Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

758 results about "System recovery" patented technology

Operation and safety monitoring simulation system for power system

The invention relates to an operation and safety monitoring simulation system for a power system, which comprises a power system full digital real-time simulation subsystem used for simulating the operation of a large-scale power system in real time and providing simulation data to other subsystems, a power market simulation subsystem used for simulating and training power market transaction, a PMU / WAMS subsystem used for carrying out real-time dynamic monitoring and analysis on a simulated power system, an SCADA / EMS subsystem used for monitoring and analyzing the simulated power system, a fault information management subsystem used for managing and comprehensively utilizing fault information, a power system dynamic safety assessment and early warning subsystem used for carrying out safety assessment and early warning on the current power system and carrying out safety verification on the operation mode of a future plan, a safety and stability control system performance test subsystem used for testing the performance of a protective relay device, a power system stabilizer (PSS) and other automated equipment as well as a safety and stability control system and equipment, a power system fault diagnosis subsystem used for carrying out on-line diagnosis and intelligent safety alarming on the fault of the simulated power system and providing a dispatching control decision under the fault condition, and a power system recovery control subsystem used for recognizing the state of the fault of the simulated power system, searching and inferring the power supply path of an outage region and providing a power grid recovery control strategy. The system can simulate the operation of a large-scale power grid in real time, and can be used for searching and comprehensively testing the technology and software of various power systems in dispatching, operation, control and other aspects.
Owner:CHINA ELECTRIC POWER RES INST +1

Persistent snapshot management system

A persistent snapshot is taken and maintained in accordance with a novel method and system for extended periods of time using only a portion of a computer readable medium of which the snapshot is taken. Multiple snapshots can be taken in succession at periodic intervals and maintained practically indefinitely. The snapshots are maintained even after powering down and rebooting of the computer system. The state of the object of the snapshot for each snapshot preferably is accessible via a folder on volume of the snapshot. A restore of a file or folder may be accomplished by merely copy that file or folder from the snapshot folder to a current directory of the volume. Alternatively, the entire computer system may be restored to a previous snapshot state thereof. Snapshots that occurred after the state to which the computer is restored are not lost in the restore operation. Different rule sets and scenarios can be applied to each snapshot. Furthermore, each snapshot can be written to within the context of the snapshot and later restored to its pristine condition. Software for implementing the systems and methods of snapshots in accordance with the present invention may comprise firmware of a hard disk drive controller or a disk controller board or within the HDD casing itself. The present invention further comprises novel systems and methods in which the systems and methods of taking and maintaining snapshots are utilized in creating and managing temporal data stores, including temporal database management systems. The implications for data mining and exploration, data analysis, intelligence gathering, and artificial intelligence (just to name a few areas) are profound.
Owner:COLUMBIA DATA PRODUCTS

Automatic analysis method and system of malicious codes based on API (application program interface) HOOK

The invention provides an automatic analysis method and system of malicious codes based on an API (application program interface) HOOK. An API HOOK technology and a remote thread implantation technology are utilized to monitor samples; influences of the malicious codes on the whole system in an operation process are recorded, and a dynamic analysis report is automatically generated; influences of malicious code samples on a file, a network, and a registry and a key process are recorded, and when the operation of the samples ends, the system recovers the state before the samples are executed; the whole monitoring, recording and reduction process ends automatically without manual intervention; monitoring software can only run a sample each time, the monitoring software is used for monitoring the host process of the samples and process threads created by the host process of the samples, and when the monitoring software finishes the monitoring, the system recovers the state before the samples are operated; behaviors such as creation, deletion, modification and the like of the malicious code samples on the file are detected, operation behaviors of the malicious code samples on the network are detected, behaviors such as addition, deletion, modification and the like of the malicious code samples on the registry are detected, and operation behaviors of the malicious code samples on the create process are detected; and finally the dynamic monitoring report on the malicious code samples is submitted, and when the monitoring is finished, the monitoring software carries out inversion operation to restore the system to the state before the samples are operated according to the operations and influences of the samples on an operating system. The intelligent analysis technology of the malicious codes is suitable for analyzing a great deal of samples without the manual intervention, and is quicker in analysis speed and less in garbage in the analysis report.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Method for sensing and recovery against buffer overflow attacks and apparatus thereof

Methods and apparatuses for detecting and recovering from a buffer overflow attack are provided. A method of recovering an operation state of a processor from a buffer overflow attach includes: detecting whether a buffer overflow attack is made on any write operation while storing write operations that are potential targets of buffer overflow attacks in a predetermined location instead of an original destination to store write operations; storing the contents stored in the predetermined location at a predetermined interval in the original destination for storing write operations if no buffer overflow attack is detected and discarding unsafe write operations subsequent to a buffer overflow attack if a buffer overflow attack is detected; and ignoring the unsafe write operations subsequent to the buffer overflow attack if a buffer overflow attack is detected. Therefore, a buffer overflow attack occurring in a computer can be effectively detected, and damage of a system which is attacked can be minimized and the system can be recovered or return to the original state before the attack. A system can be effectively protected while minimizing reduction in performance of the computer system according to a method used to implement the present invention, thereby greatly improving the environments under which the computer and the Internet are used.
Owner:HANBAT NAT UNIV IND ACADEMIC COOPERATION FOUND

Concurrent connections performance testing system and method for file system

ActiveCN102035697AUnderstand the actual situationIncrease profitData switching networksSystem under testTask management
The invention discloses a concurrent connections performance testing system and a concurrent connections performance testing method for a file system. A master control node and at least one testing node are arranged, wherein the testing node is arranged on an application server of a storage system, is mainly used for simulating an application load to test a tested system, is connected with the tested file system through a storage network, and is used for testing the tested system; and the master control node performs centralized management which comprises process scheduling and task management on the testing node through a local area network, and is used for performing centralized management on all testing nodes and counting a test result. The system comprises a parameter processing module, a tested system information collecting module, a system initialization module, a condition monitoring module, a distributed management module, a load testing module, a result counting and reporting module and a system recovery module, solves the problems that the concurrent connections of the file system are not definitely defined and a detailed and useable testing method is lacked in the prior art, and is particularly suitable for the concurrent connections performance test of a distributed file system.
Owner:NO 15 INST OF CHINA ELECTRONICS TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products