Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

35 results about "Manufacturer identifier" patented technology

Windows Virtual machine remote detecting method

InactiveCN103220298AChange the situation of lack of effective management meansDetect relevanceTransmissionIp addressMedia access control
The invention discloses a Windows Virtual machine remote detecting method which is used for solving the technical problem that an existing Windows Virtual machine has security holes. According to the technical scheme, firstly, an internet protocol (IP) address of a known target host machine of a main machine is detected to acquire a media access control (MAC) address of the target host machine, and the MAC address is sent to the detection main machine; then, manufacturer identifiers in the MAC address are extracted after the detection main machine receives the MAC address of the target host machine, and then whether the manufacturer identifiers are matched with 00:03:FF is checked; all target host machines in a local area network are processed in an ergodic mode to detect all opened Windows Virtual machines and a host machine; and afterwards, the relevance between each virtual machine and the host machine is analyzed according to the 32nd bit to the 47th bit in the MAC address to detect the relevance between the virtual machines and the host machine. The Windows Virtual machine remote detecting method can detect the relevance between the Windows Virtual machines and the host machine according to the manufacturer identifiers in the MAC address. Furthermore, the detection accuracy can reach to 100%.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Adaptive management entity, base station self-configuring method and base station self-configuring system

ActiveCN102685726AImplement the self-configuration processNetwork data managementAdaptive managementElement management system
The invention provides an adaptive management entity, a base station self-configuring method and a base station self-configuring system. The base station self-configuring method comprises the following steps that the adaptive management entity receives a connection request sent by a base station eNodeB and sends an information acquisition request to the eNodeB; and the adaptive management entity receives identification information sent by the eNodeB according to the information acquisition request, acquires address information of an element management system EMS corresponding to a manufacturer identifier according to the manufacturer identifier in the identification information, and sends the address information of the EMS to the eNodeB, so that the eNodeB acquires software and configuration parameters from the EMS. By the adaptive management entity, the base station self-configuring method and the base station self-configuring system, when eNodeBs and EMSs which are provided by multiple manufacturers are in a network, the eNodeB and the EMS which are provided by the same manufacturer are not required to be bonded together, the eNodeB can acquire the address information of the corresponding EMS through the adaptive management entity, and the self-configuring process of the eNodeB in a multi-manufacturer environment is realized.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Method for accessing network by application program in mobile terminal, distribution server and system

The invention relates to the field of communication and discloses a method for accessing a network by an application program in a mobile terminal, a distribution server and a system and aims at solving the technical problem in the prior art that the mobile terminal accesses the network by consuming a large amount of data traffic of the mobile terminal. The method comprises the following steps that the mobile terminal transmits a manufacturer identifier of the application program in the mobile terminal to the distributor server through a mobile communication network; if the distribution server determines that the application program has the traffic-free permission according to the manufacturer identifier, when the application program initiates a data access request, the mobile terminal accesses the network by a proxy server distributed by the distribution server; data generated by accessing the network by the mobile terminal through the proxy server are marked with a traffic-free identifier; all or partial data traffic generated by accessing the network by the mobile terminal through the proxy server is counted into a designated service provider by a mobile communication operator based on the traffic-free identifier. The method achieves the technical effect of accessing the network by the mobile terminal in a traffic-free mode.
Owner:360 TECH GRP CO LTD

Equipment connection method, system, equipment and computer readable storage medium

ActiveCN112929188AImplement auto-discoveryRealize automatic authenticationData switching networksIp addressPassword
The invention provides an equipment connection method, a system, a equipment and a computer readable storage medium, and relates to the technical field of equipment management. The equipment connection method comprises the following steps: an access equipment sends a dynamic host configuration protocol request to a management and control equipment; the management and control equipment sends a dynamic host configuration protocol response to the access equipment; the access equipment sends an access message to the management and control equipment by using the IP address of the management and control equipment; the management and control equipment authenticates the access equipment according to the manufacturer identifier, the equipment model and the unique equipment identifier which are configured in advance; under the condition that the authentication is successful, the management and control equipment queries pre-configured authentication information by utilizing the authentication identifier and the manufacturer identifier, and obtains a user name and a password; and the management and control equipment is connected with the access equipment by using the IP address and the service port of the access equipment. According to the invention, the automatic discovery, automatic authentication and automatic authentication of the access equipment are realized, the access equipment can be configured quickly and automatically, and the access safety of the equipment can be improved.
Owner:CHINA TELECOM CORP LTD

Vehicle VIN code tampering detection method and device, equipment and storage medium

The invention relates to a vehicle VIN code tampering detection method and device, equipment and a storage medium. The method comprises the steps of obtaining a VIN code image and a manufacturer identifier of a to-be-detected vehicle; determining a plurality of VIN code character images from the VIN code images, and respectively inputting the plurality of VIN code character images into a characterclassification model to obtain a classification result of each VIN code character image, wherein the classification result is used for representing the font type of the VIN character in the VIN character image; and obtaining a VIN code font standard corresponding to the manufacturer identifier, and determining a VIN code tampering detection result of the to-be-detected vehicle according to the classification result of each VIN code character image and the VIN code font standard. According to the method, the VIN code tampering detection process can be completed only by acquiring the VIN code image of the to-be-detected vehicle and the manufacturer identifier, so that the method is wider in application range and higher in efficiency in an actual scene; and the VIN code character images areclassified by adopting the character classification model, so that the detection speed is greatly increased, and the accuracy of a detection result is also improved.
Owner:上海眼控科技股份有限公司

System and method for realizing authentication monitoring

The invention discloses a system and a method for realizing authentication monitoring. The method comprises the following steps that: a terminal transmits a manufacturer identifier, an authorization number and an equipment identifier of the terminal to an authentication monitoring server; the authentication monitoring server determines whether illegal infringement exists or not according to a comparison between the number of the equipment identifiers corresponding to the counted manufacturer identifiers and authentication numbers and an authentication range in a scheme for monitoring whether the authentication range is surpassed or not; and in a scheme for performing authentication monitoring on a specific terminal, the existence of the illegal infringement in a functional module corresponding to the equipment identifier is judged according to the manufacturer identifier and the authentication number and a limited use mark is transmitted to the terminal when limit on the use of the functional module is further determined according to a limit strategy if the illegal infringement exists. Therefore, the monitoring server can grasp the authentication situation of the functional module, effectively monitor an illegal infringement action, protect the intellectual property of the functional module owned by a terminal system manufacturer to the maximum extent, ensure healthy development of an industrial chain and promote the benign development of functional application.
Owner:北京中智润邦科技有限公司

Scattered arrangement base station identification method and device, electronic equipment and storage medium

The invention discloses a scattered base station identification method and a device, electronic equipment and a storage medium, relates to the field of communication, is used for solving the problem of how to identify a scattered base station of main equipment in the prior art, and comprises the following steps: obtaining position information of a base station to be identified and a first main equipment manufacturer identifier; determining at least one reference base station according to the position information of the base station to be identified; wherein the distance between each reference base station in the at least one reference base station and the base station to be identified is smaller than a first threshold value; and determining the number of the first main equipment manufacturer identifiers in the main equipment manufacturer identifiers of the at least one reference base station. and determining the proportion of the first main equipment manufacturer identifiers according to the number of the first main equipment manufacturer identifiers. and judging whether the base station to be identified is a main equipment scattered base station or not according to the first main equipment manufacturer identification proportion. The method is used for identifying the scattered base station of the main equipment.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Management method, management system, management equipment and medium for shared articles

The invention discloses a management method, a management system, management equipment and a medium for shared articles, and relates to the technical field of intelligent sharing. The method comprises the following steps: when a user rents a shared article, generating and writing an anti-counterfeiting code comprising a manufacturer identifier, a system identifier and a random number into an IC card of the shared article, and recording a user identifier of the shared article when the random number is generated; unlocking the shared article at the shared article position; when the user returns the shared article, reading the anti-counterfeiting code stored in the IC card of the shared article, and performing anti-counterfeiting verification; if the anti-counterfeiting verification is passed, locking the shared article at the shared article position, and prompting the user of information aiming at successful return of the shared article; and if the anti-counterfeiting verification is not passed, prompting the user of information with the purpose of returning failure of the shared article. According to the embodiment, the technical problem that the user returns the shared articles which are not produced by the original factory can be solved, and the technical effect of maintaining the benefits of cooperative manufacturers is achieved.
Owner:CCB FINTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products