Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40results about How to "Does not affect business" patented technology

Information sending method and device

The invention discloses an information sending method and device. The information sending method comprises that a line net center issues information to station systems and / or line centers issue information to station systems; the line net center controls several line centers, each line center controls several station systems, the line net center is used for processing all net information, each line center is used for processing information of station systems controlled by the line center and reports the processing result to the line net center, and each station is used for providing information and broadcasting information issued by the corresponding line center; each station system broadcasts information issued by the corresponding line center and / or the line net center; each station system forwards equipment state information to the corresponding line center; the line net center sends control information to the station systems and / or the line centers send control information to the station systems, and the control information is an instruction for controlling the equipment of the station systems and / or media information. According to the invention, after the line net center is broken down, the line centers can replace the line net center to continue the work, and services are not affected.
Owner:QINGDAO HISENSE TRANS TECH

Storage system, storage appliance and control appliance

The invention discloses a storage system, a storage appliance and a control appliance. The storage system comprises the control appliance and at least two storage appliances, wherein the control appliance comprises a system controller and a converter, the converter is connected with the system controller, and in addition, the converter is provided with at least two first interfaces, wherein at least two first interfaces are single-passage serial microcomputer system interfaces, or at least two first interfaces are peripheral element expansion x1 interfaces, each storage appliance comprises a connector and a storage unit, each connector comprises a second interface and a third interface, the second interface of each connector is connected with a first interface of the converter, and a third interface of the connector is connected with the storage unit, so the two storage appliances are parallelly connected with the control appliance. Through adopting the mode, the parallel connection of the storage appliance to the control appliance can be realized, the access time delay of the partial storage appliance is reduced, and the storage volume expansion of the storage system is convenient.
Owner:HUAWEI TECH CO LTD

Method, apparatus and device for controlling data recovery speed

The invention discloses a method, an apparatus, a device and a computer-readable storage medium for controlling the data recovery speed. The method comprises the following steps: determining a corresponding cluster recovery speed based on the current busy degree of a distributed system; determining a corresponding cluster recovery speed based on the current busy degree of the distributed system; determining any storage node to recover data as a target node, multiplying the ratio of the number of data to be recovered by the target node and the number of data to be recovered by the distributed system by the cluster recovery speed to obtain the recovery speed of the corresponding node, and determining the number of tokens allocated to the target node in a unit time as the currently availablenumber of tokens based on the recovery speed of the node; when the data recovery request is received, judging whether the number of tokens allocated to the target node in the current unit time reachesthe currently available number of tokens, if so, refusing issuing of the token to the target node, if not, issuing the token to the target node to indicate that the target node realizes the data recovery. The invention achieves the purpose of controlling the speed of data recovery based on the current situation of the distributed system.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Medical antibacterial elevator panel auxiliary control device

PendingCN112079218AEasy to useDoes not affect normal economic operationLavatory sanitoryElevatorsControl cellStructural engineering
The invention relates to a medical antibacterial elevator panel auxiliary control device. The medical antibacterial elevator panel auxiliary control device comprises a disinfection bottle, a bearing plate and a control panel, wherein control units are arranged on the control panel; each control unit is aligned and matched with one key on an elevator panel; the control units comprise transmission pressing keys, suction cylinders and piston connecting pieces; the transmission pressing keys are matched and opposite to the keys on the elevator panel; when the transmission pressing keys are pressed, the transmission pressing keys can move corresponding to the control panel, and press and trigger the corresponding keys on the elevator panel; the suction cylinders further comprise one-way liquidinlet switches and antibacterial nozzles; the one-way liquid inlet switches communicate with suction cavities and guide cavities; liquid spraying directions of the antibacterial nozzles are towards the transmission pressing keys; and after users finish pressing, return pieces reversely pull back piston ends, and the piston ends reversely slide in the suction cylinders. The device can quickly and conveniently update elevators, can timely disinfect the keys after pressing use each time, and effectively reduces bacterial propagation.
Owner:王丽萍

System of soft exchange network passing through firewall based on ALG+MP and its method

This invention discloses a system and a method for passing through fire walls based on the ALG+MP soft exchange network composed of an ALG1, MP2, LAN exchanger3, FW4, MGC5, IAD6, an ordinary phone set 7 and SPY 8, in which, the ordinary phone set is accessed into LAN exchanger3 then to IP by IAD6 to call controlled by MGC5 and matches with MGC5 to finish the penetration of FW4 by ALG1 and MP2, ALG1 sets up the communication connection between terminals and MP2 to realize communication among terminals by the forward of medium flows of MP2.
Owner:武汉市中光通信公司

XXE attack detection method, system and device and computer storage medium

The invention discloses an XXE attack detection method, system and device and a computer storage medium. The method comprises the steps of obtaining to-be-detected XML data; converting the XML data to be detected into a corresponding detection graph; traversing and mining the detection image to obtain a mining result; and judging whether the to-be-detected XML data carries the XXE attack or not based on the mining result. According to the method, the to-be-detected XML data is converted into the corresponding detection graph, and due to the connectivity and transitivity of the graph, even if the to-be-detected XML data carries the hidden attack information, the original attack information corresponding to the hidden attack information can be obtained by traversing and mining the detection graph, so that the hidden attack information can be detected, and the hidden attack information can be detected. The hidden attack information in the to-be-detected XML data can be judged together, so that the detection accuracy of the XXE attack is improved, and the XML service is not influenced. According to the XXE attack detection system and device and the computer readable storage medium provided by the invention, the corresponding technical problems are also solved.
Owner:SANGFOR TECH INC

Sensitive data detection system for large-scale SSL/TLS encrypted session flow

ActiveCN111711598AReal-time processingImprove the ability of rapid detection and processingTransmissionRapid processingInternet access
The invention provides a sensitive data detection system for a large-scale SSL/TLS encrypted session stream. The system comprises an agent decryption module which is disposed at an Internet access gateway of a detection object, carries out the intermediate agent of an SSL/TLS encrypted data transmission process, and outputs the plaintext content, a detection task production scheduling module whichcalls a detection tool to generate a detection task and task information, schedules a task processor to execute the detection task, and sends the task information to a detection result generation module, a task processor module which is used for executing the detection task and generating a task result, a detection tool module which is used for detecting sensitive data contained in the plaintextcontent, and the detection result generation module which is used for judging and combining according to the task information and the task result to generate a detection result. According to the system, a complex decryption key management process is not needed, detection task production and result processing are separated, detection tasks are asynchronously produced, task processing resources arescheduled as required, and large-scale SSL/TLS encrypted session streams can be rapidly processed in real time.
Owner:CHINA ELECTRONICS TECH CYBER SECURITY CO LTD

Call processing method in next generation network

The call processing method for the next generation of network has expanded local connection options in medium gateway control protocol and increased call type parameter to the local connection options. When the medium gateway detects the call service, it informs the medium gateway controller, the medium gateway controller issues connection amending command with the said call type parameter and requires the medium gateway to perform coding / decoding switching. The medium gateway regulates corresponding DSP parameters based on the call type parameter to suit different service transmission. The call type parameter as one expanded parameter has no influence on service and causes no malfunction of the gateway. The present invention makes it possible for the medium gateway to use G.711 coding / decoding service to regulate DSP parameter for different service and this raises the transmission quality.
Owner:HUAWEI TECH CO LTD

A sensitive data detection system for large-scale ssl/tls encrypted session streams

ActiveCN111711598BReal-time processingImprove the ability of rapid detection and processingSecuring communicationThe InternetData transmission
The invention provides a sensitive data detection system oriented to large-scale SSL / TLS encrypted session flow, including: a proxy decryption module, which is set at the Internet entry and exit gateway of the detection object, performs intermediate proxy for the SSL / TLS encrypted data transmission process, and outputs plaintext Content; detection task production scheduling module, which calls detection tools to generate detection tasks and task information, schedules the task processor to execute detection tasks, and sends the task information to the detection result generation module; task processor module is used to execute detection tasks and generate The task result; the detection tool module is used to detect the sensitive data contained in the plaintext content; the detection result generation module is used to judge and merge according to the task information and the task result to generate the detection result. This system does not require complex decryption key management process, separates detection task production and result processing, produces detection tasks asynchronously, schedules task processing resources on demand, and can quickly process large-scale SSL / TLS encrypted session streams in real time.
Owner:CHINA ELECTRONICS TECH CYBER SECURITY CO LTD

Loess strata subway tunnel earth pressure balance shield construction method

The invention discloses a loess strata subway tunnel earth pressure balance shield construction method. The method comprises that firstly, shield excavation construction is performed by using a earth pressure balance shield machine; the excavation speed in no more than 10cm / min, the total thrust is no more than 15000KN, and the inner pressure of a soil warehouse is kept in a range between 1bar and 2 bar; the aperture opening ratio of a spoke panel type cutter is in a range of 40-70%, and the rotating speed of the cutter is no more than 1.5rpm; cement, pulverized fuel ash, fine sand, bentonite and water is mixed uniformly to obtain synchronous grouting liquid and second grouting is performed by using double-liquid grouting composed of cement paste and water glass; performing shield duct piece assembly construction after completion of one cycle of the shield excavation construction; and the process is repeated until the overall construction of the subway tunnel is achieved. The construction method is simple in step, easy to operate, fast in construction speed, high in construction quality, low in interference on the environment, high in construction safety and capable of guaranteeing successful construction of loess strata subway tunnels.
Owner:URBAN RAIL TRANSIT ENG CO LTD OF CHINA RAILWAY FIRST GRP CO LTD +1

A distributed access authentication management method in a leo satellite network

The invention discloses a distributed access authentication management method in a LEO satellite network, which adopts an identity-based cryptographic system, uses the private key of the key generation center to quickly generate the public-private key pair of the user and the satellite node, and stores the public-private key pair in the identification field The identity information is agreed in the system to realize the role distinction in the system; at the same time, based on the chain distributed storage technology of the blockchain, a trusted chain with the key generation center and the satellite as the main body of trust is constructed to realize rapid access authentication of users and fast inter-satellite The handover identity verification function adapts to the characteristics of dynamic topology and frequent handover of satellite-ground links in the LEO satellite network. On the other hand, this method adopts the distributed storage technology of the block chain, and uses the trust chain as the consensus mechanism to record relevant information such as user registration, logout, login, logout, and switching, and to ensure the accuracy, integrity, and accuracy of user logs. Consistency, traceability and non-tampering, avoiding the bottleneck of the central node in the access function and authentication performance.
Owner:NANJING UNIV OF SCI & TECH

Operator-level network address translation method and device

The embodiment of the invention provides an operator-level network address translation method and device. The method comprises the steps of acquiring a running state of target distributed CGN equipment, if it is judged that the target distributed CGN device fails, switching the flow to a centralized CGN device, and sending a stop instruction to the target distributed CGN device. The embodiment ofthe invention provides the operator-level network address translation method and device. Through dynamic conditional release of the routing after the NAT of the distributed CGN equipment, the centralized CGN and the distributed CGN are ensured to use the same address space after the NAT, the service is not influenced when the main CGN equipment and the standby CGN equipment are switched, and the use efficiency of the IPv4 address is improved.
Owner:XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP +1

Method and device for upgrading and rolling back a base station

Embodiments of the invention provide an upgrade method and apparatus, and a rollback method and apparatus of a base station. The upgrade method includes steps: a software management master control module obtains a hot patch software package; the software management master control module determines a target baseband board in one or more baseband boards according to the hot patch software package; the software management master control module generates a synchronous request message for the target baseband board; the software management master control module transmits the synchronous request message to a target software management agent module corresponding to the target baseband board; and the target software management agent module is used for obtaining the hot patch software package by employing the synchronous request message and upgrading the target baseband board by employing the hot patch software package. Therefore, patch upgrade of a base station having a problem in the conventional network can be rapidly realized, patch upgrade with dynamic loading and dynamic come-into-effect of the target baseband board can be performed, other baseband boards can simultaneously and normally operate, the base station does not need to perform resetting during patch upgrade, and the influence on business and user perception is avoided.
Owner:DATANG MOBILE COMM EQUIP CO LTD

Method and system for accessing network management of large-scale remote zero-configuration equipment

A method and system for connecting a large-scale remote zero-configuration device to a network management, involving the field of Ethernet switching and transmission, the method comprising: configuring a zero-configuration device as a proxy server on a network management server, and using other zero-configuration devices as clients; The link layer discovery protocol service distribution protocol establishes the management channel between the proxy server and the next-level client, and also establishes the management channel between the connected clients step by step through the service distribution protocol; the proxy server and each client are respectively in In the management channel, the neighbor information is obtained through the private LLDP link layer discovery protocol; the network management server collects the neighbor information of the entire network through the proxy server, forms a network topology map, and manages the selected client according to the network topology map. The zero-configuration device connected in the present invention does not need manual participation in pre-configuration or on-site configuration, which saves manpower and improves configuration efficiency.
Owner:FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products