Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

281 results about "Syslog" patented technology

In computing, syslog /ˈsɪslɒɡ/ is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity level.

System and method for peer to peer synchronization of files

InactiveUS20060242206A1Currency is bulkyMinimum configuration effortDigital data information retrievalData processing applicationsFile synchronizationOperational system
A system and related techniques provide a seamless, peer-to-peer file synchronization capability for sharing files, folders, directories or other stored content between machines. According to embodiments of the invention in one regard, a sync engine or other file management logic may be integrated into the operating system or other resources of a user's desktop, laptop, network-enabled cellular device or other computer, client, machine or other hardware. The sync engine may accept user designations of files, folders, directories or other contents which they wish to share, sync or roam between two or more selected machines, on an automatically consistent basis. The sync engine or other control logic may maintain a file system log to record the state of files which have been designated for sharing, to indicate for example whether a transmission of the file has been made, to which target machine or machines it has been transmitted, and other variables regarding the state of file or other content. According to embodiments of the invention in one regard, the sync engine may apply version management logic when files located on a target or destination machine, may, for example, reflect newer or more complete content than the file which is designated for roaming to that machine, or other under conditions. A user may therefore readily and with a comparative minimum of configuration effort select and effectuate the sharing of a set of frequently used or otherwise desired files to an arbitrary set of machines which they own or use, without a need to invoke a remote server or other control or storage to back up and synchronize that content.
Owner:MICROSOFT TECH LICENSING LLC

High-performance Syslog processing and storage method

The invention is high performance Syslog log processing and storing method, and the steps are: (1) receiving log: log sever software receives the syslog data message by separated thread running method via bound UDP port (514), and the data message is generated into data class of syslog, and the data class of syslog is written in log buffer; (2) log buffer: the log buffer takes charge of storing the received syslog log data temporarily; (3) log normalization processing: detects the head of log buffer by separated thread, if the log buffer has new data, and the data will be extracted from buffer queue, and log will execute normalization processing according to field description information of log normalization configuring file, and call the log storing module to store the log as uniform format; (4) log storage: using the storing thread pool to write said normalization log on log storage file, every thread takes charge of writing log data in one file, and several threads can write the logs in different directories and discs, and improve the storing efficiency. The technical schedule adopts asynchronies log processing and intercurrent log storage technique, and two taches can inherit each other and coordinates the problems of log amount and log inercurrent amount, and use time to change time, and improve the log processing ability greatly.
Owner:QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC

Log organization structure clustered based on transaction aggregation and method for realizing corresponding recovery protocol thereof

The invention discloses a log organization structure clustered according to transaction aggregation and a recovery protocol based on the log organization structure clustered, which can be applied to a transactional data management system of a large-sized computer. A log file is sequentially organized to a plurality of log fragments and each log fragment is used for storing the log content of the same transaction and reserving a transaction number as well as a preceding log fragment pointer of the transaction; a data page number involved in a log entry of the same fragment is stored in the form of an array. When the system is operating, each transaction only writes its own log fragment and writes the log fragment in the log file when the transaction is submitted. In a recovering process, the system can be recovered to a lasting and consistent state by scanning all the log fragments for remake and returning the log fragments of all the active transactions for return. The problem of producing bottlenecks during writing logs in the traditional transactional data management system is resolved and log amount of the system can be effectively reduced.
Owner:天津神舟通用数据技术有限公司

Reverse-based intrusion detection system and reverse-based intrusion detection method

The invention discloses a reverse-based intrusion detection system and a reverse-based intrusion detection method and relates to the field of network encryption protocols. The system comprises a data extraction module, a reverse analysis module, an intrusion rule module, a response module and a data management module. The method comprises the following steps: (1) capturing all network data packages running through an Android phone by the data extraction module, sending to a reverse analysis engine, acquiring network processes and user behaviors by the data extraction module to generate a system log and a weblog, and sending the system log and the weblog to the data management module; (2) identifying intrusion behaviors by the reverse analysis engine through the TCP/IP (transmission control protocol /Internet protocol) analysis technology and the apk decompilation reverse technology by combining the system log and the weblog; (3) performing warning and recording on the intrusion behaviors identified by the reverse analysis engine through the response module; (4) storing all information of a user in the data management module so as to facilitate later evidence collection and lookup. The reverse-based intrusion detection system and the reverse-based intrusion detection method disclosed by the invention have safety, timeliness, expandability and advancement.
Owner:WUHAN HONGXU INFORMATION TECH

DC online monitoring and management system and management method

The invention relates to a DC online monitoring and management system and management method. Included are an on-site data real-time acquisition module and a service system application module. The on-site data real-time acquisition module provides basic data for the online monitoring and management system, takes charge of communication with a terminal acquisition device and stores operating logs in a text mode; the communication data are saved to a database through the network communication connection and disconnection; the service system application module relies on the acquired data by the on-site data real-time acquisition module as service application, display on-site device data indicators and prompting early warning information. The invention is advantageous in that the system operating condition information is recorded in the system logs through on-site real-time data acquisition and IP address monitoring, real-time query and monitoring can be done through the service system and the operating state of the real-time acquisition device is achieved. The invention displays operating conditions of the device intuitively by way of information management and conducts remote management and monitoring of the device.
Owner:ANSHAN POWER SUPPLY COMPANY OF STATE GRID LIAONING ELECTRIC POWER COMPANY +2

Abnormal detection system based on outlier excavation

An abnormal detection system based on outlier excavation comprises a data acquisition unit, a storage data base, a feature selection module, a data excavation module, a normal activity profile data base and a classifier. The data acquisition unit is used for acquiring network data. An output end of the data acquisition unit is connected with a signal input end of the storage data base. Two signal output ends of the storage data base are respectively connected with a corresponding signal input end of the feature selection module and a corresponding signal input end of the data excavation module. The other signal input end of the data excavation module is connected with the normal activity profile data base. Signal output ends of the feature selection module and the data excavation module are respectively connected with corresponding signal input ends of the classifier. A signal output end of the classifier is used for outputting of the abnormal detection system based on the outlier excavation and a detection state is displayed. According to the system, network data, namely, a high-dimensional, sparse and nonlinear dataset composed of a large amount of system logs and audit records is processed, false alarm rate is reduced and system detection performance is improved.
Owner:WUXI NANLIGONG TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products