Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

8359results about How to "Achieve protection" patented technology

Over-power protection apparatus with programmable over-current threshold

An over-power protection apparatus with programmable over-current threshold for a power converter is provided. The over-power protection apparatus further provides an over-temperature threshold for protection purposes. The over-power protection apparatus is able to achieve over-power and over-temperature protection in response to the level of the driving signal of the power converter. In addition, the programmable over-current threshold of the present invention can be adjusted in response to various load conditions.
Owner:SEMICON COMPONENTS IND LLC

Fingerprint recognition system and control method

The invention discloses a fingerprint identifying system which comprises three large parts of a fingerprint database, a central server and a client terminal; the fingerprint database is mainly used for memorizing the fingerprint characteristic information after digital coding; the central server is mainly responsible for validating the validity of the client terminal, receiving the fingerprint characteristic data, comparing the characteristics and returning the fingerprint identifying result; the client terminal is mainly responsible for collecting the fingerprint, extracting and uploading the fingerprint characteristic data. The system overcomes the defects of the prior art, can provide an online / offline fingerprint identifying system the basic algorithm library of which can be seamlessly expanded and the functions of which can be selected and matched. The fingerprint identifying system can lead a user to obtain the ID identification and authentication services with high quality under the situation of not needing a great amount of capital investment.
Owner:章毅 +2

Electronic device and power adapter thereof

The invention belongs to the technical field of charging, and provides an electronic device and a power adapter of the electronic device. The power adapter comprising a power source module, a master control module, an electric level adjustment module, a current detection module, a voltage detection module and an output switch module is provided for the electronic device, the master control module judges whether the output current of the power adapter is larger than a current threshold and whether the output voltage of the power adapter is larger than a voltage threshold, and if the output current is larger than the current threshold and / or the output voltage is larger than the voltage threshold, the master control module controls the output switch module to close direct current electricity output of the power adapter. In addition, if the electronic device judges that the output of the power adapter has an overcurrent and / or overvoltage phenomenon and feeds a charging closing instruction back to the master control module, the master control module controls the output switch module to close the direct current electricity output of the power adapter according to the charging closing instruction, and therefore the purpose of achieving overcurrent and / or overvoltage protection is achieved for a battery.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Sensitive data protection system and method of data circulation and transaction of big data platform

The invention discloses a sensitive data protection system of the data circulation and transaction of a big data platform. The sensitive data protection system is characterized in that the sensitive data protection system of the data circulation and transaction of the big data platform comprises a data collection module, a data sharing module, a data exchange module, a data acquisition module and a desensitization management module, wherein the data collection module discovers sensitive contents in data collection and carries out protection processing on the sensitive contents; the data sharing module carries out the protection processing on the sensitive data in a data sharing process; the data exchange module carries out desensitization processing on a relative sensitive data configuration desensitization strategy in a data exchange process; the data acquisition module protects a data file downloading link and a storage address in a data acquisition process; and the desensitization management module manages, monitors and audits the desensitization and the protection processing of the sensitive data. The invention also discloses a sensitive data protection method of the data circulation and transaction of the big data platform.
Owner:CHINA ELECTRONICS TECH CYBER SECURITY CO LTD

Block chain-based data processing method, apparatus, storage medium, and electronic device

The present disclosure proposes a block chain-based data processing method, apparatus, storage medium, and electronic device for protecting a private transaction of a block chain node. The method includes: receiving a block in a blockchain network; the block includes a sub-block, the sub-block includes data corresponding to the smart contract code and the smart contract code; and obtaining the private key from the management contract by using a pre-acquired private key a secret key; obtaining a smart contract code in the sub-block according to the secret key, so that the first block chain nodeexecutes the smart contract code; encrypting and writing the data generated by the smart contract code and the block chain node to execute the smart contract code In the block; the sub-block is written into the block of the block chain node.
Owner:CLOUDMINDS SHANGHAI ROBOTICS CO LTD

Battery charging device and battery charging protection control method

The invention belongs to the technical field of charging, and provides a battery charging device and a battery charging protection control method. A power supply adaptor in the battery charging device is in data communication with a charging control module; when it is judged by the power supply adaptor that overvoltage and / or overcurrent of direct current output by a communication interface of the power supply adaptor happens, the power supply adaptor informs the charging control module to drive a controller in electronic equipment to close a communication interface of the electronic equipment and direct current output is stopped automatically; when it is judged that overvoltage and / or overcurrent happens when the charging control module receives output voltage and output current of the power supply adaptor, the charging control module informs the power supply adaptor to stop direct current output and drives the controller in the electronic equipment to close the communication interface of the electronic equipment. In this way, overvoltage and / or overcurrent protection of a battery can be achieved when overvoltage and / or overcurrent output of the communication interface of the power supply adaptor happens.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

Threat detection and defense device, system and method for industrial control system

The invention discloses a threat detection and defense device, system and method for an industrial control system. The threat detection and defense device, system and method is used for protecting safety of the industrial control system. The threat detection and defense device comprises a threat detection module and an exception handling module, wherein the threat detection module is used for intercepting and capturing a communication data message, identifying message field information in the communication data message, judging whether the communication data message is the malicious message according to the message field information, judging whether malicious act against a local upper computer or malicious act initiated by the local upper computer exists according to the message field information and message field information in a communication massage recorded in a local communication log database and detecting whether malicious operation against a control program in the local upper computer exists; the exception handling module is used for triggering and performing corresponding safety operation according to safety configuration files if one or more of the malicious message, the malicious act against the local upper computer, the malicious act initiated by the local upper computer and the malicious operation against the control program in the local upper computer exist.
Owner:ZHEJIANG UNIV

Starting power generation system for electric automobile

The invention discloses a starting power generation system for an electric automobile, which comprises a double salient pole starting power generator, a starting power generation controller and controller working power; the starting power generation controller comprises a bidirectional power conversion circuit, an exciting current detection unit, an output current detection unit, an output voltage detection unit, a position rotation speed detection unit, an armature current detection unit, an exciting main circuit and a digital signal processor, wherein the exciting main circuit includes an exciting relay, a rectification filter unit and a chopper circuit which are connected in series in turn; and the digital signal processor is connected with the exciting current detection unit, the output current detection unit, the output voltage detection unit, the armature current detection unit, the position rotation speed detection unit, and the control ends of the bidirectional power conversion circuit, the exciting relay and the rectification filter unit by signals respectively. The invention also discloses an electric automobile and a control method thereof. Compared with the prior art, the starting power generation system is simple in structure, low in cost and flexible to control.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Process for repairing water erosion damage of flow passage component of steam turbine and protecting flow passage component of steam turbine

The invention discloses a process for repairing water erosion damage of a flow passage component of a steam turbine and protecting the flow passage component of the steam turbine. In the process, molded lines of the flow passage component of the steam turbine are repaired by adopting copy overlaying of manual argon tungsten arc welding aiming at the phenomenon of the water erosion damage existing in the flow passage component of the steam turbine. A water erosion resistant coating is prepared by supersonic speed flame spraying so as to achieve the purposes of repairing the molded lines of the flow passage component of the steam turbine and protecting the molded lines at large area on line and prolonging the service life of the flow passage component of the steam turbine. Through the process of the invention, the flow passage component of the steam turbine can be repaired and protected at large area on line in a short time without changing vibration characteristic, steam-driven characteristic and strength characteristic of the flow passage component of the steam turbine, so that the process has the advantages of high on-site operability, small deformation of the repaired workpiece, remarkable improvement on water erosion resistance and the like, can solve the common problem of water erosion in the flow passage component of the power station steam turbine in service on site, improves the running safety and efficiency of units and increases economic benefit of a power plant.
Owner:XIAN THERMAL POWER RES INST CO LTD

Data integrity authentication information generation method and device as well as data integrity authentication method and device

The invention provides a data integrity authentication information generation method and device. The device comprises a Hash structure generation unit, a common authentication information acquisition unit and an integrity authentication information generation unit, wherein the Hash structure generation unit can generate a Hash structure corresponding to a specific time period according to Hash values of data sections contained in multiple data sources in the specific time period, so that the Hash value in each data section can respectively represent a child node at the lowest level of the Hash structure in order to calculate a root Hash value of the child node; the common authentication information acquisition unit can acquire the common authentication information according to the root Hash values; the integrity authentication information generation unit can generate the integrity authentication information of the data sections contained in the multiple data sources in the specific time period for the multiple data sources, wherein the integrity authentication information of each data section comprises common authentication information, path information containing from the Hash value of the data section of the leaf node at the lowest level in the Hash structure to the root node, and the relevant node Hash value of the child node in the path. The invention also provides a data integrity authentication device and method.
Owner:SONY CORP

Intelligent vending machine

The invention discloses an intelligent vending machine. A payment module, a cargo transmission module, a commodity management module, an environment sensing module, a commodity state display module, an advertisement management module and an intelligent city module are arranged inside a machine body, wherein the commodity management module comprises a system management and communication center, a mobile display hand set and a remote vending machine operation terminal; the payment module comprises a mobile payment module, an iris payment module and a face payment module; the intelligent city module and the advertisement management module are used for displaying and inquiring relevant city information. The intelligent vending machine has the advantages that a manager can be timely notified to supplement cargos in time; the function of reminding the concrete position of the vending machine with the short lacked commodity distance is achieved; the cloud server can recommend buying commodity to the user according to the weather, temperature, geographic position and health preserving information sensed by the vending machine according to seasons; the user experience is enhanced; various payment functions are realized; convenience and high speed are realized.
Owner:永州巨米智能科技有限公司

Method and apparatus for controlling smart home appliance

The embodiment of the application discloses a method and apparatus for controlling a smart home appliance. One specific embodiment of the method includes steps: recognizing whether a sound is a voicein response to detection of the sound; if yes, recognizing identity information of a user emitting the sound, and determining whether the user is a legal user according to the identity information; performing speech recognition on the sound in response to determination that the user is the legal user, and obtaining a control instruction; and executing the control instruction in response to determination that the control instruction is an instruction matched with the identity information. According to the method and apparatus, security management and control of the smart home appliance and security management and security protection of a speaker can be realized.
Owner:SAMSUNG ELECTRONICS CHINA R&D CENT +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products