shelf life of cold fresh pork, belonging to the technical field of detecting the quality of the pork by acquiring the temperature of the pork. The indicator forecasts the shelf life of the pork by timely acquiring the temperature of the pork in the circulation process from output to sell. The indicator has small volume and convenient use, can be directly attached to the surface of the cold fresh pork, and timely updates and displays the temperature, the shelf life and the system time of the fresh pork. The indicator uses a high-precision temperature sensor DS18B20 to acquire the temperature of the surface of the cold fresh pork, transmits the temperature value to a micro controller MSP430F1XX through a data wire DQ, uses the controller to forecast the real-time shelf life based on the TTT theory of the temperature, and uses a liquid crystal display LM6059BCW to display real-time temperature, the shelf life, the system time and the food names. The system time, the real-time temperature and the shelf life are all memorized in an extended memory card every 1 hour, and can be transmitted to a computer through serial ports of the indicator as required by users. The indicator has high precision, low energy consumption, multiple functions and convenient operation, and effectively solves the problem for forecasting the shelf life of the cold fresh pork during circulating.
Owner:SHANGHAI OCEAN UNIV

Code and thread differential addressing via multiplex page maps

InactiveUS20060158690A1Facilitates expanded user mode memory addressingRemove changeSpecific access rightsVisual presentationMemory addressSingle process
Described is a system and method whereby processes may have multiple memory maps associated therewith to provide curtained memory and overcome other memory-related problems. Multiple maps are used to restrict memory access of existing code such as drivers, without changing that code, and without changing existing microprocessors. A thread of a process is associated with one memory map at a time, which by mapping to different memory locations, provides memory isolation without requiring a process switch. Memory isolation may be combined with controlled, closed memory map switching performed only by trusted code, to ensure that some protected memory is inaccessible to all but the trusted code (curtained memory). For example, the threads of the process may ordinarily run at one privilege level with a restricted map, with map switching is only allowed at a higher privilege level. As the threads run through code, the map may be appropriately changed on entering and leaving the trusted code, thus controlling what memory addresses are accessible based on what code is currently being executed. Map switching among multiple maps eliminates the need to change a process in order to access different memory, thereby allowing expanded memory addressing in a single process and isolating untrusted code run in process from certain memory of that process.
Owner:MICROSOFT TECH LICENSING LLC

Modular intelligent controller and controlling method of low-voltage circuit breaker dedicated to wind power generation

InactiveCN101741142AWith remote wireless communication functionMeet the requirements of wind power generationEnergy efficient ICTCircuit arrangementsTime delaysEngineering
The invention discloses a modular intelligent controller and a controlling method of a low-voltage circuit breaker dedicated to wind power generation, wherein a processor and an extended memory are respectively connected with an Ethernet communication module, a fieldbus communication module, a wireless transceiving module, an electric energy calculating module, a simulation tripping module and an on and off controlling module; each module, the processor and the extended memory are respectively connected with a power module; the output end of the electric energy calculating module is connected with the simulation tripping module; and the output end of the simulation tripping module is connected with the on and off controlling module. The invention possesses the function of remoter wireless communication, short time delay protection and long time delay protection are performed according to the obtained current effective value; harmonic analysis is carried out according to the obtained current instantaneous value; the analysis on the quality of the generated electric energy is carried out according to the obtained voltage instantaneous value/effective value; the accumulated generated electric energy of the wind power generator is calculated according to the electric energy value; and the modular mode is adopted to satisfy the requirement of wind power generation.
Owner:JIANGSU UNIV OF SCI & TECH

System and method for high-speed image-cued triggering

A high-speed digital camera system and method for processing high-speed image data is claimed. The method comprises generating images with at least 3×105 pixels at greater than 200 frames-per-second with an image sensor, downloading an image from the image sensor; defining an area of interest in the downloaded image comprising a plurality of adjacent pixels in the image in which an event of interest is expected to occur, defining at least one threshold level for all pixels in the plurality; uploading the defined threshold level to a processor in the camera, retrieving pixel data in real time from the image sensor, and comparing within the camera the pixel data retrieved in real time from the image sensor to the defined threshold levels. A trigger is set when the threshold levels are exceeded and the camera records the event of interest and stores it in camera memory for outputting to a remote computer. The system comprises an image sensor capable of generating images with at least 3×105 pixels at greater than 200 frames-per-second, processing means capable of providing control signals to the image sensor and processing retrieved imagery in a parallel pipelined fashion, small memory for storing look-up tables or buffering data for external transmission, extended memory with which to store retrieved images capable of being overwritten in a circular buffer fashion, and a digital interface to connect to a host computer or network. The image sensor, processing means, small memory, extended memory, and digital interface are all housed within a single enclosure capable of extended communications with an external host computer or network.
Owner:SOUTHERN VISION SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products