Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34 results about "Named parameter" patented technology

In computer programming, named parameters, pass-by-name, or keyword arguments refer to a computer language's support for function calls that clearly state the name of each parameter within the function call.

Method for copying phone directories of mobile phones based on network

The invention discloses a method for copying a phone directory of a mobile phone based on network, which comprises the following steps that: a server is logged on, the user name, code and server state are verified, and usable service condition is fed back; a mobile phone end processes local phone directory data according to an operation action of a user, generates additional data and an operational instruction required by operation, encapsulates corresponding operational instruction, additional data and user name parameter as required, and transmits the encapsulated operational instruction, the encapsulated additional data and the encapsulated user name parameter to a server end through a network layer; the server end receives and analyzes data from the network layer, executes corresponding operation according to the operational instruction of the user and the additional data, encapsulates execution result feedback and the additional data as required according to executed operation results, and transmits the encapsulated execution result feedback and the encapsulated additional data to the mobile phone end through the network layer; and the mobile phone end receives and analyzes feedback data of the server end and executes corresponding local processing according to the execution result feedback and the additional data. The method realizes operations such as copying of the phone directory on the server, and has strong practicality.
Owner:SHANGHAI WINGTECH ELECTRONICS TECH

Method for backing up mobile phone short messages based on network

The invention discloses a method for backing up mobile phone short messages based on network, comprising the following steps that: a user logins a server, checks the identity of the user and the state of the server and feeds back the available service state; mobile terminal application software processes local short message data according to the operational action of the user, generates additional data and an operational instruction required by the operation, necessarily packages the corresponding operational instruction, the additional data and user name parameters and transmits the corresponding operational instruction, the additional data and the user name parameters to a server end through a network layer; server end application software receives data from the network layer and analyzes, executes corresponding operation according to the operation instruction of the user and the additional data, feeds back the execution result according to the result of the execution operation, necessarily packages the additional data and transmits the additional data to the mobile phone terminal through the network layer; and the mobile phone terminal receives feedback data of an analyzing server end and locally processes according to the execution result feedback and the additional data. The invention can realize the backup, restoration and other operations of the short messages on the server.
Owner:SHANGHAI WINGTECH ELECTRONICS TECH

Mapping method for data collected by automatic safety device and EMS system primary equipment model

The invention relates to a mapping method for data collected by an automatic safety device and an EMS system primary equipment model. The mapping method comprises the steps that the automatic safety device collects real-time operating data of primary equipment, and grouping organization is carried out in an electrical power system interval mode; the data is placed in a universal classification service group structure to be uploaded to a management master station of the automatic safety device; the management master station receives interval data of universal classification service groups through communication software, and interval serial numbers are extracted from group names; the interval name parameter groups are searched for interval dispatching names corresponding to the interval serial numbers, the EMS module is searched for corresponding interval IDs according to the interval dispatching names in a matching mode, the primary equipment in the EMS model is positioned according to the interval types included in the interval data groups and the interval IDs, and the values of fixed items in the real-time operating data are written in an attribute domain corresponding to the primary equipment in the EMS model. The accuracy of the data corresponding relationship is improved on the premise of improving data maintenance efficiency.
Owner:POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD

Diameter flooding attack detection device and method

The invention belongs to the technical field of communication security, in particular to a Diameter flooding attack detection device and method, The device comprises a parameter extracting module, which is used for extracting the signaling message parameters flowing through the signaling, and matching the state machine according to the parameters, wherein the signaling message parameters include the session identification parameters, the source host parameters and the user name parameters, and setting and initializing each signaling message parameter counter, a signaling flow analysis module which is used for early warning analysis of the signaling message parameters in the signaling according to the state machine matching condition and using the counter count value, a detection alarm module which is used for flooding attack alarm according to the warning analysis result of the signaling message parameters. The invention is applicable to an IMS network in a mobile communication network, security detection and early warning of Diameter flooding attacks are implemented, Automatic identification and detection of Diameter flooding attacks are performed based on IMS signaling flows, detection and early warning of Diameter flooding attacks are detected and early warned from signaling flows, thus improving IMS network security and having important guiding significance for the securityof communication networks.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Method and device for automatically testing full-process scene of interface

PendingCN113360415ASolve the problem of interface full-process test automationSoftware testing/debuggingEngineeringHuman–computer interaction
The invention discloses a method and device for automatically testing full-process scene of an interface, and belongs to the technical field of artificial intelligence. The method comprises the steps of: configuring an interface document, a test case library and a business parameter document; obtaining a preorder interface access sequence list of a to-be-tested interface from the interface document, obtaining test cases corresponding to preorder interfaces from the test case library, obtaining parameters required by the preorder interfaces from the test cases, the interface document and the business parameter document, and writing the parameters into a reporting message, naming parameters which need to be acquired from messages returned from other interfaces, and writing parameter names into the reporting message; calling the preorder interfaces in sequence, completing parameter acquisition of the preorder interfaces, and storing the parameters in a parameter library according to parameter names; and acquiring the parameters from the test cases, the interface document, the business parameter document and the parameter library, writing the parameters into the reporting message of the to-be-tested interface, calling the to-be-tested interface, and completing the automatic interface test. According to the method and device of the invention, full-process interface scenarized automatic testing can be realized.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Data source identification selection method

InactiveCN108600265ASolve the usage scenario, the use of the data source switching module is safeSolve the use of securityTransmissionDomain nameRequest - action
The invention discloses a data source identification selection method. The method is characterized by comprising the following steps: S1, initiating http network request action by a user; S2, requesting to execute front interception by an http network request trigger interceptor of the user; S3, acquiring a domain name parameter about the attribute of a requested service port; S4, acquiring user parameter and a data source identification dictionary, data source identification corresponding to the user parameter, and a data source identification package caching instance; and S5, storing the current data source identification and continuously accessing the current access request. Through the method disclosed by the invention, the dynamic data configuration and switch are automatically performed through an underlying framework so as to avoid the data operation error caused by concurrence abnormality; the centralized management on the configuration parameter is performed more flexibly, sothat the configuration parameter can be more quickly transmitted to all load-end system service in a unified way, the abnormality caused by manual repeated operation and possible omission or misoperation is avoided, and a dynamic database connection management mechanism is provided for the network system.
Owner:JULONG

Mapping method of data collected by safety automatic device and primary equipment model of ems system

The invention relates to a mapping method for data collected by an automatic safety device and an EMS system primary equipment model. The mapping method comprises the steps that the automatic safety device collects real-time operating data of primary equipment, and grouping organization is carried out in an electrical power system interval mode; the data is placed in a universal classification service group structure to be uploaded to a management master station of the automatic safety device; the management master station receives interval data of universal classification service groups through communication software, and interval serial numbers are extracted from group names; the interval name parameter groups are searched for interval dispatching names corresponding to the interval serial numbers, the EMS module is searched for corresponding interval IDs according to the interval dispatching names in a matching mode, the primary equipment in the EMS model is positioned according to the interval types included in the interval data groups and the interval IDs, and the values of fixed items in the real-time operating data are written in an attribute domain corresponding to the primary equipment in the EMS model. The accuracy of the data corresponding relationship is improved on the premise of improving data maintenance efficiency.
Owner:POWER DISPATCHING CONTROL CENT OF GUANGDONG POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products