Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

129 results about "Response strategy" patented technology

Geographic Response Strategies. Geographic Response Strategies ( GRS) are oil spill response plans tailored to protect a specific sensitive area from impacts following a spill. Environmental conditions at GRS sites frequently change according to season, storm impact, erosion, substrate redistribution, and other factors,...

Cross-data-center virtual machine migration method, service control gateway and cross-data-center virtual machine migration

Embodiments of the invention provide a cross-data-center virtual machine migration method, a service control gateway and a cross-data-center virtual machine migration. The migration method comprises: a target service control gateway of a target data center receives virtual machine migration information sent by a source service control gateway of a source data center; the target service control gateway configures a response strategy, an internal data channel between an ingress router of the target data center and a target switch, and an external data channel between the target data center and a user on the target switch; the target service control gateway sends configuration success information to the source service control gateway; and the target service control gateway installs an virtual machine to be migrated on the target server and provides service for the user. According to the embodiments of the invention, the strategy of the target switch can be automatically installed, the external data channel from the user to the target data center can be automatically installed, and the internal data channel between the ingress router of the target data center and the target switch can be automatically installed, thereby achieving the automatic virtual machine migration across data centers.
Owner:HUAWEI TECH CO LTD

Intrusion detection method and intrusion detection system for industrial control system based on communication model

The invention provides an intrusion detection method and an intrusion detection system for an industrial control system based on a communication model. The accuracy of intrusion detection is improved to the maximum degree while the practicability is guaranteed. The intrusion detection method comprises the steps of firstly establishing a communication model and communication rules of the industrial control system, wherein the communication model comprises node information and communication connection information; generating a legal communication rule set on the basis of the communication model after the communication model of the industrial control system is established, learning in an installation and debugging stage and a stage before an attack happens of the industrial control system, and establishing a communication model and a communication rule set; then deploying detectors in an industrial control network, capturing a datagram, analyzing and extracting the communication connection information through the datagram, comparing the communication connection information with the generated legal communication rule set, and giving out an alarm when communication connection which violates the legal communication rule set exists; and calling a system response module to adopt corresponding response strategies if intrusion is discovered, and carrying out analysis and learning again if actual detection is wrong.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method for enhancing operation and maintenance management and control of distribution network equipment

The invention aims at the characteristics of randomness and suddenness of power grid equipment faults. Therefore, the problem is difficult to accurately predict; the invention provides a method for enhancing operation and maintenance management and control of distribution network equipment. The invention belongs to the technical field of power grid equipment operation. Big data technologies such as clustering analysis, machine learning and the like are applied to effectively integrate and mine system data such as an electricity consumption information acquisition system, PMS2.0, D5000 and thelike; data islands among the systems are broken through, an equipment fault prediction model is established according to an adjacent propagation effect analysis theory, the equipment fault occurrenceprobability can be pre-judged in advance, equipment maintenance can be arranged in advance, the power failure frequency and time are reduced, the power supply quality is improved, and the operation and maintenance level of a distribution network is greatly improved. According to the method, an alarm signal is sent out before an equipment fault occurs, the equipment fault is pre-judged in advance,a coping strategy is provided, the big data technology is innovatively applied to predict the possibility that the equipment has faults in future according to historical fault records, and a passive repair working mode is changed into an active repair working mode.
Owner:长春电力设计有限公司 +2

Active distribution network demand response control method based on hierarchical energy storage

The invention relates to an active distribution network demand response control method based on hierarchical energy storage. The method comprises a same layer source-storage coordinated response strategy, a cross layer storage-storage coordinated response strategy, a same layer source-storage-charge coordinated response strategy and a cross layer source-storage-charge coordinated response strategy. The same layer source-storage coordinated response strategy is used for onsite smoothing distributed energy network access real-time power fluctuation. The cross layer storage-storage coordinated response strategy solves the problem fed back by the present layer by authorizing to the energy storage system in the previous layer of power grid and aims at enhancing the consumption capacity of the distributed power supplies. The same layer source-storage-charge coordinated response strategy and the cross layer source-storage-charge coordinated response strategy perform optimization control according to the priority of maximizing consumption distributed power generation, load power supply and energy storage economic operation. The energy storage system is hierarchically accessed to the distribution network so that the characteristics of energy storage can be fully exerted and the economic performance of its application can be enhanced, and scale application of energy storage in the electric power system can be facilitated.
Owner:XUJI GRP +2

Multiuser command speech recognition method and system and storage medium

The invention discloses a multiuser command speech recognition method comprising the steps that at least one user speech instruction is acquired; existence of at least one wake-up word in at least oneuser speech instruction is recognized and detected according to the user voiceprint characteristics; existence of at least one executive command in at least one user speech instruction is recognizedand detected according to the user voiceprint characteristics; at least one wake-up word and at least one executive command are matched according to the user voiceprint characteristics so as to obtainat least one response instruction corresponding to at least one user; and at least one response instruction is matched and responded according to the response strategy. The wake-up words and the executive commands of multiple users are recognized through the voiceprint characteristics of the users and responded according to the response strategy. The wake-up words and the executive commands are separately recognized so that the speech recognition accuracy can be enhanced, the speech commands of the users are executed according to the response strategy and the speech commands can be clearly executed without confusion.
Owner:FLYBALL ELECTRONIC SHENZHEN CO LTD

Safety monitoring method under distributed network environment

ActiveCN103916397ASolve real-time security issuesTransmissionComputer moduleSafety control
The invention discloses a safety monitoring method under a distributed network environment and relates to the safety monitoring problem in the field of information security. According to the method, the system is composed of a monitoring module, a safety module and a safety mechanism, wherein the safety module is composed of a safety function cooperation module, a safety control module, a safety measurement module, a safety decision module and a local benchmark database. Monitored dynamic data are transmitted out by the monitoring module, and the monitored dynamic data are transmitted to the safety measurement module for measurement and used for measuring safety of behaviors of monitoring nodes; the safety problem is determined by the safety decision module according to the measurement result; the safety mechanism in a monitored system is dispatched by the safety control module according to the decision result to perform a coping strategy; the safety function cooperation module is responsible for having communication with the safety measurement module, the safety decision module and the safety control module so that the safety function cooperation work can be achieved. A safety strategy can be dynamically made for the distributed network environment, and safety of the monitoring nodes under the distributed network environment is maintained.
Owner:BEIJING UNIV OF TECH

Intrusion detection and analysis system on basis of service data flow of virtual machines

InactiveCN104753952AApplicable security defenseImprove robustnessData switching networksService flowData stream
The invention provides an intrusion detection and analysis system on the basis of service data flow of virtual machines. The intrusion detection and analysis system comprises a data acquisition module, an intrusion detection module, a communication interface, an alarm response module and a safety management module. The data acquisition module is used for acquiring audit data when access request operation is started; the intrusion detection module is used for analyzing the acquired audit data and detecting the audit data to determine whether the audit data are intrusion events or not; the intrusion detection module and the data acquisition module are bidirectionally communicated with each other via the communication interface; an intrusion detection system can generate alarm information by the aid of the alarm response module when the intrusion events occur, and the alarm information is transmitted to the safety management module by the aid of the alarm response module, so that the alarm information can be visually displayed; the safety management module is used for combining and scheduling forecasting methods, transmitting access control strategies, the forecasting methods and alarm correlation information to the intrusion detection module, transmitting response strategies to the alarm response module and receiving safety update information transmitted by the alarm response module.
Owner:CHENGDU SHUANGAOYANG TECH

IP recognition method and system for domain name authority service source

The invention discloses an IP recognition method and system for a domain name authority service source. The method comprises the steps: 1), a query record feature statistic module extracts the query record features of set source IPs from an authority query log of an authority server; 2), a recursion structure feature statistic module builds a recursion structure mapping relation table according to the read global recursion service detection data, and then carries out recursion structure feature extraction according to the recursion structure mapping relation table; 3), a source IP cluster recognition module carries out the clustering of the set source IPs according to the extracted query record features and the recursion structure features, dividing the source IPs into a plurality of different subsets, and sets a response strategy for each subset; 4), the authority judges which subset the IP corresponding to the query belongs to when the authority server receives the query, and then carries out the processing of the IP corresponding to the query according to the response strategy corresponding to the subset. The method can achieve the fine recognition of different types of source IPs, and carries out the corresponding processing of the IPs.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products