Abstract:
An email processing device includes a link retrieval module, a link verification module and a link testing module. The link retrieval module receives an email and retrieves a link corresponding to the email. The link verification module receives the link, and outputs the link or generates a forwarding link according to the linkage state of the link. The link testing module receives the link, and perform a protective mechanism test on the link to generate a test result corresponding to the email. The link retrieval module receives the forwarding link, and retrieves the link corresponding to the forwarding link.
Abstract:
A content capturing system is suitable for capturing content in an image of a document. The content capturing system includes a processor and a storage device. The processor accesses the program stored in the storage device to implement a cutting module and a processing module. The cutting module receives a corrected image. The content in the corrected image includes a plurality of text areas, and the cutting module inputs the corrected image or a first text area into a convolutional neural network. The convolutional neural network outputs the coordinates of the first text area. The cutting module cuts the first text area according to the coordinates of the first text area. The cutting module inputs the cut first text area into a text recognition system and obtains a plurality of first characters in the first text area from the text recognition system.
Abstract:
A product substance inspection system includes an expansion module, an inspection module, and a preference-setting module. The expansion module expends regulatory information into a plurality of substance thresholds. The inspection module obtains material composition corresponding to a constituent from the aggregate material composition stored in a database, and compares each element in the material composition with the corresponding substance threshold. When the inspection module determines that the value of a specific element in the material composition exceeds the corresponding substance threshold, the preference-setting module replaces the constituent to which the specific element belongs according to the preference settings.
Abstract:
A file sharing system includes: a second, first user device and a cloud server. The first user device uploads a file and sharing information corresponding to the file, wherein the sharing information includes file recipient information of an application corresponding to the second user device. The cloud server receives the file and the sharing information, and transmits a first sharing message to the second user device according to the sharing information. The second user device transmits a request message to the cloud server for requesting the file according to the first sharing message. The cloud server authenticates the second user device according to the request message, and transmits a second sharing message to the application corresponding to the second user device according to the file recipient information when the authentication is successful. The second user device accesses the file according to the second sharing information of the application.
Abstract:
A software risk evaluation system and method thereof are provided. The software risk evaluation system includes a computer system and a server. The computer system executes a software risk evaluation program to perform the steps of: scanning the computer system to obtain a software installation list of software installed on the computer system; obtaining a software risk management file from the server; setting a risk level for each software on the software installation list according to the software risk management file; adjusting the risk level of each software on the software installation list according to software asset management data and the software risk management file; and generating a software risk evaluation report according to the adjusted risk level of each software on the software installation list.
Abstract:
An information push system, including a plurality of signal transmitters, a client side, and a server. The signal transmitters are configured to output a respective identification code. The client side is configured to determine a user setting, and receive the identification codes from the signal transmitters. The server is configured to receive the user setting and the identification codes from the client side, and output the push information of a received identification code according to the user setting and the received identification code. The server also includes a database, which is configured to store the user setting, and the identification code and the push information which are corresponding to each signal transmitter.
Abstract:
The present invention discloses a method for providing a message to a mobile communication device. The method includes the following steps: a dispatched message is received from a service-providing server through a message-dispatching server. The dispatched message includes identification information of at least one message receiver. Rule-operating and message-processing are performed to the dispatched message through the message-dispatching server after a fixed time period from a time at which the dispatched message is received. The rule-operated and message-processed dispatched message is displayed on a display unit of a mobile communication device through the message-dispatching server. The mobile communication device logs in with the identification information of the message receiver.
Abstract:
A character recognition method includes the stages as detailed in the following paragraph. An image is received, wherein the image is one in a plurality of consecutive images. A target object in the image is detected. Object information of the target object is defined according to the area ratio of the target object occupied in the image. Whether the target object in the image is the same as the target object in the previous image is determined according to the object information. Character recognition on the target object is performed to obtain a recognition result. The weighting score of the recognition result is calculated according to the object information and the recognition result. The weighting score of the recognition result of the target object in the consecutive images is accumulated until the weighting score is higher than a preset value, and the recognition result is output.
Abstract:
The present invention discloses a hacking detection method, including: deploying a plurality of trap IP addresses in a trap IP address list; collecting access logs from a plurality of network devices to create a connection record list, wherein the connection record list includes a plurality of connection records; and comparing the trap IP address list and the connection record list to obtain a suspicious source list. The suspicious source list includes a plurality of suspicious source IP addresses. The suspicious source IP addresses match a portion of the trap IP addresses in the trap IP address list.
Abstract:
A dynamic resource management method for remote management of resources of resources devices by a cloud server is provided. The method includes: detecting resource-using-statuses of the resource devices to generate using-load parameters for the resources devices according to the resource-using-statuses of the resources devices by control devices installed on the resources devices; timely collecting, by the cloud server, the using-load parameters for the resources devices outputted by the control devices via a network; and upon receiving a using request corresponding to the resources devices from at least one smart device, performing, by the cloud server, a comparison according to the using-load parameters for the resources devices and the using request and performing resource using distribution on the resources devices to obtain resource-use planning based on the comparison result, thereby controlling the operation of the resource devices and replying to the using request of the smart device.