Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

891results about How to "Avoid getting" patented technology

A combined deep learning training method based on a privacy protection technology

The invention belongs to the technical field of artificial intelligence, and relates to a combined deep learning training method based on a privacy protection technology. The efficient combined deep learning training method based on the privacy protection technology is achieved. In the invention, each participant first trains a local model on a private data set to obtain a local gradient, then performs Laplace noise disturbance on the local gradient, encrypts the local gradient and sends the encrypted local gradient to a cloud server; The cloud server performs aggregation operation on all thereceived local gradients and the ciphertext parameters of the last round, and broadcasts the generated ciphertext parameters; And finally, the participant decrypts the received ciphertext parameters and updates the local model so as to carry out subsequent training. According to the method, a homomorphic encryption scheme and a differential privacy technology are combined, a safe and efficient deep learning training method is provided, the accuracy of a training model is guaranteed, and meanwhile a server is prevented from inferring model parameters, training data privacy and internal attacksto obtain private information.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

File safe protection system and method thereof

The invention discloses a file safe protection system and a method, which mainly solves the problems of network illegal invasion, information stealing and tamping, impersonation and weak deny resistance in the conventional information system. The file safe protection system consists of a unified authentication and management server, a certificate server CA, a secret key management server and a client terminal; the unified authentication and management server is used as a middle node and is used for processing or transmitting a service request sent by the client terminal; the certificate server CA processes a certificate service request of the client terminal and provides basic support for identification; and the secret key management server processes the secrete key service requests of the client terminal and the certificate server CA, and is used for encrypting and decrypting a file for the client terminal and providing parameter support for a digital certificate signed by the certificate server CA. With the adoption of the file safe protection system and method provided by the invention, identification, confidentiality, integration and non-repudiation services can be provided; and the file can be safely protected in transmission, storage, sharing and access processes.
Owner:XIDIAN UNIV

Application login method and system, terminal and electronic equipment

The invention discloses an application login method and system, a terminal and electronic equipment, and belongs to the technical field of information security. The method comprises the following steps of: when a first application in a terminal acquires authorization confirmation that a user permits to use user identity information of the first application to log in a second application, sending an authentication request of authentication encryption information carrying the identification information of the second application to an authentication server; when it is determined that the second application is legal according to an authentication result returned by the authentication server, obtaining the access token from the business server of the first application and sending the obtained access token to the second application, so that the second application can obtain the business data of the user from the business server by utilizing the access token, and meanwhile, the user is allowed to use the business data when carrying out the business of the second application. The data is transmitted in an encryption mode, information is prevented from being stolen in the transmission process, and therefore the safety of the data recorded on the service server by a user is guaranteed.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Unmanned aerial vehicle tilt photography fine grid earthwork measurement method

The invention provides an unmanned aerial vehicle tilt photography fine grid earthwork measurement method. The aerial survey data are obtained by aerial survey of the unmanned aerial vehicle and the data are integrated and processed so as to obtain a three-dimensional model of a real scene; the model restoration technology is applied to eliminate the interference objects such as trees and houses in the real scene three-dimensional model, the elevation around the pores left after the interference objects are deleted is applied to fit the curved surface, and the pores are filled with the curved surface so that the restored real scene three-dimensional model is finally obtained, and the real surface point cloud is generated based on the restored real scene three-dimensional model; and an irregular triangular network model is constructed according to the point cloud and then a regular grid model is further constructed, and the earthwork calculation value is obtained through a fine grid earthwork measurement formula based on the regular grid model. The accurate calculation of earthwork filling and excavation can be realized based on the fine grid, and the method has the advantages of high accuracy, safe operation and saving manpower and time cost.
Owner:SHANDONG TRAFFIC PLANNING DESIGN INST

Handheld near infrared spectrum detection system and detection method for quality of fruits and vegetables

The invention discloses a handheld near infrared spectrum detection system and a detection method for the quality of fruits and vegetables, and belongs to the field of quick detection technologies for the quality of foods or agricultural products. The handheld near infrared spectrum detection system and the detection method have the advantages that modulation light paths of a digital micro-mirror device is matched with a single-point detector and other external modules, so that the handheld, low-cost and miniaturized near infrared spectrum detection system for the quality of the fruits and vegetables can be obtained, and high-performance spectrum information can be acquired without expensive linear array detectors; characteristic wave bands are selected at first in the aspect of building fruit and vegetable quality detection models, then wave bands which do not contain information variables and are low in relevancy are removed, then a small quantity of characteristic wavelengths are selected by the id of characteristic wavelength selection processes, internal collinear relations among spectrum data are eliminated, accordingly, model calculation can be reduced, the models can be simplified, and the quality of the models can be improved; the bottleneck problems of high nondestructive detection cost for the quality of fruits and vegetables, carrying inconvenience and poor quality of existing detection models can be solved by the aid of the handheld near infrared spectrum detection system and the detection method.
Owner:JIANGSU UNIV

Auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection

The invention discloses an auxiliary driving vehicle gateway for multi-CPU hard isolation of intelligent interconnection. The auxiliary driving vehicle gateway comprises a vehicle security communication system and a vehicle information analysis and control system, wherein the vehicle security communication system comprises a vehicle gateway double-wireless network card structure composed of an inter-vehicle wireless communication module and a vehicle domain wireless communication module, and a vehicle owner mobile terminal, and the vehicle security communication system carries out CPU control by an I.MX6Q processor; and the vehicle information analysis and control system carries out CPU control by an Exynos4412 processor, and comprises a driving route identification module, a driving behavior analysis module, a vehicle information collection module and an intelligent vehicle controller. The auxiliary driving vehicle gateway disclosed by the invention can realize the communication security of the vehicle gateway, realize driving security by driver fatigue state analysis based on Opencv face recognition and driving route recognition and analysis, as well as effectively resisting against Sybil attack and other various types of attacks from a hardware level to prevent hackers from invading the vehicle gateway to obtain vehicle information and controlling the vehicle.
Owner:JIANGSU UNIV

Method and device for monitoring interface jamming

The invention provides a method and device for monitoring interface jamming. The method comprises the steps of determining an interface jamming threshold of a to-be-monitored terminal according to a central processing unit of the to-be-monitored terminal and performance indexes of a memory; sending a monitoring message to a message queue corresponding to an interface thread in real time or at regular intervals, and recording sending time, wherein the monitoring message carries a message identifier; sequentially processing messages in the message queue, and when a processing request on the monitoring message is received, recording receiving time; determining whether interface jamming occurs according to the sending time, the receiving time and the interface jamming threshold; when it is determined that the interface jamming occurs, obtaining log information of the to-be-monitored terminal in a jamming time period. In the method and device for monitoring interface jamming, the interface jamming is automatically monitored; when it is monitored that the interface jamming occurs, the log information during the jamming period is obtained so that developers can conveniently analyze reasons for the jamming conveniently, the obtaining of the log information during the jamming period through problem reoccurring is avoided, and plenty of manpower and time are saved.
Owner:WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products