Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

634results about How to "Reduce storage overhead" patented technology

ATM secure authentication and pre-alarming method based on face recognition

The invention discloses an ATM security certificate and a pre-warning method based on face recognition. The invention introduces face recognition and video detection into the applications of ATM and bank card business for the first time, which can obviously improve the security of ATM financial system, effectively reduce and overawe various ATM fraud and criminal activities. The complete system operation process in the method of the invention is: firstly, registering the face information of a holder at a service window which arranges an infrared face acquisition equipment or with the registration by the users themselves on ATM in bank, and saving the encrypted face information to a bank database and a bank card. Then, determining whether the ATM operator to be recognized is the holder of the bank card or not through verifying the user's identity by a face recognition engine; determining and recognizing whether existing behaviors that threaten ATM and the users though a behavior monitoring engine; and determining whether to trigger corresponding pre-warning mechanism or not according to the recognition result. The invention can extend to the applications of bank book business, public security monitoring and pursuing escaped criminals, etc.
Owner:哈尔滨维科智能系统有限公司

Improved positioning method of indoor fingerprint based on clustering neural network

The invention discloses the technical field of wireless communication and wireless network positioning, and in particular relates to an improved positioning method of an indoor fingerprint based on a clustering neural network. According to the technical scheme, the positioning method is characterized by comprising the following steps of: an offline phase: constructing a fingerprint database by fingerprint information collected from a reference point, sorting fingerprints in the fingerprint database by utilizing a clustering algorithm, and training the fingerprint and position information of each reference point by utilizing a artificial neural network model to obtain an optimized network model; and an online phase: carrying out cluster matching on the collected real-time fingerprint information and a cluster center in the fingerprint database to determine a primary positioning area, and taking the real-time fingerprint information in the primary positioning area as an input end of the neural network model of the reference point to acquire final accurate position estimation. The method has the advantages that low calculation and storage cost for the clustering artificial neural network fingerprint positioning method can be guaranteed, the positioning accuracy of the clustering artificial neural network fingerprint positioning method can be improved, and accurate positioning information is provided for users.
Owner:BEIJING JIAOTONG UNIV

Route exchange method suitable for GEO/LEO double layered constellation network

The invention discloses a route exchange method suitable for a GEO/LEO double layered constellation network. According to the method, a system period is divided into equal-duration time sections based on a dynamic boundary value; a GEO layer satellite high in on-board processing capacity is used for calculating the best route and the second best route for each LEO satellite; in the processes of information transmission and exchange, when loads of the LED satellites are large, the GEO satellite shares part of low priority services in time for the LED satellites, and it is guaranteed that important information is reliably transmitted in real time; when link congestion, node ineffectiveness and other emergency conditions happen in the satellite network, in order to avoid rerouting of the whole network, and the GEO satellite only calculates rerouting for affected routes; after link congestion is eliminated, the LED satellites recover route information in time before congestion in order to avoid link resource waste in the network. In the network that topology time varying happens, links are prone to congestion, on-board resources are limited, continuous high-load flows are prone to being generated, and nodes are prone to being ineffective at the special period, the method can reduce constellation system cost, shorten convergence time, save the on-board resources, increase the utilization rate of the link resources, guarantee that important information is reliably transmitted in real time and improve invulnerability and robustness of the satellite network.
Owner:中国人民解放军西安通信学院

Method for detecting and classifying all-network flow abnormity on line

The invention discloses a method for detecting and classifying all-network flow abnormity on line. The method comprises the following steps of: (I) acquiring network flow (NetFlow), namely, receiving a NetFlow data packet transmitted from a border router by adopting a NetFlow collector, resolving the data packet and aggregating data streams to form data suitable for statistical analysis, and transmitting the data to a central control board through network to store in a database; (II) building a flow matrix taking the entropy of flow characteristics as measure; (III) detecting the flow abnormity on line by adopting a main increment component analyzing method; and (IV) constructing sample points in four-dimensional space by utilizing residual vector acquired through on-line detection and classifying the flow abnormity on line by adopting an increment k-mean value clustering method. The method has the advantages of detecting the flow abnormity on line, classifying the flow abnormity on line in real time, meeting the requirement on the real-time detection and classification of the flow abnormity better and laying the technical foundation for subsequently defending against network attack, along with lower time complexity and storage expenditure.
Owner:中国人民解放军陆军炮兵防空兵学院

Data restoring and synchronizing method based on log snapshot

The invention relates to the field of occupation of the mass data memory space and backup and recovery of historical data, and in particular provides a data recovery and synchronization method based on log snapshots. The data recovery and synchronization method based on the log snapshots adopts log files with given format to record changed information of data of databases each time; the changed information is formatted, positioned and stored into the log files; an analytic program calls an approximate algorithm to acquire effective data on set time points by means of multithreading; the data is temporarily stored into a temporary table, and abstract data snapshots are generated according to the temporary table; and data recovery and synchronization is realized by utilization of the snapshots. The data recovery and synchronization method based on the log snapshots can greatly reduce the burden of a database system, obviously improve the efficiency of the database system and an application system, save a great deal of memory space, and reduce the operation cost of the systems.
Owner:INSPUR TIANYUAN COMM INFORMATION SYST CO LTD

Multi-user supported searchable encryption system and method

The invention discloses a multi-user supported searchable encryption system and method and accordingly the problem that specific encrypted files cannot be searched accurately in the prior art is mainly solved. The multi-user supported searchable encryption system comprises a credible authorization center TA, service providers and users; the credible authorization center TA is formed by a system initialization module, a secret key generation and management module and a user information management module; the service providers comprise a file server and a management server; the users comprise data providers and data receivers. The multi-user supported searchable encryption method comprises the steps of system initialization, secret key distribution, file encryption, business outsourcing, file retrieval, user decryption and user logout and adding. According to the multi-user supported searchable encryption system and method, the file retrieval time of the users is shortened due to the establishment of a key word index on files, the storage and computational overhead of the users is reduced due to the accurate file retrieval, the file retrieval is accurate, meanwhile the forward and backward security of the files is ensured, and meanwhile the multi-user simultaneous decryption is supported.
Owner:西安电子科技大学昆山创新研究院 +1

Achievement method of certificate-less public key cryptosystem without bilinear pairing operation

The invention provides an achievement method of a certificate-less public key cryptosystem without bilinear pairing operation and belongs to the field of information safety. The achievement method is used for solving the problems of generation of a secret key of a user, usage and authentication of a public key of the user. According to the achievement method, firstly, a user sets a secret value and calculates a temporary public key, then a secret key generating center generates the other part of the secret key for the user and enables the two parts to be bound, and finally the user synthesizes a his / her actual public and secret key pair. The defect that public key replacement and signature counterfeit possibly exist in a common certificate-less cryptosystem is overcome, the user has complete control right on the secret key, the secret key can be revoked and re-generated, and the signature of the user has non-repudiation. The achievement method adopts a public key cryptographic algorithm of a standard elliptic curve, does not adopt the bilinear pairing operation, is few in occupied resources and high in safety and can operate without the secret key generating center when being applied to signature, authentication and secret key negotiation. By means of the achievement method, identity authentication, communication security and non-repudiation application demands of large-scale systems and low-power-consumption devices can be met.
Owner:北京百旺信安科技有限公司 +1

Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search

The invention discloses an efficient verifiable multi-keyword sequencing searchable encryption method supporting a preference search and a logic search. The encryption method comprises the following steps that a data owner encrypts a document, constructs a cryptogram index based on a document collection, generates summary information of the document by utilizing a secret key and the content of thedocument, and then sends a cryptogram document, an encrypted index and the summary information to a cloud server; a data user shares the information of the secret key, which is generated by the dataowner, generates a query trap door according to a query, and sends an encrypted query trap door and the number K of to-be-obtained documents to the cloud server; the cloud server can execute safe inner product operation after receiving the cryptogram index and the query trap door, searches for K documents most relevant to the query of the user, sequences according to relevant values among the K documents and the query, then generates verification objects, and finally returns the most relevant K documents and the verification objects to the data user, and the data user verifies the correctnessand completeness of a return result through a verification algorithm.
Owner:SOUTH CHINA UNIV OF TECH

Dynamically extensible and efficient single packet tracing method

The invention discloses a dynamically extensible and efficient single packet tracing method. The method comprises the following steps: in an inter-domain network composed of transit domains, constructing an anti-anonymous union by using all tracing Stub domains, wherein the anti-anonymous union configures ACL filtering rules on boundary routers of the tracing Stub domains, so that all anonymous packets entering the inter-domain network are cleared; constructing a tracing network in the tracing Stub domains, and establishing path fingerprint in the tracing network; and after the occurrence of attack, a network service provider directly locates an attack domain via the source address and an inlet router of the anonymous packet by using the anti-anonymous union, and then reduces an attack path through the extracted path fingerprint. By adoption of the dynamically extensible and efficient single packet tracing method disclosed by the invention, the coupling between autonomous domains is weakened so as to achieve the purpose of phased management and flexible control, and the leakage of the network topology privacy is avoided as well, which is beneficial to the expansion of the scale of the tracing system.
Owner:东北大学秦皇岛分校

Authentication authorization method and system

The invention discloses an authentication authorization method and an authentication authorization system and solves the problem that the traditional authentication authorization method is ineffective when the passwords are deciphered or stolen. The method includes: respectively collecting infrared image data and visible light image data on the same image; extracting the infrared characteristic information and the visible light characteristic information; carrying out characteristic integration treatment on the infrared characteristic information and the visible light characteristic information to generate the characteristic information of one image; comparing the image characteristics after being integrated with the pre-memorized image characteristics to carry out authentication authorization. Compared with the traditional password authentication authorization method, the authentication authorization method of the invention based on face identification has high safety and no dangers that the passwords are deciphered or stolen; besides, a user need not to memorize the passwords, thus being more convenient for using. The invention also discloses an authentication authorization system and a terminal system that is matched to be used. The invention can be used in the authentication process of face identification.
Owner:CHINA UNIONPAY

Method for precisely synchronizing time of industrial wireless network on basis of prediction and compensation

The invention relates to technologies for industrial wireless networks, in particular to a method for precisely synchronizing time of an industrial wireless network on the basis of prediction and compensation. The method includes constructing the factory-automation-oriented industrial wireless network into a star network on the basis of an IEEE (institute of electrical and electronics engineers) 802.11 single-hop basic service set (BBS) structure; setting a master clock and slave clocks according to types and functions of nodes in the industrial wireless network; enabling a master clock side and slave clock sides to interact with one another via two-way timestamp information and computing a time deviation value of a current synchronizing cycle; predicting a time deviation value of a next synchronizing cycle by the aid of the time deviation value of the current synchronizing cycle; compensating clock drift by the aid of the predicted time deviation value of the next synchronizing cycle and correcting the clocks. The method has the advantages that the method is implemented on the premise that application requirements of factory automation are sufficiently considered, so that high time synchronization precision can be realized by the aid of few wireless communication resources, and purposes of high precision, high efficiency, low expenditure and easiness in implementation can be achieved.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Method and system for carrying out multi-dimensional regional inquiry on distribution type sequence table

The invention discloses a method and a system for carrying out multi-dimensional regional inquiry on a distribution type sequence table. The method comprises the following steps of: respectively establishing a sheet of corresponding secondary index table for each index list of the distribution type sequence table, and the principal linkage of the corresponding secondary index table of each index list is a combination value of an index list value, the principal linkage of the distribution type sequence table, and the length of the index list value; and when a regional inquiry request is received, according to the field name of the inquiry request, searching a corresponding secondary index table of the field name from each secondary index table, according to the field value of the inquiry request, searching a record position corresponding to the field value of the inquiry request from a corresponding secondary index table, and directly reading corresponding data from the record position of the distribution type sequence table. According to the method and the system, a multi-dimensional regional inquiry speed can be greatly accelerated, and the requirements on high performance, low storage cost and high reliability can be met at the same time.
Owner:北京东方国信科技股份有限公司

Method and Apparatus for Allocating A Dynamic Data Structure

A method, system and program are provided for allocating a data structure to memory by selecting a page of memory having a free entry, allocating the free entry for exclusive storage of a data element in the data structure, and then updating control information on the selected page with management data specifying that the free entry is allocated. In a selected embodiment, the page of memory is part of a heap of memory pages which is organized so that a page, having at least one free entry and fewer free entries than any other page in the heap, is located at the top of the heap. This allows allocations to proceed first with pages having fewer free entries, thereby promoting pages having all free entries.
Owner:IBM CORP

Optimizing method for storing virtual machine mirror images based on CAS (content addressable storage)

The invention relates to an optimizing method for storing virtual machine mirror images based on CAS (content addressable storage). The method specifically comprises the following steps of adopting a CAS method to divide a virtual machine mirror image file into blocks, calculating fingerprint sequences, and judging the repetitive data through the fingerprint sequences. Only one data block is reserved for the data blocks with the same content, and the number of corresponding share times is stored in each block file. The original file is actually stored with the finger sequences (as shown in Figure 3), and the data part is stored in a shared storage system. To ensure the transparent storage of a virtual machine monitor and the portability of the shared storage system, the operation process of the virtual machine mirror images is packaged into the realizing process of a corresponding system calling and response interface by a FUSE (filesystem in user space)-based framework, so as to service a FUSE inner module to obtain an I/O (input/output) request generated by an upper-layer user operating a virtual machine, and convert the direct storage of the virtual machine mirror image files into the storage based on the CAS method. The method for eliminating the repetitive data based on the CAS has the advantages that the occupation amount of disks of the vertical machine mirror images is reduced by more than 50%, and the application prospect is wide for the current states of the large-scale application of the existing virtual machine.
Owner:BEIHANG UNIV

Query optimization method based on join index in data warehouse

The invention relates to a query optimization method based on a join index in a data warehouse. The method comprises the following steps: creating a fact table foreign key join index based on a dimension table surrogate key; creating a join index update strategy; when a predicate condition exists on a dimension table, making a predicate judgment after direct access to dimension table record through the join index, and performing calculation through a dynamic bitmap join index by reference to a bitmap join index to generate a join bitmap index; when the selection rate on the dimension table is very low, further compressing a dimension table bitmap in order to raise the cache level of dimension table bitmap calculation; and calculating simple memory address access by only using an array-bitmap data structure with a reference bitmap join index calculation method based on co-processor memory calculation. Through adoption of the query optimization method, the calculation performance of the bitmap index can be effectively increased. Moreover, the query optimization method can be combined with high-performance co-processors such as GPU and Intel Xeon Phi TM to accelerate the index calculation performance, and can be widely applied to the field of data warehouses.
Owner:RENMIN UNIVERSITY OF CHINA

Consistency maintenance device for multi-kernel processor and consistency interaction method

The invention discloses a consistency maintenance device for a multi-kernel processor and a consistency interaction method, mainly solving the technical problem of large directory access delay in a consistency interaction process for processing read-miss and write-miss by a Cache consistency protocol of the traditional multi-kernel processor. According to the invention, all kernels of the multi-kernel processor are divided into a plurality nodes in parallel relation, wherein each node comprises a plurality of kernels. When the read-miss and the write-miss occur, effective data transcription nodes closest to the kernels undergoing the read-miss and the write-miss are directly predicted and accessed according to node predication Cache, and a directory updating step is put off and is not performed until data access is finished, so that directory access delay is completely concealed and the access efficiency is increased; a double-layer directory structure is beneficial to conversion of directory storage expense from exponential increase into linear increase, so that better expandability is achieved; and because the node is taken as a unit for performing coarse-grained predication, the storage expense for information predication is saved compared with that for fine-grained prediction in which the kernel is taken as a unit.
Owner:XI AN JIAOTONG UNIV

Light-weight authentication key negotiation method based on implicit certificate

The invention relates to a light-weight authentication key negotiation method based on an implicit certificate, and belongs to the technical field of identity authentication. The method is used for establishing a secure channel between an OPC UA server and an OPC UA client and generating of a session key. Three entities, a credible certification authority (CA), the OPC UA client A and the OPC UA server B, are involved in an authentication key negotiation process. The OPC UA server B and the OPC UA client A acquire the own implicit certificates after the CA completes identity registration. Then the OPC UA server B and the OPC UA client A complete bidirectional authentication and key negotiation between the entities by using a light-weight algorithm. According to the method provided by the invention, the light-weight authentication key negotiation method based on the implicit certificate is provided aiming at the problem that an existing OPC UA security mechanism is not applicable to a resource-constrained communication environment. The method provided by the invention can be efficiently and safely applicable to an industrial network with a large amount of resource-constrained embedded OPC UA equipment.
Owner:KYLAND TECH CO LTD

Blockchain structure for intelligent mobile terminal, generation method and transaction verification method

The invention discloses a blockchain structure for an intelligent mobile terminal, a generation method and a transaction verification method. The generation method comprises the following steps: firstof all, a genesis block generator generates a genesis block, and transmits the genesis block or a Hash value to a P2P network via a given rule, such that more than half of nodes in the whole networkhold the genesis block, and the other half of the nodes hold the Hash value of the block; the nodes perform consensus operation on the basis of this and achieve a new consensus; and through continuously performing cyclic consensus, the blockchain structure in which parts of the nodes store parts of blocks of the blockchain is finally obtained. The blockchain structure for the intelligent mobile terminal, the generation method and the transaction verification method have the characteristics that the storage space occupation is small and all consensus mechanisms are compatible.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products