Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

87 results about "Verification routine" patented technology

Hotspot sharing method based on artificial intelligence and feature analysis and big data cloud platform

The invention relates to a hotspot sharing method based on artificial intelligence and feature analysis and a big data cloud platform, and aims to identify an access intrusion detection result of a target terminal before the target terminal is accessed to a hotspot network corresponding to a current hotspot sharing terminal, thereby ensuring information security relative to the current hotspot sharing terminal. In this way, the target terminal can pass the access verification before using the hotspot network corresponding to the current hotspot sharing terminal. The access intrusion detectionresult is determined based on the information security evaluation characteristics, and the access intrusion detection result can be identified for different information communication networks where different hotspot sharing requests are located, so that access verification can be accurately and reliably realized. Moreover, the access verification is carried out on the big data cloud platform side,so that a corresponding verification program does not need to be deployed in the current hotspot sharing terminal, and the operation rate of the current hotspot sharing terminal can be prevented frombeing severely slowed down.
Owner:中科星云物连科技(北京)有限公司

Method and apparatus for performing incremental validation of program code conversion

A method and apparatus for verifying program code conversion performed by an emulator. A first emulator configured in a same-to-same (X-X) mode converts subject code into target code for execution by a subject processor. Execution of the subject code natively by the subject processor is compared against execution through the first emulator, to verify that program code conversion. Optionally, the first emulator is then used to incrementally validate program code conversion (i.e. optimisation and / or translation) performed by a second emulator, such as a this-to-that (X-Y) mode emulator running on a target processor.
Owner:IBM CORP

Credit card verification enhancement system

A method and system verifies the validity of a credit card payment transaction with a set of requester account data by searching an account record database for a matched record containing a record account number that matches the requester account number and an expected verification key that matches the requester verification key, said expected verification key changes after each successful payment transaction validation, according to a pre-determined list of values to enhance the security and robustness of account transactions. Also, the present invention provides a method and system that is cost-effective to implement and highly compatible with the current account verification procedure.
Owner:CHEN HAN PING

System and method for accelerating MMU mapping table deployment

The invention provides a system and a method for accelerating MMU mapping table deployment. The system comprises an MMU mapping table generation device and a verification program packaging device which run on a verification program compiling server, and an MMU mapping table deployment device which runs on a target SOC; the MMU mapping table generation device is used for reading, analyzing and legality checking an MMU mapping table configuration file, and generating an MMU mapping table adaptive to the target SOC according to the MMU mapping table configuration file; the verification program packaging device analyzes an original verification program generated by compiling, obtains an MMU mapping table address specified by the verification program and maximum size information of an MMU mapping table, checks validity of the size of the MMU mapping table adapted to a target SOC, and combines and packages the generated MMU mapping table adapted to the SOC and the verification program into a new verification program containing the MMU mapping table; and the MMU mapping table deployment device analyzes the MMU mapping table adapted to the target SOC, and completes deployment of the MMU mapping table on the target SOC.
Owner:SHANGHAI LINKCHIP SEMICON TECH CO LTD

System and method for network switch to perform automatic backup of data

The invention provides a system and method for a network switch to execute automatic data backup. The system comprises a network switch which is at least provided with a plurality of first device connecting units, a plurality of second device connecting units and a plurality of network connecting units, wherein each unit is electrically connected to a main board so as to be respectively connectedwith a corresponding first device and a corresponding second device. The network switch is provided with at least one data storage area and a verification program, and when the first device or the second device reads the data storage area, the verification program verifies the backup permission of the device; and a plurality of first devices, storage medium, at least one data storage area is arranged; a first control program and a backup verification code are installed in the first control module. When the first device is connected with the first device connection unit of the network switch, the first control program drives the backup instruction set to automatically search the data storage area in the network switch, and downloads the content of the data storage area to the first device for storage through the authority of the backup verification code.
Owner:陈立新

Code verification method, networking terminal equipment and readable storage medium

The invention discloses a code verification method, networking terminal equipment and a readable storage medium. The code verification method comprises the steps of executing a code pre-verification program, specifically, reading a pre-stored code, signing the pre-stored code and comparing a signature with a signature stored in the pre-stored code; if the signature is consistent with the signature stored in the pre-stored code, executing a main program, otherwise, alarming and exiting; executing a code verification program; and if the signature is consistent with the signature stored in the pre-stored code, ending the verification, and otherwise, alarming and exiting. According to the technical scheme provided by the embodiment of the invention, the code is pre-verified before the main program is executed, the security of the code is firstly determined, meanwhile, the main program is started under the condition that pre-verification has no problem, and the verification program for the code is synchronously started in the running process of the main program, so that verification guard is performed in the running process of the program, codes are verified and protected through two-section type starting, the signature in the code verification process changes along with the change of time at the same time, and the cracking complexity is increased.
Owner:BOE TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products