Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

343results about How to "Take security into consideration" patented technology

Collision avoidance control method and system for automatic driving

ActiveCN108189835APreferential collision avoidance behaviorTaking into account driving efficiencyExternal condition input parametersVehicle drivingAutopilot
The invention discloses a collision avoidance control method for automatic driving. The method comprises the steps that when it is detected that an obstacle exists in a planning driving path of an automatic driving vehicle, the collision time of the automatic driving vehicle and the obstacle is calculated; if the collision time is smaller than a set safety threshold value, a safety collision avoidance operation is executed; if the collision time is smaller than or equal to a set emergent braking threshold value, an emergent braking operation is executed; the relative speed of the automatic driving vehicle and the obstacle is calculated; if the relative speed is larger than or equal to a common braking threshold value, a common braking operation is executed; if the relative speed is largerthan a vehicle following cruising threshold value, the real-time distance between the automatic driving vehicle and the obstacle is calculated, and if the real-time distance is longer than a minimum line changing distance, a line changing operation is executed; otherwise, a vehicle following cruising operation is executed. According to the collision avoidance control method for automatic driving,overall planning is conducted for different complex working conditions, an optimal collision avoidance behavioral mode is given based on a vehicle self-state under different working conditions, the method is suitable for a working condition that the vehicle speed of the automatic driving vehicle is 60 km/h or below, and the safety of efficient vehicle driving can be achieved.
Owner:清华大学苏州汽车研究院(吴江)

Multi-target dispatching method considering wind electricity output for electrical power system

The invention discloses a multi-target dispatching method considering wind electricity output for an electrical power system. The method comprises the steps of outputting high and low limits of a prediction interval based on high-low limit evaluation method of a neural network, generating a wind electricity frequency scene in a prediction interval sequence to describe the randomness of wind electricity power, simultaneously considering the total fuel cost, the pollutant discharge amount, the risk cost and the rotary standby cost in an objective function by taking load shedding punishment expense expectation as a risk index, constructing an optimized dispatching model including a wind electricity power system, and carrying out optimization solution on the constructed multi-target objective function based on a flower pollination algorithm and a differential evolution algorithm so as to obtain the optimized dispatching method. According to the method, the load shedding punishment expense expectation is taken as the risk index, meanwhile, the rotary standby cost is considered in the objective function, the optimized dispatching model including the wind electricity power system is constructed, conventional operation constraints of a unit are considered by the constructed model, and besides, reliability constraints are further added, so that the environment, the economy and the safety are simultaneously considered by virtue of a dispatching decision.
Owner:STATE GRID SHANDONG ELECTRIC POWER +1

Vehicle collision avoidance dynamic safety path planning method based on accurate trajectory prediction

The invention relates to a vehicle collision avoidance dynamic safety path planning method based on accurate trajectory prediction. The method comprises the steps of obtaining vehicle state information and parameter information of a vehicle and an obstacle vehicle; constructing a vehicle trajectory prediction model based on a three-degree-of-freedom vehicle dynamics model and a long-short-term memory recurrent neural network LSTM; using the vehicle trajectory prediction model to predict the driving trajectories of the vehicle and the obstacle vehicle, and obtaining the driving trajectory prediction data of the vehicle and the obstacle vehicle; constructing a vehicle dynamic safety path planning model by fusing mesh generation, an artificial potential field method and a high-order polynomial curve fitting method; based on the driving trajectory prediction data of the vehicle and the obstacle vehicle obtained in the step 3, using the vehicle dynamic safety path planning model to obtain an optimal collision avoidance path of the vehicle; and carrying out speed and acceleration real-time matching on the optimal collision avoidance path obtained in the step 5. Compared with the prior art, the method has the advantages of high precision, safety, feasibility, comfort and the like.
Owner:TONGJI UNIV

Intelligent cup

The invention relates to an intelligent cup. The intelligent cup comprises a cup body, a cup cover, a display screen, an electronic switch, a pressure sensor, a temperature sensor, a loudspeaker, a main control chip and a battery, wherein the cup body is used for containing water; the cup cover is arranged above the cup body; the display screen is arranged on the cup cover and used for displaying the water containing amount and the water temperature conditions in the cup body, and encryption control over the cup body can be carried out by inputting passwords or handprint identification on the display screen; the electronic switch is connected with the main control chip and the display screen and controlled to be turned on or turned off through the main control chip; the pressure sensor is arranged at the bottom of the cup body and used for determining and timely recording the water containing amount in the cup body; the temperature sensor is arranged at the bottom of the cup body and used for determining the water temperature in the cup body; the loudspeaker is arranged on the cup cover and used for giving a warning tone when the water containing amount and the water temperature achieve or do not achieve setting values; the main control chip is connected with the display screen, the electronic switch, the pressure sensor, the temperature sensor and the loudspeaker, and used for conducting information collation, recording, controlling and warning; the battery is used for providing electric energy for the intelligent cup.
Owner:陈建军

Information exchange system with safety isolation

The invention discloses an information exchange system with safety isolation, relating to the field of information safety. Real-time communication of an internal network and an external network cannot be considered simultaneously, so that the conventional information exchange system has poor convenience and security. The information exchange system with safety isolation solves the above problem. The system comprises an inner end machine and an outer end machine which are each provided with a protocol stripping module. The inner end machine and the outer end machine establish a communication connection through a data migration control unit. The data migration control unit is provided with a transmission isolation module. Due to the protocol stripping module, a network protocol of one party cannot extend to an opposite party. All previous application layer information is stripped off from the protocol stripping module and is restored to application layer information. The stripped data is transmitted between the inner end machine and the outer end machine through the data migration control unit. The transmission isolation module guarantees information transmission and simultaneously prevents one end machine from attacking the other end machine. While the internal network and external network are isolated effectively, safe and controlled data exchange between the internal network and the external network is realized.
Owner:陈巨根

Motor torque control method and wheel rim motor distributed drive system

The invention provides a motor torque control method and a wheel rim motor distributed drive system. The method is applied to a vehicle control unit in the system. The system further comprises two motor systems. The motor systems comprise motors. By means of the method, the following motor torque control process is executed to the motor systems at the same time. Based on current accelerator pedalsignals and the current rotating speeds of the motors in the motor systems, torque basic values of the motors in the motor systems are calculated; the torque basic values of the motors are corrected,and torque corrected values of the motors are obtained; the torque corrected values of the motors are limited through the current vehicle speed of a vehicle and the motor torque recently sent to the other motor system by the vehicle control unit historically, and torque limited values of the motors are obtained; the motor torque is determined from the torque limited values and the torque correctedvalues of the motors and input in the motor systems to which the motors belong, and therefore the motor systems are controlled to respond to the motor torque to control the motors in the motor systems to drive driving wheels, used for being driven by the motor systems, on the vehicle.
Owner:WEICHAI POWER CO LTD

Method and system for identity authentication between master station and slave station in SCADA (Supervisory Control and Data Acquisition) system

The invention provides a method and system for identity authentication between a master station and a slave station in an SCADA system. The method comprises following steps that: the master station A creates service and generates a symmetric polynomial coefficient aij; the slave station B builds connection with the master station A according to the IP address of the server of the master station A; after the connection is built successfully, the slave station B and the master station A share the symmetric multinomial parameter; both the master station and the slave station take the data frames of a communication protocol as own identity identifier IDA and IDB; the master station and the slave station exchange mutual identity identifiers; the identity identifiers are substituted into a symmetric polynomial for calculation; if f(IDA, IDB) is equal to f(IDB, IDA), the slave station B and the master station A realize two-way authentication; and a symmetric encryption key KAB is obtained through calculation and extension. According to the method and the system of the invention, the shared key is generated by the symmetric polynomial; the shared key is taken as the symmetric encryption key; a symmetric encryption algorithm is used in the message exchange process; and therefore, the calculation complexity is reduced.
Owner:SHANGHAI JIAO TONG UNIV +1

Scheduling method for virtual machine migration and system

The invention provides a scheduling method for virtual machine migration. The scheduling method includes the flowing steps that S1, a cross-domain migration request of a virtual machine is obtained; S2, whether the virtual machine can be migrated out or not is judged according to safety information of the virtual machine and the domain safety strategy of a source safety domain where the virtual machine is located; S3, if yes, the safety information of the virtual machine is parsed, and the target safety domain to which the virtual machine can be migrated is determined according to the central safety strategy; S4, the cross-domain migration request of the virtual machine is transferred to the target safety domain; S5, whether the target safety domain allows the virtual machine to be migrated to the target safety domain or not is judged according to the safety information of the virtual machine and the domain safety strategy of the target safety domain; S6, if yes, the target safety domain receives the cross-domain migration request of the virtual machine, and the virtual machine is migrated to the target safety domain from the source safety domain. By means of the scheduling method and system for virtual machine migration, potential safety hazards caused by migration of the virtual machine can be avoided, optimizing operation of system overall performance and load balance are guaranteed, and service safety and performance of the system are taken into consideration as well.
Owner:CEC CYBERSPACE GREAT WALL

Wave correlation based current protection method for power collecting lines in wind farm

The invention relates to a wave correlation based current protection method for power collecting lines in a wind farm. The method comprises the following steps: firstly, three-phase current in protective mounting position of each power collecting line in the wind farm is collected; filtering is performed, and fault component current of each phase is extracted by programming; correlation coefficients of the phases between the power collecting lines is calculated according to the fault component current, and the correlation coefficients are traversed pairwise; if the correlation coefficient of one phase belongs to (0, 1], the phase of the two power collecting lines has no fault, and the two power collecting lines are written as line i and line j; if the correlation coefficient of the one phase does not belong to (0,1], the phase of one and only one of the two power collecting lines has a fault, and the two power collecting lines are written as line u and line v; at the moment, when the correlation coefficient of the phase between the line u and the line j belongs to (0,1], the phase of the power collecting line u has no fault, while the phase of the power collecting line v has a fault; when the correlation coefficient of the phase between the line u and the line j does not belong to (0,1], the phase of the power collecting line u has a fault, while the phase of the power collecting line v has no fault.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING) +1

Single-power-source automatic double door controlled by crank double-slider mechanism

A single-power-source automatic double door controlled by a crank-slider mechanism is composed of a right door body, a first shaft, a first connection bridge, a first spring, a first fixed rod, a connecting rope, a fixed pulley, a first fixed disk, a second shaft, a second connection bridge, a second spring, a second fixed rod, a second fixed disk, a door frame, a first pin shaft, a first joint lever, a second pin shaft, a second joint lever, a first slider, a third pin shaft, a third joint lever, a second slider, a fourth pin shaft, a rail, a fourth joint lever, a fifth pin shaft, a third slider, a fifth joint lever, a left door body, a sixth pin shaft, a sixth joint lever, a seventh pin shaft, a lever, a rotation shaft, a fixed block and an ejector rod. Compared with an existing single door, the single-power-source automatic double door can achieve opening and closing of the doors and a lock through automatic control, the operation is easier and more convenient when controlling is performed, the single-action-source automatic double-leave door can be opened and closed both inwards and outwards, and therefore the theftproof performance is better; meanwhile, the single-power-source automatic double door can be made of materials such as wood, metal and glass, and therefore the double door has the advantages of low cost, aesthetic property, practicability and safety.
Owner:湖州市双林工业园区开发有限公司

Power consumption data desensitization algorithm model construction method based on anonymization privacy technology

The invention relates to a power consumption data desensitization algorithm model construction method based on an anonymization privacy technology. The method is characterized by comprising the following steps of 1, researching a data desensitization method in a multi-source heterogeneous big data environment; 2, analyzing and comparing the adaptability conditions of anonymization, data encryptionand differential privacy technologies in a power consumption information acquisition data environment; 3, constructing a power consumption data desensitization algorithm model based on anonymizationand differential privacy technologies; and step 4, researching and developing a power consumption data desensitization tool and carrying out trial point application. The invention discloses a power utilization data desensitization algorithm model construction method based on an anonymization privacy technology. A customizable power consumption data desensitization algorithm model is constructed; the desensitization requirements of different users can be accurately met, the convenience and safety of information sharing are considered, the privacy safety of sensitive data in use, release and sharing links in marketing and acquisition systems is guaranteed, and the leakage risk of mass power marketing data, power customer data and personal power consumption information of state grid companiesis effectively reduced.
Owner:ELECTRIC POWER SCI & RES INST OF STATE GRID TIANJIN ELECTRIC POWER CO +2

Password-less login realization method based on enterprise-level intranet and extranet environment

InactiveCN107733861ATake security into considerationTake care of the login processTransmissionPasswordEnterprise level
The invention discloses a password-less login realization method based on enterprise-level intranet and extranet environment. The method specifically comprises the following steps: step S100, scanningQR code through an APP by using any communication electronic equipment with code-scanning function; step S200, logging in the QR code and acquiring the information in the QR code, sending the information to a mobile interaction platform of the enterprise through a national encryption algorithm SM4 data encryption way; step S300, judging whether the QR code scanned in the step S100 is the directlylinked intranet authentication service or extranet authentication service, and then performing the routing strategy matching; step S310, requesting an extranet permission platform to perform the authentication if the QR code is the extranet authentication service; and accessing an intranet database through an isolating device SQL penetrating way if the QR code is the intranet authentication service; and accomplishing the authentication service. By using the QR code identification login, a problem that the intranet login of the traditional enterprise performs the authentication by inputting the account and password is avoided, the security is improved, and meanwhile, the non-technical measure leakages of request interception, hijacking and like are avoided.
Owner:SICHUAN ZHONGDIAN AOSTAR INFORMATION TECHNOLOGIES CO LTD

Solenoid valve assembly externally arranged on absorber and absorber

InactiveCN105782324AContinuously adjustable dampingDamping adjustment responds quicklyOperating means/releasing devices for valvesSpringsSolenoid valveOil pressure
The invention provides a solenoid valve assembly externally arranged on an absorber and the absorber. The solenoid valve assembly externally arranged on the absorber comprises a solenoid valve part and an overflow valve. The solenoid valve part comprises a solenoid valve deck, a solenoid valve body, a coil, a solenoid valve element, an armature, a first spring and a second spring. The overflow valve comprises an overflow valve deck provided with open holes formed in the two ends in the axial direction, an overflow valve body provided with an oil inflow hole and an overflow hole, an overflow valve seat provided with a center hole, an overflow adjusting assembly, an overflow valve element, a pressure adjusting spring and a supporting piece. Through the overflow valve of the solenoid valve assembly externally arranged on the absorber, damping adjustment can be achieved through the overflow adjusting assembly of the overflow valve when the oil pressure is small and a throttling hole is closed, so that the solenoid valve assembly externally arranged on the absorber is high in damping adjustment response speed, stable in performance and capable of meeting the requirements that damping force is adjusted continuously in real time in the suspension frame movement process.
Owner:GUANGZHOU AUTOMOBILE GROUP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products