Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

740results about How to "Realize verification" patented technology

Detection method and detection system of intelligent relay protection device

The invention provides a detection method and a detection system of an intelligent relay protection device. Aiming at the situation that compared with the prior art, dynamic properties of the relay protection device cannot be detected effectively in an intelligent substation spot, and starting from the feature of sharing of digitalization and informatization of an intelligent substation secondary system, the detection method which regards a digit simulation system as a data source and regards synchronous working of a plurality of digitized relay protection testers is provided and the detection system of the intelligent relay protection device is constructed. Various operating situations which probably happen in a transformer substation can be simulated according to an actual electric topological structure of an intelligent substation and device parameters construction and simulation models in a lab, simulating calculation can be conducted, transient test data which have higher similarity with the actual operating situations can be achieved by transforming, the transient test data can be output in the intelligent substation spot in a playback mode, and detection of the dynamic properties of the relay protection device and checkout work of protection definite value can be carried out.
Owner:STATE GRID CORP OF CHINA +2

Authentication system and method based on intelligent mobile communication equipment

The invention provides an authentication system based on intelligent mobile communication equipment. The authentication system comprises more than one intelligent mobile communication equipment, more than one server, a client-side module and a server-side module; the client-side module is arranged in the intelligent mobile communication equipment and comprises an identification module, wherein the identification module is used for submitting an authentication request, acquiring identity information, identifying elements in the identity information and querying an authentication result; the server-side module is arranged in the server and comprises a certificate management module, an identity information management module and an authentication module and is used for realizing format and content management of various certificates, management of the identity information and authentication of effectiveness of the elements; the identity information comprises at least one element; and the client-side module and the server-side module are in data communication through a mobile communication network. The invention further provides an authentication method based on the intelligent mobile communication equipment. Due to adoption of the authentication system and method, the identity authentication can be rapidly, conveniently and accurately carried out.
Owner:ZHUHAI ZAIZHOU SOFTWARE TECH

Data integrity authentication information generation method and device as well as data integrity authentication method and device

The invention provides a data integrity authentication information generation method and device. The device comprises a Hash structure generation unit, a common authentication information acquisition unit and an integrity authentication information generation unit, wherein the Hash structure generation unit can generate a Hash structure corresponding to a specific time period according to Hash values of data sections contained in multiple data sources in the specific time period, so that the Hash value in each data section can respectively represent a child node at the lowest level of the Hash structure in order to calculate a root Hash value of the child node; the common authentication information acquisition unit can acquire the common authentication information according to the root Hash values; the integrity authentication information generation unit can generate the integrity authentication information of the data sections contained in the multiple data sources in the specific time period for the multiple data sources, wherein the integrity authentication information of each data section comprises common authentication information, path information containing from the Hash value of the data section of the leaf node at the lowest level in the Hash structure to the root node, and the relevant node Hash value of the child node in the path. The invention also provides a data integrity authentication device and method.
Owner:SONY CORP

Low-voltage distribution network topology structure verification method, device and equipment and storage medium

The invention discloses a low-voltage distribution network topology structure verification method. After a voltage sequence is formed, the voltage sequence is clustered, namely, the voltage sequence is clustered into three groups. Then by comparing the similarity between the voltage sequence after clustering processing and the voltage sequence of each phase in the transformer monitoring terminal of the target station area, the current station area phase to which the voltage monitoring equipment belongs can be determined. Finally, the target voltage monitoring equipment with phase change is determined, and the phase of the target voltage monitoring equipment is updated, so as to achieve the verification of the low-voltage distribution network topology. This method not only determines the station information of voltage monitoring equipment but also determines the phase information of each voltage monitoring equipment, which can improve the accuracy of low-voltage distribution network topology verification, and thus is conducive to the management of low-voltage distribution network and loss reduction and energy conservation. In addition, the invention also discloses a low-voltage distribution network topology structure verification device and equipment and a storage medium, which have the effects above.
Owner:ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1

Heterogeneous unmanned aerial vehicle cluster target tracking system and method based on biosocial force

The invention discloses a heterogeneous unmanned aerial vehicle cluster target tracking system and method based on biosocial force. The target tracking system includes a cluster hardware system architecture, a cluster software system architecture, a cluster communication system architecture and a cluster flight management and control system. The method comprises the following steps that 1, modeling of an unmanned aerial vehicle state is carried out; 2, a consistency protocol is designed; 3, unmanned aerial vehicle control instructions are designed based on a phase difference consistency algorithm; 4, trajectory tracking based on non-linear guidance is carried out; 5, a heterogeneous unmanned aerial vehicle cluster system based on the biosocial force is described; and 6, heterogeneous unmanned aerial vehicle cluster target tracking based on the biosocial force is carried out. The heterogeneous unmanned aerial vehicle cluster target tracking system and method based on the biosocial forcehas the advantages that the heterogeneous unmanned aerial vehicle cluster target tracking is realized, the speed of controlling an unmanned aerial vehicle to gradually converge to an expected path isincreased, and the system of the whole target tracking system is complete, the functions are perfect, and the verification of targets in different task scenes can be realized.
Owner:BEIHANG UNIV

Digital satellite attitude and orbit control algorithm ground simulation verification system

The invention provides a digital satellite attitude and orbit control algorithm ground simulation verification system. The digital satellite attitude and orbit control algorithm ground simulation verification system comprises a simulation platform, a host computer platform, a data transfer platform, and a satellite control algorithm platform. The simulation platform is suitable for acquiring control information of a satellite attitude and orbit algorithm, and is operated in a preset simulation environment according to a dynamical model to generate an actual attitude and an actual orbit of a satellite, and then is used to output satellite simulation information. The host computer platform is suitable for receiving the satellite simulation information, and based on the setting of the satellite simulation information and parameters related to the dynamical model, and is used to transmit operation information of operating the simulation platform to the simulation platform according to an instruction input by a user. The satellite control algorithm platform is suitable for determining the satellite attitude and orbit algorithm according to the satellite simulation information, and is used to transmit control information of executing the satellite attitude and orbit algorithm to the simulation platform. The linked operation of the satellite simulation verification system is realized, and a satellite simulation integration level is improved.
Owner:王洋

Zero-trust network architecture and construction method

The invention provides a zero-trust network architecture and a construction method. The zero-trust network architecture comprises a controller, a cloud gateway, an edge gateway and a terminal agent, the edge gateway is in communication connection with the cloud gateway, the cloud gateway, the edge gateway and the terminal agent are respectively in communication connection with the controller, and the cloud gateway and the edge gateway are respectively in communication connection with the client; the controller is used for controlling registration and login processes of the client, the cloud gateway and the edge gateway and issuing a routing strategy and an authorized access control strategy; the edge gateway is used for controlling resource security access, and the cloud gateway is used for routing when a client accesses resources across regions; the terminal agent is deployed at a client, establishes a tunnel with the cloud gateway and the edge gateway, and performs secure access on authorized resources; the network position boundary no longer determines the access authority, all access subjects need to be subjected to identity authentication and authorization before access is allowed, and the security threat brought by the enterprise network architecture with the fuzzy boundary at present is solved.
Owner:中孚安全技术有限公司

Urban traffic track data set generation method based on taxi data and urban road network

The invention discloses an urban traffic track data set generation method based on taxi data and an urban road network, and belongs to the field of traffic transportation. The model is composed of a preparation layer, a generation layer and a verification layer. Track data of private cars are generated based on taxi data and urban road network information for the first time, and meanwhile a complete verification method is provided for verifying the accuracy of a generated data set. The invention provides an urban functional region division method based on an adjacent road division method. Theurban functional region division method comprises the steps of dividing a city into different functional regions; meanwhile, providing a regional population weight opportunity model, and a populationmovement mode can be more accurately depicted. In order to verify the authenticity and the accuracy of the method, a macroscopic angle-based model and a microscopic angle-based model are respectivelyprovided on a verification layer to verify the authenticity and the accuracy of a data set generated by the model. Through verification of the verification layer, the track data of the private car generated according to the taxi GPS data and the urban vehicle network information are high in authenticity and accuracy.
Owner:DALIAN UNIV OF TECH

Satellite multiple attitude control mode test system based on double gimbal control moment gyroscope (DGCMG) structure

The invention relates to a satellite multiple attitude control mode test system based on a double gimbal control moment gyroscope (DGCMG) structure. Performance of three satellite attitude control systems which are based on a DGCMG, a single gimbal control moment gyroscope (CMG) and a flywheel is tested and verified through a DGCMG actuating mechanism. The satellite multiple attitude control mode test system based on the DGCMG structure comprises a platform system, the satellite attitude control system, a space environment simulation system and a ground station system. The platform system is composed of a tri-axial air bearing table, a satellite service comprehensive management system, a power source and a wireless bridge and used for simulating satellite dynamic characteristics and information management. The satellite attitude control system is composed of a jet propulsion system, the DGCMG, a fiber-optic gyroscope, a star sensor, a sun sensor and a global position system (GPS) receiver and used for determination of an attitude and an orbit and control of a satellite platform. The space environment simulation system is composed of a GPS simulator, a sliding block which is of a pyramidal structure, a sun simulator and a star simulator and used for simulating space interference torque, and part performance of a GPS satellite and a celestial body. The satellite multiple attitude control mode test system based on the DGCMG structure can provide ground testing and verification for multiple attitudes of a satellite.
Owner:BEIHANG UNIV

Second-generation ID card online inquiry system and method based on secure network

InactiveCN101656748ASolving the full range of mobile online applicationsRealize remote secure deliveryUser identity/authority verificationSpecial data processing applicationsRelevant informationNetwork link
The invention discloses a second-generation ID card online inquiry system based on a secure network, comprising an on-line service terminal, a secure network link module, an identification authentication and right management server and an identification relevant information database, wherein the on-line service terminal comprises a mobile multi-interface read module, a secure coding and decoding module and a terminal set, wherein the mobile multi-interface read module and the secure coding and decoding module are both connected to the same terminal set; the terminal set is connected with the identification authentication and right management server through the secure network link module; and a high-speed data link exists between the identification authentication and right management serverand the identification relevant information database. After the mobile multi-interface read module finishes reading a second-generation ID card, an identification information authentication inquiry request initiated from the terminal set by an operator is coded by the secure coding and decoding module and sent to the identification authentication and right management server by the secure networklink module, then information is obtained from the identification relevant information database after identification authentication and right judgment, and the information is fed back from the securenetwork link module to the terminal, thereby movably finishing the on-line authentication and inquiry of personal information with high security.
Owner:上海申远投资管理有限公司

Fault-tolerant directory cache controller

The invention discloses a fault-tolerant directory cache controller for the problem that a conventional directory cache is poor in fault tolerance and low in reliability, and cannot meet the requirements of a spatial environment or a complicated electromagnetic environment. The fault-tolerant directory cache controller comprises four identical directory cache bodies, a directory access bypass, a directory access crossbar switch, an access crossbar switch and a configuration register. By designing the four directory cache bodies, the configuration register, the full interconnected access crossbar switch and the directory access crossbar switch, two working modes can be flexibly configured, so that both the performance and the fault tolerance are preferred. By designing a directory access bypass module, the complete failure of a directory Cache function in a bad condition such as a space high-radiation environment is prevented, so that the reliability is enhanced. Compared with the conventional directory Cache, the fault-tolerant directory cache controller has the advantages that a multilevel fault-tolerant technology from a system structure level to a circuit design level is adopted, so that on the premise of no performance loss, the fault tolerance and reliability of the directory Cache are remarkably improved.
Owner:NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products