Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

104results about How to "Flexible sharing" patented technology

Logistics management method, equipment and system based on cloud computing

The invention provides a logistics management method based on a cloud computing technology. After one or more logistics agencies and staff thereof register/login a logistics management server, the logistics management method is characterized by comprising the following steps of: registering logistics information; allocating a unique waybill number; based on the logistics information and the state of each logistics agency and the staff of the logistics agency, allocating a logistics task to an appropriate logistics agency and parties of the logistics agency; sending the logistics information and the waybill number to the terminal equipment of the parties; attaching a waybill having the waybill number or a radio frequency identification (RFID) tag, on which the waybill number is recorded, to corresponding goods; monitoring and recording the parties and position of the goods in the logistics process; providing logistics state information; and after the logistics process is finished, settling accounts. The invention also provides the logistics management server and a logistics management system. By adoption of the logistics management method, functions of tracking logistics state, sharing logistics resources and settling the accounts among a plurality of logistics companies can be realized.
Owner:BEIJING TIANDE SHITONG TECH DEV

Multi-controller dynamic deployment method of software defined spatial information network

The invention discloses a multi-controller dynamic deployment method of a software defined spatial information network. In the case of flow surge of switching nodes, the overload switch node can be migrated to an adjacent non-overload area by means of the collaboration of the controllers to realize the dynamic migration of the switch so as to reduce the processing pressure of the controllers and realize load balance of multiple controllers. A multi-target optimization method based on switch flow r, an interaction delay t and a controller volume f is provided in view of the migration problem of the overload switch by the controllers, a proper migration switch is selected according to the three parameters, and a target controller is selected according to the supportable residual load of the target controller; and with respect to the underload controller, the target is migrated by considering the requirement that the load of the other controllers can bear the migration of all switches in the underload controller, and then the underload controller is closed. By adoption of the multi-controller dynamic deployment method disclosed by the invention, the network response delay is shortened, the network throughput is improved, and the load balance among the controllers is guaranteed.
Owner:DALIAN UNIV

Configuration and sending method of PUCCH (Physical Uplink Control Channel) resources as well as device thereof

The invention relates to a configuration method of PUCCH (Physical Uplink Control Channel) resources. The method comprises the following steps of: arranging the same PUCCH format channel starting point for a plurality of downlink component carriers, and arranging different dynamic Acknowledgement / Negative-Acknowledgement (ACK / NACK) resource mapping start offsets, wherein the PUCCH resources of the downlink component carriers correspond to the same uplink component carrier. In the invention, the flexible PUCCH resource sharing is realized by arranging the same PUCCH format channel starting point for the downlink component carriers, and the overhead compaction of dynamic ACK / NACK mapping resources is realized by arranging different dynamic ACK / NACK resource mapping start offsets.
Owner:HUAWEI TECH CO LTD

Synchronisation

The invention provides a processor comprising an execution unit arranged to execute multiple program threads, each thread comprising a sequence of instructions, and a plurality of synchronisers for synchronising threads. Each synchroniser is operable, in response to execution by the execution unit of one or more synchroniser association instructions, to associate with a group of at least two threads. Each synchroniser is also operable, when thus associated, to synchronise the threads of the group by pausing execution of a thread in the group pending a synchronisation point in another thread of that group.
Owner:XMOS

System and method for sharing dynamic frequency spectrum

The invention discloses a system for sharing a dynamic frequency spectrum. A DFPA (Dynamic Frequency Planning Adjustment) unit is used for planning and configuring available frequency spectrum resources to a plurality of wireless systems. The invention further discloses a method for sharing the dynamic frequency spectrum. When the sharing of the dynamic frequency spectrum is started and after the DFPA unit receives information of starting the sharing of the dynamic frequency spectrum, relevant frequency spectrum information is transmitted to DFRD (Dynamic Frequency Reframing Decision) units residing on different wireless systems; and after the DFRD units receive the relevant frequency spectrum information, the available frequency spectrum resources of the wireless network are determined. The system and the method which are disclosed by the invention are used for dynamically sharing wireless frequency spectrum resources under the condition that the wireless systems coexist, therefore, the wireless frequency spectrum can be shared more effectively and flexibly, the utilization rate of network resources is improved and the user experience is improved.
Owner:ZTE CORP

Data sharing method and device

The invention, which relates to the technical field of data sharing, discloses a data sharing method and device. The method comprises: a data resource catalog is formed by a first terminal; the firstterminal associates the data resource catalog with data resources in a data source; and the first terminal issues the data resource catalog that is provided for a second terminal for checking and is used for obtaining at least parts of data resources by subscription if needed. Therefore, data sharing flexibility and security are improved.
Owner:JIANGSU FEIBO SOFTWARE TECH

Book resource access control method based on ciphertext attribute authentication and threshold function

ActiveCN110912897AReduce computational and communication overheadAvoid Collusion AttacksPublic key for secure communicationInformation resourceThreshold function
The invention provides a book resource access control method based on ciphertext attribute authentication and a threshold function. The book resource access control method comprises the following steps that an authentication center and terminal members generate respective public / private key pairs; the terminal members interact with the authentication center to perform attribute authentication to obtain permission level values, and each terminal member sends the public key and the permission level value to the authentication center, and sends the public key and the permission level value to thecloud service platform after verification; the terminal member calculates an encryption key and a decryption key, encrypts the shared resource information into a ciphertext and uploads the ciphertextto the cloud service platform; and the terminal member determines a ciphertext resource to be checked according to the ciphertext, the cloud service platform verifies the identity of the ciphertext resource and opens an access link of the ciphertext resource, and the terminal member downloads the ciphertext for decryption. Personal privacy is protected by adopting a ciphertext attribute authentication technology, access permission is controlled by setting a threshold function to guarantee the safety of resource sharing, and collusion attack is prevented by adopting identity and permission dual authentication, so that information resource sharing in the Internet of Things is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Method and device for sharing video

The invention discloses a method for sharing a video. The method comprises the steps that a first bullet screen to be shared on an image frame is determined according to a bullet screen selecting instruction; a second bullet screen expect for the first bullet screen is hidden; a shared image and video information of the image frame are acquired, wherein the shared image comprises the currently shown image frame and the first bullet screen reserved and shown on the image frame; the shared image and the video information are shared.
Owner:MIGU COMIC CO LTD

System for processing graphic objects including a secured graphic manager

The general field of the invention is that of viewing systems that have to display information or images having different criticality levels. The viewing system according to the invention comprises at least one secure graphic manager with a criticality level at least equal to the highest criticality level of the graphic applications. The manager has the following detection means: violation of the segregation of the applications in their respective display window; overrunning of the processing times of each application; and violation of the specific storage spaces of the graphic applications.
Owner:THALES SA

Data sharing method, device and equipment and medium

The embodiment of the invention discloses a data sharing method and device, equipment and a medium. The method comprises the steps that a server collects service reference data associated with an application program and / or a sharing mode; the server configures each alternative application program and / or each alternative sharing mode according to the service reference data; the server generates data sharing configuration information according to the configuration of each alternative application program and / or each alternative sharing mode; wherein the data sharing configuration information is used for being issued to at least one client, and indicating the client to generate a target application program according to the data sharing configuration information and display the target application program in a data sharing interface. According to the technical scheme provided by the embodiment of the invention, the effect of flexibly configuring the sharing application program in the data sharing interface or the sharing mode used by the sharing application program is achieved.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Internet of Things data security sharing method based on privacy protection

The invention provides an Internet of Things data security sharing method based on privacy protection. The method comprises the following steps: initializing protocol parameters in an information sharing network domain; registering a terminal member; enabling the terminal member to acquire own attribute authority parameters, calculating encryption keys according to the Chinese remainder theorem, encrypting shared information resources and storing the encrypted information resources in an off-chain database; calculating intermediate parameters required for storing the information resources, generating index information of the shared ciphertext and packaging the index information in a block, and so on, enabling each terminal member to store related information of the ciphertext in the blockto generate a block chain; and accessing and sharing the ciphertext. Identity and attribute parameter matching dual authentication is adopted to prevent collusion attacks and protect personal privacy,an attribute matching access control strategy is combined with a block chain technology to guarantee the safety of shared resource information, the storage burden is reduced, information resource sharing in the industrial Internet of Things is more flexible, efficient and practical, and the method has important field research significance and commercial application value.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Dynamic authority access control method based on privacy protection

The invention provides a dynamic authority access control method based on privacy protection, which comprises the following steps: initializing protocol parameters in an information sharing network domain, carrying out identity authentication of hidden attributes on terminal members, and after the authentication succeeds, setting, by a data sharer, the access authority of the shared resources according to the attribute parameters of the data sharer, encrypting the shared resources and storing the encrypted shared resources into an encrypted database; searching for, by a data acquirer, the shared resource to be accessed according to a keyword, acquiring a ciphertext storage link after verifying the access authority, downloading the ciphertext resource through the link, and calculating a decryption key to decrypt and acquire the ciphertext resource; and meanwhile, updating, by a terminal member, the access authority of the terminal member by acquiring rewards or punishment and the like.Double authentication is used to prevent collusion attacks, the safety of shared resources is guaranteed, personal privacy is protected, flexible and fine-grained data resource access is achieved based on attribute matching dynamic access control, access management is greatly simplified, and resource sharing is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Optical network unit device for mutual-excitation multi-wavelength dynamic scheduling in passive optical network (PON)

The invention discloses an optical network unit device for mutual-excitation multi-wavelength dynamic scheduling in a passive optical network (PON), belonging to the technical field of optical communication. The optical network unit device comprises an uplink data transmitter, a downlink data receiver and an optical circulator, wherein the output end of the optical circulator is connected with the uplink data transmitter so as to transmit downlink data optical signals, and the input end of the optical circulator is connected with the uplink data transmitter so as to transmit uplink data optical signals; and the uplink data transmitter comprises two FP multi-longitudinal model lasers with the same model intervals, an adjustable band-pass filter, two optical circulator, an optical splitting and coupling device and a control module. Based on the mutual-excitation working mode of two FP multi-longitudinal model lasers, the invention can dynamically generate uplink optical carrier with adjustable multi-wavelength, flexibly and effectively share all uplink wavelength resources, improve the utilization rate of the uplink wavelength resources, has simple structure and low cost, and meet the development requirement on rapid increase of user uplink access capability.
Owner:SHANGHAI JIAO TONG UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products