Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

48results about How to "Avoid parity" patented technology

Method for deleting repeated data by using double-fingerprint hash check

The invention provides a method for deleting repeated data by using double-fingerprint hash check. The method comprises the following steps of: dividing an object to be backed up into data blocks to be backed up with equal lengths; judging whether the weak fingerprint of one of the data blocks to be backed up is the same as the weak fingerprint of any data block in a server; if the weak fingerprint of one of the data blocks to be backed up is different from the weak fingerprint of any data block in the server, backing up the data block; if the weak fingerprint of one of the data blocks to be backed up is the same as the weak fingerprint of any data block in the server, judging whether the strong fingerprint of the data block is the same as the strong fingerprint of any data block in the server; if the strong fingerprint of the data block is different from the strong fingerprint of any data block in the server, backing up the data block; and performing the operation on all data blocks to be backed up. In the method for deleting the repeated data, a hash function with low calculation amount is adopted at the first time to perform weak check on every data block and a has function with high calculation amount is adopted then to perform strong check, so the problem that all the data are checked by the hash function with the high calculation amount is avoided, the fingerprint calculation amount during checking is reduced greatly, the series performance is enhanced, and the appreciable transmission performance is provided for data backup based on mass data storage.
Owner:HUAZHONG UNIV OF SCI & TECH

Product configuration data monitoring method and device, apparatus and storage medium

The invention discloses a product configuration data monitoring method and device, an apparatus and a storage medium, and relates to the field of financial technology. The method comprises the following steps of when a parameter configuration instruction is received, carrying out parameter verification on a current configuration parameter according to a verification rule corresponding to the current configuration parameter in a parameter configuration instruction, and giving an alarm on a parameter with an abnormal verification result; and according to each verification rule in the preset rule chain and the preset rule operation frequency, carrying out timing cycle verification on the product configuration data corresponding to the product, and giving an alarm on the parameters with the abnormal verification results so as to monitor the product configuration data. According to the method, the current configuration parameters are firstly verified in real time, and then the product configuration data of the product is periodically and repeatedly verified in a circulating mode, so that the verification of some configuration parameters is prevented from being omitted, the problem data is prevented from being generated, the accuracy of the financial technology product configuration data is improved, and the manual operation is reduced.
Owner:WEBANK (CHINA)

Quick adjustment technology for gaps between grinding rollers of coal mill and liner plate of grinding bowl

ActiveCN105080664AAvoid repeated adjustmentsAvoid successive measurementsGrain treatmentsEconomic benefitsEngineering
The invention discloses a quick adjustment technology for gaps between grinding rollers of a coal mill and a liner plate of a grinding bowl, and belongs to the technical field of maintenance technologies of coal mills. The quick adjustment technology is used for quickly adjusting the gaps between the grinding rollers and the liner plate of the grinding bowl. According to the quick adjustment technology, the gaps between the grinding rollers of the bowl type coal mill and the liner plate of the grinding bowl are limited through asbestos boards, the grinding rollers go down slowly till the grinding rollers make contact with the asbestos boards and the asbestos boards slightly resist pulling, then, the gaps between the grinding rollers and the liner plate of the grinding bowl are limited within the needed gaps, and therefore, the gaps between the grinding rollers and the liner plate of the grinding bowl are quickly adjusted. The quick adjustment technology for the gaps between the grinding rollers of the coal mill and the liner plate of the grinding bowl is innovative in the industry; the process is simplified, and the adjustment process is completed in one step; the tedious measurement and adjustment process is avoided; maintenance time is shortened, and the labor efficiency of maintainers is improved; the continuous workability of a coal pulverizing system is improved, and it is guaranteed that the whole production process is smooth; and the quick adjustment technology provides guarantees for high-efficiency production of enterprises, has remarkable economic benefits and has great application and popularization value.
Owner:WUYANG IRON & STEEL

Method for generating a secret or a key in a network

Disclosed is a method for generating a secret or a key in a network (20). The network (20) comprises at least a first subscriber (21) and a second subscriber (22) and a common transmission channel (30) between at least the first (21) and second subscribers (22). The first subscriber (21) can output at least a first value (1) and a second value (0) and the second subscriber (22) can output at leastthe first value (1) and the second value (0) on the transmission channel, the first subscriber (21) generating a first sequence of subscriber values and the second subscriber (22) generating a secondsequence of subscriber values in order for the transmission to occur largely synchronously on the transmission channel (30); and the first subscriber (21) and the second subscriber (22) each generatea common secret or a common key, the first subscriber (21) doing so on the basis of information about the first sequence of subscriber values and on the basis of a sequence of superposed values resulting from a superposition of the second sequence of subscriber values onto the first sequence of subscriber values on the transmission channel (30), and the second subscriber (22) doing so on the basis of information about the second sequence of subscriber values and on the basis of the sequence of superposed values resulting from the superposition of the second sequence of subscriber values ontothe first sequence of subscriber values on the transmission channel (30). At least the first subscriber (21) and the second subscriber (22) determine a sequence of test values in accordance with the resulting sequence of superposed values and output same on the transmission channel (30).
Owner:ROBERT BOSCH GMBH

Verification method for data destruction of storage medium

The embodiment of the invention provides a verification method for data destruction of storage medium. The method comprises the following steps of: destructing data of a target storage medium to be subjected to data destruction; extracting and generating a first encryption electronic feature code according to data destruction feature information of the target storage medium and extracting and generating a second encryption electronic feature code according to inherent attribute information of the target storage medium; based on a preset encryption algorithm, performing combined encryption on the first encryption electronic feature code and the second encryption electronic feature code, and generating a verification ciphertext sequence and writing the sequence into a specified verification storage area in the target storage medium; while verifying and checking, decrypting the verification ciphertext sequence in the verification storage area, and checking the generated decryption result with display information on the storage medium to verify the data destruction information of the target storage medium. With the method provided by the invention, by technological means, an existing problem of data leakage caused by artificial negligence or deliberate inaccuracy of verification can be solved.
Owner:深圳青柠存储技术有限公司

Juvenile physique development trend evaluation method and device

The invention discloses a juvenile physique development trend evaluation method and device. The method comprises the steps of obtaining juvenile individual basic feature data and physique developmentindex data of two or more dates of an individual; converting the physique development index data of the individual, and performing statistical calculation to obtain a data combination of the individual development level evaluation value; and performing logic analysis according to the data combination body, and outputting the development trend quality grade of each development index of the individual at the last measurement time point and the development prediction condition at the subsequent time. Compared with the prior art and scheme, the standardization method and device can replace experiential manual judgment of professionals to a certain extent, and a user does not have professional knowledge bases, so that the cost can be effectively saved, the efficiency can be effectively improved, and the method and device can be further applied to businesses such as real-time evaluation and interpretation of growth and development conditions of juveniles, health state early warning and the like.
Owner:北京菁医林国际医院管理有限公司

Website content data display method and device, equipment and storage medium

PendingCN111767493ASensitive verification is complete and accurateAvoid showingNatural language data processingImage data processing detailsData displayWeb site
The invention discloses a website content data display method. The method comprises the following steps of receiving image data submitted when a target user accesses the website, judging whether textinformation exists in the image data or not, if yes, extracting the text information, and performing text content verification on the text information by utilizing a preset text sensitive word bank toobtain a first verification result, performing image content verification on the image data to obtain a second verification result, and under the condition that both the first verification result andthe second verification result are normal, displaying the image data. According to the method, the mode of determining whether the text information in the image data contains the sensitive information or not according to the text sensitive word bank is more accurate; and two modes are used for verification and are combined to obtain a verification result, so that sensitive verification of the image data is more complete and accurate, and sensitive information can be further prevented from being displayed on a website. The invention furthermore discloses a website content data display device and equipment, and a computer readable storage medium, which all have the above beneficial effects.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Business object information sending method, publishing method, server and client

The embodiments of the present invention provides a business object information sending method, a business object information publishing method, a server and a client. The business object informationsending method includes the following steps that: business object information to be published is received, wherein the business object information to be published contains at least one attribute value; and the access tool of a business platform stored by a management terminal is called, so that the business object information to be published can be provided to the access tool, wherein the access tool contains a verification rule set, wherein the verification rule set comprises at least one verification rule, wherein the verification rule is used to verify the attribute values; when the resultof the verification of the business object information to be published by the access tool indicates successful verification, the business object information to be published is sent to the business platform, so that the business platform can publish the business object information to be published. With the business object information sending method of the invention adopted, the publishing efficiency of business object information can be improved.
Owner:ALIBABA GRP HLDG LTD

Method and system for simplifying point-to-point transaction network of partitioned power market

The invention relates to a method and a system for simplifying a point-to-point transaction network of a partitioned power market. The method comprises the following steps of: 101, acquiring a power transfer distribution factor of each branch in the point-to-point transaction network of the power market by utilizing an active power increment of a node and an active power increment of each branch in the point-to-point transaction network of the power market; 102, simplifying the point-to-point transaction network of the power market based on the power transfer distribution factor of each branchin the point-to-point transaction network of the power market; and 103, if the simplified point-to-point transaction network of the power market is connected, outputting the simplified point-to-pointtransaction network of the power market, otherwise, reducing the power transfer distribution factor of each branch in the point-to-point transaction network of the power market and returning to the step 102. According to the technical scheme provided by the invention, various power transactions can be quicker and more intuitive, the purpose of effective analysis can be achieved, meanwhile, transaction information can be completely reserved, and the high efficiency and accuracy of security check load flow calculation are ensured.
Owner:CHINA ELECTRIC POWER RES INST +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products