Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1876 results about "Pool" patented technology

In computer science, a pool is a collection of resources that are kept ready to use, rather than acquired on use and released afterwards. In this context, resources can refer to system resources such as file handles, which are external to a process, or internal resources such as objects. A pool client requests a resource from the pool and performs desired operations on the returned resource. When the client finishes its use of the resource, it is returned to the pool rather than released and lost.

Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof

The invention relates to a mimicry defense architecture based zero-day attack detection, analysis and response system and a method thereof. The method comprises the steps of performing attack detection and processing on the input, cheating and inducing an attacker through honeypot type executing bodies, and performing meta-function inspection on the output of each executing body; performing statistical analysis on abnormal output by combining abnormal information, updating a zero-day attack database, feeding back an analysis result to an intrusion response module, and preventing persistent attacks of the attacker; performing dynamic adjustment and management on an online executing body by combining voting conditions, executing body dispatching, the executing body with abnormal output and the like, and selecting executing bodies from an executing body resource pool to get into a dynamic online executing body set; and analyzing a zero-day vulnerability in the executing body with abnormal output according to an anomaly statistical analysis result, and repairing the related executing bodies in the executing body pool. According to the invention, functions and the flexibility of mimicry defense architecture are enhanced, values of the abnormal output are sufficiently utilized, and the threat and the defense cost of zero-day attacks are reduced.
Owner:THE PLA INFORMATION ENG UNIV

Method and system to support dynamic rights and resources sharing

The invention relates to method for deriving a sub-right from a right, the right comprising a plurality of components, each of which specifies an aspect of the right. A component may be, for example, a principal, an action, a resource, and a condition. The invention also relates to a method for integrating a first right with a second right. Furthermore, the invention relates to a method of sharing rights by deriving a sub-right from a right, allowing use of the sub-right, and integrating the sub-right with the right. In addition, the invention relates to a system to support rights sharing by enabling the derivation of a sub-right from a right, the right comprising plural components each of which specifies an aspect of the right, the system comprising a receiving module for receiving a sub-right, the sub-right comprising plural components each of which specifies an aspect of the sub-right, and a confirmation module for confirming that the values of the components of the sub-right can be derived from the values of the corresponding components of the right. The invention further relates to a method for deriving a sub-right from a pool of rights granted by a grantor to a grantee for controlling use of resources within a computing environment, the computing environment having a mechanism for enforcing rights within the environment to control use of resources in accordance with the rights.
Owner:CONTENTGUARD HLDG

Method and device using vector instruction to process file index in parallel mode

The invention discloses a method and a device using a vector instruction to process a file index in a parallel mode. The method comprises the following steps of calculating and sorting index key values of data in a data table, distributing needed storing space of all leaf nodes, using an SIMD (single instruction multiple data) instruction to load a plurality of index key values once, sequentially filling the data in all the leaf nodes, distributing the needed storing space of the internal nodes of the upper layer, building the internal nodes, continuously building the internal nodes of the upper layer until the node number of the upper layer is one, regarding the node as a root node, and finishing the building of an index tree; building a buffer pool in internal storage, using an inquiring queue to temporarily store all received inquiring requests, taking the inquiring requests out of the buffering pool when the length of the inquiring queue reaches a preset threshold value, sorting the inquiring requests, and forming a sorted to-be-inquired queue; sequentially obtaining a to-be-inquired term in the sorted inquiring queues, sequentially searching from the root node of the built index tree, and using the SIMD method to search the to-be-inquired term in a parallel mode inside the internal nodes and the leaf nodes.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

System and method for automatically deploying application system in cloud resource pool

The invention discloses a system and method for automatically deploying an application system in a cloud resource pool, and relates to the field of cloud computation. An application system template is analyzed and divided into a single server template, an internal private network setting, a public network setting, an application setting and a gateway setting; a VLAN and a subnet are allocated to the application system according to the internal private network setting, and a DHCP server is configured so that an IP designated for each server can be kept; all the servers are set up according to the single server template in the sequence of logic entities; a network device control interface is called according to the public network setting so that a private network routing strategy, a security strategy, a firewall strategy of an exit gateway, and an address mapping of the private network and the public network can be set; a service issuing interface is called to send an application configuration parameter list to an application configuration system so that application initialization can be completed, an application service gateway is set up according to the application external service type and the gateway setting, and therefore the application system is automatically deployed in the cloud resource pool and can adapt to deploying of various different servers.
Owner:CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products