Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "Guaranteed data communication" patented technology

Inter-site communication state detection method and device for power line communication network

The present invention provides an inter-site communication state detection method for a power line communication network. The method comprises the steps of sending a detection request message to an STA site from a CCO site at a pre-set time interval; on the condition that the CCO site does not receive a detection response message sent from the STA site within a preset period of time, judging that the communication between the CCO site and the STA site is in the abnormal state; sending a whole-network broadcast offline message to all STA sites within the power line communication network from the CCO site, and recovering TEI resources corresponding to STA sites in the communication abnormal state. The whole-network broadcast offline message contains the TEI information of each STA site, and is used for indicating all STA sites within the power line communication network to delete the routing information corresponding to the TEI information. In this way, the communication between STA sites in the communication abnormal state and other sites in the power line communication network is cut off. The invention also provides an inter-site communication state detection device for the power line communication network.
Owner:SANECHIPS TECH CO LTD

Data processing method and system, device testing system and node testing system

The invention provides a data processing method and system, a device testing system and a node testing system. The data processing system comprises a front-end device and a processing device, wherein the front-end device is used for sending a front-end request to the processing device, and is further used for receiving a back-end request that is sent by the processing device and is corresponding to the front-end request, replacing a real back-end device by using an analog unit constructed in advance to process the back-end request and to obtain a back-end response value, and sending the back-end response value to the processing device; and the processing device is used for receiving the front-end request, and under a condition in which a service provided by the real back-end device needs to be invoked in the process of determining to process the front-end request, redirecting the back-end request corresponding to the front-end request to the front-end device by using a traffic hijack service set in advance, and is further used for receiving the back-end response value, and feeding a front-end response value obtained after the back-end response value is processed back to the front-end device. According to the data processing method and system, the device testing system and the node testing system, the data interaction between the front-end device and the processing device can be implemented on the premise of not affecting the real back-end device.
Owner:ALIBABA GRP HLDG LTD

Data processing device and method based on imaging box chip, chip and imaging box

The invention provides a data processing device and method based on an imaging box chip, the chip and an imaging box. The chip comprises a volatile storage module and a nonvolatile storage module connected with the volatile storage module. ID of the chip is stored in the nonvolatile storage module. The data processing device comprises a communication module, an instruction analysis module, a judgement module and a data writing unit, wherein the communication module is used for being connected to a bus of imaging equipment and receiving an access instruction sent by the imaging equipment, and the access instruction carries a target ID; the instruction analysis module is connected with the communication module and used for analyzing whether the access instruction is a reading instruction or a writing instruction; the judgement module is connected with the communication module and used for judging whether the target ID is matched with the ID of the chip; and the data writing unit is connected with the instruction analysis module, the judgement module and the volatile storage module and used for writing data contents in the access instruction into the volatile storage module if the access instruction is the writing instruction before whether the target ID and the ID of the chip is matched or not is judged.
Owner:APEX MICROELECTRONICS CO LTD

Tramcar network monitoring system

The invention relates to monitoring of permanent magnet electric transmission of tramcars in Hong Kong, in particular to a tramcar network monitoring system. The network monitoring system is designedand arranged on a driver console of a tramcar in Hong Kong, the monitoring system is connected with an electric transmission system of the tramcar in Hong Kong through a network interface, data information collected by the electric transmission system and fault information analyzed by the electric transmission system are transmitted to the monitoring system through a network to be displayed and stored, and a control instruction can be sent to the electric transmission system through the monitoring system. The monitoring system is a human-computer interaction interface between a driver, field debugging personnel and the electric transmission system, which provides convenience for viewing the data information, and network control on the electric transmission system can also be achieved. Thetramcar network monitoring system is arranged on a driving console to ensure data communication of the electric transmission system, so that the electric transmission system runs safely and reliably,the actual needs of users are met, the affirmation of the users is obtained, and the good economic and social benefits are obtained.
Owner:CRRC YONGJI ELECTRIC CO LTD

Situation awareness virtual link defense method, device and system

The invention provides a situation awareness virtual link defense method, device and system, and relates to the technical field of network security. The defense method comprises the following steps of: collecting log information of a network node, and sending the log information to a situation awareness system; when the network node is detected to be subjected to network attack, setting a virtual node for the network node; establishing a virtual link consisting of the network node, the virtual node and an associated network node of the network node; when the number of the virtual nodes or the associated network nodes is multiple, establishing a plurality of virtual links among the network node, the virtual nodes and the associated network nodes in a link shunting, link aggregation and / or link isolation mode; and storing the data information of the network node into the virtual node, and sending the data information to the situation awareness system for security analysis. According to the situation awareness virtual link defense method, device and system, the virtual links are established by using the virtual nodes, the communication path of the data information is changed, an attacker is prevented from stealing private data, and the data security is guaranteed.
Owner:SHANGHAI NEWDON TECH CO LTD

Remote control system used for notebook computer and control method thereof

The invention provides a remote control system used for a notebook computer. The remote control system comprises a wireless controller and the following components arranged in the notebook computer: a wireless communication module which is connected with the wireless controller in a communication way and receives a control instruction from the wireless controller and transmits data information to the wireless controller; an IP address acquisition module which acquires the current IP address of the notebook computer after the notebook computer is turned on; and an embedded controller which is electrically connected with the wireless communication module and the IP address acquisition module and controls turn-on operation of the notebook computer according to the control instruction received by the wireless communication module and controls the wireless communication module to transmit IP address information acquired by the IP address acquisition module to the wireless controller, wherein the wireless controller is configured in a way that the wireless controller establishes remote connection with the notebook computer via the received IP address and controls operation of the notebook computer. The notebook computer in the turn-off state can be controlled to perform turn-on operation so that remote control can be realized.
Owner:HEFEI LCFC INFORMATION TECH

Structure online monitoring system based on NB-IoT protocol

The invention discloses an NB-IoT protocol-based structure online monitoring system, which comprises a sensor module, a sensor collection and processing module, an NB-IoT data communication module, a power supply charging and power supply management module, a server side and a client terminal, and is characterized in that the sensor module obtains data through measurement, the sensor collection and processing module receives the data and sends the data to the NB-IoT data communication module; the NB-IoT data communication module is arranged at the front end, the server side is arranged at the rear end, the sensor collection processing module remotely transmits data to the server side through the NB-IoT data communication module, the power supply charging and power supply management module provides power supply, and online monitoring data display, storage and analysis management software is arranged at the server side. the monitoring data are displayed in a classified manner and stored as required, and online analysis is performed in real time, and early warning information is given. According to the invention, wiring is not needed, the cost is reduced, the power consumption is smaller, the telecom operator-level service quality can be provided, and the method can be conveniently applied to a complex structure monitoring environment.
Owner:杭州浙程科技有限公司

Active/Standby State Management Method for Dual-machine Hot Standby System

The invention provides a main / standby state management method of a hot / standby system. The method mainly comprises a step of arranging an A-series host computer, a B-series hot computer, an A-series host computer IO and a B-series IO which are connected through a communication bus in the hot / standby system, and when the communication bus is available, the A-series hot computer performs data communication with the B-series hot computer, the A-series and the B-series IO through the communication bus. The B-series host computer performs data communication with the A-series host computer, the A-series IO and the B-series IO through the communication bus. According to the main / standby state management method, through dividing the hot / standby system into a host machine part and an input / output (IO) part, the communication bus and a standby communication line are arranged. Based on a specific processing strategy, adverse influences of double main states at the host machine part to outward input output of the input / output (IO) part and the whole hot / standby system can be eliminated. The main / standby state management method can effectively ensure data communication among the A-series host computer, the B-series host computer, the A-series IO and the B-series IO.
Owner:BEIJING JIAOTONG UNIV

Data processing device, method, chip and imaging box based on imaging box chip

The invention provides a data processing device and method based on an imaging box chip, the chip and an imaging box. The chip comprises a volatile storage module and a nonvolatile storage module connected with the volatile storage module. ID of the chip is stored in the nonvolatile storage module. The data processing device comprises a communication module, an instruction analysis module, a judgement module and a data writing unit, wherein the communication module is used for being connected to a bus of imaging equipment and receiving an access instruction sent by the imaging equipment, and the access instruction carries a target ID; the instruction analysis module is connected with the communication module and used for analyzing whether the access instruction is a reading instruction or a writing instruction; the judgement module is connected with the communication module and used for judging whether the target ID is matched with the ID of the chip; and the data writing unit is connected with the instruction analysis module, the judgement module and the volatile storage module and used for writing data contents in the access instruction into the volatile storage module if the access instruction is the writing instruction before whether the target ID and the ID of the chip is matched or not is judged.
Owner:APEX MICROELECTRONICS CO LTD

Method, device and readable storage medium for detecting false data injection attack

The present application discloses a method, device and computer-readable storage medium for detecting false data injection attacks. Applied to a three-layer smart grid framework consisting of PMU layer, local aggregation layer, and control layer, the local aggregation layer pre-trains multiple fuzzy neural network models that are independent of each other and are used to detect false data in the aggregated data of the local aggregator; Receive the measurement data and estimated state values ​​sent by each local aggregator and input them into the corresponding fuzzy neural network model to obtain the false data information of each local aggregator; if there is at least one target local aggregator whose false data value is greater than the threshold, then determine the bus Suffering from false data injection attacks; the local aggregator aggregates the measurement data collected by the PMUs in the corresponding area and performs state estimation to obtain the estimated state value, and sends the data to the control layer after the identity legality verification request is passed. This application can effectively resist false data injection to attack the grid and ensure the security of grid communication.
Owner:CHANGSHA UNIVERSITY OF SCIENCE AND TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products