会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 61. 发明公开
    • COMMUNICATION NODE FOR CRITICAL SYSTEMS
    • EP3617882A1
    • 2020-03-04
    • EP18192221.2
    • 2018-09-03
    • TTTech Computertechnik AG
    • Fidi, ChristianBauer, Günther
    • G06F9/54
    • (MCAD) as node critical application data (NCAD), if and only if, said commander critical application data (CCAD) and said monitor critical application data (MCAD) are identical and the comperator part (COMP) starts to receive said commander critical application data (CCAD) and said monitor critical application data (MCAD) within an interval of configured length (SYNC-1), or in the case that the monitor part (MON) and the comperator part (COMP) are integrated into an integrated part (MONC), the commander part (COM) is configured to also forward said first end system critical application data (ESCAD1) as node critical application data (NCAD) to the real-time network (NET), and wherein the switch (SW) comprises an interception function (INTERCEPT) which is configured to preempt an ongoing transmission of a node critical application data (NCAD) and/or is configured to prevent the transmission of a node critical application data (NCAD), and said comperator part (COMP) is configured to activate said interception function (INTERCEPT) if and only if said commander critical application data (CCAD) and said monitor critical application data (MCAD) are not identical or the comperator part (COMP) does not start to receive said commander critical application data (CCAD) and said monitor critical application data (MCAD) within an interval of configured length (SYNC-1).
    • 62. 发明公开
    • NETWORK DEVICE AND METHOD FOR SCALABLE DATA INTEGRITY CHECKING
    • EP3562094A1
    • 2019-10-30
    • EP18168798.9
    • 2018-04-23
    • TTTech Computertechnik AG
    • Gaderer, GeorgBauer, Günther
    • H04L12/24H04L12/26H04L1/00H04L12/935H04L12/44H04L12/939H04L12/40H04L29/08H04L12/931H04L12/933H04L12/947
    • A method for data integrity check in a network device (2) of a computer network, wherein said network device comprises a communication module (22) and a monitoring module (23), wherein said monitoring module (23) is configured for receiving the same data, which are being received by a communication module (22) from an input port (3001; 3001, 3002, 3003, 3004) of the network device, and wherein the monitoring module (23) receives the same data which the communication module (22) transmits towards one or more output ports (3101; 3101, 3102, 3103, 3104) of the network device, and wherein in case the communication module (22) receives so-called R-data, wherein R-data comprise n data elements, wherein said n data elements are forming an n-tuple, and wherein said R-data are data which the communication module (22) receives from one input port, and wherein said data in its entirety, that is all n data elements of the R-data, are designated to be transmitted by the communication module (22) towards one selected output port (3101; 3101, 3102, 3103, 3104) or towards more selected output ports, the monitoring module (23) receives the same R-data, and wherein the communication module (22) transmits so-called T-data, wherein T-data are data based on the data elements of the R-data received by the communication module (22), towards the output port or towards more output ports of the network device (2), for which output port or ports the R-data corresponding to the T-data are designated, and wherein the monitoring module (23) receives said T-data, and wherein the monitoring module (23)
      - derives, after receiving the same R-data as the communication module (22), a sub-tuple of said R-data, a so-called "R-data sub-tuple", wherein said R-data sub-tuple comprises m of the n data elements of the n-tuple of R-data, wherein m > 0 and m
      - stores, after deriving said R-data sub-tuple, only said R-data sub-tuple,
      - derives, after receiving the T-data corresponding to said R-data, a sub-tuple of said T-data, a so-called "T-data sub-tuple", and
      - compares said stored R-data sub-tuple with said T-data sub-tuple, and executes at least one specified or specifiable action, if the comparison of said stored R-data sub-tuple with said T-data sub-tuple delivers as result that said R-data sub-tuple and said T-data sub-tuple are not identical.
    • 63. 发明公开
    • METHOD AND COMPUTER SYSTEM TO CONSISTENTLY CONTROL A SET OF ACTUATORS
    • EP3483673A1
    • 2019-05-15
    • EP17201657.8
    • 2017-11-14
    • TTTech Computertechnik AG
    • Niedrist, GeorgTRAXLER, StefanSchmidt, EricSteiner, Wilfried
    • G05B9/03H04L12/40
    • A method for transmitting control commands (F-A100, F-A200) in a computer system, wherein said computer system comprises components at least in form of nodes (A100, A200), actuators (ACT1, ACT2, ACT3) and communication systems (COM1, COM2), wherein said control commands (F-A100, F-A200) are communicated over said communication systems (COM1, COM2) from said nodes (A100, A200) to said actuators (ACT1, ACT2, ACT3), and wherein one, two, or more components (A100, A200, IF100, IF200, COM1, COM2, IF11, IF12, IF13, IF21, IF22, IF23, ACT1, ACT2, AT3) of the computer system may fail to operate according their specification, and wherein for consistently accepting control commands (F-A100, F-A200) at said actuators (ACT1, ACT2, ACT3) nodes (A100, A200) and their control commands (F-A100, F-A200) are assigned priorities, wherein a node and its control commands have the same priority, wherein at least two priorities (HIGH, LOW) are used, wherein a high priority node (A100) produces high priority control commands (F-A100) and a low priority node (A200) produces low priority control commands (F-A200), and wherein a high priority node (A100) is configured to communicate its control commands (F-A100) over at least two communication systems (COM1, COM2) to the actuators (ACT1, ACT2, ACT3) and a low priority node (A200) is configured to communicate its low priority control commands (F-A200) over at least one communication system (COM2) to the actuators (ACT1, ACT2, ACT3), and wherein an actuator (ACT1, ACT2, ACT3) accepts the high priority control commands (F-A100) from the high priority node (A100) as long as it receives said high priority control commands (F-A100) on any one of the at least two communication systems (COM1, COM2) and in this first case discards the low priority control commands (F-A200), and stops to accept said high priority control commands (F-A100) in case said actuator (ACT1, ACT2, ACT3) does not receive said high priority control commands (F-A100) from any communication system (COM1, COM2) of the at least two communication systems (COM1, COM2) for a configurable duration, and in which second case the actuator (ACT1, ACT2, ACT3) starts to accept low priority control commands (F-A200).
    • 64. 发明公开
    • METHOD AND DEVICE TO CONFIGURE REAL-TIME NETWORKS
    • EP3468118A1
    • 2019-04-10
    • EP17194686.6
    • 2017-10-04
    • TTTech Computertechnik AG
    • Craciunas, SilviuSerna Oliver, Ramon
    • H04L12/801H04L12/841H04L12/851
    • A method to configure nodes (v1, ..., v8) in a real-time network, which nodes (v1, ..., v8) of the real-time network are connected with links (Ela, ..., E8a, E1b, ..., E8b) to each other directly or indirectly via other nodes (v1, ..., v8) and communicate with each other using said links (Ela, ..., E8a, E1b, ..., E8b) by exchanging frames (F1, ..., F4), wherein at least one node (v1, ..., v8) associates at least one queue (Q1, ..., Q3) with at least one link (Ela, ..., E8a, E1b, ..., E8b), wherein said at least one node (v1, ..., v8) is connected to said at least one queue (Q1, ..., Q3), and wherein said at least one node (v1, ..., v8) places frames (F1, ..., F4) in said at least one queue (Q1, ..., Q3) for transmission on the associated link (Ela, ..., E8a, E1b, ..., E8b), and wherein said at least one queue is associated with a gate (G1, ..., G3) which can be in an open state or in a closed state, and wherein said at least one node selects (TS) frames that are placed in said at least one queue on the at least one link associated with said queue for transmission if the state of the gate associated with said queue is in the open state and does not select frames for transmission from said queue on said link when said gate is in the closed state, and wherein said gate changes the state with the progress of time from open to closed and from closed to open to form windows (W1, ..., W4) as indicated by configuration data (GCL), and wherein said configuration data (GCL) is produced by a tool, wherein said tool is capable of solving constraints in array theory, and wherein said tool accepts input, which input is formulated as constraints in array theory (CON), and wherein said input is provided to said tool by means of human user input and/or by means of communication requests from one, two, or more nodes in the real-time network, and wherein said configuration data (GCL) is communicated to one, two, or more nodes (v1, ..., v8) in the real-time network, node or nodes which applies/apply at least parts of said configuration data (GCL) or said configuration data (GCL) as local configuration.
    • 69. 发明公开
    • METHOD AND COMPUTER SYSTEM FOR FAULT TOLERANT DATA INTEGRITY VERIFICATION OF SAFETY-RELATED DATA
    • EP3373144A1
    • 2018-09-12
    • EP18160175.8
    • 2018-03-06
    • TTTech Computertechnik AG
    • Rosenblattl, Maximilian
    • G06F11/10
    • G06F11/1004G06F11/0796G06F2201/805G06F2201/82
    • A method for fault tolerant data integrity verification of safety-related data in a safety-related computer system, comprising the steps of a) randomly generating a set of at least two, preferably three, four or more initial values on the safety-related execution environment, preferably with a safety-related software, b) calculating on the safety-related execution environment with a safety-related software, for each of said initial values, one specific CRC ("cyclic redundancy check") reference value, wherein each specific CRC reference value is calculated jointly from the safety-related data to be verified and the initial value associated with said specific CRC reference value, c) storing the pairs of initial value and associated specific CRC reference value, and d) following the steps a) - c), executing the following steps: d1) randomly choosing an initial value out of the set of initial values generated in step a), d2) the non-safety-related hardware-engine calculating a CRC value jointly from said randomly chosen initial value and the safety-related data to be verified, d3) comparing said in step d2) calculated CRC value to the reference CRC value, which is associated with the initial value being used in step d2), and d3i) in case that the calculated CRC value is identical to the reference CRC value, starting with step d1) again, or d3ii) in case that the calculated CRC value is not identical to the reference CRC value, executing at least one specified or specifiable action.