Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36 results about "Request for Comments" patented technology

Request for Comments (RFC), in information and communications technology, is a type of text document from the technology community. An RFC document may come from many bodies including from the Internet Engineering Task Force (IETF), the Internet Research Task Force (IRTF), the Internet Architecture Board (IAB), or from independent authors. The RFC system is supported by the Internet Society (ISOC).

Formalization detection method and system for malicious URL (uniform resource locator)

The invention discloses a formalization detection method for a malicious URL (uniform resource locator). The formalization detection method comprises the following steps of: splitting the URL to be detected into syntactic element character strings according to a URL syntactic structure on the basis of the standard of RFC (request for comments); extracting designated character strings from the character strings obtained by splitting; performing completing treatment on the non-existent character strings; reordering the character strings obtained after completing treatment to obtain a new URL, and calculating the hash value of the new URL; and traversing a malicious URL feature library, and performing contrast detection on feature data in the malicious URL feature library and the hash value of the URL to be detected. The invention further discloses a formalization detection system for the malicious URL. The technical scheme disclosed by the invention can be effectively used against the variability in the formats of the URL; and compared with the traditional URL detection method, the detection rate against the malicious URL which often changes the format is higher, and a single feature can also be adopted for corresponding to multiple format variants of the malicious URL, so that the volume of a virus feature library required for the detection method is smaller, and the space of a memory and a magnetic disk can be further saved.
Owner:HARBIN ANTIY TECH

Multi-stage hierarchical bandwidth management method

The invention discloses a multi-stage hierarchical bandwidth management method, which comprises the following steps of: A10, configuring CIR (Committed Information Rate) and PIR (peak Information Rate) (or EIR (Excess Information Rate)) of each stage of scheduling node according to a business model, wherein the CIR of the node is set according to the bandwidth purchased by a user in the first stage, the bandwidth distribution principle of each node from the second stage of scheduling is shown in the description, EIRni=PIRni-CIRni, and n is not less than 2; and A20, respectively marking messages as green, yellow or red by using MEF (Managed Extensibility Framework), RFC2697 (Request for Comments 2697) or RFC2698 algorithms in the first stage, configuring each node into a color sensitive mode and a coupling mode from the second stage, and shaping the traffic according to the MEF algorithm. By using the invention, the multi-stage hierarchical bandwidth management is realized on an exchanging chip supporting the MEF Traffic Shaping algorithm without need of special ASIC (Application Specific Integrated Circuits) or hardware; and the requirements are satisfied through updating software under the situation of changing or updating the business so that considerable hardware cost is saved; and the bandwidth distribution algorithm of the hierarchical business model is simple and convenient for web masters to configure.
Owner:FENGHUO COMM SCI & TECH CO LTD

Method and device for realizing PIM multicast in VRRP network environment

ActiveCN103227724AEnable co-deploymentSolve the problem that multicast cannot be deployed at the same timeSpecial service provision for substationIP multicastProtocol Independent Multicast
The invention discloses a method for realizing PIM (Protocol Independent Multicast) in a VRRP (Virtual Router Redundancy Protocol) network environment. A virtual IP (Internet Protocol) address is carried when a PIM Hello message is transmitted to an interface for enabling the VRRP; when the PIM Hello message is received, the virtual IP address of the VRRP is used for establishing a PIM neighbor, so that unicast and multicast services can be simultaneously used as a host and a backup in the VRRP network environment. Meanwhile, the virtual IP address of the VRRP is completely compatible with a current RFC (Request for Comments) protocol, and so that the problem that the VRRP and the multicast cannot be deployed simultaneously at present is solved. The invention also discloses a device for realizing the PIM multicast in the VRRP network environment. The device comprises a transmitting module and a receiving module, wherein the transmitting module is used for transmitting the PIM Hello message carrying the virtual IP address; and the receiving module is used for receiving the PIM Hello message and selecting and transmitting a router of the PIM Hello message to establish the PIM neighbor by using a real address or the virtual IP address. The method and the device disclosed by the invention have the characteristics that the protocol is simple and the deployment is flexible; common deployment of the VRRP and the multicast can be realized; and the host and backup of the unicast and the multicast can be allowed at the same time.
Owner:北京华三通信技术有限公司

File processing method and device

ActiveCN106599328ASeek advice comprehensivelyAvoid changeOffice automationFile access structuresUser inputSecond opinion
The invention discloses a file processing method and device, which can be used for increasing the efficiency of opinion collection and adoption of files and preventing from changing the working process of the opinion collection and adoption without authorization. The method comprises the following steps: receiving a file to be consulted, converting the visual and readable file to be consulted to a file which is organized based on a structured way, and displaying the file which is organized based on the structured way, wherein the the file which is organized based on the structured way comprises a root unit, a branch unit and a leaf unit; receiving the first opinion information which is input by a first user and aims at the root unit, the branch unit or the leaf unit; receiving the first adoption information of a second user to the first opinion information; receiving the second opinion information of a third user to the adoption information; receiving the second adoption information of a fourth user to the second opinion information, and returning to receive the second opinion information of the third user to the adoption information; and after achieving the preset conditions, stopping receiving the first opinion information, the first adoption information, the second opinion information and the second adoption information.
Owner:AGRICULTURAL BANK OF CHINA

Method for querying hierarchical node data

The invention discloses a method for querying hierarchical node data. By using the method, MDX (multidimensional expressions) statements, BWETL (band width extract transform and load) data extracting and RFC (request for comment) remote functions are invoked integrally, the hierarchical node data are queried, hierarchical nodes are inputted, and queried nodes are inputted on a data retrieval platform. The method for querying hierarchical node data comprises the following steps of examination on authorization: verifying authorization of inputted nodes and personnel using the method; parameter transmitting: transmitting parameters to a function if verification passes and performing specific data extracting operation; executing on a node report: invoking a BWQUERY node report according to the parameters after the parameters are received by the function; invoking of the MDX statements: invoking the MDX statements if data of the inputted nodes exist, transmitting the running result of the report to an inner table of the function and maintaining the running result as a queried parameter; and returning of the result: reading data from a DSO (digital storage oscilloscope) model according to the node parameters and limiting conditions of the function, and returning the result to the data retrieval platform to obtain the hierarchical node data. By using the method, the data acquisition efficiency is improved, and data uploading is stable.
Owner:STATE GRID CORP OF CHINA +3

Formal detection method and system for malicious url

The invention discloses a formalization detection method for a malicious URL (uniform resource locator). The formalization detection method comprises the following steps of: splitting the URL to be detected into syntactic element character strings according to a URL syntactic structure on the basis of the standard of RFC (request for comments); extracting designated character strings from the character strings obtained by splitting; performing completing treatment on the non-existent character strings; reordering the character strings obtained after completing treatment to obtain a new URL, and calculating the hash value of the new URL; and traversing a malicious URL feature library, and performing contrast detection on feature data in the malicious URL feature library and the hash value of the URL to be detected. The invention further discloses a formalization detection system for the malicious URL. The technical scheme disclosed by the invention can be effectively used against the variability in the formats of the URL; and compared with the traditional URL detection method, the detection rate against the malicious URL which often changes the format is higher, and a single feature can also be adopted for corresponding to multiple format variants of the malicious URL, so that the volume of a virus feature library required for the detection method is smaller, and the space of a memory and a magnetic disk can be further saved.
Owner:HARBIN ANTIY TECH

Information transmission method, media gateway and base station controller

InactiveCN103888985ASolve the problem of failure of some operation and maintenance functionsSolve the problem of failure of operation and maintenance functionsWireless communicationInformation transmissionMultiple frequency
The invention provides an information transmission method, a media gateway and a base station controller. The method comprises: under the condition of IP (internet protocol) conversion of an A interface, receiving DTMF (dual tone multiple frequency) signals sent by user equipment, the DTMF signals comprising button information of the UE (user equipment); converting the DTMF signals into RFC2833 (request for comment 2833) messages, the RFC2833 messages comprising the button information of the use equipment; and sending the RFC2833 messages to the BSC (base station controller) of a BSS (base station subsystem). Since the DTMF signals comprising the button information of the UE are converted into the RFC2833 messages comprising the button information of the user equipment, in the BSS, the button information of the user equipment can be obtained by directly using the BSC to parse the RFC2833 messages, and the operation maintenance of a network is carried out according to the button information of the user equipment, so that the problem of partially failed operation maintenance functions caused by the lack of a transcoder (TC) in the BSS after the conversion of the A interface is solved.
Owner:HUAWEI TECH CO LTD

Email receiving and sending system and method implemented by using Bluetooth

The invention discloses an email receiving and sending system implemented by using Bluetooth. The system comprises a packaging module, a search module, a connection module and a sending module, wherein the packaging module is used for packaging emails conforming to an RFC2822 (request for comments) format into an OPP (object push profile) format which can be identified by Bluetooth; the search module is used for searching the Bluetooth of a receiving party in a coverage area; the connection module is used for reading a Bluetooth matching chain list of a sending party, and establishing a connection between the Bluetooth of the sending party and the Bluetooth of the receiving party; and the sending module is used for prompting the receiving party to confirm whether to agree to receive the email, when the receiving party refuses to receive the email, prompting a situation of failing to send the email and ending the operation, and when the receiving party agrees to receive the email, sending the email through an OPP protocol. The invention also provides an email receiving and sending method implemented by using Bluetooth. According to the invention, an effect of sending and receiving emails by using Bluetooth in a mobile phone can be achieved, operations of email sending and receiving are convenient and quick, and no flow fee is required to be paid.
Owner:SHENZHEN FUTAIHONG PRECISION IND CO LTD +1

Method for realizing communication of enterprise switchboard

The invention discloses a method for realizing communication of an enterprise switchboard. The method comprises the following steps: DTMF (Dual-Tone Multi-Frequency) data formed into a data packet according to the set rule and format so that the data is sent in an extended RFC (Request for Comments) format; after a user and the switchboard establish connection, the data packet in the extended RFC format is sent to the switchboard through a client side, and then the switchboard receives the data packet in the extended RFC format and analyzes the data packet to obtain personal information of the user; a menu drive unit drives a menu to be automatically displayed on a display unit of the client side when the user dials the number of the switchboard, and then the user can select the needed functions according to the menu; the client side sets conversation information and operation information in the data packet in the extended RFC format sent to the switchboard; and the switchboard receives the data packet in the extended RFC format and analyzes the data packet to obtain the conversation information and the operation information so as to further perform subsequent operation according to the obtained information. The method disclosed by the invention has the beneficial effects that the standard RFC format is extended, and the personal information of the user, the conversation information and the operation information are set in the newly added field add, which can reduce pressure on a background server of the switchboard and improve the operating efficiency.
Owner:杭州世导通讯有限公司

Multi-stage hierarchical bandwidth management method

ActiveCN102185777BLow costConsiderable cost savingsData switching networksExtensibilityPeak information rate
The invention discloses a multi-stage hierarchical bandwidth management method, which comprises the following steps of: A10, configuring CIR (Committed Information Rate) and PIR (peak Information Rate) (or EIR (Excess Information Rate)) of each stage of scheduling node according to a business model, wherein the CIR of the node is set according to the bandwidth purchased by a user in the first stage, the bandwidth distribution principle of each node from the second stage of scheduling is shown in the description, EIRni=PIRni-CIRni, and n is not less than 2; and A20, respectively marking messages as green, yellow or red by using MEF (Managed Extensibility Framework), RFC2697 (Request for Comments 2697) or RFC2698 algorithms in the first stage, configuring each node into a color sensitive mode and a coupling mode from the second stage, and shaping the traffic according to the MEF algorithm. By using the invention, the multi-stage hierarchical bandwidth management is realized on an exchanging chip supporting the MEF Traffic Shaping algorithm without need of special ASIC (Application Specific Integrated Circuits) or hardware; and the requirements are satisfied through updating software under the situation of changing or updating the business so that considerable hardware cost is saved; and the bandwidth distribution algorithm of the hierarchical business model is simple and convenient for web masters to configure.
Owner:FENGHUO COMM SCI & TECH CO LTD

Fault-tolerant mechanism optimised for peer to peer network

#CMT# # / CMT# The device has an admission unit i.e. admission component, for inserting a new node within a peer-to-peer network (Np2p) of a communication element (E1) e.g. application server in a communication architecture, where the network is composed of nodes (N1-N5). The admission unit determines the adjacent nodes deployed on a same processing equipment, and inserts the new node between the nodes. The nodes (N1-N5) are arranged in circular form such that each node possesses a single successor node and a single predecessor node. #CMT# : # / CMT# An independent claim is also included for a communication element comprising a peer-to-peer network. #CMT#USE : # / CMT# Device for managing a peer-to-peer network of a communication element (claimed) e.g. application server in a communication architecture i.e. Internet protocol multimedia subsystem architecture, or signaling element e.g. proxy conforming to a session initiation protocol defined by Request for Comments (RFC) 3261 of Internet Engineering Task Force (IETF), or call session control function within the architecture. #CMT#ADVANTAGE : # / CMT# The device is configured such that two of the nodes are not present in the same processing equipment, thus limiting the simultaneous failure of the nodes, while eliminating the need for changing fault-tolerant mechanisms. #CMT#DESCRIPTION OF DRAWINGS : # / CMT# The drawing shows a schematic view of a communication element. E1, E2 : Communication equipments LB : Load distribution module Np2p : Peer-to-peer network N-TEL : Communication network N1-N5 : Nodes.
Owner:ALCATEL LUCENT SAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products