Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

52 results about "Transparent computing" patented technology

Transparent computing is a computing paradigm in which services are shared. It is considered a form of persuasive computing.

Transparent computing method and transparent computing system based on virtualization technology

The invention discloses a transparent computing method and transparent computing system based on the virtualization technology. Through the virtualization technology, physical differences between different hardware platforms of a client are shielded, wide support for different hardware devices is provided, the mobility requirement of a user is met, application service support across terminal devices and operating systems is provided for the user, and the user does not need to worry about management of computer hardware devices and systems. The scheme is achieved in the transparent computing system based on a wide area network, a request is started by the client in the transparent computing system, legality of the request is confirmed through a management client and a transparent main server of a software resource server, connection of resources is given, instance operating systems stored in the transparent software resource server are loaded remotely and run, needed service is acquired, and the task requirement of the user is completed. The transparent computing method and transparent computing system based on the virtualization technology can adapt to different hardware platforms and operating system platforms, can be started on the wide area network faster, and is higher in safety performance and practicability.
Owner:HUNAN NEW CLOUDNET TECH CO LTD

Method for remotely starting transparent computing system client through wireless local area network

The invention relates to a method for remotely starting a transparent computing system client through a wireless local area network, which belongs to the technical field of computing systems. The method comprises that: the client executes a guide code in a guide chip and searches for transparent networks in a current region according to a preset searching period; the client sequences the searched transparent networks and displays a transparent network list obtained by the sequencing to a user; the user selects to remotely start a used transparent network, and the client performs network authentication on the transparent network selected by the user and tests the transparent network which is selected by the user and passes the authentication; a starting code of the guide chip acquires an identifier of the client from a server; and the user selects an operating system to be loaded. The method has the advantage of solving the problems that the transparent networks and non-transparent networks cannot be distinguished under the wireless network by the conventional methods for remotely starting the transparent computing system, that potential safety hazard exists in network access, that the network authentication cannot be performed, that network stability cannot be detected, and the like.
Owner:HUNAN NEW CLOUDNET TECH CO LTD

User identity authentication method suitable for transparent computing system and system configuration method

The invention discloses a user identity authentication method suitable for a transparent computing system and a system configuration method. The user identity authentication method comprises: when a user boots up and logs in, a client transmits a login requesting information to an authentication server, and the authentication server queries a background database, acquires an operating system authority list bootable by the user and transmits the list to the client; the user selects the operating system and invokes a remote loading request to a storage server; and the storage server authenticates a user name and passwords of the client, checks a mirror image configuration file of the operating system of the user after the authentication passes, and judges whether the authentication succeeds according to the IP of the client and mirror image IP settings of an operating system to be booted up. The system configuration method is used for configuring the transparent computing system using the user identity authentication method. According to the user identity authentication method suitable for the transparent computing system and the system configuration method, which are provided by the invention, the authority management of the user is achieved, a plurality of individual services can be provided, and the user experience is perfected.
Owner:CENT SOUTH UNIV

Wearable equipment safety management method, transparent server, and cloud architecture system

The invention discloses wearable equipment safety management method, a transparent server, and a cloud architecture system. The method specifically comprises the following steps: S1, classifying the application software in a wearable equipment system terminal, and specifying different data storage modes for different types of application software; S2, enabling wearable equipment to carry out the dividing of different storage regions at the transparent server for different types of application software, wherein the storage regions are provided for the corresponding type of application software for data storage; S3, enabling the transparent server to carry out the data storage according to the divided storage regions through the application software data received by a transparent network. According to the invention, an operating system of the wearable equipment terminal is mirrored and stored at the transparent server based on a transparent computing architecture, and the method can guarantee the safety of the system and data, and guarantees the privacy of a user. The method can achieve the selective storage of the background data of all application software, guarantees the data safety, selectivity, uniqueness and flexibility, and is better in expansibility and compatibility.
Owner:HUNAN NEW CLOUDNET TECH CO LTD

Wearable device security management method, transparent server-side and cloud architecture system

The invention discloses wearable equipment safety management method, a transparent server, and a cloud architecture system. The method specifically comprises the following steps: S1, classifying the application software in a wearable equipment system terminal, and specifying different data storage modes for different types of application software; S2, enabling wearable equipment to carry out the dividing of different storage regions at the transparent server for different types of application software, wherein the storage regions are provided for the corresponding type of application software for data storage; S3, enabling the transparent server to carry out the data storage according to the divided storage regions through the application software data received by a transparent network. According to the invention, an operating system of the wearable equipment terminal is mirrored and stored at the transparent server based on a transparent computing architecture, and the method can guarantee the safety of the system and data, and guarantees the privacy of a user. The method can achieve the selective storage of the background data of all application software, guarantees the data safety, selectivity, uniqueness and flexibility, and is better in expansibility and compatibility.
Owner:HUNAN NEW CLOUDNET TECH CO LTD

A user identity authentication method and system configuration method suitable for transparent computing systems

The invention discloses a user identity authentication method suitable for a transparent computing system and a system configuration method. The user identity authentication method comprises: when a user boots up and logs in, a client transmits a login requesting information to an authentication server, and the authentication server queries a background database, acquires an operating system authority list bootable by the user and transmits the list to the client; the user selects the operating system and invokes a remote loading request to a storage server; and the storage server authenticates a user name and passwords of the client, checks a mirror image configuration file of the operating system of the user after the authentication passes, and judges whether the authentication succeeds according to the IP of the client and mirror image IP settings of an operating system to be booted up. The system configuration method is used for configuring the transparent computing system using the user identity authentication method. According to the user identity authentication method suitable for the transparent computing system and the system configuration method, which are provided by the invention, the authority management of the user is achieved, a plurality of individual services can be provided, and the user experience is perfected.
Owner:CENT SOUTH UNIV

Mobile terminal application management method and system based on transparent computing

The invention provides a mobile terminal application management method and system based on transparent computing. The mobile terminal application management method based on the transparent computing comprises the following steps: S1, a transparent server stores the application installation package or the upgrade package in the application database through a scheduling control module; S2, the transparent server scanning transparent mobile terminals connected with the transparent server; and S3, if the transparent mobile terminal connected with the transparent server is scanned by the transparent server in the step S2, the installation, upgrading, and uninstall of the applications requiring management in the operation system of transparent mobile terminals connected with the transparent server is realized through the scheduling control module. The invention can realize the unified installation, uninstall, upgrading and other operations for the application required by the same mobile terminal in the same place through a transparent server, and the invention is based on the transparent computing framework, therefore, the management efficiency is high, and the management is convenient and quick; and the applications in the same mobile terminal is managed by a transparent server uniformly, therefore, the personnel management cost and the maintenance cost is greatly saved.
Owner:HUNAN NEW CLOUDNET TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products