Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

103results about How to "Shielding differences" patented technology

Universal virtual machine monitoring system based on driving

The invention relates to a universal virtual machine monitoring system based on driving, and the system comprises an event interception module, a semantic meaning analysis module and a scheduling management module. The event interception module and the semantic meaning analysis module are separated, wherein the event interception module intercepts a system call in a virtual machine on a virtual machine manager and then informs the semantic meaning analysis module in a management domain. The semantic meaning analysis module comprises definitions of key data structures of a kernel of the virtual machine, and the semantic meaning analysis module needs to be matched with the event interception module in the process of recovering the semantic meaning. The semantic meaning analysis module recovers the semantic meaning of the intercepted virtual machine related information, thus restoring operating system grade semantic meaning. The scheduling management module transmits all monitoring information to the monitoring system and provides a unified monitoring interface for the monitoring system. The system achieves the aim of monitoring operating systems of all types in unification and shields the differences of the operating systems in the virtual machine, thus realizing the universality of the monitoring function.
Owner:HUAZHONG UNIV OF SCI & TECH

Set-top-box-based triple play system and implementation method

InactiveCN102710647AShield network differencesRealize triple playTransmissionSelective content distributionWeb Services Description LanguageService content
The invention discloses a set-top-box-based triple play system, which comprises one or more than one terminal, a set-top box and a service publication platform. Different terminals acquire service published by the service publication platform from different networks through the set-top box. The system is characterized in that the set-top box comprises a terminal type detection module, a network type detection module and a service fusion module, wherein the terminal type detection module is used for detecting and identifying the types of the terminals connected to the set-top box; the network type detection module is used for detecting the types of available networks, selecting one from the available networks as an interaction network for the terminals and the service publication platform, and identifying the types of the networks used for the terminals or the service publication platform to transmit requests; and the service fusion module is used for disintegrating a web services description language (WSDL) from the service publication platform, selecting proper sub-WSDLs according to detection results of the terminal type detection module and the network type detection module, combining the sub-WSDLs into a new WSDL, performing compression, transcoding, cutting and rendering on service contents by calling the other modules of the set-top box or chip resources, generating optimized service contents, and outputting the optimized service contents to different terminals.
Owner:GUANGDONG IKER DIGITAL TECH

Method and device for identifying access attacks

The embodiment of the application provides a method and device for identifying access attacks. The method comprises the following steps: acquiring a first time interval sequence of the adjacent access in each access from the current identification user or IP in a first preset range; implementing spectrum analysis on the first time interval sequence to obtain the weight coefficients of the fundamental frequency and each subharmonic frequency of the first time interval sequence; judging whether the ratio of the weight coefficient of the fundamental frequency of the first time interval sequence to the average value of the weight coefficients of each subharmonic frequency of the first time interval sequence is greater than the preset threshold value; and if the ratio is greater than the preset threshold value, identifying each access from the current identification user or IP in the first preset range as the access attack. According to the method and device provided by the embodiment of the application, the identification is processed based on the time interval sequence of the adjacent access in each access from the same identification user or IP, and thus the diversity of various access can be shielded, the various access can be effectively identified, and relatively good universality can be achieved.
Owner:ADVANCED NEW TECH CO LTD

Embedded data concentrator based on RFID middleware

The invention relates to an embedded data concentrator based on RFID middleware and belongs to the technical field of the radio frequency identification technology. The embedded data concentrator comprises embedded data concentrator hardware and configuration management software. The embedded data concentrator hardware works in an embedded hardware environment based on an ARM and comprises a processor, a memory, a wireless module, a display screen and a universal input/output interface, and the hardware is integrated on two double-layer hybrid integrated circuit boards, wherein one hybrid integrated circuit board integrates the processor, the memory and the display screen, and the processor is connected with the memory through a main memory bus and connected with the display screen through an I/O bus; the other hybrid integrated circuit board integrates the wireless module and the universal input/output interface, the wireless module and the universal input/output interface are respectively connected with an I/O bus of the circuit board, and the two circuit boards are in the mode of a master and a slave and are connected through a UART bus. The embedded data concentrator has the advantages that the RFID data integration problem is solved; an RFID system generates a large amount of data, the data are processed through the RFID middleware, valuable RFID data are transmitted to an enterprise, and thus the RFID technology and an enterprise resource information system can be combined.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Unified control method of large-scale server cluster

The invention discloses a unified control method of a large-scale server cluster; the unified control method comprises the following steps: a control module arranged on a management server receives control commands input by users; the control module carries out transferred meaning on the control commands and encapsulates the control commands into command data packets; the control module appoints a controlled server list from a server list; the control module is connected with a controlled module on a controlled server and delivers the command data packets to the controlled module; the controlled module receives the command data packets, carries out transferred meaning on the command data packets and analyzes the command data packets into the control commands; the controlled module starts a built-in initialization script and carries out environment initialization; and the controlled module starts system calls and carries out the control commands. The unified control method has the advantages of shielding differences among different operating systems by carrying out unified transferred meaning on the control commands, having very good portability, and being capable of conveniently and freely carrying out unified control on one or multiple servers by appointing the controlled server list needing to be controlled, thereby realizing the high efficiency control on the large-scale server cluster.
Owner:东莞市正欣科技有限公司

Gatekeeper adaptation module and data transmission system

The invention discloses a gatekeeper adaptation module and a data transmission system suitable for information interaction between a production control area and a management information area of a power I area. The data transmission system comprises a control forwarding center, an acquisition client, an isolation gatekeeper and a gatekeeper adaptation module, wherein the gatekeeper adaptation module comprises an upper layer adaptation unit and a lower layer adaptation unit, the control forwarding center is connected and communicated with the upper adaptation unit and/or the acquisition client in the gateway adaptation module through a communication adaptation module based on a TCP protocol, the acquisition client is connected and communicated with the lower-layer adaptation unit in the gateway adaptation module based on the TCP protocol, and the control forwarding center stores communication addresses respectively corresponding to each acquisition control end and each gatekeeper adaptation module. When the gateway adaptation module is applied, data interaction with upper-layer control forwarding center software and lower-layer acquisition client software can be carried out based ona TCP protocol, a communication mode of forward and reverse gatekeepers is shielded, loose coupling of upper and lower programs is realized, and a unified TCP communication interaction mode is provided.
Owner:NANJING HUADUN ELECTRIC POWER INFORMATION SAFETY EVALUATION CO LTD

Unified access method for heterogeneous data sources

The invention relates to a unified access method for heterogeneous data sources, wherein the method comprises the steps: receiving a data access request sent by a client, wherein the access request is used for requesting to access any data source in heterogeneous data sources; according to the access request, assembling a corresponding access statement, analyzing a data source corresponding to the access request, and loading a drive program of the data source, to obtain data source connection; and connecting the data source to execute the access statement, receiving a result returned by the data source, packaging the result into a universal class entity, and returning the universal class entity to the client. According to the method, on the premise of ensuring the own characteristics of each database, servitization abstraction is carried out based on the access difference of the heterogeneous data sources, and integrated and unified management and access of the heterogeneous data sources are realized; and a set of universal access interfaces and access rules capable of cross-language and cross-platform heterogeneous databases are designed in a Restful mode, and a unified data access mode is provided for upper-layer applications.
Owner:NO 15 INST OF CHINA ELECTRONICS TECH GRP

Intelligent substation virtual terminal automatic association method based on standard function coding

ActiveCN107563031AAvoid the problem of unifying definitionsSimplified quantitySpecial data processing applicationsVirtual terminalSmart substation
The present invention relates to an intelligent substation virtual terminal association method, in particular to an intelligent terminal substation virtual terminal automatic association method basedon the standard function coding. The method comprises the following steps that: 1) an ICD file function coding template library is established, and function coding is carried out on the device virtualterminal; 2) a standard virtual terminal template library is established; 3) the ICD file in the project is corresponded to the function coding template library to implement automatic coding; and 4)the automatically encoded virtual terminal carries out automatic association according to the standard virtual terminal template library, and the required SCD file output application is finally formed. The method disclosed by the present invention has the advantages that: the virtual terminal marking method taking the secondary system function loop as the core can effectively avoid the problem that the definitions of the virtual terminals in various domestic manufacturers are difficult to be unified, and the function coding shields the difference between virtual terminals of different manufacturers, so that the match rate of the automatic coding and the success rate of the automatic association can be significantly enhanced.
Owner:POWERCHINA FUJIAN ELECTRIC POWER SURVEY & DESIGN INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products