Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

95results about "Program loading/initiating" patented technology

Dynamic identification and administration of networked clients

ActiveUS7568018B1Data resettingMultiple digital computer combinationsSubject matterDistributed computing
The present inventive subject matter relates to networked computing environments and more specifically to dynamic identification and administration of networked clients. Various embodiments of the present inventive subject matter include systems and methods for defining, on a server, a configuration of interest comprising one or more potential properties of a client, communicating the configurations of interest over a network to one or more clients, dynamically evaluating a client state relative to the configurations of interest, and communicating a representation of the client state in relation to the configuration of interest to the server. Further embodiments include automatically creating and displaying associations of clients based on configurations of interest. Yet further embodiments include clients requesting and receiving updates to the configurations of interest. Still further embodiments include actions associated with configurations of interest. Such actions, in various embodiments, include performing administrative actions on various networked clients.
Owner:NEW BOUNDARY TECH

Method and apparatus for implementing deployment descriptors in an enterprise environment

Methods and apparatus for implementing deployment descriptors which are used to deploy modules in an enterprise environment are disclosed. According to one aspect of the present invention, a method for deploying an application using a deployment tool for use on a platform server includes creating the application, creating an application deployment descriptor for the application, packaging the application in an archive, and deploying the application packaged in the archive. Creating the application includes obtaining an application component which has an associated application component deployment descriptor that has information relating to the deployment of the application component. The application deployment descriptor for the application includes information arranged to identify the application component, and packaging the application in an archive includes packaging the application component, the application component deployment descriptor, and the application deployment descriptor. The application packaged in the archive is deployed using the application component deployment descriptor.
Owner:ORACLE INT CORP

Application program control method based on two-time signature verification technology

An application program control method based on a two-time signature verification technology is achieved by performing two times of signing and two times of signature verification on application programs on an android terminal. Security detection is performed on the application programs through a reliable third-party security detection mechanism, the application programs passing the detection will be signed by the third-party security detection mechanism, and then the signed applications are returned to developers. When the application programs are installed on the intelligent android terminal, security detection is performed on the application programs first to see whether the application programs are signed by the third-party security detection mechanism or not, and signatures are verified; if signatures of the third-party detection mechanism do not exist or the signatures cannot pass verification, installation of the application programs is refused. Through the technical scheme, the application program control method based on the two-time signature verification technology has the advantages that signature information is fixed through introduction of the third-party detection signatures and a security control module of the android terminal so that secure application programs can be downloaded and installed in an android system through multiple channels, and while security of the android terminal is guaranteed, a flexible and efficient application program verification scheme is provided.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI +1

Deployment method of utility software and the system thereof

InactiveCN101788917AImplement automatic installationImprove reliabilityProgram loading/initiatingTransmissionOperational systemSoftware deployment
The invention discloses a deployment method for utility software. The terminal PCs in the cluster enters the network starting mode after the start-up and downloads operation system mirror image and the automatic response files from the installation server and install the operation system. After installation, the computer mounts the software database from the installation serve to the local hard disk according to the mounting order in the automatic response files. The software database comprises a variety of utility software installation files and supporting files to realize the practical automatic installation of the utility softwares. The above-mentioned terminal PCs can invoke the supporting files according to the call instructions in the automatic response files and install all kinds of utility softwares on the local hard disk.By adopting the unattended installation system and utility softwares, the invention can realize the automatic installation of the utility softwares on the terminal PCs. By so doing, the invention can save labour resources and avoid mistakes possible in the manual operation, improve the reliability of the utility software deployment, thus making the deployment method more convenient and quick to use.
Owner:INSPUR BEIJING ELECTRONICS INFORMATION IND

Method for reducing power consumption of device, mobile terminal and system

ActiveCN105159816AReduce power consumptionImprove battery lifeHardware monitoringCurrent supply arrangementsTerminal equipmentComputer terminal
The invention discloses a method for reducing power consumption of a device, a mobile terminal and a system. The method comprises the following steps of: when the mobile terminal enters a standby mode, capturing a behavior of an application program in a background of the mobile terminal and collecting power consumption data of the behavior of the application program; sending the power consumption data of the behavior of the application program to an application program power consumption analysis database stored in a cloud server for analysis and comparison; receiving and storing an application list limited to be started and fed back and pushed by the application program power consumption analysis database; and forbidding the corresponding application program, in the application list limited to be started, to be started in the background of the mobile terminal when the mobile terminal enters the standby mode. According to the method for reducing the power consumption of the device, the background applications in the system are effectively managed and the applications unnecessary to run in the background are limited, so that the purposes of reducing the power consumption of the device of the mobile terminal and prolonging the service time of the device are achieved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Method for realizing rapid Web Service publishment in service oriented architecture application systems

ActiveCN101957758AProgram loading/initiatingTransmissionWeb Services Description LanguageBusiness function
The invention relates to a method for realizing rapid Web Service publishment in service oriented architecture application systems, including an imaging service assembly platform and a service running platform. The method comprises an imaging service assembly processing operation and a service running processing operation, wherein in the imaging service assembly processing operation, imaging assembly, compilation, compiling check and rapid establishment of a new member are completed; and in the service running processing operation, the uploading of service assembly files, the dynamic register of services, the automatic creation of a WSDL (Web Services Description Language) file and the monitoring of the user requests are completed. By adopting the method for realizing rapid Web Service publishment in the service oriented architecture application systems, the integration efficiency among the SOA (Service Oriented Architecture) application systems is greatly improved, meanwhile, the method can be used for rapidly and intuitively publishing the traditional business function as Web services, greatly improves the integration efficiency among the application systems and has the advantages of steady and reliable operation performance and wider application range.
Owner:PRIMETON INFORMATION TECH

Identifying The Origin Of Application Resources

InactiveUS20080022263A1Decompilation/disassemblyProgram loading/initiatingDatabase
A tool is provided for translation verification testing of various forms of translatable objects in an installed application. The tool attaches tags to a select set of translatable objects. In general, the tags attached to the translatable objects identify the source of the tag. This enables the component of the tag to be verified in a non-complex manner. In one embodiment, a set of rules are selected and followed to predetermine attaching of tags to translatable objects in the application.
Owner:INT BUSINESS MASCH CORP

Embedded remote universal upgrading system based on general packet radio service (GPRS) and upgrading method based on embedded remote universal upgrading system

InactiveCN103078917AMeet the needs of upgradingRealize remote upgradeProgram loading/initiatingTransmissionGeneral Packet Radio ServiceIp address
The invention relates to an embedded remote universal upgrading system based on general packet radio service (GPRS) and a upgrading method based on the embedded remote universal upgrading system, which aims at solving the problems of the existing manual upgrading way that the labor and the material resource are greatly wasted and the universality of the upgrading system is poor. When a remote device needs to be upgraded, relevant upgrading configuration of the remote device is conducted by the remote working personnel through a liquid crystal screen of a remote upgrading controller, then an upgrading request and own internet protocol (IP) address are transmitted to a server, the server transmits a corresponding upgrading program file through a special upgrading software on the server to begin the upgrading. After the upgrading is completed, the remote device returns and transmits an upgrading completion log to through the remote upgrading controller so as to notify the server that the remote upgrading is completed. The embedded remote universal upgrading system and the upgrading method are suitable for upgrading the remote device to be upgraded.
Owner:HARBIN INST OF TECH

Method and system for dynamically loading data structures into memory with global constant pool

A method of operating a computer involving data structures in a set of data structures. As unloaded data structures are needed during runtime, a data structure is received from a first memory. The data structure includes one or more sets of instructions and one or more constants. Instructions from the data structure are stored in a first portion of a second memory, which comprises RAM. Constants from the data structure are stored in a second portion of the second memory if only if the respective constant has not been stored in the second portion of the second memory. Indexes in instructions that reference the constants are modified to correspond to the respective locations of the constants in the second portion of the second memory, and at least some instructions from the data structure are read and executed from the RAM. Also described is a computer system including a memory and logic that, for classes in a set of classes, receives a class from a class file and stores constants from the class in a second portion of the memory if only if the respective constant has not been stored in the second portion of the memory.
Owner:ALTO DYNAMICS LLC +1

Starting method of satellite borne software

InactiveCN106648809AImprove securitySave space costProgram loading/initiatingStatic random-access memoryProgrammable read-only memory
The invention relates to a starting method of satellite borne software. The method comprises the following steps: ground compression software stores an object code of the satellite borne software in a programmable read only memory (PROM) after multiple lossless compression; and after a satellite computer is electrified or reset, a starting program decompresses and reduces compression data of the satellite borne software stored in the PROM to a static random access memory (SRAM) and operates. The memory efficiency of the PROm is effectively improved, the flight program and the starting program which are normally cured in the PROM are realized, so that the space cost and the maintenance cost brought by redundant backup are lowered, the safety of the satellite is extremely improved, the PROM is not overturned by single particles, EEPROM is not dependent, on-orbit maintenance times in the later stage can be greatly reduced, and the fault-tolerant ability of operation of the satellite borne computer is enhanced.
Owner:SHANGHAI AEROSPACE CONTROL TECH INST

Android application host process awakening method, storage medium, equipment and system

ActiveCN107704274ABootstrappingProgram loading/initiatingApplication softwareBackground process
The invention relates to the field of mobile software and discloses an Android application host process awakening method, a storage medium, equipment and a system. The method comprises the steps thatS1, a background process is newly created for an application program, and the application program establishes long connection with a server; S2, before the long connection between the application program and the server is broken, if a host process of the application program is in an ending running state, the host process of the application program is awakened, if the host process of the application program is in a normal running state, processing is not done, and after the long connection between the application program and the server is broken, a notification message is created and issued tothe terminal equipment; S3, the terminal equipment receives the notification message, if the notification message is a process awakening message, the step S4 is turned to, and otherwise the step is ended; and S4, the background process is awakened, the running state of the host process of the application program is judged, if the host process of the application program is in the ending running state, the host process of the application program is awakened, and otherwise the step is ended. Through the Android application host process awakening method, the storage medium, the equipment and the system, awakening of the host process of the application program can be effectively guaranteed.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Mesh communications network having mesh ports

A method for communicating over a mesh network established between a plurality of devices is disclosed. Each device has a wireless radio and the method involves launching a mesh service on each device, the mesh service being operable to cause a processor circuit of the device to provide functionality for controlling the wireless radio for communication between devices over the mesh network. Each device has at least one application running on the device, the at least one application being associated with a mesh port, the mesh port being used to designate data transmissions as being associated with instances of a specific application running on at least some of the devices in the plurality of devices, the at least one application and the mesh service on each device being in data communication. The method also involves, in response to a specific application running on a device requesting the mesh service to provide access to the mesh network for communication via a specific mesh port, causing the mesh service to determine whether the specific application is authorized for communications on the specific mesh port, and if the specific application is authorized, processing requests from the application to communicate on the specific mesh port over the mesh network and forwarding data transmissions associated with the specific mesh port to the specific application, and if the specific application is not authorized, declining requests from the application to communicate on the specific mesh port over the mesh network and preventing access by the specific application to data transmissions associated with the specific mesh port.
Owner:LEFT OF THE DOT MEDIA

System and method for executing hybridized code on a dynamically configurable hardware environment

InactiveUS7032103B2Software engineeringGeneral purpose stored program computerMultiple contextTheoretical computer science
A system and method for executing previously created run time executables in a configurable processing element array is disclosed. In one embodiment, this system and method begins by identifying at least one subset of program code. The method may then generate at least one set of configuration memory contexts that replaces each of the at least one subsets of program code, the at least one set of configuration memory contexts emulating the at least one subset of program code. The method may then manipulate the at least one set of multiple context processing elements using the at least one set of configuration memory contexts. The method may then execute the plurality of threads of program code using the at least one set of multiple context processing elements.
Owner:QUALCOMM INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products