Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

48results about How to "Avoid evil" patented technology

Storage-based block chain excitation method, block chain network and storage network

ActiveCN109325746ASolve the problem that malicious nodes cannot be effectively reducedAvoid evilFinancePayment protocolsSystem maintenanceRanking
The invention discloses a storage-based block chain excitation method, a block chain network and a storage network. The method of the invention comprises the following steps that a ranking algorithm of the block chain nodes is proposed. The total contribution value is calculated by the storage contribution and the betting amount of the block chain nodes, and the contribution of the nodes to the whole system in the storage contribution and the betting is effectively evaluated. In this paper, a method of ranking un_rank nodes is proposed, in which the nodes of the whole network participate in the ranking as much as possible, and the un_rank nodes can also get the block chain reward by storing their contribution. A method of incentive based on storage reward and wager amount is proposed, which effectively motivates the node to maintain the whole block chain system continuously and ensure the safety of the block chain system. The method of the invention is suitable for rewarding nodes according to the storage contribution, can effectively evaluate the storage contribution of nodes, motivates all nodes to participate in the system maintenance of the block chain, and rewards the nodes based on the storage contribution.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Data holding proving method, device and system

The invention discloses a data holding proving method, device and system. The problem that there is no data holding proving mechanism for existing personal storage can be solved. The method includes the steps of receiving file segment identifiers of a to-be-verified file and a root node of a Merkle trusted tree; searching for the Merkle trusted tree corresponding to the root node and file segmentscorresponding to leaf nodes of the Merkle trusted tree; sending the file segments corresponding to the file segment identifiers and authentication paths of the file segments to a verification side sothat the verification side can conveniently conduct data holding verification on a storage side according to the file segments, the authentication paths and the root node; or sending operation values, calculated according to a preset algorithm, of the file segments and file segment identifiers and the authentication paths of the file segments to the verification side so that the verification sidecan conduct data holding verification on the storage side according to the operation values, calculated on the basis of the preset algorithm, of the file segments, the operation values, calculated onthe basis of the preset algorithm, of the file segment identifiers, the authentication paths and the root node. The data holding proving method, device and system are mainly applicable to scenes in which data is stored on the basis of a blockchain.
Owner:BEIJING QIHOO TECH CO LTD

Multi-party secure computing implementation method based on block chain technology

The invention discloses a multi-party security computing implementation method based on a blockchain technology. The method specifically comprises the following steps: step 1, compiling an intelligentcontract, wherein the intelligent contract comprises node information of each contract party, tasks of each contract party for executing the intelligent contract and task execution relationships among the tasks; step 2, publishing the intelligent contract: publishing the intelligent contract on the block chain; 3, determining an executable state: after the intelligent contract is authorized by related nodes of each contract party of the intelligent contract, determining the intelligent contract as the executable state; step 4, executing the intelligent contract, wherein different contract parties have own unique business accounts, log in node servers of nodes through node accounts of the nodes and execute tasks of the intelligent contract on the blockchain; and step 5, carrying out verification and recording of an execution result, wherein the nodes which do not participate in the intelligent contract carry out verification and state recording of the contract execution result. According to the invention, the problems of data security and privacy in the data cooperation process are solved.
Owner:DATANG NETWORK CO LTD

Data encoding method and system supporting data ownership certification and data restoration

The invention discloses a data encoding method supporting data ownership certification and data restoration and belongs to the field of information security. The method comprises the following steps:after a client fragments a file, a coding fragment and a verification label thereof are generated according to a redundancy strategy R, a trap door random function T and a data ownership proving scheme S, the coding fragment and the verification label are sent to a storage node, and a corresponding relationship is sent between a coding fragment index and the storage node to an auditing node; the private parameters are stored locally at the client, and the public parameters are sent to the storage node and the auditing node; after randomly selecting the challenge node and the challenge set, theauditing node initiates a challenge, so that the challenge node obtains the corresponding coding fragment and the verification label thereof, generates a data ownership certificate according to the Sand returns the data ownership certificate; if the auditing node receives the data ownership proof in the challenge time window and passes the verification, the challenge succeeds; otherwise, challenge failure. According to the invention, the integrity and reliability of the data can be ensured in the distributed storage system.
Owner:HUAZHONG UNIV OF SCI & TECH

Consensus method of alliance chain based on hierarchical model

The invention discloses an alliance chain consensus method based on a hierarchical model, and the method comprises the steps: carrying out the dynamic division of nodes in a chain: the nodes are no longer used as common peer nodes or sorting nodes, layering the alliance chain according to a Goosip protocol propagation mode, and selecting proxy nodes, and if the previous node finds that the block sent by the previous layer of node does not accord with the local cache transaction, determining that the previous layer of node has the Byzantine node, and if not, performing block copying on the node of the layer communicating with the PB node of the upper layer of the Byzantine node and then continuing the propagation to the next layer; if it is found that the Leader of the first layer do evil, completing, by the PB of each layer, the preparatory work locally and competing for the Leader; then forwarding the messages passing the verification mutually, and carrying out the next verification after messages passing the verification of most nodes are received; and carrying verification according to local transaction cache, main node signature, previous block hash, block height and read-write set conflict; and completing block submission if the verification is passed. Therefore, the consensus process of the alliance chain is optimized.
Owner:XI AN JIAOTONG UNIV

Multi-input verifiable pseudo-random number generation method

The invention relates to a multi-input verifiable pseudo-random number generation method. The method comprises the following steps of enabling a verifier to select a random number as a main private key; generating the sub-private keys based on a threshold scheme and the main private key and distributing the sub-private keys; signing any message by using a verifier sub-private key so as to obtain the first signature information and broadcasting the first signature information; signing the message information by using an own verifier main private key to form the seed information and broadcastingthe seed information; receiving the first signature information and the seed information broadcasted by other verifiers and verifying the first signature information and the seed information; when the verification result is false or the seed information cannot be obtained, enabling the other verifiers to collect the first signature information distributed by the dishonest verifier, and recoveringthe seed information of the dishonest verifier based on the threshold scheme; and collecting the seed information of all verifiers, and synthesizing a signature as a pseudo-random number of the round. According to the present invention, when the verifier is judged to be dishonest, the signature of the dishonest verifier is published, so that the verifiability of the random number is prevented from being damaged, and the last person is completely prevented from doing evil.
Owner:上海链朗信息科技有限公司

Anxiety-proof decoction

The invention discloses anxiety-proof decoction and an orally-taken Chinese traditional medicinal preparation for treating symptoms such as dizziness and nausea, vexation and less sleep and difficultyin falling asleep. The orally-taken Chinese traditional medicinal preparation is characterized by being prepared from the following traditional Chinese medicinal raw materials in parts by weight: 8gof rhizoma coptidis, 5g of cortex cinnamomi, 20g of pericarpium citri reticulatae, 12g of rhizoma pinelliae, 15g of caulis bambusae in taeniam, 16g of fructus aurantii immaturus, 18g of radix paeoniaealba, 19g of radix rehmanniae, 12g of radix rehmanniae preparata, 20g of fried wild jujube seed, 12g of radix polygalae, 15g of rhizoma acori graminei, 35g of crude dragon bone, 35g of raw oyster shell, 20g of flos rosae rugosae and 15g of semen cannabis. The medicinal effects of raw herbal materials selected by the invention are complementary with one another, so that mutual inhibition, mutual restraint and mutual detoxication among drugs are avoided; in addition, the effects of mutual promotion and mutual assistance are enabled to be obvious; the anxiety-proof decoction has the efficacy ofregulating the center and reducing phlegm and clearing heat and soothing the nerves. The anxiety-proof decoction has definite effects for treating the symptoms such as the dizziness and nausea, the vexation, the less sleep and difficulty in falling asleep by orally taking.
Owner:侯春华

Traditional Chinese medicine preparation for treating influenza and preparation method of traditional Chinese medicine preparation for treating influenza

The invention discloses a traditional Chinese medicine preparation for treating influenza and a preparation method of the traditional Chinese medicine preparation for treating influenza. The traditional Chinese medicine preparation for treating influenza is characterized by being prepared from, by weight, 15 parts of herba corydalis bungeanae, 20 parts of folium isatidis, 35 parts of radix isatidis, 15 parts of honeysuckle, 15 parts of radix astragali, 20 parts of fructus forsythiae, 20 parts of radix platycodi, 35 parts of herba taraxaci, 20 parts of rhizoma et radix polygoni cuspidati, 20 parts of radix scrophulariae, 10 parts of radix glycyrrhizae, 20 parts of herba houttuyniae and 20 parts of herba artemisiae apiaceae. Due to property complementation of raw medicinal materials, mutual inhibition, mutual restraint and mutual detoxication in compatibility of the raw medicinal materials are avoided, and remarkable functions of mutual promotion and mutual enhancement are achieved. The traditional Chinese medicine preparation for treating influenza has efficacies of heat clearing, detoxifying, inflammation resisting, sterilizing, swelling relieving and heat dissipating and is a pure orally-taken herbal medicine preparation for treating influenza.
Owner:景金发

Block chain service execution method and device based on multi-signature smart contract

PendingCN114372280AImplement a distributed implementationAvoid evilFinanceDigital data protectionComputer networkSmart contract
The invention discloses a block chain service execution method and device based on a multi-signature smart contract. The method is applied to any block chain node. Comprising the steps of deploying a multi-signature smart contract; receiving a service execution request, generating a voting invitation corresponding to the service execution request under the condition that an initiator account of the service execution request belongs to the account with the voting right and a target service indicated by the service execution request belongs to the service supported by the multi-signature smart contract, and sending the voting invitation to the account with the voting right; receiving voting content fed back by the account with the voting right for the voting invitation, and verifying the legality of a signature in the voting content; determining whether the voting content passing the legality verification meets a preset passing condition or not; and if the passing condition is satisfied, calling an execution logic corresponding to the service indicated by the service execution request in the multi-signature smart contract, and executing the target service. By applying the scheme, the reliability of group decision service execution can be improved.
Owner:HANGZHOU RIVTOWER TECH CO LTD

Anti-blocking boiler air cap applied to power station field

The invention belongs to the technical field of air caps, and particularly relates to an anti-blocking boiler air cap applied to the power station field. The anti-blocking boiler air cap comprises anair cap conical cover, an air cap sleeve, air cap holes and an executing mechanism, wherein a turbine drives a rotary shaft to rotate after being blown by air, and volute spiral springs are compressedfor energy storage; after the turbine rotates after being blown by air, executing rods in an anti-blocking mechanism can be quickly separated from the air cap holes, and normal ventilation of the aircap is achieved. After the air cap stops air blowing, the volute spiral springs release energy; the release speed of the volute spiral springs can be decreased through a fly wheel, and the effect that the rotary shaft can drive annular sleeves to slowly rotate through a first shaft sleeve, connection plates and a gear ring; and the executing rods in the anti-blocking mechanism can slowly penetrate through the air cap holes in a rotary mode, thus, the effect that high-temperature small-particle coal in the air cap holes can be discharged through the executing rods is ensured, in addition, a small space without the high-temperature small-particle coal can be formed through rotation of the rotary executing rods, and the situation that the air cap is blocked is avoided.
Owner:聊城市开发区信远信息科技有限公司

Dynamic cross-chain message forwarding method and system

The invention provides a dynamic cross-chain message forwarding method and system. Each node of a message initiation chain sends a cross-chain message to a relay chain node according to an inter-chain node corresponding relationship; the relay chain node verifies the correctness of the cross-chain message, and signs the message passing the verification; the relay chain node divides groups based on the negotiated dynamic factor, and establishes a corresponding relation of message sending of the nodes among the groups; the relay chain node performs broadcast aggregation of group internal node signatures, and when the number of signatures reaches a set threshold value, broadcast aggregation of inter-group node signatures is performed until the total signature reaches a preset threshold value; the relay chain node sends a message carrying the aggregation signature reaching the preset threshold value to the node of the target chain according to the inter-chain node corresponding relation, and the node of the target chain verifies the correctness of the message and the aggregation signature; the method can ensure that the message is real and credible, is not tampered and is reliably transmitted; and the efficiency of verifying the message and aggregating the signature by the relay chain node can be improved.
Owner:DAREWAY SOFTWARE

Boiler funnel cap used in power plant field

The invention belongs to the technical field of funnel caps, and particularly relates to a boiler funnel cap used in the power plant field. The boiler funnel cap comprises a funnel cap conical cover,a funnel cap sleeve, funnel cap holes and an executing mechanism, a turbine drives a rotation shaft to rotate after being blown by wind, and volute spiral springs are compressed to store energy; and after the turbine is blown by wind to rotate, lead screws in an anti-blocking mechanism can be quickly separated from the funnel cap holes, and the funnel cap can be normally ventilated. After the funnel cap stops being blown by wind, the volute spiral springs release energy; the rotating speed of the rotation shaft can be limited through design of frictional arc-shaped plates in a gear shifting mechanism, then the effect of decreasing the releasing speed of the volute spiral springs is achieved, and it is guaranteed that the rotation shaft drives loop sleeves to rotate at low speed through a first shaft sleeve, connecting plates and a gear ring; and in addition, the lead screws in the anti-blocking mechanism can slowly penetrate through the funnel cap holes in a rotating mode, therefore, it is guaranteed that the lead screws can extrude out high-temperature small-particle coal in the funnel cap holes, it is guaranteed that high-temperature small-particle coal near the outer sides of the funnel cap holes can not enter the funnel cap holes, and the condition that the funnel cap holes are blocked is finally avoided.
Owner:JIANGSU JUJIE ELECTROMECHANICAL CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products