Patent classifications
G06F9/448
Device state synchronization method and common capability component
This application discloses a device state synchronization method. The method performed by a common capability component, the method includes: receiving a first representation state instance resource creation request sent by an application, where the first representation state instance resource creation request includes a device state attribute; creating a first representation state instance resource based on the first representation state instance resource creation request and a created second representation state instance resource; sending a device state update request to a device, where the device state update request includes the device state attribute; receiving an actual state instance resource creation request sent by the device; creating an actual state instance resource based on the actual state instance resource creation request; and sending to the application, information indicating that an actual state resource is successfully created.
Device state synchronization method and common capability component
This application discloses a device state synchronization method. The method performed by a common capability component, the method includes: receiving a first representation state instance resource creation request sent by an application, where the first representation state instance resource creation request includes a device state attribute; creating a first representation state instance resource based on the first representation state instance resource creation request and a created second representation state instance resource; sending a device state update request to a device, where the device state update request includes the device state attribute; receiving an actual state instance resource creation request sent by the device; creating an actual state instance resource based on the actual state instance resource creation request; and sending to the application, information indicating that an actual state resource is successfully created.
Electronic device for processing background task by using external input and storage medium thereof
A storage medium according to various embodiments may store instructions. When the instructions are executed by a processor of a computer including an operating system which provides an activation state in which the instructions are executed in a foreground in relation to at least one application program, a suspended state in which the instructions are executed but do not perform a command in a background in relation thereto, and a background state in which the instructions are executed and perform a command in a background in relation thereto, the instructions may cause the computer to: in relation to an application program configured to perform a task, store information on the task in a memory of the computer; after a state of the application program is changed from an activation state to a suspended state, receive a push message from an outside of the computer; change the state of the application program from the suspended state to a background state, according to reception of the push message; and allow the application program to perform the task on the basis of the information on the task in the background state. Further, an electronic device according to various embodiments may be provided.
Behavior analysis based on finite-state machine for malware detection
A system and method are disclosed for identifying malicious activity on a target device based on behavior analysis of the target device. The system includes a behavioral analyzer run on a virtual machine connected to the target device. The virtual machine collects system events and parameters from the target device and run a script, independent of the target device, to detect a threat. The script is a set of instructions executed to analyze behavior of an object by processing and correlating the events. The script includes a rule structure which stores signatures and expressions of the known malwares. By correlating the selected event parameters with known malware parameters, it is determined whether the event imposes a threat or not. A finite state machine is used for the state transition table.
POSTURE TRANSITION DETECTION AND CLASSIFICATION USING LINKED BIOMECHANICAL MODEL
Embodiments are disclosed for user posture transition detection and classification using a linked biomechanical model. In an embodiment, a method comprises: obtaining motion data from a headset worn by a user; selecting features of a linked biomechanical model based on a current posture state; determining at least one probability that a posture transition occurred based on an output of a classifier, where the output of the classifier is based on the selected features and the motion data; determining a posture transition based on the at least one probability; and performing at least one action based on detection of the posture transition.
PROVIDING A ROUTER CONFIGURATION FOR CREATING AND DESTROYING PARTS OF AN APPLICATION BASED ON URL PATTERNS
A router configuration is provided for creating and destroying parts of an application based on URL patterns. A first uniform resource locator (URL) pattern is received. Parts of an application are created based on the first URL pattern. A second URL pattern with a portion that is different than the first URL pattern is received. A subset of the parts of the application are destroyed based the portion that is different between the first and the second URL patterns.
Analyzing data using a hierarchical structure
Apparatus, systems, and methods for analyzing data are described. The data can be analyzed using a hierarchical structure. One such hierarchical structure can comprise a plurality of layers, where each layer performs an analysis on input data and provides an output based on the analysis. The output from lower layers in the hierarchical structure can be provided as inputs to higher layers. In this manner, lower layers can perform a lower level of analysis (e.g., more basic/fundamental analysis), while a higher layer can perform a higher level of analysis (e.g., more complex analysis) using the outputs from one or more lower layers. In an example, the hierarchical structure performs pattern recognition.
DATA PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, AND READABLE STORAGE MEDIUM
Embodiments of this application provide a data processing method and apparatus, a computer device, and a readable storage medium. The method includes: setting a state machine of a resource data transfer service to a first state in response to a start request for the resource data transfer service, the start request carrying a state identifier of the first state; executing a first service logic corresponding to the first state, to obtain an execution result of the first service logic; adjusting the state machine to a second state according to the execution result of the first service logic, and executing a second service logic corresponding to the second state, to obtain an execution result of the second service logic; and outputting a service execution result of the resource data transfer service according to the execution result of the second service logic when the second state is a termination state, a service logic of the resource data transfer service including at least the first service logic and the second service logic. In this way, the implementations of the resource data transfer service can be enriched.
Signal arbiter
An arbiter for use with a plurality of request signals is presented. The arbiter includes a sequence identifier to identify an order between the plurality of request signals. The arbiter provides a plurality of output signals in which each output signal is associated with a request signal. When the request signals are provided in a sequential order the output signals are provided in the identified sequential order. When the request signals are provided substantially at the same time the output signals are provided in an arbitrary sequential order. A corresponding signal arbitration method and an electronic circuit comprising the arbiter are also presented.
SECURELY CONNECTING ISOLATED MANAGED HEAPS
A method may include generating, by a source isolate, an external object reference, passing, by the source isolate, the external object reference to a target isolate, storing, by the source isolate and in an exported reference table, an entry that maps the external object reference to an object stored in a heap of the source isolate, performing, by the target isolate, a task that accesses the object using the external object reference, receiving, by the source isolate and from a finalizer of the external object reference, a notification that the external object reference has become unreferenced, and in response to the notification, removing, by the source isolate, the entry from the exported reference table.