Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

146results about How to "Balance security" patented technology

Intelligent equipment unlocking method based on human eye motion feature

The invention relates to an intelligent equipment unlocking method based on a human eye motion feature. The method comprises the following steps: acquiring a human face identification parameter, a user eye motion feature parameter as well as hand shake, movement and acceleration parameters during glancing of a user; extracting a user feature value and storing the user feature value; during unlocking, acquiring the human face identification parameter, the user eye motion feature parameter as well as the hand shake, movement and acceleration parameters during glancing of the user; extracting the user feature value; and comparing the user feature value of an unlocking person with the stored feature value, and outputting a signal indicating whether to unlock or not. A mobile phone can be unlocked conveniently and rapidly in an eyeball glancing way. On the other hand, 'shoulder surfing attack' can be prevented by adopting a mechanism of feature parameters, and an illegal user cannot unlock the mobile phone even if an unlocking pattern is obtained, so that the safety is improved. By adopting the unlocking way, the problem of user experience and safety is balanced. The intelligent equipment unlocking method has wide development and popularization prospects.
Owner:徐州泰丰泵业有限公司

Multi-target economic dispatch method for power system with wind farm

The invention provides a multi-target economic dispatch method for a power system with a wind farm. The method comprises the steps that first, possible wind power output scenes in a dispatch cycle are generated, and the number of the scenes is reduced to S; second, a mathematical model of the method is built, target functions include total electricity generation cost, power balance levels of all the moments of all the scenes and spinning reserve levels of all the moments of all the scenes, and constraint conditions include output upper limit and output lower limit constraints of thermal power units, climbing rate constraints and the minimum start and shut down time constraints; third, fuzzification processing is carried out by building membership functions of all the target functions; fourth, the minimum values of all the membership functions are obtained to serve as global satisfaction degree indexes; fifth, an economic dispatch result meeting the constraint conditions in the second step and enabling the global satisfaction degree indexes in the fourth step to be maximum is solved. The economic dispatch method is suitable for solving the problems about economic dispatch of the power system with the wind farm and the thermal power units, and a plurality of optimization targets are balanced in a dispatch result.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Dynamic optimization scheduling method and system for flexible interconnected distribution network

The invention discloses a dynamic optimization scheduling method and system for a flexible interconnected distribution network. A dynamic optimization scheduling method of a flexible interconnected distribution network based on model prediction control is provided for the uncertainty of renewable energy output and load demands by taking a flexible interconnected distribution network connected witheach feeder through a multi-terminal back-to-back VSC-HVDC. The method comprises the steps of: based on the renewable energy and load ultra-short term power prediction information, establishing a voltage prediction model through calculation of voltage sensitivity of each node, establishing a flexible distribution network optimization operation model to take the minimum of the deviation of a predicted voltage and a rated voltage and the integrated power supply cost by a target, and combining a method of adaptive dynamic weight and feedback correction to optimize and obtain a dispatching instruction value and perform issuing. The method can effectively solve the problem of voltage out-of-limit generated by random fluctuation of the distributed power supply output and load demands and effectively balances the economical efficiency and the safety of the operation of the flexible interconnected distribution network.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +4

Aggregation method and system supporting fault tolerance and resisting differential attacks in smart power grid

The invention discloses an aggregation method and system supporting fault tolerance and resisting differential attacks in a smart power grid. According to the method, a smart electric meter is used for recording and reporting the power consumption of users in real time; a control center is responsible for collecting, processing and analyzing real-time power consumption data of the users; a gateway is responsible for data aggregation; a trusted center is responsible for the whole system. Main modules include a system initialization module, a data aggregation request module, a data aggregation request relay module, a user data reporting module, a security data aggregation module and an aggregated data recovery module. A security data aggregation system is realized and is used for protecting power consumption privacy of the users, preventing a vicious external attacker and an electric energy control center from abusing authority and effectively resisting malicious software instrumentation and attacks; since an auxiliary ciphertext is introduced, physical and communication fault tolerance is achieved, and it is guaranteed that the power consumption data of the users can still automatically aggregate and be reported successfully on the condition that a part of the power consumption data fails to be reported.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Standby configuration optimization method adopting wind power system unit

The invention provides a standby configuration optimization method adopting a wind power system unit. The standby configuration optimization method provides a method for computing two risk costs including outage cost and wind curtailment cost under certain forward-reverse rotation spare capacity by utilizing an integral of a wind power and load joint probability density function, an optimum allocation method for allocating the total system forward-reverse rotation spare capacity to different coal consumption units, and a decision-making method comprehensively considering the risk costs and power generating cost, the total system forward-reverse rotation spare capacity when the power system performs most economical operation and power generating plans and spare allocation capacities of the units. The standby configuration optimization method is suitable for the power system accessed to a wind power plant, can make a decision on the total system forward-reverse rotation spare capacity giving consideration to the economical efficiency and safety and contribution plans and optimum forward-reverse rotation spare capacities of the units, meanwhile unit climbing constraint and network security constraint are considered for spare capacity allocation of the units, and completely available standby application provided by the units is ensured.
Owner:HOHAI UNIV

Shield tunnel lining segment and reinforcing method thereof

The invention discloses a shield tunnel lining segment and further discloses a reinforcing method of the shield tunnel lining segment. An existing structure comprises a top-sealing block, a first adjoining block, a second adjoining block, a bottom-sealing block, a first standard block and a second standard block, wherein the first adjoining block and the second adjoining block are located at the two ends of the top-sealing block, and the first standard block and the second standard block are located at the two ends of the bottom-sealing block. The first adjoining block is connected with the first standard block, and the second adjoining block is connected with the second standard block. Steel strand hole passages are formed in the existing first adjoining block and first standard block, steel strands are arranged in the steel strand hole passages, and steel strand outlets are formed in the inner sides of the first adjoining block and the first standard block. The second adjoining blockand the second standard block are also treated in the same way. The reinforcing method comprises the steps that (1) the lining segment is prefabricated according to the borne load of a tunnel structure; (2) the stress condition of the lining segment is judged, and the reinforcing method of the lining segment is determined; and (3) the lining segment is reinforced. According to the shield tunnel lining segment and the reinforcing method, the overall rigidity and the deformation harmony of the tunnel structure are improved, and tunnel operation safety can be ensured.
Owner:TONGJI UNIV

Lithium ion battery and preparation method

The invention provides a lithium ion battery and a preparation method. The lithium ion battery includes a positive electrode, a negative electrode, a diaphragm, and an electrolyte. The positive electrode and the negative electrode are separated by the diaphragm; the positive electrode, the negative electrode and the diaphragm are encapsulated in an enclosed space; the electrolyte is filled in theenclosed space; the positive electrode includes a positive active material, the positive active material includes a nickel-cobalt-manganese ternary material, and the percentage of the amount of a substance of nickel in the nickel-cobalt-manganese ternary material is 50-60%; the negative electrode includes a negative active material, the negative active material includes graphite, and the degree ofgraphitization of the graphite is 91-94%, and an OI value is 6-7; and the electrolyte includes a lithium salt, a solvent and an additive, wherein the lithium salt includes lithium hexafluorophosphateand lithium bis(fluorosulfonyl)imide, the solvent includes ethylene carbonate, ethyl methyl carbonate, dimethyl carbonate and propyl propionate, and the additive includes lithium difluorophosphate, lithium bis(oxalate)borate, tris(trimethylsiloxy)boron, vinylene carbonate, and succinonitrile. The lithium ion battery has the characteristics of high safety, low cost, long service life and excellentusage performance.
Owner:SVOLT ENERGY TECHNOLOGY CO LTD

Anti-lightning evaluation method and device of high-voltage overhead power transmission line

The invention provides an anti-lightning evaluation method and an anti-lightning device of a high-voltage overhead power transmission line. The method comprises the steps of: obtaining a thunder current amplitude, calculating a lightning channel wave impedance value Z by the following formula according to the thunder current amplitude, wherein I is the thunder current amplitude; and determining a counterattack anti-lightning level of the line according to the lightning channel wave impedance value so as to further determine insulation configuration of the power transmission line. The device disclosed by the invention comprises a thunder current amplitude obtaining module, a lightning channel wave impedance value calculating module and an insulation configuration determining module. By the anti-lightning evaluation method and the anti-lightening evaluation device of the high-voltage overhead power transmission line disclosed by the invention, the lightning channel wave impedance value corresponding to any thunder current amplitude can be precisely calculated so as to more accurately evaluate the counterattack anti-lightning level of the high-voltage overhead power transmission line and determine proper insulation configuration, so that the security and the economical efficiency of the power transmission line are better balanced.
Owner:CHINA ENERGY ENG GRP GUANGDONG ELECTRIC POWER DESIGN INST CO LTD +1

Method for configuring secret key of wireless sensor network

InactiveCN102665209AAchieving Energy Spending with Security and ConnectivityBalance costNetwork topologiesSecurity arrangementComputer securityT matrix
The invention relates to a method for configuring a secret key of a wireless sensor network. The method is characterized by comprising the following steps of: step 1, generating a large secret key pool; step 2, generating alpha and beta secret key matrix spaces; step 3, generating a classification secret key matrix space; and step 4, before a network node of a wireless sensor network is firstly configured, randomly selecting t matrix pair elements from primary secret key matrix spaces alpha 1 and beta 1 through a system, and randomly assigning the ith row and ith column of information of each matrix pair element to a node, wherein each node stores t matrixes ID (identity) corresponding to the t matrix pair elements; step 5, randomly throwing the nodes of the step 4 in a configuration area so that the nodes broadcast self stored matrix ID values to surrounding nodes can directly establish right secret keys if finding out that the nodes have the same matrix ID with an opposite node, and each firstly configured nodes cancel row and column information of residual alpha 1; and step 6, sequentially carrying out multiple complementation node configuration from corresponding alpha n and beta n1 according to the step 5, wherein v is larger than and equal to 3, S is larger than and equal to 100 and t is larger than and equal to 60. Compared with the prior art, the invention has the advantages of capability of realizing balance of energy source expense of network nodes with safety and connectivity.
Owner:佛山微创软件科技有限公司

Video and audio credible playing method based on asymmetric encryption

The invention discloses a video and audio credible playing method based on asymmetric encryption, and relates to the technical field of digital security, and the method comprises the steps that a publishing end embeds a digital signature encrypted by a private key into a video streaming media in a general transcoding service process of the video streaming media, and pushes the video streaming media embedded with the digital signature to an intermediate network; the client receives the video streaming media through the intermediate network; digital signatures therein is extracted, the digitalsignature is decrypted by using the public key to obtain data for detection; and a detection result is deduced according to the detection data to control the player to play the video streaming media content. According to the invention, the detection process is transferred from the Internet to the transceiving end; by combining the one-way hash algorithm and the asymmetric encryption technology, while it is ensured that the behaviors of tampering and replacing the streaming media in the transmission process can be detected by the user side, the calculation overhead is greatly reduced, the complex asymmetric encryption technology can be applied to video streaming media application, and the basic real-time requirement of the streaming media is met.
Owner:CHENGDU SOBEY DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products