Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

72results about How to "Protect normal transmission" patented technology

Light funnel illumination system based on conical fiber light guide

The invention discloses a light funnel illumination system based on conical fiber light guide. The light funnel illumination system comprises a condensing device, a light guide device and an illumination device; the condensing device comprises a condensing lens for collecting sunlight, and a photoelectric type tracking device for controlling the condensing lens to rotate; the photoelectric type tracking device controls the condensing lens to move collect the sunlight; after the sunlight penetrates through the condensing lens, a light spot is formed, and the light guide device transmits the light spot to the illumination device to realize illumination; the light guide device comprises a first optical fiber arranged below the center of the condensing lens and used for transmitting the sunlight, and a second optical fiber connected with the first optical fiber and the illumination device. The light funnel illumination system adopts the conical fiber as the light guide device, and the aperture of the large end of the conical fiber is greater than the diameter of the light spot, so that even if the light spot shifts, light can enter the conical fiber very well, and no energy loss appears; and the small end of the conical fiber is connected with the second optical fiber in an adapted manner, so that the brightness of an outlet optical fiber of the second optical fiber is improved, manufacturing materials are saved, and the cost is lowered substantially.
Owner:HUAQIAO UNIVERSITY

Secure transmission method and circuit of chip security information

The invention discloses a secure transmission method and circuit of chip security information. The circuit comprises a control register used for starting security information transmission, an NVM used for storing the security information, a data register set used for loading the chip security information, a register used for generating an NVM access address, a counter used for recording a security information loading state, and a related combined logic unit. When the chip security information is accessed, firstly software sets the register used for starting the security information transmission to start access and transmission of the chip security information; hardware automatically performs read operation on the NVM used for storing the security information, decrypts returned data, and writes the data in the data register set used for loading the chip security information; and if the security information transmission is not finished (by judging a value of the counter used for recording the security information loading state), an access address register of the NVM is updated and the access and transmission of a next group of security information are started. The method provided by the invention can effectively protect the transmission of the chip security information.
Owner:BEIJING CEC HUADA ELECTRONIC DESIGN CO LTD

Frequency spectrum resource sharing method for authorized user oriented automatic repeat request in cognitive radio network

The invention discloses a frequency spectrum resource sharing method for an authorized user oriented an automatic repeat request in cognitive radio network, and belongs to the technical field of radio communication. A time division mechanism is used, and each data frame of the cognitive radio network is halved into two time slots; in the first time slot, the authorized user carries out first transmission, and a cognitive user shares a channel in the Underlay transmission manner; and in the second time slot, the authorized user carries out repeated transmission according to information of automatic repeat request, and the cognitive user shares the channel under the condition that the interruption performance of the authorized user is ensured. The problem of maximizing the average transmission speed of the cognitive user is established, and solved to obtain the power distribution scheme of the cognitive user in the repeat transmission time slot; and interference is eliminated, so that the cognitive user can obtain high transmission speed, and the ARQ information of the authorized user can be used by the cognitive user to protect transmission of the authorized user and further to reduce the interruption possibility of the authorized user.
Owner:XI AN JIAOTONG UNIV

Self-supporting cicada-preventing butterfly cable and production equipment for processing same

PendingCN111399151AOptimize the space areaIncrease fiber densityFibre mechanical structuresCore (optical fiber)Electrical and Electronics engineering
The invention discloses a self-supporting cicada-preventing butterfly cable which comprises an optical cable body. The optical cable body comprises an outer sheath, a communication unit and a reinforcer, and the outer sheath wraps the communication unit and the reinforcer; the communication unit comprises a winding optical fiber ribbon and two symmetrically arranged protection sheets, and the winding optical fiber ribbon is arranged between the two protection sheets; the two sides of the outer sheath are respectively provided with two tearing grooves, and the distance between the two tearing grooves at one side is greater than the width of the protection sheet, thereby solving the problem that the optical fiber attenuation exceeds the standard or the structure of the optical cable is damaged because cicadas are attached to the optical cable. The invention also discloses production equipment for processing the self-supporting cicada-preventing butterfly cable, the protection sheet pay-off rack is additionally arranged, and the extrusion molding die core and the extrusion molding die sleeve of the plastic extruding machine are improved so that the production process of integrated extrusion molding can be completed, the integrated molding of the novel optical cable is realized, and the production efficiency is relatively high.
Owner:FURUKAWA ELECTRIC XIAN OPTICAL COMM

Safety transmission method and system for multi-media broadcast video

The invention provides a safety transmission method and a safety transmission system for a multi-media broadcast video. The safety transmission method comprises the following steps: whether a service gateway is within a signal coverage area of a multi-media broadcast server is judged; the multi-media broadcast server divides the multi-media broadcast video into N video frame segments; the last video frame of the N video frame segments is associated with a decryption file to form an encrypted video file, and the file is sent to the service gateway; the service gateway demodulates the file according to a demodulation method with the multi-media broadcast server, and the demodulated file is transmitted to terminal equipment; and after decrypting the file, the terminal equipment plays the multi-media broadcast video. According to the method and the system provided by the invention, cost of the terminal equipment can be effectively reduced, meanwhile video encryption is effectively performed during a data transmission process to prevent the received video from being illegally attacked, tampered, downloaded and pirated, effectively protection is performed on the transmission of the mobile multi-media broadcast video, and safety transmission is achieved.
Owner:ZHONGGUANG REDIANYUN TECH CO LTD

A cross-platform information input and output protection system

The invention discloses a cross-platform information input and output protection system, comprising: 1. a cross-platform input method assistant software, which can be installed on a plurality of operating systems, is used for setting encryption / decryption keys and managing key information, encrypting data and decrypting data, 2. a cloud key cent, including key generation, key distribution and keymanagement modules, can synchronize data between the local key database and the remote key database system, 3. an encryption algorithm library, which can use or combine multiple encryption algorithms,4. a decryption algorithm library, which can automatically match and combine the decryption algorithm according to the parameters of the key, 5. an encryption module which can quickly encrypt the information data input into the buff area by the system of the device through calling the encryption function by the cross-platform input method assistant software, and 6. a decryption module, which cancall the decryption function to decrypt the information data in the system output buffer of the device quickly. The invention can effectively protect various kinds of privacy information of people innetwork communication, and has strong practicability.
Owner:JIANGSU UNIV OF SCI & TECH

Integrally formed stainless steel cable bridge and preparation method thereof

The invention discloses an integrally formed stainless steel cable bridge and a preparation method thereof in the technical field of cable fittings. The integrally formed stainless steel cable bridgecomprises a bottom plate, a left folded plate, a right folded plate, a left mounting plate and a right mounting plate. A left side wall of the bottom plate is integrally formed and is connected to theleft folded plate, and a right side wall of the bottom plate is integrally formed and is connected to the right folded plate. According to the integrally formed stainless steel cable bridge and the preparation method thereof, the cable bridge can be quickly and effectively prepared by the combination of accessories and the improvement of preparation process, the steps are simplified, a compression plate containing a top pad and a bottom pad is added inside, the strength and toughness of stainless steel are increased, the local settlement deformation of the stainless steel with strong ductility after bearing weight is avoided, the compression plate is made of expanded graphite powder which can be released from ports of a left folded side and a right folded side after being exposed to hightemperature, the internal space of the cable bridge is filled, the cable is protected, the risk of open flame combustion is reduced, the loss is effectively reduced, and the safety of information transmission is protected.
Owner:ANHUI JINDI ELECTRIC APPLIANCES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products