Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

228 results about "Process function" patented technology

In thermodynamics, a quantity that is well defined so as to describe the path of a process through the equilibrium state space of a thermodynamic system is termed a process function, or, alternatively, a process quantity, or a path function. As an example, mechanical work and heat are process functions because they describe quantitatively the transition between equilibrium states of a thermodynamic system.

Embedded browser and implement method thereof

The invention discloses an embedded browser and an implement method of the embedded browser. The embedded browser comprises a main program module, a communication interface module, a browser plug-in module, a browser application module and a browser kernel module. The main program module is composed of browser initialization, socket event cycling and a program quit submodule. The communication interface module carries out data interaction through a communication server process and other processes. The browser plug-in module is composed of a java script object (JS-Object) plug-in and a Flash plug-in submodule. The browser application module comprises kernel parameter configuration, browser key value configuration, virtual event management and a window and page control management submodule. The browser kernel module is composed of cookie management and a kernel key value submodule. The embedded browser achieves that a browser socket event process function monitors information periodically, has the functions of requesting information reports, displaying a progress window and cookie management according to a page loading progress, supports java script (JS) object extension and a soft keyboard, and is convenient to use, low in development cost, convenient to upgrade and maintain and good in user perception.
Owner:CHENGDU SANLING KAITIAN COMM IND

An embedded browser and its implementation method

The invention discloses an embedded browser and an implement method of the embedded browser. The embedded browser comprises a main program module, a communication interface module, a browser plug-in module, a browser application module and a browser kernel module. The main program module is composed of browser initialization, socket event cycling and a program quit submodule. The communication interface module carries out data interaction through a communication server process and other processes. The browser plug-in module is composed of a java script object (JS-Object) plug-in and a Flash plug-in submodule. The browser application module comprises kernel parameter configuration, browser key value configuration, virtual event management and a window and page control management submodule. The browser kernel module is composed of cookie management and a kernel key value submodule. The embedded browser achieves that a browser socket event process function monitors information periodically, has the functions of requesting information reports, displaying a progress window and cookie management according to a page loading progress, supports java script (JS) object extension and a soft keyboard, and is convenient to use, low in development cost, convenient to upgrade and maintain and good in user perception.
Owner:CHENGDU SANLING KAITIAN COMM IND

Privacy leakage vulnerability detection confirming method based on static stain data analysis

The invention discloses a method for detecting whether privacy leakage vulnerability exists in an Android application software APP or not. The method mainly solves the problems of low vulnerability detection speed, high detection environment requirements and low detection accuracy in the prior art. The method comprises the realization processes of configuring an optimization detection file; limiting an assembly and callback of the detected Android application software APP; performing static stain data stream analysis on the limited assembly and callback to obtain a stain data stream path; further processing the stain path, building a function node sequence; expanding and filling with function nodes, performing pruning and compression processing, and connecting the processed function nodes to form a detail stain data flowing path; performing deduplication processing on the detail stain data flowing path; then, performing graphical output. The method provided by the invention has the advantages that the speed of detecting the privacy leakage vulnerability of the Android application software APP is accelerated; the requirements on the detection environment and the vulnerability reproducing difficulty are reduced, so that the vulnerability analysis is faster and more accurate.
Owner:XIDIAN UNIV

Malicious program detection method based on function characteristics

The invention provides a malicious program detection method based on function characteristics. The malicious program detection method includes the steps of (1) selection of performance functions of malicious programs, namely selecting malicious program samples, carrying out disassembling and manual analysis and specifying functions closely related to malicious behaviors as the performance functions, (2) extraction of function characteristics, namely processing function body codes of the functions closely related to malicious behaviors, removing interference instructions, identifying conditional judgment statements and loop statements, and converting all the statements into equivalent expression forms as the function characteristics, (3) establishment of malicious program characteristic library, namely establishing a malicious program characteristic library as a malicious program model by using the function characteristics of the performance functions of all the malicious program samples and by using of a malicious program sample library; and (4) detection of malicious programs, namely analyzing a function characteristic set of all functions of a program to be detected by using the malicious program characteristic library, and determining whether the function characteristic set is consistent with a characteristic model in the malicious program characteristic library or not to identify whether the program to be detected is the malicious program or not.
Owner:NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products