Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

48results about How to "Avoid parity" patented technology

Method for deleting repeated data by using double-fingerprint hash check

The invention provides a method for deleting repeated data by using double-fingerprint hash check. The method comprises the following steps of: dividing an object to be backed up into data blocks to be backed up with equal lengths; judging whether the weak fingerprint of one of the data blocks to be backed up is the same as the weak fingerprint of any data block in a server; if the weak fingerprint of one of the data blocks to be backed up is different from the weak fingerprint of any data block in the server, backing up the data block; if the weak fingerprint of one of the data blocks to be backed up is the same as the weak fingerprint of any data block in the server, judging whether the strong fingerprint of the data block is the same as the strong fingerprint of any data block in the server; if the strong fingerprint of the data block is different from the strong fingerprint of any data block in the server, backing up the data block; and performing the operation on all data blocks to be backed up. In the method for deleting the repeated data, a hash function with low calculation amount is adopted at the first time to perform weak check on every data block and a has function with high calculation amount is adopted then to perform strong check, so the problem that all the data are checked by the hash function with the high calculation amount is avoided, the fingerprint calculation amount during checking is reduced greatly, the series performance is enhanced, and the appreciable transmission performance is provided for data backup based on mass data storage.
Owner:HUAZHONG UNIV OF SCI & TECH

Product configuration data monitoring method and device, apparatus and storage medium

The invention discloses a product configuration data monitoring method and device, an apparatus and a storage medium, and relates to the field of financial technology. The method comprises the following steps of when a parameter configuration instruction is received, carrying out parameter verification on a current configuration parameter according to a verification rule corresponding to the current configuration parameter in a parameter configuration instruction, and giving an alarm on a parameter with an abnormal verification result; and according to each verification rule in the preset rule chain and the preset rule operation frequency, carrying out timing cycle verification on the product configuration data corresponding to the product, and giving an alarm on the parameters with the abnormal verification results so as to monitor the product configuration data. According to the method, the current configuration parameters are firstly verified in real time, and then the product configuration data of the product is periodically and repeatedly verified in a circulating mode, so that the verification of some configuration parameters is prevented from being omitted, the problem data is prevented from being generated, the accuracy of the financial technology product configuration data is improved, and the manual operation is reduced.
Owner:WEBANK (CHINA)

Quick adjustment technology for gaps between grinding rollers of coal mill and liner plate of grinding bowl

ActiveCN105080664AAvoid repeated adjustmentsAvoid successive measurementsGrain treatmentsEconomic benefitsEngineering
The invention discloses a quick adjustment technology for gaps between grinding rollers of a coal mill and a liner plate of a grinding bowl, and belongs to the technical field of maintenance technologies of coal mills. The quick adjustment technology is used for quickly adjusting the gaps between the grinding rollers and the liner plate of the grinding bowl. According to the quick adjustment technology, the gaps between the grinding rollers of the bowl type coal mill and the liner plate of the grinding bowl are limited through asbestos boards, the grinding rollers go down slowly till the grinding rollers make contact with the asbestos boards and the asbestos boards slightly resist pulling, then, the gaps between the grinding rollers and the liner plate of the grinding bowl are limited within the needed gaps, and therefore, the gaps between the grinding rollers and the liner plate of the grinding bowl are quickly adjusted. The quick adjustment technology for the gaps between the grinding rollers of the coal mill and the liner plate of the grinding bowl is innovative in the industry; the process is simplified, and the adjustment process is completed in one step; the tedious measurement and adjustment process is avoided; maintenance time is shortened, and the labor efficiency of maintainers is improved; the continuous workability of a coal pulverizing system is improved, and it is guaranteed that the whole production process is smooth; and the quick adjustment technology provides guarantees for high-efficiency production of enterprises, has remarkable economic benefits and has great application and popularization value.
Owner:WUYANG IRON & STEEL

Method for generating a secret or a key in a network

Disclosed is a method for generating a secret or a key in a network (20). The network (20) comprises at least a first subscriber (21) and a second subscriber (22) and a common transmission channel (30) between at least the first (21) and second subscribers (22). The first subscriber (21) can output at least a first value (1) and a second value (0) and the second subscriber (22) can output at leastthe first value (1) and the second value (0) on the transmission channel, the first subscriber (21) generating a first sequence of subscriber values and the second subscriber (22) generating a secondsequence of subscriber values in order for the transmission to occur largely synchronously on the transmission channel (30); and the first subscriber (21) and the second subscriber (22) each generatea common secret or a common key, the first subscriber (21) doing so on the basis of information about the first sequence of subscriber values and on the basis of a sequence of superposed values resulting from a superposition of the second sequence of subscriber values onto the first sequence of subscriber values on the transmission channel (30), and the second subscriber (22) doing so on the basis of information about the second sequence of subscriber values and on the basis of the sequence of superposed values resulting from the superposition of the second sequence of subscriber values ontothe first sequence of subscriber values on the transmission channel (30). At least the first subscriber (21) and the second subscriber (22) determine a sequence of test values in accordance with the resulting sequence of superposed values and output same on the transmission channel (30).
Owner:ROBERT BOSCH GMBH

Verification method for data destruction of storage medium

The embodiment of the invention provides a verification method for data destruction of storage medium. The method comprises the following steps of: destructing data of a target storage medium to be subjected to data destruction; extracting and generating a first encryption electronic feature code according to data destruction feature information of the target storage medium and extracting and generating a second encryption electronic feature code according to inherent attribute information of the target storage medium; based on a preset encryption algorithm, performing combined encryption on the first encryption electronic feature code and the second encryption electronic feature code, and generating a verification ciphertext sequence and writing the sequence into a specified verification storage area in the target storage medium; while verifying and checking, decrypting the verification ciphertext sequence in the verification storage area, and checking the generated decryption result with display information on the storage medium to verify the data destruction information of the target storage medium. With the method provided by the invention, by technological means, an existing problem of data leakage caused by artificial negligence or deliberate inaccuracy of verification can be solved.
Owner:深圳青柠存储技术有限公司

Website content data display method and device, equipment and storage medium

PendingCN111767493ASensitive verification is complete and accurateAvoid showingNatural language data processingImage data processing detailsData displayWeb site
The invention discloses a website content data display method. The method comprises the following steps of receiving image data submitted when a target user accesses the website, judging whether textinformation exists in the image data or not, if yes, extracting the text information, and performing text content verification on the text information by utilizing a preset text sensitive word bank toobtain a first verification result, performing image content verification on the image data to obtain a second verification result, and under the condition that both the first verification result andthe second verification result are normal, displaying the image data. According to the method, the mode of determining whether the text information in the image data contains the sensitive information or not according to the text sensitive word bank is more accurate; and two modes are used for verification and are combined to obtain a verification result, so that sensitive verification of the image data is more complete and accurate, and sensitive information can be further prevented from being displayed on a website. The invention furthermore discloses a website content data display device and equipment, and a computer readable storage medium, which all have the above beneficial effects.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Method and system for simplifying point-to-point transaction network of partitioned power market

The invention relates to a method and a system for simplifying a point-to-point transaction network of a partitioned power market. The method comprises the following steps of: 101, acquiring a power transfer distribution factor of each branch in the point-to-point transaction network of the power market by utilizing an active power increment of a node and an active power increment of each branch in the point-to-point transaction network of the power market; 102, simplifying the point-to-point transaction network of the power market based on the power transfer distribution factor of each branchin the point-to-point transaction network of the power market; and 103, if the simplified point-to-point transaction network of the power market is connected, outputting the simplified point-to-pointtransaction network of the power market, otherwise, reducing the power transfer distribution factor of each branch in the point-to-point transaction network of the power market and returning to the step 102. According to the technical scheme provided by the invention, various power transactions can be quicker and more intuitive, the purpose of effective analysis can be achieved, meanwhile, transaction information can be completely reserved, and the high efficiency and accuracy of security check load flow calculation are ensured.
Owner:CHINA ELECTRIC POWER RES INST +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products