Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

953 results about "Check digit" patented technology

A check digit is a form of redundancy check used for error detection on identification numbers, such as bank account numbers, which are used in an application where they will at least sometimes be input manually. It is analogous to a binary parity bit used to check for errors in computer-generated data. It consists of one or more digits computed by an algorithm from the other digits (or letters) in the sequence input.

Polarization code and multi-bit even parity check code cascaded error correction coding method

The invention discloses a polarization code and multi-bit even parity check code cascaded error correction coding method. The method comprises the steps: a transmitting end encoder utilizes a multi-bit even parity check code as an outer code, and utilizes a polarization code as an inner code; a receiving end decoder decodes by utilizing a modified successive cancellation list (SCL) decoding algorithm. On the aspect of error correction performance, comparing with the prior art utilizing middle-short code length non-cascaded polarization codes of the SCL decoding algorithm, the polarization code and multi-bit even parity check code cascaded error correction coding method has the advantages that frame error rate performance of a system can be remarkably improved, and a maximum likelihood bound (ML Bound), which cannot be broken through by the SCL decoding algorithm, can be remarkably broken through. On the aspect of engineering realization, according to the polarization code and multi-bit even parity check code cascaded error correction coding method, the outer code utilizes the multi-bit even parity check code, which is simple to code; the modified SCL decoding algorithm is utilized to decode, bit decision and even parity check are combined to be carried out in a decoding process, and compared with the original SCL decoding algorithm, the method provided by the invention does not increase the decoding complexity, and facilitates the engineering realization.
Owner:HUAZHONG UNIV OF SCI & TECH

Cancellation method for an automatic ticket system

Subscribers are given access to a series of events by a smart card acting as an electronic ticket, which operates automatic turnstile. A subscriber can cancel the card in respect of a particular event by telephoning a cancellation office and verbally communicating the identifying number of the subscriber's card. This number is entered into a stop list for the event. The stop list automatically controls the automatic turnstile to prevent access to the event by use of any card on the stop list for this event. Each subscriber has a hand-held reader device, for displaying a sequence number and authentication code from the card. At the cancellation office, the card is authenticated by generating a check code from the sequence number and comparing it with the authentication code communicated by the subscriber.
Owner:INT COMP LTD

Basic Matrix, Coder/Encoder and Generation Method of the Low Density Parity Check Codes

The invention relates to a base matrix, a encoder / decoder of Low Density Parity Check (LDPC) codes and a generation method thereof. The encoder / decoder is determined uniquely by the parity check matrix of the LDPC codes. With different code sizes, said parity check matrix can be obtained by expanding different base matrixes, and also can be obtained by expanding a unique base matrix after correction. Elements of said base matrix must meet an inequation in which the girth value is up to the standard, e.g. when girth ≧6, for any element i, j, k, l in the matrix which forms the short loop having a length of 4 in anticlockwise, there are always mod(i−j+k−l, z) unequal to 0. By this invention, the girth of the constructed base matrix is made as large as possible, the amount of the shortest loops is as few as possible when it is the same girth, thus the curve of bit error ratio (BER) is dropped quickly, the error floor of the LDPC codes is eliminated effectively, and the optimal performance of the LDPC codes is obtained.
Owner:ZTE CORP

Login and verification method for application program

The invention belongs to the technical field of mobile terminals and provides a login and verification method for an application program. The login and verification method comprises the following steps: login information of the application program and identification of a mobile terminal are obtained, and the login information comprises a login account of the application program; according to the login account of the application program and the identification of the mobile terminal, a preset function is adopted to generate a check code; a login request is sent to an application program server, and the login request comprises the login information and the check code so that the application program server verifies the login information according to the check code and the check code stored in the application program server. In the login and verification method, when the generated check code and the check code stored in the application program server are different, the verification result of the login information proves to be illegal. Even when other people learn about the login account and the password, the people cannot succeed in login operation of the application program. Therefore, illegal login on a random mobile terminal is eliminated, and safety of multiple login accounts and the password is improved.
Owner:GUANGDONG OPPO MOBILE TELECOMM CORP LTD

A decoding method for block low-density check code and reconstruction of multi-mode decoder

InactiveCN101262231AChange control outputSimple read and write access controlError preventionError correction/detection using multiple parity bitsResource utilizationLow complexity
The invention discloses a decoding method for a blocky check code with low density and a multi-mode reconfigurable decoder, and particularly relates to a decoding design based on the blocky check array of a unit cycle permutation array; the decoding method adopts partly collateral minimum and bias iterative compensation algorithm, and is characterized by low complexity and fast iterative convergence; the decoder has flexible configuration and high availability of resources, and the decoder is characterized in that: firstly, the decoder can support the blocky check array decoding with different code lengths under various code rates; secondly, the decoder can select and configure different messages to update concurrent factors according to the decoding delay and the throughput requirements; thirdly, node messages are stored in a distribution type, the write / read access control is easy, and the node messages are stored in a compression type, thereby effectively improving the utilitization of the stored resources; lastly, the iterative update adopts multi-level production line structure, thus fully improving the data throughput of the decoder. The method and the device of the invention have the advantages of stable performance, flexible configuration and good expansibility, etc.
Owner:ZHEJIANG UNIV

Data identification method for two-dimension code safety verification

The invention discloses a data identification method for two-dimension code safety verification. The method comprises the following steps of S1, adding a verification code in a character random code to form a byte stream random number, and performing data encryption and data conversion to form a verification random code; S2, combining the verification random code and a URL (Uniform Resource Locator) to form a background visit address, and generating a two-dimension code with the background visit address; S3, scanning the two-dimension code to obtain the verification random code and the URL, restoring the verification random code through decryption to form the character random code and the verification code, and generating a new verification code according to the character random code; and S4, comparing the verification restored by decryption and the new verification code, returning a message of verification failure if the verification restored by decryption and the new verification code are not consistent, and performing next verification operation of the verification restored by decryption and the new verification code are consistent. The method provided by the invention can effectively prevent influences of brute force attack, can prevent database paralysis caused by lots of data access, and can improve the safety of the two-dimension code to a certain extent.
Owner:SIGMATRIX TECH CO LTD

Hierarchical Block Irregular Low Density Check Code Decoder and Decoding Method

ActiveCN102281125ANo pipelining contentionPipeline contention conflict eliminationError preventionCheck digitDegree of parallelism
The invention discloses a laminated and partitioned irregular low density parity check (LDPC) code decoder and a decoding method in the technical field of communication. An external information storage unit outputs a soft value transmitted to an information node by a last iterated check node to a decoding processing module. A cyclic shift register transmits a posterior probability likelihood ratio update value of the information node to the decoding processing module. The decoding processing module transmits the check update value in the iteration to the external information storage unit, andsimultaneously transmits the posterior probability likelihood ratio update value of the information node to the cyclic shift register through a decoding processing module interweaving network. The decoder is suitable for decoding all quality control (QC) LDPC codes, and all the partitioned LDPC code words support decoding; the decoder has no stream competition conflict, and has better throughput performance and relatively simple working time sequence; and the consumption of the interweaving network of huge resources is not needed, many hardware resources are saved, and the resource consumption of the whole decoder is relatively low. The decoding supporting parallelism degree can be flexibly changed.
Owner:SHANGHAI NAT ENG RES CENT OF DIGITAL TELEVISION

Method for storing real-time data

The invention discloses a method for storing real-time data, which comprises the following steps: the data of a storage sensor is collected by a collector in real time; the summary information of a main index is accessed, checked and compared; the latest indicator of the main index content is extracted; the latest storage indicator of the data is accessed; data content and a check code are stored; new index content and the check code are calculated; the main index content and the check code are stored; main index summary is updated and stored; backup index content and the check code are stored; backup index summary is stored; the backup index summary is accessed and then checked and compared; the latest indicator of the backup index is acquired; the latest storage indicator of the data content is accessed; and storage information is reestablished. Double indexes and multiple checks are adopted for protecting the data in a storage unit, thus guaranteeing the complete content of the data stored in the collector. Cycling coverage is adopted for realizing the continuous storage of data content under fixed storage capacity, improving the reliability and completeness of important parameter record during the industrial process and promoting the operation efficiency of process monitoring and work safety.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Quasi-cyclic low density parity-check code (QC-LDPC) decoder and decoding method

The invention discloses a quasi-cyclic low density parity-check code (QC-LDPC) decoder. The QC-LDPC decoder is applied to solid state disk error correction systems, and comprises a syndrome calculation module, a judgment control module, a searching module and an overturn control module, wherein the syndrome calculation module is used for calculating the syndrome of a code sequence to be decoded; the judgment control module is used for judging whether the syndrome is an all-zero vector or not, and controlling to finish the syndrome calculation and outputting the current code sequence as a decoding result if the syndrome is the all-zero vector; the searching module is used for calculating the set of the number of code elements which do not meet a check equation in the code sequence to be decoded and searches the position of a maximal value in the set when the syndrome is not the all-zero vector; and the overturn control module is used for overturning the code element which corresponds to the position of the maximal value in the set in the code sequence to be decoded, and inputting an updated code sequence to be decoded into the syndrome calculation module. The invention correspondingly provides a QC-LDPC decoding method. Thus, by using the decoder and the decoding method, the syndrome calculation can be controlled to be finished when error correction is finished, and the decoding period and decoding delay are lowered.
Owner:RAMAXEL TECH SHENZHEN

Encrypted domain lossless reversible information concealing method based on carrier image check code

The invention discloses an encrypted domain lossless reversible information concealing method based on a carrier image check code. The method comprises the steps of (1) dividing an original carrier image into a first carrier sub-image and a second carrier sub-image, encoding the first carrier sub-image, embedding a check code corresponding to the first carrier sub-image into the second carrier sub-image, encrypting the carrier image containing the check code, and obtaining a encrypted ciphertext carrier image containing the check code; (2) dividing the encrypted ciphertext carrier image containing the check code, carrying out different overturn computing on negative three bits of an first encrypted carrier sub-image according to secret data to be embedded, embedding the secret data, and obtaining a ciphertext carrier image containing the secrete data; (3) decoding a plaintext domain carrier image containing the secret data, abstracting the secret data in the decrypted plaintext domain carrier image, and recovering an original carrier image. According to the method, the secrete data are embedded in the ciphertext carrier image, and the method ensures that the original carrier image is recovered in a lossless mode while the secret data are subjected to plaintext abstraction.
Owner:SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products