Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

422 results about "Process identifier" patented technology

In computing, the process identifier (normally referred to as the process ID or PID) is a number used by most operating system kernels—such as those of UNIX, macOS and Microsoft Windows—to uniquely identify an active process. This number may be used as a parameter in various function calls, allowing processes to be manipulated, such as adjusting the process's priority or killing it altogether.

Method for islanding microgrid control and optimization based on rotating coordinate virtual impedance

The invention discloses a method for islanding microgrid control and optimization based on rotating coordinate virtual impedance. Aiming to a fact that the actual microgrids have complicated impedance characteristics, the method for islanding microgrid control and optimization based on the rotating coordinate virtual impedance includes utilizing the coordinate rotation orthogonal transformation to design the coordinate rotation virtual impedance, improving the impedance characteristics of the microgrid, compensating errors of power distribution and improving power decoupling performance; establishing a complete small-signal dynamic model of the microgrid, wherein the small-signal dynamic model comprises distributed energy sources, power converters, loads and power grids, and guiding the selection of an optimal value on the basis of the small-signal dynamic analytical method; and simultaneously, providing a theoretical basis for the optimization selection of islanding microgrid control parameters by using the small-signal dynamic analytical method, wherein the islanding microgrid control parameters comprise droop control coefficients of the power distribution, process identifier (PI) parameters of a voltage current feedback controller, feedforward control coefficients and the like. The microgrid after being subjected to optimization design in an islanded operational mode is capable of effectively achieving power decoupling and improving the accuracy of the power distribution, the stability of the system and the dynamic performances.
Owner:SHANDONG UNIV

Method and device for simultaneously starting multiple same applications on intelligent terminal

InactiveCN104866342ASolve the problem that multiple identical applications cannot be opened at the same timeSave storage spaceProgram loading/initiatingApplication softwareComputer science
The application discloses a method and a device for simultaneously starting multiple same applications on an intelligent terminal. The method comprises following steps: receiving selecting operation of a user to applications of the intelligent terminal; determining whether activity instances of selected applications are present in the process of the intelligent terminal; distributing process identifiers for the applications if the activity instances do not exist and creating activity instances of applications based on process identifiers; and distributing process identifiers, having different process identifier values from the intelligent terminal, for the applications and recreating activity instances of the applications based on process identifiers or switching to activity instances of the selected applications of the intelligent terminal. By adoption of the above scheme, the problem that multiple same applications cannot be started on a conventional intelligent terminal is solved by distributing process identifiers, having different process identifier values from the intelligent terminal, for the applications and recreating activity instances of the applications.
Owner:北京数字天域科技有限责任公司

Method and system for authenticating application software of Android platform on mobile internet

The invention discloses a method and a system for authenticating application software of an Android platform on the mobile internet. The authenticating method comprises receiving by an authentication server a signature request of the application software, generating a key pair and sending a public key and an application identifier to a certificate authority center, receiving a signature certificate, signing a digital signature on the application software by using a private key, downloading by a terminal the signed application software, inquiring the installation information of the application software according to a process identifier, acquiring a user identifier from the installation information, judging whether a corresponding relation of the application identifier, the process identifier and the user identifier of the application software is stored, if not, then verifying the signature certificate and using the public key to check, establishing and storing the corresponding relation of the application identifier, the process identifier and the user identifier of the application software when the checking is successful, processing the business request and returning the business processing result. When the technical scheme of the invention is implemented, the authenticity, the integrality and the anti-counterfeit property of the source of the application software are guaranteed.
Owner:卓望数码技术(深圳)有限公司

Audio mixing control method and apparatus for Wince vehicle-mounted multimedia

ActiveCN104023305ASolve the problem of inaudibleEasy to useStereophonic systemsComputer scienceLower priority
The invention discloses an audio mixing control method and apparatus for Wince vehicle-mounted multimedia. The audio mixing control method comprises: A, when supplications are started, generating corresponding process IDs, and when the already started applications need to play sound, creating corresponding audio streams; B, pairing the audio stream of each application and the corresponding process IDs for marking, and identifying the types of sounding applications according to the process IDs; and C, according to preset sound priorities, controlling the volume of an application whose priority is the highest to be highest, and closing or reducing the sound of an application whose priority is low. According to the invention, the volume of the application whose priority is the highest can be controlled to be highest according to the sound priorities, and the sound of the application whose priority is low can be reduced or closed, and such an automatic sound adjusting mode reduces the influence of other unnecessary sound, so that the problem can be solved that a user cannot listen clearly due to simultaneous playing of multiple sound at the same volume, manual operation by the user is unnecessary, the use of the user is greatly facilitated, and driving is not affected.
Owner:SHENZHEN APICAL TECH CO LTD

Secure virtual interface

A network interface for secure virtual interface data communication includes a doorbell circuit, a processor, memory, and a bridge circuit. The doorbell circuit responds to physical I/O addresses of the host that are mapped by a memory management unit by a registration process. An application program seeking to use a channel of a virtual interface must register the virtual address of host memory where data for communication is or will be stored and register the virtual address of a page of I/O addresses. Access to the doorbell functions and to the host memory via the memory management unit are therefore denied when the requesting process identifier does not successfully compare with the process identifier for the process that performed the registrations. A password may be stored in the network interface in association with a virtual interface (VI) channel identifier and stored in association with the virtual to physical map used for VI communication. The network interface may abandon a requested or implied data communication function when passwords so not successfully compare. Methods for virtual interface (VI) communication performed by an application program may include one or more of the steps of (a) establishing a VI channel where physical I/O addresses of a network controller are secured; (b) registering host memory for use with a VI channel where physical memory addresses are secured; (c) describing blocks of host memory with reference to a memory handle; and (d) accomplishing data communication of a described block of host memory via an established VI channel where the data and controls of the VI channel are secured and the data and controls of other VI channels are secured. Security is provided against both erroneous operations and operations intentionally effected by rouge processes.
Owner:MARVELL ASIA PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products