Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

46results about How to "Less fairness" patented technology

Medical equipment anti-counterfeiting and traceability system based on block chain technology

InactiveCN107679876ASolve counterfeit and shoddy productsReduce execution time and fairnessCommerceMedical equipmentSmart contract
The invention relates to a medical equipment anti-counterfeiting and traceability system based on the block chain technology. The system comprises a circulating module, an authentication module and aquerying module; participants comprises an authentication node, a manufacture node, a transaction node and a querying node. The medical l equipment anti-counterfeiting and traceability system adds allcirculating information of the medical equipment from leaving factory to waste in an information traceback chain, the life cycle data is real and queryable; two anti-counterfeiting chips are designedfor the disposable and reusable medical equipment, thereby thoroughly solving the trouble of the counterfeiting and shoddy products; the management method on the medical equipment market by the government offices is written in the intelligent contract, the execution time of the management flow is greatly shortened, the fairness and the judicial efficiency are improved, and the judicial transparency is increased.
Owner:SHANGHAI WEILIAN INFORMATION TECH CO LTD

Identity-based anonymous authentication method and system

The invention relates to an identity-based anonymous authentication method and system. The method comprises the following steps: a server generates two partial private keys and sends the same to double parties P1 and P2 participating in the authentication respectively, wherein P1 and P2 generate a main authentication code (the formula is described in the specification) and R in an authentication process, and the privacy and reliability of the interactive information between P1 and P2 are ensured by using zero knowledge proof; after the P1 obtains the main authentication code, the P1 generatesa pseudo-address AID, generates a third temporary public key R3, calculates a final authentication code alpha, and sends the authentication information (AID, R, R3, alpha, T) the server, and the server verifies the authentication information and feeds back the authentication information to a user, after the successful completion of three times of handshake, the server can establish secure communication with the user. The identity-based anonymous authentication method and system are suitable for jointly completing identity-based distributed anonymous authentication without exposing the respective partial authentication private keys of the both parties together, the both parties holding the partial private keys must participate in the authentication at the same time, and the complete authentication private key does not need to be restored.
Owner:WUHAN UNIV

Upstream bandwidth allocation scheduling algorithm of O-OFDM (optical orthogonal frequency division multiplexing) access system

The invention discloses an upstream bandwidth allocation scheduling algorithm of an O-OFDM (optical orthogonal frequency division multiplexing) access system. The upstream bandwidth allocation scheduling algorithm comprises the following steps of collecting a bandwidth requirement of each user; comparing whether bandwidth required by the system is larger than the maximum bandwidth capable of being provided by the system or not; if yes, enabling the power consumption of the system to be minimum on the premise of ensuring the service quality of each user; otherwise, keeping the fairness of each low-priority service on the premise of ensuring the high-priority service quality; and displaying a bandwidth allocation result and the total power consumption of the system. When the bandwidth requirements of the system are smaller than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm disclosed by the invention can try hard to reduce the power consumption of the system on the premise of ensuring the bandwidth requirement of each ONU (optical network unit) so as to realize the purpose of energy saving; and when the bandwidth requirements of the system are larger than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm can effectively allocate the bandwidth resource so as to be capable of ensuring that the system has the high-priority service quality and also to be capable of ensuring the fairness of the low-priority services.
Owner:SHANGHAI JIAO TONG UNIV

Method for implementing dynamic resource obligation of wireless self-organizing network by elephant flow detection

The invention relates to a method for achieving dynamic resources obligating of a self organization network by using long traffic detection. The method avoids a traditional mechanism of a network node channel competition, and an important transaction and a high priority transaction can be forwarded in high reliability, the method for the dynamic resources obligating is recommended in Ad hoc network, and a channel distributed according to need is inserted into a control protocol, and network resource distribution is achieved to dynamic, and a goal for providing different resource to a different upper transaction is furthest achieved, meanwhile, the highest network transmission efficiency is kept in a station of lower network load and higher network load. The method can dynamically identify and distinct different characteristic transaction traffic in real time, and then the resource is directly obligated, and an operating factor of the channel is improved, and has high utility value.
Owner:PLA UNIV OF SCI & TECH

Method for jointly generating SM2 digital signature by multiple parties

The invention discloses a method for jointly generating SM2 digital signature by multiple parties. The method comprises following steps that all parties P1, P2, ... , P<Tau> joining digital signaturerandomly select partial private keys x1, x2, ... , x<x>(belonging to Zn), and two partial random numbers k1, k2, ... , k<x>(belonging to Zn) and Rho1, Rho2, ... , Rho<x>(belonging to Zn); then all parties calculate through an interactive ideal function F<MULT> to obtain a public key P<pub>=(Q-G)=(Sigma<lota=1><Tau>x<lota>G-G) of SM2, and two intermediate variables R=Sigma<lota=1><Tau>k<lota>G=(r<x>,r<y>) and alpha =xRhomode n; for a message m, all parties separately calculate a hash value e=h(m) and a first signature r=r<x>+e mod n, and calculates through the interactive ideal function F<MULT>to obtain a third intermediate variable beta=Rho(k+r)mod n; and finally, all parties separately calculate a second signature s=min{alpha<-1>beta-r, n-alpha<-1>beta+r}, and outputs complete SM2 digital signature (r,s) after signature verification succeeds. Through adoption of the method, an SM2 digital signature is generated by multiple parties jointly, it is ensured that all parties do not disclose partial private keys in signing, and digital signature involves all parties, so that multi-party signature is safe and fair.
Owner:WUHAN UNIV

Ultra-dense network wireless resource allocation method based on NOMA and beam forming

The invention discloses an ultra-dense network wireless resource allocation method based on NOMA and beam forming. The method comprises the steps: combining beam forming and NOMA; enabling a base station equipped with multiple antennas to communicate with user equipment equipped with multiple single antennas; employing beam forming to improve the coverage rate and the signal to noise ratio of signals from a macro base station to a small base station; adopting NOMA in the process that the small base station transmits the signals to users, and distributing different transmission powers to the different users so as to adapt to the situation that the users cannot feed back effective network state information according to the change of the network environment. According to the invention, inter-cluster interference and intra-cluster user interference are effectively suppressed; moreover, the fairness among users is ensured to a certain extent, the throughput performance of the system is improved, and power distribution is fairly and effectively carried out, so the system has the advantages of high throughput, high signal quality and high power efficiency, simultaneous communication of alarge number of users is supported, and the system performance and the spectrum utilization rate are greatly improved.
Owner:DONGGUAN UNIV OF TECH

Energy-saving transfer path selection method for user side in heterogeneous network based on D2D relay

The invention discloses an energy-saving transfer path selection method for a user side in a heterogeneous network based on a D2D relay. A relay link is selected in a classification manner by distinguishing a network type of a relay user. When a macro base station user is selected as the relay, the power consumption proportion of the macro relay user is controlled by adopting a minimum relay powerconsumption proportion method under the condition that the total power consumption of the relay link is ensured to be minimum; and when a small base station user is selected as the relay, the power consumption of the relay user is reduced by adopting the minimum relay power consumption proportion method under the condition that the lowest energy consumption required for normal communication of the link is ensured, at the same time, the effective rate of an uplink of the small base station relay user is adjusted, and the load of the relay user accessing the surrounding small base station is balanced. The method controls the total power consumption of the relay link, reduces the power consumption of the user terminal and balances the load of the surrounding receiving base station while meeting normal communication of the user, and is suitable for a real-time communication system.
Owner:江苏三台山数据应用研究院有限公司

An Identity-Based Anonymous Authentication Method and System

The invention relates to an identity-based anonymous authentication method and system. The method comprises the following steps: a server generates two partial private keys and sends the same to double parties P1 and P2 participating in the authentication respectively, wherein P1 and P2 generate a main authentication code (the formula is described in the specification) and R in an authentication process, and the privacy and reliability of the interactive information between P1 and P2 are ensured by using zero knowledge proof; after the P1 obtains the main authentication code, the P1 generatesa pseudo-address AID, generates a third temporary public key R3, calculates a final authentication code alpha, and sends the authentication information (AID, R, R3, alpha, T) the server, and the server verifies the authentication information and feeds back the authentication information to a user, after the successful completion of three times of handshake, the server can establish secure communication with the user. The identity-based anonymous authentication method and system are suitable for jointly completing identity-based distributed anonymous authentication without exposing the respective partial authentication private keys of the both parties together, the both parties holding the partial private keys must participate in the authentication at the same time, and the complete authentication private key does not need to be restored.
Owner:WUHAN UNIV

Uplink Bandwidth Allocation and Scheduling Algorithm in Optical Orthogonal Frequency Division Multiplexing Access System

The invention discloses an upstream bandwidth allocation scheduling algorithm of an O-OFDM (optical orthogonal frequency division multiplexing) access system. The upstream bandwidth allocation scheduling algorithm comprises the following steps of collecting a bandwidth requirement of each user; comparing whether bandwidth required by the system is larger than the maximum bandwidth capable of being provided by the system or not; if yes, enabling the power consumption of the system to be minimum on the premise of ensuring the service quality of each user; otherwise, keeping the fairness of each low-priority service on the premise of ensuring the high-priority service quality; and displaying a bandwidth allocation result and the total power consumption of the system. When the bandwidth requirements of the system are smaller than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm disclosed by the invention can try hard to reduce the power consumption of the system on the premise of ensuring the bandwidth requirement of each ONU (optical network unit) so as to realize the purpose of energy saving; and when the bandwidth requirements of the system are larger than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm can effectively allocate the bandwidth resource so as to be capable of ensuring that the system has the high-priority service quality and also to be capable of ensuring the fairness of the low-priority services.
Owner:SHANGHAI JIAOTONG UNIV

Feature selection optimization method and device and readable storage medium

The invention discloses a feature selection optimization method and device and a readable storage medium, and the method comprises the steps: obtaining a sample binning result corresponding to each to-be-selected feature, and carrying out the feature selection of each to-be-selected feature based on each sample binning result, obtaining a candidate feature set which does not meet the requirements of a preset feature evaluation value and a target feature set which meets the requirements of the preset feature evaluation value; determining a target sample binning corresponding to each candidate feature according to each binning feature evaluation value of each candidate feature in the candidate feature set on the respective corresponding sample binning result; based on each target sample sub-box and the candidate feature set, constructing each target cross feature meeting the requirement of the preset feature evaluation value; and adding each target cross feature into the target feature set to obtain a target feature selection result. The technical problem that the feature selection effect is poor is solved.
Owner:WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products