Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

79results about How to "Authoritative" patented technology

Identity identification method and system for image and video data

The invention discloses an identity identification method and an identity identification system for image and video data. The identity identification method comprises the steps of: during acquisitionof each image, forming identity identification information of the image by reading local information, wherein the identity identification information at least comprises an image generation time, an image generation location, image generation equipment and a digital signature of the image; performing image coding on the identity identification information to enable coded image data to comprise theidentity identification information of the image, so as to obtain the unique identity identification of the image, i.e., an image ID. For video data, a video ID describing video sequence information is formed by image identity identification information of key frames. Through adoption of the identity identification method of the invention, the unique ID is designed for the image and video data, thereby providing meta-information with uniqueness, authority, safety, universality and privacy for processing such as coding, channel transmission and decoding reestablishment, space-time synchronization fused analysis, tracing and tamper resistant of the image.
Owner:SHANGHAI JIAO TONG UNIV

Official document error correction method

The invention discloses an official document error correction method, which comprises the following steps of: a text detection step: carrying out text recognition model training by utilizing machine learning, and classifying document texts into notification, report, approval, notification, letter, conference summary and ask-for-leave types; an error detection step: making word segmentation througha Chinese word segmentation device, detecting errors from the aspects of word granularity and word granularity, integrating suspected error results of the two types of granularity detection, to forma suspected error position candidate set; using a bidirectional character-level N-gram LM deep learning model for scoring characters in sentences, regarding the position with the low score as a position to be corrected, conducting dictionary word checking on the position to be corrected and context combinations, and when all the combinations cannot be found in a dictionary, regarding the combinations as wrong characters and added into a wrong position candidate set. According to the scheme, auditing requirements such as row text specifications, incomplete contents, unknown questions, grammar error correction, smoothness detection, context association and the like are combined, the characteristics are used for innovating, reconstructing and combining the existing technical scheme, and the error correction effect of the enterprise electronic official document can be effectively improved through tests.
Owner:FUJIAN YIRONG INFORMATION TECH +2

Identity authentication method based on fuzzy vault and digital certificate

InactiveCN101945114AImprove security and trustAvoiding the problem of forward secrecyUser identity/authority verificationUser informationRegistered user
The invention relates to an identity authentication method based on a fuzzy vault and a digital certificate, wherein the digital certificate and fingerprint identification are combined in a smart card, so that the digital identity and the physical identity of a user correspond to realize the identity authentication with high safety. The method comprises the following steps of: firstly generating an RSA key pair in a user UK, and sending a public key and relevant registration information to an RA for auditing by the user UK; when the auditing is passed, transferring user information to a CA for verification by the RA; after the verification is successful, generating the digital certificate for the user and sending to the user to be stored in the UK by the CA; and inputting a fingerprint in the UK by the registered user, extracting the true detail points in the fingerprint, dispensing the true detail points into the UK and a fingerprint server, and locking the PIN of the UK by the true detail points of the user, so that the digital certificate stored in the UK and a corresponding private key can be safely protected. In order to reduce the calculation amount of the smart card, a secret sharing method is introduced, so that only when the information in both the smart card and the server can be obtained, the PIN of the smart card can be recovered to release the digital certificate containing the private key.
Owner:XIDIAN UNIV +1

Linear model method used for simplified-Chinese readability measurement

The invention discloses a linear model method used for simplified-Chinese readability measurement. The method includes the steps of: constructing simplified-Chinese text and a readability level corpusthereof; preprocessing the text, wherein word segmentation, sentence segmentation, part-of-speech labeling, named-entity recognition, component syntax analysis, dependency syntax analysis, clause labeling and stroke counting are included; extracting and calculating text language features; constructing a best feature combination according to the language features and a regression algorithm; and constructing a linear regression model of readability measurement. The text language features adopted by the model cover four aspects of shallow-layer features, part-of-speech label features (also called semantic or lexical features), grammatical features, textual features and the like, a readability level of simplified-Chinese text for learners of which native languages are Chinese can be automatically predicted, and a gap of readability prediction models based on the simplified-Chinese text is filled. The model of the invention is high in a fitting degree, is high in interpretability, and hasextensibility and an important reference value for evaluating readability of application text.
Owner:GUANGDONG UNIVERSITY OF FOREIGN STUDIES

Method for automatically building classification tree from semi-structured data of Wikipedia

The invention discloses a method for automatically building a classification tree from the semi-structured data of Wikipedia. The method comprises the steps: (1) extracting the semi-structured data, to be specific, acquiring the HTML of a page by analysis, and identifying the page containing the semi-structured data; (2) extracting a hyponymy relationship among the semi-structured data, to be specific, acquiring the hyponymy relationship contained in a Wikipedia catalog page according to the layout characteristics of the Wikipedia catalog page, analyzing an HTML element, and acquiring the hyponymy relationship contained in a navigation table according to the structure of the navigation table; (3) integrating the hyponymy relationships from different semi-structured data, to be specific, building a simple directed and unweighted graph according to the extracted hyponymy relationship set, and then generating a classification tree based on the depth-first traversal algorithm of the simple directed and unweighted graph. The method can automatically extract the hyponymy relationship in Wikipedia pages, and build the classification tree, thereby reducing the building cost by experts in the domain, and fully reusing the hyponymy relationship manually built by volunteers.
Owner:XI AN JIAOTONG UNIV

Multimedia digital watermark evidence taking mobile phone

The invention discloses a multimedia digital watermark evidence taking mobile phone. The multimedia digital watermark evidence taking mobile phone is an intelligent evidence taking mobile phone whichuses the unique stability, concealment, security and fragility of a fragile digital watermark to ensure the integrity, the authenticity, the stability, the reliability and the authority of photographed and recorded multimedia data based on an image, audio and video fragile digital watermark embedding and extraction technology. When a user uses the mobile phone, imperceptible and unmodifiable fragile digital watermark information with unique identity confirmation is embedded in real time in a photographed image, audio and video. The image or the audio or the video with the fragile watermark canbe normally used and distributed but can not be modified manually. The authenticity of a file can be identified according to whether the photographed digital file contains the digital watermark information. The evidence taking process is quick, efficient, accurate, safe and convenient. The evidence taking content has the uniqueness of a digital evidence and the legal authority of evidence use, and the multimedia digital watermark evidence taking mobile phone disclosed in the invention can be used for evidence taking and recording in fields such as judicature, law enforcement and claim.
Owner:CHENGDU YUFEI INFORMATION ENG

Intelligent card system man-in-the-middle attack verification platform and test method

The invention relates to an intelligent card system man-in-the-middle attack verification platform and a test method. One end of the verification platform conducts communication with an intelligent card, and the other end of the verification platform conducts communication with a card reader. A control management module is arranged in the verification platform and used for loading an attack test program and storing and processing instructions and responses sent by the card reader and the intelligent card. By the adoption of the intelligent card system man-in-the-middle attack verification platform of the structure and the test method, the uniformity of an intelligent card system design scheme and the practical running process can be verified, and authenticity and effectiveness of a security evaluation result is guaranteed; the evaluation result has higher persuasion and authority; due to the fact that a middle attack needs to be executed actually, cost of the man-in-the-middle attack can be quantified effectively and accurately, the ability of an intelligent card system in resisting the man-in-the-middle attack can be evaluated accurately, and thus the security level of the intelligent card system to be tested is confirmed.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Composition, high-efficiency flame-retardant phase change thermal management composite material which is prepared from composition and preparation method of composition and high-efficiency flame-retardant phase change thermal management composite material

The invention relates to a composition, a high-efficiency flame-retardant phase change thermal management composite material which is prepared from the composition and a preparation method of the composition and high-efficiency flame-retardant phase change thermal management composite material. The composition comprises, by weight, 25-90% of an alkane phase change material with a phase transitiontemperature of 20-60 DEG C, 5-15% of thermally conductive filler, 5-25% of one or more of the following flame retardants including aluminum hypophosphite, an ammonium polyphosphate-pentaerythritol composite and a phosphorus-nitrogen nanocomposite flame retardant, 0-30% of a resin-based material, 0-2% of an antioxidant and 0-3% of glass fiber. The composite material has excellent mechanical properties, high thermal conductivity, a high encapsulation rate for phase change materials and no leakage after phase change is performed, the temperature of a battery pack can be regulated effectively, andthe temperature of the battery pack can be controlled within an optimal working temperature range, so that the service life and reliability of the battery pack are improved; and a highest level of V-0 in the UL 94 standard is achieved, excellent flame retardant performance is achieved, and the safety of the battery pack is improved.
Owner:AEROSPACE INST OF ADVANCED MATERIALS & PROCESSING TECH

Information security and function security association analysis method

The invention relates to an information security and function security association analysis method, and belongs to the field of information security. The method comprises the following steps that: anintelligent equipment information system security risk assessment model, an intelligent equipment function fault security analysis model and an information security and function fault matching model are included, and the intelligent equipment information system security risk assessment model is mainly used for collecting authoritative known industrial control information system security vulnerability information and establishing a CIA information base for the vulnerability information. The equipment function fault safety analysis model is used for calculating a confidentiality threat value, anintegrity threat value and an availability threat value of a logic node function according to description of the logic node function fault of the intelligent equipment involved in the IEC 61850 standard; and a logic node function fault CIA threat library is established. The information security and function fault matching model is used for establishing a corresponding relation calculation methodof information system security CIA and intelligent equipment security CIA threat values.
Owner:STATE GRID SICHUAN ELECTRIC POWER CORP ELECTRIC POWER RES INST +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products