Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

92 results about "Transaction logic" patented technology

Transaction Logic is an extension of predicate logic that accounts in a clean and declarative way for the phenomenon of state changes in logic programs and databases. This extension adds connectives specifically designed for combining simple actions into complex transactions and for providing control over their execution. The logic has a natural model theory and a sound and complete proof theory. Transaction Logic has a Horn clause subset, which has a procedural as well as a declarative semantics. The important features of the logic include hypothetical and committed updates, dynamic constraints on transaction execution, non-determinism, and bulk updates. In this way, Transaction Logic is able to declaratively capture a number of non-logical phenomena, including procedural knowledge in artificial intelligence, active databases, and methods with side effects in object databases.

Multiprocessor computer system having multiple coherency regions and software process migration between coherency regions without cache purges

A multiprocessor computer system has a plurality of processing nodes which use processor state information to determine which coherent caches in the system are required to examine a coherency transaction produced by a single originating processor's storage request. A node of the computer has dynamic coherency boundaries such that the hardware uses only a subset of the total processors in a large system for a single workload at any specific point in time and can optimize the cache coherency as the supervisor software or firmware expands and contracts the number of processors which are being used to run any single workload. Multiple instances of a node can be connected with a second level controller to create a large multiprocessor system. The node controller uses the mode bits to determine which processors must receive any given transaction that is received by the node controller. The second level controller uses the mode bits to determine which nodes must receive any given transaction that is received by the second level controller. Logical partitions are mapped to allowable physical processors. Cache coherence regions which encompass subsets of the total number of processors and caches in the system are chosen for their physical proximity. A distinct cache coherency region can be defined for each partition using a hypervisor.
Owner:IBM CORP

Distributed system and method for guaranteeing transaction consistency and linear consistency

ActiveCN109977171AGuaranteed Conflict Serializable SchedulingEfficient fusionDatabase updatingDatabase distribution/replicationExecution planTimestamp
The invention relates to a distributed system and method for guaranteeing transaction consistency and linear consistency. The distributed system comprises a plurality of clients and a database servercomposed of an access layer, a meta-information management cluster, a global Gts generation cluster and a transaction processing and storage layer. The client is used for providing an interface for interaction with the database server for a user and sending a user request to the database server; the access layer is used for receiving the request sent by the client and analyzing to generate an execution plan; the meta-information management cluster is used for managing the distributed cluster; the global Gts generation cluster is used for generating a global timestamp and uniquely sorting global transactions in the distributed system to realize linear consistency; and the transaction processing and storage layer comprises a plurality of resource management nodes and is used for executing the transaction logic according to the execution plan sent by the access layer, and an obtained result is returned to the client through the access layer. The method and the system can be widely appliedto the field of data processing.
Owner:RENMIN UNIVERSITY OF CHINA

Member name and bank card binding electronic business system and method

This invention relates to a method and system of e-commerce through the consumer registering the businesses number name. A system and method to achievement e-commerce transactions In a public network through Member Name, including,at least terminal devices for consumer, commercial tenants pay device, the card issuing bank payment gateway devices, payment platform devices and the third party logistics unit. Its property is through bundling with the establishment of the card issuing bank payment gateway Member name and their bank cards card number, when consumers apply for e-commerce transactions to the business community, need not submit personal information of bank cards will be able to activate the e-commerce transactions logic, the logic coverage of the state of e-commerce transactions, through unbundling transactions steps to improve the authenticity of transactions, reliability, safety; passage of this invention, consumers can break through the traditional limitations of electronic commerce terminal devices, more convenient, flexible in e-commerce, without worrying about their bank cards leaked confidential information, while businesses can be more convenient and credible conduct of e-commerce; card-issuing banks can develop electronic commerce based on depay without changing existing business processes.
Owner:田小平

Application Method of Online Charging System in Arrears Risk Control System

An application method of On-line Charging System in Arrears Risk Control System: 1) The subsystem of OCS, Mediation, communicates with CC Client, receives a credit control request raised by the CC Client and processes with a fault-tolerant management. 2) The Credit Control analyses call request, identifies a type of service and request, selects necessary service transaction logic, and judges an authorized quota of the service, after receiving the quota, the Credit Control requests for real time forward modeling from the Rating. 3) After receiving a price of the service, the Credit Control requests real time inversion from the Rating and meanwhile transfers the price to the Rating. 4) The Rating requests account comparison from the Account after receiving the price. 5) The Account compares the price with a customer's account information to make decision of subsistence lock, if there is enough balance in the account, then the fee of the price will be deducted from the balance and then locked. 6) The Account returns the account information of the compared result. 7) The Rating inverses the authorization amount according to the compared result returned by the Account, and send back to the Credit Control. 8) The Credit Control constructs a service relevant responding package according to the authorization amount, and sends the responding package to the Mediation to complete the OCS processing flow.
Owner:LINKAGE TECH GROUP +1

Data processing apparatus security

A data processing apparatus operable to access data values, each data value being associated with a respective address value is disclosed. The data processing apparatus comprises: a processor operable to process an instruction which causes a data access request; a main memory operable to store data values, said main memory having a region of secure data values; a cache operable to store previously accessed data values; and cache interface logic comprising: data transaction logic operable to receive a data access request from said processor requesting a data value be accessed in said cache, said data access request having an address value and a security attribute associated therewith; and security determination logic operable, in the event that said security attribute indicates a non-secure data access request, to determine whether said non-secure data access request is associated with said region of secure data values by interrogating a data region allocation table and, in the event that said data region allocation table provides an indication that said address value is not associated with said secure data region, to enable said data access request to complete. By determining whether the non-secure data access request is not associated with the region of secure data, it is possible to ensure that no non-secure data accesses occur for address values within a secure region.
Owner:ARM LTD

Cloud POS (Point Of Sale) terminal based on intelligent device and application, and implementation method thereof

The invention discloses a cloud POS (Point Of Sale) terminal based on intelligent device and application, and an implementation method thereof. The cloud POS terminal comprises an updating request module for initiating an updating request, a transaction control module and an updating control module, wherein the updating request module is in communication connection with the updating control module, the updating control module encrypts the updating request and further transmits the updating request to a background cloud server; the background cloud server comprises an updating acceptation module with a to-be-updated information database and a version information database, a transaction menu and transaction logic control module and a finance terminal firmware control module, wherein the transaction menu and transaction logic control module extracts transaction menu and transaction logic, which need to be updated, from the to-be-updated information database, and transmits the extracted information to the updating request module; the finance terminal firmware control module extracts finance terminal firmware, which needs to be updated, from the to-be-updated information database, and further transmits the extracted finance terminal firmware to the updating request module. By such architecture and mode, users are helped to build a set of powerful, safe, reliable and low-cost cloud POS terminal system.
Owner:SHANGHAI FUIOU PAYMENT SERVICE

Event log recording method applicable to distributed system

The invention relates to the technical field of distributed calculation, in particular to an event log recording method applicable to a distributed system. The event log recording method comprises the following steps of indentifying event logics needing event log recording and event logics needing asynchronous return response in all event logics in the distributed system first; before an event begins, distributing a unique identifier to the event; when the event begins, judging whether the event is an event needing asynchronous return response, and if not, directly executing the event logic and writing the event log into an event log record according to the result; if so, writing the event formation into a temporary table as one record, and then continuously executing the event; finally, intercepting all the received responses, taking the corresponding record out in the temporary table if an identifier in the response is consistent with the identifier of certain record in the temporary table, upgrading an event execution result in the response to the record, and then writing into the event log record. According to the event log recording method disclosed by the invention, the problems of dispersed logs, nonuniform formats and difficulty in management when a traditional distributed system executes events are solved; the event log recording method disclosed by the invention can be used for event log recording of the distributed system.
Owner:G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products