Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

194 results about "Modes" patented technology

Modes are the file system permissions given to "user", "group" and "others" classes to access files under Unix. They are shown when listing files in long format, or, if access control lists are in use, using getfacl. Modes can be changed with chmod (for traditional Unix permissions) or with setfacl (for access control lists).

System for collaborative engineering using component and file-oriented tools

Conventional file-based engineering design data for an engineering model are represented by a plurality of components. Each component has a unique identifier, a set of fields, each field having a data type and a data value, and a program which interprets and modifies the fields. The plurality of components are stored in a repository of a server. The repository also stores a history of any changes made to the components. A plurality of client computers are bidirectionally connected to the server. Each client computer may obtain the current version of the components and may send locally edited versions of the components back to the server to replace the current versions in the repository. At the client computer, the user interacts with the components using conventional file-based software. Before locally edited versions of the components are committed to the server to replace the current versions, a synchronization and merging process occurs whereby the latest version of the components are downloaded to the client computer and are compared to the locally edited version of the components to detect resolvable (compatible) and unresolvable (incompatible) conflicts therebetween. The commit process is performed only if no unresolvable conflicts exist between the two versions of the components. To facilitate translation between file-based data and components, a schema is written to "wrap" each of the engineering file formats. Each schema is a set of classes that capture all of the information in the file-based data.
Owner:BENTLEY SYST INC

System, method and computer program product for collaborative engineering using component and file oriented tools

Conventional file-based engineering design data for an engineering model are represented by a plurality of components. The plurality of components are kept in stores, which reside on servers. Each store contains the components that correspond to the elements of one design file. The stores also maintain a history of changes made to the components. A plurality of client computers are bidirectionally connected to the servers. Each client computer may obtain the current version of the components and may send locally edited versions of the components back to the servers to replace the current versions in the stores. At the client computer, the user interacts with the components using conventional file-based software. Before the locally edited versions of the components are committed to the servers to replace the current versions, a synchronization and merging process occurs whereby the latest version of the components are downloaded to the client computer and are compared to the locally edited version of the components to detect resolvable (compatible) and unresolvable (incompatible) conflicts. The commit process is performed only if no unresolvable conflicts exist between the two versions of the components. To facilitate translation between file-based data and components, a schema is written to “wrap” each of the engineering file formats. Each schema is a set of classes that capture all of the information in the file-based data.
Owner:BENTLEY SYST INC

Method, system and apparatus for defending bypassing of file uploading verification, and medium

The invention discloses a method for defending bypassing of file uploading verification. The method comprises the following steps: when uploading verification is performed on a file to be uploaded, firstly obtaining a file name with a removed suffix, detecting whether the file name contains a suffix character string the same as a target suffix character string, and refusing the uploading of the file to be uploaded when the suffix character string the same as the target suffix character string is discovered. Different from the manner of only performing the uploading verification on the last suffix in the prior art, according to the method disclosed by the invention, the suffix character string hidden in the file name is also detected, so that accurate detection can be performed effectivelyon a plurality of existing bypassing manners, the method is applicable to the modes of multiple kinds of server management software to parse files, and the possibility of jeopardizing a server and thedata in the server by the file uploading vulnerability can be greatly reduced, so that the security is higher. The invention further discloses a system and apparatus for defending bypassing of file uploading verification, and a computer readable storage medium, which have the above beneficial effects.
Owner:SANGFOR TECH INC

Application template configuration method based on tree structure

The invention particularly relates to an application template configuration method based on a tree structure. The application template configuration method based on a tree structure is based on an Angular language and an ng-zorro-antd framework, and comprises two classes of json2Tree and tree2Json; the method comprises the steps of converting a YAML format file into a JSON format, traversing configuration items in the JSON format, drawing a tree diagram, guiding a user to performing template configuration in a tree diagram mode to enable the template to support editing, storage and format conversion, and forbidding the user to modify names of the configuration items. According to the application template configuration method based on the tree structure, the user is forbidden to modify thename of the configuration item, so that configuration errors can be prevented; a hierarchical structure of configuration is more clearly displayed through a tree structure, so that the user can browseand search configuration items conveniently; data types are distinguished by using different color labels, so that a user can conveniently check the legality of configuration parameters; mutual conversion between files of different formats can be achieved, more modes can be provided for a user to configure the template, and the flexibility is improved.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products