Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

37 results about "Host model" patented technology

In computer networking, a host model is an option of designing the TCP/IP stack of a networking operating system like Microsoft Windows or Linux. When a unicast packet arrives at a host, IP must determine whether the packet is locally destined (its destination matches an address that is assigned to an interface of the host). If the IP stack is implemented with a weak host model, it accepts any locally destined packet regardless of the network interface on which the packet was received. If the IP stack is implemented with a strong host model, it only accepts locally destined packets if the destination IP address in the packet matches an IP address assigned to the network interface on which the packet was received.

Simulation verification method and system based on combination of virtual platform and FPGA

The invention discloses a simulation verification method and system based on combination of a virtual platform and an FPGA, and the method comprises a verification step: constructing a first conversion model, receiving a simulation request of a host model through the virtual platform based on TLM2.0, and converting the simulation request into a first data package; constructing an FIFO switching verification model according to a third-party PCIe DMA method, and simulating a data transceiving channel; constructing a second conversion model, receiving the first data packet, performing analysis according to a preset protocol, and sending an analysis result to an RTL design DUT according to an AHB / AXI protocol; and a simulation step: generating an executable file according to the host model andthe second conversion model, storing the executable file in an upper computer for simulation, generating a burning file according to a third-party PCIe DMA method, the first conversion model and RTLdesign DUT, downloading the burning file to the FPGA, and enabling the upper computer to run the executable file to be connected with the FPGA for joint simulation. According to the method and system,the economic cost and the verification cost of simulation are greatly reduced, and a user can conveniently and flexibly optimize and modify according to actual requirements.
Owner:ALLWINNER TECH CO LTD

Self-adaptive substation longitudinal encryption host verification method and terminal

ActiveCN113783837ASolve the automatic verification problemImplement Adaptive CalibrationNetworks interconnectionInformation technology support systemComputer hardwareSelf adaptive
The invention discloses a self-adaptive substation longitudinal encryption host verification method and a terminal. The method comprises the following steps: establishing connection with a longitudinal encryption host, and acquiring and identifying configuration information; establishing a virtual tunnel for the longitudinal encryption host according to the configuration information, and generating a verification case according to the configuration information; performing tunnel strategy verification on the virtual tunnel according to the verification case to obtain a verification result, and performing strategy consistency comparison with a preset strategy information table according to the verification result to obtain a comparison result; according to the comparison result, correcting the tunnel strategy, and generating an analysis report. According to the method, the problem of automatic verification of the longitudinal encryption host of the transformer substation is solved, automatic verification of a whole strategy information table covered by multiple channels is realized, adaptive verification and correction of different encryption host models are realized, manual intervention is not needed, and the working efficiency is greatly improved.
Owner:MAINTENANCE BRANCH OF STATE GRID FUJIAN ELECTRIC POWER

System and method for setting automobile commissioned management permission

The present invention provides a method for setting the trusteeship authority of an automobile, comprising the following steps: detecting the trusteeship authority setting instruction and generating a display instruction when the trusteeship authority setting instruction is detected; displaying a menu according to the display instruction for the car owner to adjust various parameters of the automobile Set and generate the first sending instruction when receiving the owner’s operation completion instruction; send the key password to the car key according to the first sending instruction; detect the escrow authority start instruction, and generate the second escrow authority start instruction when detecting the escrow authority start instruction A receiving command; receive the key password according to the first receiving command and generate an unlocking signal according to the key password; detect the car unlocking command and generate a second sending command when detecting the car unlocking command; send the unlocking signal according to the second sending command Send to the car to put the car into managed mode. The automobile trusteeship authority setting method provided by the invention improves the safety of the temporary trusteeship of the car. The invention also provides a system for setting the authorization of the car trusteeship.
Owner:OPTIMUM BATTERY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products