Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

51results about How to "Improve initialization speed" patented technology

Structure of solid state disk and method for accelerating initialization thereof

The invention relates to a structure of a solid state disk, which comprises a bus, a memory, a software code memory, a processor, an ATA/SATA controller and a flash controller, wherein the memory, thesoftware code memory, the processor, the ATA/SATA controller and the flash controller are in parallel reversible connection on the bus; and the bus is in reversible connection with an index data memory. The method for accelerating initialization of the solid state disk comprises the following steps: by the index data memory on the solid state disk, enabling the processor to directly acquire the memory address of each description data block in a flash memory; and directly storing the data blocks on the flash memory into the memory through the flash controller, thereby finishing the initialization acceleration of the solid state disk. The invention has the advantages of greatly increasing the initialization speed of the solid state disk, reducing the waiting time of users and releasing moreprocessor resources, thereby increasing the writing efficiency, inhibiting the accelerated ageing of address blocks to a great extent, avoiding the failure of the address blocks, prolonging the service life of the solid state disk, meeting people's use requirements and being favorable for wide application of products.
Owner:刘杰

Multi-CPU (Central Processing Unit)system starting method and module based on PCI/PCIe (Peripheral Component Interconnect/Peripheral Component Interconnect Express) bus

The invention discloses multi-CPU (Central Processing Unit)system starting method and module based on a PCI/PCIe (Peripheral Component Interconnect/Peripheral Component Interconnect Express) bus, which relate to the field of automatic control. The method comprises the following steps of: preestablishing a data structure and selecting a group leader CPU of each bus, loading a data structure into aself memory and mapping the self memory into a PCI space by a main CPU; loading the data structure to the group leader CPU of each bus by the main CPU; starting initialization by the group leader CPUof each bus according to the initialing information of the CPU in the data structure after receiving the data structure and informing the main CPU to update the state information of the CPU after theinitialization is successful; loading the data structure to other subordinate CPUs on the bus by the group leader CPU finishing the initialization under the control of the main CPU on each bus; and finishing the start of the system till all the CPUs are successfully initialized. The invention greatly improves the start speed of the system and saves the cost without adding new hardware.
Owner:HANGZHOU HIKVISION DIGITAL TECH

Method for encrypting consumable items through radio frequency identification electronic tag

The invention provides a method for encrypting consumable items through a radio frequency identification electronic tag. By using a method of additionally arranging the radio frequency identification electronic tag on the consumable items of various devices and using the devices and the radio frequency identification electronic tag to communicate by a method for communicating through encryption information, the consumable items are encrypted and protected. The consumable items are encrypted by adopting the non-contact radio frequency identification electronic tag, so that the consumable itemsare not easy to rust and damage and the reliability is improved; the radio frequency identification electronic tag is initialized after the consumable items are assembled, thus the speed of initialization is greatly improved; the method is convenient to comply a plurality of groups of passwords and produce and manage and provides the possibility for complying different passwords according to different requirements; a module is packaged by using a physical method, so that all keys cannot be obtained by using a method of breaking a host program, and the stability for encryption is greatly improved; and by setting an automatic protecting function at the radio frequency identification electronic tag, the information security is ensured.
Owner:北京力码科信息技术股份有限公司

Large object initialization method and device based on log analysis synchronization

The invention relates to the technical field of computers, in particular to a large-object initialization method and device based on log analysis synchronization, and the method comprises the steps ofquerying a to-be-initialized table containing large-object data in a full-column manner through a source-end data synchronization system, and identifying a large-object column and a non-large-objectcolumn; initializing the non-large object column data to a destination end database in a multi-row batch manner, and storing a mapping relationship between data rows of the source end database and thedestination end database by adopting ROWID; after the source end data synchronization system confirms that the non-large object column data in the table is initialized in the destination end database, starting log synchronization of the table; and according to the stored ROWID information, supplementing and initializing the large object column data in the table to a destination end database in asegmented parallel mode. According to the scheme, the initialization speed of the data containing the large object table can be effectively increased, the establishment of a data synchronization environment is quickly completed, and the probability that a source end database report'snapshots too much 'is reduced.
Owner:WUHAN DAMENG DATABASE

Mobile terminal, and method and device for initializing subscriber identity module card of mobile terminal

InactiveCN105323373ASpeed ​​up the search network residency processImprove experienceSubstation equipmentNetwork data managementSubscriber identity moduleProtocol stack
The invention discloses a method for initializing a subscriber identity module card. The method comprises the following steps: after receiving an electrifying message, initializing the subscriber identity module card according to a pre-set subscriber identity module card application mode; after successfully initializing, setting the state of the subscriber identity module card as a pre-initializing state, and caching information required by a mobile terminal protocol stack; after receiving a request message for initializing the subscriber identity module card, comparing the subscriber identity module card application mode carried in the request message for initializing the subscriber identity module card with the pre-set subscriber identity module card application mode; and, if the subscriber identity module card application mode carried in the request message for initializing the subscriber identity module card is matched with the pre-set subscriber identity module card application mode, setting the state of the subscriber identity module card as a normal service state according to the cached information construction message. The invention further discloses a mobile terminal and a device for initializing the subscriber identity module card of the mobile terminal.
Owner:SANECHIPS TECH CO LTD

Electromagnetic transient simulation initialization method

The invention relates to an electromagnetic transient simulation initialization method, which is technically characterized by comprising the following steps: constructing a node network equation of athree-phase unbalanced AC / DC hybrid power grid of a new energy station; constructing a new energy field station three-phase imbalance AC / DC hybrid power grid model based on a BP neural network according to the node network equation, and nesting load flow calculation iteration of the BP neural network; and improving the computing efficiency of the three-phase fundamental wave power flow through a multi-port equivalence-based parallel computing method. On the basis of a new energy field station sequence component model, the imbalance state of the three-phase AC / DC hybrid power grid is initialized and corrected, so that an initial point is closer to a steady-state point to improve the speed of numerical calculation; effective power flow initialization can improve the efficiency of electromagnetic transient simulation and the stability of numerical calculation, and the feasibility of power flow calculation engineering of a new energy station is improved; and according to the parallel computing method based on multi-port equivalence, the electromagnetic transient simulation initialization speed is increased, numerical convergence is fast, and interference is small.
Owner:ELECTRIC POWER SCI & RES INST OF STATE GRID TIANJIN ELECTRIC POWER CO +2

Method for encrypting consumable items through radio frequency identification electronic tag

The invention provides a method for encrypting consumable items through a radio frequency identification electronic tag. By using a method of additionally arranging the radio frequency identification electronic tag on the consumable items of various devices and using the devices and the radio frequency identification electronic tag to communicate by a method for communicating through encryption information, the consumable items are encrypted and protected. The consumable items are encrypted by adopting the non-contact radio frequency identification electronic tag, so that the consumable itemsare not easy to rust and damage and the reliability is improved; the radio frequency identification electronic tag is initialized after the consumable items are assembled, thus the speed of initialization is greatly improved; the method is convenient to comply a plurality of groups of passwords and produce and manage and provides the possibility for complying different passwords according to different requirements; a module is packaged by using a physical method, so that all keys cannot be obtained by using a method of breaking a host program, and the stability for encryption is greatly improved; and by setting an automatic protecting function at the radio frequency identification electronic tag, the information security is ensured.
Owner:北京力码科信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products