Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

212 results about "Network verification" patented technology

Convolutional neural network power system intelligent fault detection method and system based on Spearman level correlation

The invention provides a convolutional neural network power system intelligent fault detection method and system based on Spearman level correlation, and the method comprises the steps: setting a phasor measurement unit at a regional network node, and carrying out the measurement of data; performing Spearman correlation analysis on the acquired data, and proposing an image generation method basedon an analysis result; establishing an equivalent fault network, verifying the relation between the fault characteristics and the Spearman level correlation, and demonstrating the feasibility of the method; taking the generated image as an initial convolutional layer, and establishing a convolutional neural network architecture based on Spearman level correlation; and verifying the rationality andsuperiority of the method based on PSCAD/EMTDC according to the established architecture. A plurality of types of electric quantity data are comprehensively used for fault diagnosis, the position ofa fault in the power system can be quickly and accurately identified through the convolutional neural network, the problems that the power system has volatility and the traditional detection method isinaccurate due to addition of a distributed power supply and the like are solved, and the robustness and the self-adaptability of the power system are higher.
Owner:NORTHEASTERN UNIV

Searching data

A device or “dongle” (32) is provided for coupling to a Windows-based PC (23). The dongle (32) includes a subscriber identity module (SIM) (15), such as the type used in GSM or UMTS cellular or mobile telecommunications networks. A search engine (40) is accessed by the PC (23) by means of a client application (38) on the PC. The search engine (40) generates a list of search results in response to search criteria in a known manner. Further, the search engine is able to return search results relating to data for which there is restricted access (for example, encrypted data). Such data is identified with a tag which may, for example indicated which users or entities are able to access that data. A user's dongle (32) authenticates that user with the network (3) using a authentication arrangement similar to that employed for authenticating users of a GSM or UMTS mobile telecommunications network. The authenticated identity of the user is communicated to the search engine. The search engine then includes in the search results tagged data items for which the tag indicates that the authenticated user has permission to view. Tagged data items that the authenticated user does not have permission to view are not returned in the search results. Therefore, the user not entitled to view data is not distracted by search results corresponding to data that the user is unable to access. The network (3) may include a key store (51) which stores keys that allow encrypted data items identified by the search engine (40) to be decrypted.
Owner:VODAFONE GRP PLC

Consensus method for secure storage certification based on block chain and distributed storage system

The invention belongs to the technical field of distributed storage technology and block chain application. The invention discloses a consensus method for secure storage certification based on a blockchain and a distributed storage system. The method comprises the following steps: firstly, obtaining data to be stored, partitioning the data, then storing the partitioned data in a storage network in a distributed manner, and generating a non-interactive concise zero-knowledge storage proof for storing the data in a certain physical disk of a storage node; then the block chain network verifyingthe storage proof of the storage node and maintaining a real-time state table of all storage networks; and finally, carrying out block chain network consensus on the influence factor of each node in the block chain network and by utilizing the influence factor of each node. According to the distributed network storage system, an extensible system structure is adopted, a plurality of storage servers are used for sharing the storage load, and the position server is used for positioning the storage information, so that the reliability, the availability and the access efficiency of the system areimproved, and the system is easy to extend.
Owner:XIDIAN UNIV +1

System and Method for Securing Data Through a PDA Portal

Consumers may utilize computing devices to assist in the purchase and/or loyalty process, and in particular, the consumer may utilize a PDA to facilitate the purchase and/or loyalty process. During the purchase and/or loyalty process, the consumer may need to insure that any content downloaded or used in association with the PDA is secure in how it is collected, assembled, and delivered to the PDA device. This system and method secures the data from its source to when it is actually viewed or used by the authorized user. The PDA may have direct access to an Internet web site portal that offers secure personal content from a content provider, such as, for example, an on-line banking or financial institution. Using the web site portal, the content provider may offer personal or confidential data, such as financial information, to PDA users in a secure (e.g., encrypted) environment. The exemplary system and method may establish a PDA portal link to the web site for collecting specified information for a user and transmitting the information to the remote device. To receive the information, the PDA contacts the portal and establishes a connection, authenticates itself to the network and allows the user to complete secured transactions or transmissions over the network.
Owner:LIBERTY PEAK VENTURES LLC

Systems for and methods of network management and verification using intent inference

A system for managing a network using intent inference includes a network interface that is configured to obtain device information regarding a plurality of hardware devices within a data communication network. A processor is configured to infer intended packet handling behavior of a plurality of the devices. A network verification system models packet handling behavior of the devices within the network and compares the inferred intended behavior to the modeled packet handling behavior. The system can take action in response to the results of the comparison, which can include initiating a configuration change to one or more of the hardware devices of the data communication network.
Owner:VMWARE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products