Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

57 results about "Relational system" patented technology

A relational database is a database model that stores data in tables. The vast majority of databases used in modern applications are relational, so the terms "database" and "relational database" are often used synonymously. Likewise, most database management systems (DBMSes) are relational database management systems (RDBMSes).

Digital mine safety monitoring and inspecting system

The invention provides a digital mine safety monitoring and inspecting system which sequentially comprises four layers, namely a system hardware and network platform, an operation system and database management system platform, a safety monitoring and inspecting system base platform and a safety monitoring and inspecting system software platform, wherein in the four layers, the lower layer provides service for the upper layer and provides interactive connectors. The digital mine safety monitoring and inspecting system is integrally constructed on the hardware platform and network platform, and interaction between the digital mine safety monitoring and inspecting system and a bottom layer hardware facility and a monitoring and inspecting system is achieved through an operation system and a database management system, the interactive information is processed and stored in the safety monitoring and inspecting system base platform in distributing mode, and the safety monitoring and inspecting system software platform at the highest layer achieves scanning and processing on the interactive information through different functional subsystems and issues control information to the operation system and database management system platform through the safety monitoring and inspecting system base platform. The digital mine safety monitoring and inspecting system has the advantages of being capable of achieving safety monitoring, safety alarm and safety control on mines.
Owner:SHANDONG GOLD GROUP

Data processing system and method for detecting mandatory relations violation in a relational database

Machine automated techniques are described for a method of data processing called Relationships Processing. A computing system is disclosed which provides for the high speed recording and extraction of data objects (entities) and for the development of data representing a queried relationship between the entities. Furthermore, methods and systems are disclosed to detect mandatory relations violation between entities by examining whether certain relations exist. The system is expandable to handle the relatively voluminous data bases of large commercial data repositories. A user defines a set of entities and allowed relationships between the entities. The user can expand this set of allowed entities and relationships at any time during the life of the system without reprogramming or compiling of computer program code or disrupting concurrent operational use of the system. Large systems can now be built that are no longer limited to the scope of design requirements known during initial system development. For a given set of defined relationships the system allows the user to perform complex inquiries (again without programming at the code level) that would normally require multiple nested inquiries to be coded programmatically and would not achieve the performance levels of the Relationships Processor.
Owner:FINANCIAL SYST TECH

Alliance chain node secret-key distribution and backup system by improved BIP protocol

The invention relates to an alliance chain node secret-key distribution and backup system by an improved BIP protocol. The method comprises four parts including a seed construction module, a secret-key derivative module, a secret-key backup module and a secret-key recovery module, wherein the seed construction module is used for generating a secret-key seed organized in an alliance chain network;the secret-key derivative module is used for calculating an NVP node secret-key pair by using the secret-key seed, and comprises two parts including NVP node secret-key derivation and NVP public-key calculation; the secret-key backup module is used for backing up the secret-key seed and an index sequence input by an NVP node in the secret-key derivative module, and comprises a seed backup module and a derivative index backup module; and the secret-key recovery module is used for recovering the secret key of the NVP node after the secret key of the NVP node is lost, and comprises three parts including a seed recovery sub-module, an index recovery sub-module and a secret-key recovery sub-module. The invention creates a safe and reliable secret-key relationship system, which can safely generate seeds and store backup; and multi-secret-key extension is supported.
Owner:BEIJING UNIV OF TECH

Summary graph generation method of system log dependency graph for attack investigation and restoration

The invention provides a summary graph generation method of a system log dependency graph for attack investigation and restoration, comprising: determining a system entity dependency graph of an attack event to be investigated and restored, the dependency graph comprising system entity nodes associated with the attack event and a call relationship between the system entity nodes; the system entity nodes comprise process nodes and resource nodes; executing hierarchical random walk on process nodes in the dependency graph, and determining behavior representation of the process nodes; clustering the process nodes based on the behavior representation, and dividing the dependency graph into at least one first sub-graph based on a clustering result; compressing each first sub-graph to obtain at least one second sub-graph; generating a summary corresponding to each second sub-graph, and obtaining a summary graph corresponding to the dependency graph. According to the method, the dependency graph is divided into the sub-graphs, and the simple summary is provided for each sub-graph to generate the summary graph, so that the summary of related system activities and the summary information of the sub-graphs related to attacks can be conveniently checked.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products