Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36 results about "Shadow system" patented technology

Shadow system is a term used in information services for any application relied upon for business processes that is not under the jurisdiction of a centralized information systems department. That is, the information systems department did not create it, was not aware of it, and does not support it.

Method for measuring movement velocity of high-density plasma and optical system

ActiveCN106604511AThe results are reasonably accurateThe principle is simplePlasma techniqueOptical elementsHigh densityTime delays
The invention provides a method for measuring movement velocity of a high-density plasma and an optical system. On the basis of a principle of light refraction occurrence at a high-density-gradient plasma boundary, an optical system is designed to generate two light beams with incidence at small angles, wherein the directions of the two light beams are perpendicular to the movement direction of the plasma boundary; and a 4f system is used for imaging and separation of the two light beams: a first light beam and a delay beam is realized at a focal point of a first lens. When velocity measurement is carried out, some light of the first light beam is deflected at the boundary of the plasma in high-speed movement and the deflected light enters the optical system where the delay beam is located; an image of the boundary of the plasma at a corresponding time is displayed at a camera; after time delay of the delay beam, the shape and location of the plasma at the corresponding time are displayed at the camera; and average movement velocity information of the plasma boundary at a corresponding time interval can be obtained in a shadow image. With a laser shadow system, the velocity of the boundary of the plasma in high-speed movement can be obtained effectively; and the result is reasonable and accurate.
Owner:NORTHWEST INST OF NUCLEAR TECH

Industrial control honeypot safety protection device and method

The invention relates to the technical field of industrial safety, in particular to an industrial control honeypot safety protection device and method. A shadow system comprises an IP simulation module, a flow transfer redirection module, virtual switch software and a plurality of virtual machine systems; a honeynet system comprises a general protocol simulation module, an industrial protocol simulation module and a honeypot management configuration module; an industrial control equipment interface provides access to a PLC module, a DSC module, an RTU module, an OPC service, SCADA equipment and HMI man-machine interaction system industrial control equipment; and a safety protection system comprises a log acquisition and analysis module, a flow acquisition and analysis module, an abnormal behavior analysis module, a traceability evidence obtaining analysis module, a system management module and a system database module. The beneficial effects are that the device does not need to connecta network in series, does not need to configure a port flow mirror image in a bypass manner, does not change the physical network structure of a user, does not affect the network operation environment of the user, achieves the flexible deployment of the environment, and achieves plug-and-play.
Owner:山东云天安全技术有限公司

Strategy release method and system based on whole-process gray release and electronic equipment

PendingCN111580855ASolving difficult-to-evaluate problemsGuaranteed stabilityFinanceVersion controlProcess engineeringShadow system
The invention provides a strategy publishing method based on full-process gray release, which is used for automatically publishing a strategy to be published in a production system in a gray release manner, and comprises the following steps: constructing a shadow system of the production system, the shadow system comprising a plurality of process nodes which are completely the same as those of theproduction system; publishing the strategy to be published to a corresponding process node in the shadow system; executing the user request in parallel in the production system and the shadow system,and respectively recording the operation data in the production system and the shadow system; automatically comparing the operation data of the production system and the shadow system, and judging whether the difference between the operation data is within a preset range or not; and when the difference is within a predetermined range, publishing the to-be-published strategy to the production system according to a predetermined gray publishing rule. According to the method, potential production problems can be eliminated, the release risk of a production system is reduced, and the strategy release efficiency is improved.
Owner:上海淇毓信息科技有限公司

Network security protection method and system

InactiveCN114268452AProtect the safety of useAggressive Behavior AccurateSecuring communicationInternet trafficAttack
The invention provides a network security protection method and system, and relates to the technical field of network security. The method comprises the following steps: deploying a shadow system to a network protection platform, and establishing a virtual network; and performing secure partitioning on the virtual network according to a preset partitioning method to obtain a plurality of partitions. And detecting the network state of each partition in real time, and if any partition has data exception, obtaining the exceptional data of the partition and the corresponding network flow. And generating a virtual honeypot based on the abnormal data and the corresponding partition, and introducing the corresponding network traffic into the virtual honeypot to obtain an attack behavior. And inputting the attack behaviors into the attack behavior analysis models matched with the corresponding partitions to obtain attack characteristics. And determining a corresponding security defense strategy according to the attack characteristics. Therefore, the security defense strategy is determined according to the attack characteristics of different partition attack behaviors, so that the security defense strategy is more adaptive to the attack behaviors, the protection resources are configured as required according to different attack characteristics, and a better protection effect is achieved.
Owner:杨磊

Pressure sensing light and shadow imaging system and imaging method thereof

The invention provides a pressure sensing light and shadow imaging system and an imaging method thereof. The pressure sensing light and shadow imaging system comprises bearing media, a sensing surface, light and shadow media, a light pool, a light and shadow system and an imaging surface. The bearing media are arranged at the uppermost end of the pressure sensing light and shadow imaging system. The lower portion of the bearing media makes contact with the sensing surface. The lower portion of the sensing surface is closely combined with the upper surface of the light pool provided with the light and shadow media. The imaging surface is arranged below the light pool. Textured substances to be imaged are placed on the upper surface of the bearing media. The bearing media transmit borne pressure to the sensing surface. The sensing surface senses pressure distribution of the textured substances. Light rays in the light pool are reflected by the sensing surface to reflect out the contact tightness between the sensing surface and the bearing media and to generate a pressure distribution image of the textured substances. The sensing surface projects the generated pressure distribution image of the textured substances to the imaging surface. The pressure sensing light and shadow imaging system can be used for forming the contact pressure image of the textured substances and enabling the formed image to be capable of reflecting out the contact pressure distribution, the image of the textured substances and the pressed sequence.
Owner:DALIAN EVERSPRY SCI & TECH

Intelligent interactive light and shadow stone backlight device

The invention relates to the technical field of stone equipment, in particular to an intelligent interactive light and shadow stone backlight device. Compared with the prior art, the intelligent interactive light and shadow stone backlight device adopts a four-layer structural design; the uppermost layer is a light-transmitting stone carving layer; a composite material bonding layer is arranged at the bottom end of the light-transmitting stone carving layer; the lower end of the composite material bonding layer is a light and shadow system layer; the bottommost layer is a reinforced protection layer; the composite material bonding layer is made of a light-transmitting material and is in a light-transmitting state; the light and shadow system layer adopts a programmable light and shadow system; light and shadow images are designed and programmed according to natural lines or engraved patterns of the light-transmitting stone carving layer; a dynamic background light and shadow effect is achieved in cooperation with front and back patterns; an intelligent control module and a touch sensor can be arranged in the light and shadow system layer; a terminal is used for controlling interaction programs and patterns of stone products; the stone products can be achieved through cooperation with the touch sensor; many application scenes are added; and more design and imagination space is achieved.
Owner:王江

Characteristic comparison method and device based on shadow system and electronic equipment

The invention relates to the technical field of computers, in particular to a feature comparison method and device based on a shadow system and electronic equipment, and the method comprises the steps: obtaining the production features of a pre-published business production version, the business production data of an online business production version, and the production features of the online business production version; operating an online business production version and the shadow system to obtain second business result data; comparing the first business result data with the second business result data, and comparing the production characteristics of the pre-published business production version with the production characteristics of the online business production system; and performing difference analysis on the comparison result, and processing the pre-published service production version according to the difference analysis result. According to the method, the shadow system is utilized to quickly discover the influence of the production version of the pre-published service on the production characteristics in the historical version, and the situation that verification discovery cannot be covered due to the influence on the calculation of the production characteristics in the historical version is avoided, so that production accidents are avoided.
Owner:SHANGHAI QIYUE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products