Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

127 results about "Software network" patented technology

Method, Device, and Routing System for Data Transmission of Network Virtualization

A method resolves connectivity of services inside a network virtualization system when a virtual cluster system supports unicast IP, L2VPN, and L3VPN services, so that the software network virtualization system can support various types of services efficiently and with high quality. The method includes: creating, on a control device, a virtualized remote logical interface for an external interface of a remote access node; identifying, by the control device according to a service configured on the virtualized remote logical interface, a service type of the service, and generating virtual link forwarding entries of the remote access node and a core aggregation node; and sending, by the control device, the virtual link forwarding entry to the remote access node and the core aggregation node, so as to set up a virtual link between the core aggregation node and the remote access node.
Owner:HUAWEI TECH CO LTD

Network Controller for Managing Software and Hardware Forwarding Elements

Some embodiments provide a set of one or more network controllers that communicates with a wide range of devices, ranging from switches to appliances such as firewalls, load balancers, etc. The set of network controllers communicates with such devices to connect them to its managed virtual networks. The set of network controllers can define each virtual network through software switches and / or software appliances. To extend the control beyond software network elements, some embodiments implement a database server on each dedicated hardware. The set of network controllers accesses the database server to send management data. The hardware then translates the management data to connect to a managed virtual network.
Owner:NICIRA

Multi-feature mobile terminal malicious software detecting method based on network flow and multi-feature mobile terminal malicious software detecting system based on network flow

The invention discloses a multi-feature mobile terminal malicious software detecting method based on network flow and a multi-feature mobile terminal malicious software detecting system based on the network flow. The method comprises the following steps of: extracting features capable of effectively representing mobile terminal malicious software network behaviors from network flow data; classifying the extracted features capable of effectively representing the mobile terminal malicious software network behaviors according to different feature types; building detecting models adapting to the classified features, wherein each kind of types has one corresponding unique detecting model; and selecting the corresponding detecting model for each kind of features, and outputting the corresponding detecting result. By aiming at different feature types of the mobile terminal network flow, the detecting models adapting to different feature types are designed; a user can select the required model by the self according to requirements; the detecting accuracy can be improved to a certain degree through different detecting models designed by aiming at different feature types; and the individualized requirements of the user are met.
Owner:UNIV OF JINAN

Communication method of programmable virtualized router based on NetFPGA

The invention discloses a communication method of a programmable virtualized router based on NetFPGA. The communication method comprises the steps that virtualized software is installed on a host to acquire a plurality of virtualized containers, and routing protocol software is installed in each virtualized container to acquire a virtualized router; virtualized ethernet cards are set up inside each virtualized router, wherein the number of the virtualized ethernet cards is equal to the number of hardware network interfaces of bottom-layer NetFPGA; a software network bridge is arranged to bridge between the virtualized ethernet cards and the physical hardware network interfaces, each virtualized router receives a data package from a NetFPGA board card network interface through the virtualized ethernet cards and the software network bridge, routing information is acquired through the treatment of each virtualized router, the routing information is transmitted to a register of the NetFPGA through the virtualized ethernet cards and the software network bridge, and then the retransmission of the data package is achieved through the NetFPGA board card network interface and an outside network. Network communication of a plurality of programmable virtualized routers can be achieved through the software network bridge.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

System and method of semi-autonomous multimedia presentation creation, recording, display, network streaming, website addition, and playback.

The invention disclosed is a software and hardware system that allows complex multimedia presentations to be created, performed, recorded, streamed over a network, and automatically added to a website, without the need of human input other than that of the presenter. It is the first system to combine the following technologies into a single system of interdependent hardware and software: presentation creation software, network communication, media syncing, multiple remotely controlled motorized camera apparatuses, motion tracking, voice recognition, media projection software, recording and streaming of both live and recorded media, and automated website management.
Owner:BATSON STEVEN GEORGE

Exposing a bridged network as a single virtual segment

A software network bridge is disclosed which allows the connected network segments to be presented as a single network unit to the host computer. The software bridge can be implemented as an intermediate network driver, abstracting multiple network segments into a single network interface for higher level protocols and applications. While the intermediate network driver acts as a software bridge implementing the Spanning Tree Algorithm, it also acts a network interface driver to higher level protocols, conglomerating information from the multiple underlying network interface cards and forwarding along commands from the higher level software to the appropriate network interface card. The intermediate network driver can also simultaneously send the same data packet through multiple network interfaces by creating multiple packet descriptors, each pointing to the same data, but each given individually to the underlying network interfaces to control during their transmission. Further efficiencies can also be achieved by the software bridge, implemented as an intermediate network driver, through the use of a dynamic allocation scheme which increases the size of the useable buffers of each network interface without increasing the overall memory consumption, and the use of a queuing scheme which preliminarily examines incoming data packets to determine if any processing needs to be performed, and queues the packets should they require processing. Additionally, a user interface is presented exposing this functionality of the intermediate network driver.
Owner:MICROSOFT TECH LICENSING LLC

Fault prediction method based on software network feature learning

The invention discloses a fault prediction method based on software network feature learning, and belongs to the field of software complicated networks. The method comprises the steps that source codes and defect information of each version of target software are obtained to construct a software defect network; multi-layered structure metric elements aiming at internal features, local features andglobal features of software defect network nodes are designed to construct a defect prediction data set; preprocessing is conducted on a defect prediction data set by using a maximized minimum methodand a PCA dimensionality reduction method; the best defect prediction model suitable for the software is established by using prediction model preference method of a dynamic prediction threshold filtering algorithm, and defect prediction effects and scores are given. According to the method, a complicated network technology is introduced to the defect prediction, a set of matric elements capableof reflecting the local and global features of defects in the software is designed by using complicated network matric parameters, the most suitable defect prediction model of the target software canbe selected to perform defect and fault prediction on the target software, and manpower and time cost is reduced to the most extent.
Owner:BEIHANG UNIV

Defect high-risk module identification method based on software network

The invention provides a defect high-risk module identification method based on a software network, and belongs to the field of software complex networks. The method comprises the steps that 1, constructing an adaptive classifier, whrein the adaptive classifier comprises a plurality of classifiers; step 2, performing adaptive feature selection; step 3, performing adaptive threshold optimization; step 4, optimizing the internal parameters of the adaptive classifier; and 5, selecting a self-adaptive optimal prediction model, and performing defect high-risk module identification on the to-be-tested software network by using the optimal prediction model. For any type of defect data set, contents in five aspects of construction of the self-adaptive classifier, self-adaptive feature selection, self-adaptive threshold optimization, self-adaptive classifier internal parameter tuning, selection of a self-adaptive optimal prediction model and the like can be completed according to the characteristics of a data set, the best defect prediction result is obtained, and a high-risk software module is identified.
Owner:BEIHANG UNIV

Communication system, switching method used in communication system and network management server

The present invention relates to a communication system, comprising: a first network device; a second network device having the same hardware configuration as the first network device; a first network management server, used to monitor the working status of the first network device and receive the first network device The working configuration information backed up by the device and transmit the working configuration information to the second network device; when the first network device reaches the preset failure condition, switch the second network device from the hot standby mode to the working mode, so that the second network device can use the working mode configuration information to operate. The invention also relates to a switching method and a network management server. The present invention is based on the fact that the network management server realizes the dual-computer hot standby switching of the network equipment without modifying the software and hardware of the network equipment, which simplifies and standardizes the management and monitoring of the network equipment, especially the switch, and improves the reliability of the communication system. And disaster recovery, saving costs, and it is also applicable to various types and brands of network equipment.
Owner:HYTERA COMM CORP

Software key function identification method based on complex network fault propagation

InactiveCN105045574ACompliant with the actual software systemGuaranteed uptimeSpecific program execution arrangementsCascading failureNODAL
The invention discloses a software key function identification method based on complex network fault propagation. The software key function identification method comprises the following steps: 1) according to a source code, carrying out subfunction and calling relation extraction on a program, and carrying out abstraction to obtain a network chart of a software structure; 2) according to a probability of calling and executing each subfunction, endowing each side with a certain weight w, wherein the weight is a failure probability of inter-function cascading faults; 3) analyzing the topological structure characteristics of software, and calculating an in-degree value and an out-degree value of each node, wherein the in-degree value of the node is a frequency that the function is called by other functions, and the out-degree value of the node is the frequency that the function calls other functions; 4) carrying out a cascading failure simulation experiment on each node of a software network, and calculating the node numbers G, i.e., the criticality, of a maximum connected subgraph of the software network after each node is subjected to stable failure; and 5) sorting the G in an increasing sequence to obtain the criticality of each function. The software key function identification method is simple and reliable. Compared with a traditional method, the software key function identification method can precisely identify a software key function.
Owner:ELECTRIC POWER RES INST OF GUANGDONG POWER GRID

Management system and implementation method used for interconnection between industrial internet of things and Ethernet

The invention discloses a management system and an implementation method used for interconnection between an industrial internet of things and an Ethernet. The management system is a network management system for internets of things, can be operated remotely, and is mainly applied to industrial internets of things and other industrial wireless networks. The management system comprises two major parts of an internet-of-things access module and a network module, wherein the internet-of-things access module adopts a wireless network for industrial automation (WIA) industrial protocol to exchange data with the internet of things, and the network module outputs received data in the internet of things to the remote Ethernet. Three connector modes are provided and include that a traditional registered jack-45 (RJ-45) connector and a traditional recommended standard-232 (RS-232) connector are accessed to the Ethernet through a modem, and a universal series bus (USB) is accessed to the Ethernet through a wireless network card, so that the management system can adapt to different environments and enables mounting and using processes to be more convenient and faster for a user. The implementation method includes that embedded Web services are provided for the user at the same time through a radio frequency data receiving and transmitting module and a software network module, real-time monitoring and control functions can be achieved depending on a Web browser, and the real-time performance, the network performance and the reliability of the management system are hard to match by other systems.
Owner:MICROCYBER CORP

Integrated Software Network Agent

A model for the next generation of software network agents for downloadable software is provided. The software network agent delivers a streamlined user experience that presents the user with options to try or buy. The agent may be co-branded for merchant and affiliate marketing. The agent may be integrated with a number of services, such as ecommerce systems, affiliate marketing network systems, site optimization, web analytics and email marketing systems that enable a merchant to enhance the user experience and improve marketing. A user's actions may be tracked in order to provide OEMs and retailers payout on purchase referrals to the merchant's online store. Code changes and bug fixes can be made at the server and in a timely manner with minimal impact to the various systems supporting the software activation user experience.
Owner:DIGITAL RIVER INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products