Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

30 results about "Information sector" patented technology

The Information Technology Sector is central to the nation's security, economy, and public health and safety as businesses, governments, academia, and private citizens are increasingly dependent upon Information Technology Sector functions.

SVG (scalable vector graphics) imaging modeling-based method for realizing information resource monitoring and positioning

An SVG (scalable vector graphics) imaging modeling-based method for realizing information resource monitoring and positioning comprises the steps of imaging a modeling tool according to information equipment, establishing three layers of physical space position and logic hierarchical model of information resource, performing bidirectional binding on modeling and the equipment to support monitoring on different types of the same equipment and different equipment of the same type, designing a monitoring model, wherein configuration parameters, resource type, monitoring data items, data alarm threshold values and the like for monitoring need to be configured when the model is related to the equipment, performing real-time monitoring and customizing on the information equipment according to a real-time attention model by dimensions, concerned by a user, of application, the information resource, the resource type and the like, and performing statistics, analysis and summarizing on the alarm data according to the data and the alarm rule which are collected by monitoring. The SVG imaging modeling-based method has the characteristics of easiness in configuration, maintenance and expansibility and strong suitability and is suitable for the information department of a company to configure and monitor the equipment.
Owner:STATE GRID CORP OF CHINA +1

Cloud computing-based conference room on-line reservation management system and cloud computing-based conference room on-line reservation method

The present invention provides a cloud computing-based conference room on-line reservation management system and a cloud computing-based conference room on-line reservation method. According to the present invention, by the user management, the conference room resource management, the department information management and the user reservation audit activities, the conference participation personnel, the conference room resources and the conference time are coordinated fully, the conference room resource usage conflicts and the manpower cost needed by using the conference rooms are reduced, andthe conferencing efficiency is improved. By constructing the keywords for the user information, the conference room information, the department information and the conference room reservation results, users can query the needed information conveniently and more rapidly, and the conference room reservation efficiency is improved. According to the present invention, various resources are called according to the demands, more costs are saved for the enterprises, the conference room reservation randomness and the resource waste are avoided, and the management levels of the enterprises take new steps.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Encryption and decryption method and system capable of aiming at disk data memory area

InactiveCN106709380AEfficient encryption and decryption frameworkImprove securityInternal/peripheral component protectionFile systemComputer module
The invention relates to an encryption and decryption method and system capable of aiming at a disk data memory area. The system comprises an encryption algorithm configuration module (118), an encryption sector initialization module (112) and a data encryption and decryption module (119), wherein the encryption sector initialization module (112) is used for setting a sector which needs to be encrypted and decrypted according to the partitioned memory capacity of a disk and file system characteristics; the encryption algorithm configuration module (118) is used for setting an encryption algorithm used by the system; and the data encryption and decryption module (119) is used for encrypting file data written into the disk data memory area according to the encryption algorithm and carrying out decryption on the file data read via the disk data memory area. By use of the system, decryption and encryption processing for the disk data memory area is realized, but the boot sector of the disk and the super block sector and the file information sector of the disk file system are not subjected to the encryption and decryption processing, and an efficient disk encryption and decryption frame is realized.
Owner:INST OF ACOUSTICS CHINESE ACAD OF SCI +1

Enterprise information operation, maintenance and management method

An enterprise information operation, maintenance and management method relates to the information management technology field. The method has the following working flows of deploying an EICM information management system in an enterprise data center; initializing the enterprise internal information via the information department personnel; recording or importing the new information, such as the personnel, the asset, the budget, the project, the contract, etc.; configuring the equipment monitoring; receiving the fault reports coming from other departments in a telephone or self-service manner, and noticing the related officials automatically and timely to follow and serve; supplementing the reports that are not generated automatically by a management system of the scheme via the related personnel and in the management system; managers checking the above information via a webpage or a WeChat official account to instruct. The enterprise information operation, maintenance and management method of the present invention is an information management platform that is customized for an enterprise information department omni-directionally, technically supports all current mainstream platforms, integrates the technology management and the working management as a uniform working and cooperation platform, and can in butt joint with a conventional relevant system.
Owner:GUANGZHOU JIA HE TECH CO LTD

Application network management and control method combining in-band management and out-of-band management of a power grid company

The invention provides an application network management and control method combining in-band management and out-of-band management of a power grid company, and the method comprises the steps: settingan acquisition server and a client plug-in, enabling the acquisition server to be divided into an in-band acquisition server and an out-of-band acquisition server, and enabling the in-band acquisition server to be accessed to a network in a non-intrusive mode; accessing the out-of-band acquisition server to the network to realize convergence of out-of-band monitoring data and internal monitoringdata, and the client plug-in is installed on a monitored object to acquire performance indexes in real time and integrate the performance indexes with the out-of-band performance indexes to form finalperformance data of the monitored object; and enabling the collected information to enter a server area system, and the server area system monitor and analyze all sessions entering the application and tracks database access actions caused by clicking of the user. According to the monitoring method for monitoring the availability and the performance of each service system in real time from the perspective of the terminal user, faults and hidden dangers of the system can be found in time, and rapid analysis and processing of an information department are facilitated.
Owner:STATE GRID LIAONING ELECTRIC POWER RES INST

Disk protection system of tree-form multilayer cover layer of sector increment and implementing method thereof

The invention provides a disk protection system of a tree-form multilayer cover layer of a sector increment and an implementing method thereof. The disk protection system and the implementing method comprise a disk filter drive, a configuration information module, a current layer and a history cover layer, wherein the disk filter drive is used for implementing reading-writing redirections to writing filter data of a protected partition through the current layer and the history cover layer, the configuration information module is used for storing a configuration information structure which consists of multiple levels structures; the multiple levels of structures include a disk protection system configuration information sector, multiple cover layer information of each partition, position information of each cover layer of the partition and a layer information sector in turn; the address of the next level of structure is stored in the front level of structure, and the tree-form hierarchical structure of multiple layers of cover layers can be analyzed only through the disk protection system configuration information sector. According to the disk protection system and the implementing method, multiple layers of covering layers are effectively organized through a configuration information structure so as to support multiple functions of the cover layers, each cover layer is of a tree-form organization structure, and the privacy and the safety of the data in each cover layer can be protected.
Owner:FUJIAN CENTM INFORMATION

Data processing system based on monitoring information

The invention relates to a data processing system based on monitoring information, which comprises an acquisition module, a construction module, a statistics module and a receiving module, and is characterized in that the acquisition module acquires user information; the construction module constructs scheduling information, and the statistics module counts the total attendance time of any user, determines the working time of the user, and determines the performance completion rate according to the working time; the receiving module receives a user request, judges whether the request accords with an approval standard according to the demand information, the department position and the performance completion rate, and sends an approval verification code, first time when the user request is received and second time when an approval result is given to the user if the request accords with the approval standard; and adjusting the time period length of the first time and the second time according to the department where the user is located, the department position and the performance completion rate. A relation is established between approval of user demands and actual work performance, and performance completion conditions in work are used as reference data of demand approval, so that the approval efficiency is improved.
Owner:XIEHE HOSPITAL ATTACHED TO TONGJI MEDICAL COLLEGE HUAZHONG SCI & TECH UNIV

Method for solving overdue payment of patent tax fees

InactiveCN101551877ACompressed spaceSolve the problem of overdue paymentData processing applicationsMessaging/mailboxes/announcementsPaymentInformation sector
The invention relates to a method for solving overdue payment of patent tax fees, which is characterized in that a charging party arranges or entrusts other persons and a communication department to arrange a payment preannouncing system by utilizing the existing communication conditions, facilities and equipment to preannounce tax payers, patentees and applicants to pay correlative fees on time, thus the overdue payment cannot be caused because of forgetting the time of paying the fees, heavy losses such as late fees, patent reinstatement fees, even patent failures and the like of the tax payers and patent fee payers are avoided, the charging party can efficiently collect the tax fees on time with full amount of money, a payment scroll network file is established and payment detail automatic preannouncing information is programmed to preannounce the fee payers to pay the correlative fees on time and bring convenience for an information department to expand the operating service space, improve the short message quality, compress the development space of junk short messages and enable mobile phone short messages to play a role in bringing profits for the modern fee payers and the whole society so as to reduce the bad effects of the junk short messages on the society.
Owner:易美春
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products