Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

158results about How to "Avoid uploading" patented technology

Privacy protection method in face authentication system based on edge calculation

The invention belongs to the technical field of privacy protection in cloud computing and discloses a privacy protection method in face authentication system based on edge calculation. The method comprises the steps that: a camera collects a face image and uploads the face image to a connected edge computing node, an authority assigning mechanism sends a permission vector Li of a user to the edgecomputing node after collecting user face information, an edge computing device carries out feature extraction on a face image of a user requesting registration to obtain a feature vector by using a method based on a deep convolutional neural network, a safe nearest neighbor algorithm is performed to encrypt the feature vector of a registered user, and a secret sharing homomorphic algorithm is performed and n sub-secrets are generated according to the feature vector and are distributively stored in n edge computing devices. The direct upload of sensitive data to a cloud server is avoided, theprivacy of the face data is protected, and the fault tolerance of a system is improved. Results prove that the accuracy of face recognition under a ciphertext of the present invention is completely equal to the accuracy of face recognition under a plaintext.
Owner:XIDIAN UNIV

Internet-based catering and amusement management system and electronic menu and ordering method thereof

The invention discloses a catering and amusement management system and a special electronic menu and a self-help ordering method thereof. The internet-based catering and amusement management system comprises a remote data service unit, a remote application service unit, at least one catering and amusement shop operating unit and an access terminal unit, wherein the remote data service unit is used for the collective and concentrated storage of data from the units in the system; the remote application service unit is used for acquiring the data from the units, analyzing and processing the data collectively, distributing the data to the units and providing an internet-based catering management application service module; the at least one catering and amusement shop operating unit is used for the daily operation of a catering and amusement shop and the data interaction with the remote data service unit; and the access terminal unit is used for accessing the corresponding catering management application service module according to the right distributed by the remote application service unit. The system has high data safety, remote management, convenient and quick maintenance, low system maintenance cost and good augmentability, and can be simultaneously applied to the management of a plurality of catering and amusement shops with different brands.
Owner:杭州因餐信息技术有限公司

Method for acquiring subordinate financial business data and system for acquiring subordinate financial business data

The invention discloses a method for acquiring subordinate financial business data and a system for acquiring the subordinate financial business data, which relate to the field of ETL (extraction-transformation-loading) of a data warehouse, and realize automatic acquisition of the subordinate financial business data based on an SOA (service-oriented architecture) and a message-oriented middleware. The method includes the steps of firstly, extracting financial business data needing to be uploaded according to extracting configuration; and then uploading the extracted data to a superior financial business data center by the aid of the message-oriented middleware and utilizing the uploaded extracted data as a basic data source for integrative query. The method provides two data acquiring modes including overall extracting and data extracting in the extracting configuration, and a user can extract changed data in a data sheet without changing an original business data sheet by the acquiring mode of data extracting, so that data extracting efficiency is improved, only data meeting the requirements can be acquired by setting up access conditions, and acquisition and upload of unnecessary data is avoided.
Owner:北京用友政务软件股份有限公司

Live-broadcasting room video stream synthesis method and apparatus, and terminal equipment

The invention relates to the field of network live broadcasting, and specifically relates to a live-broadcasting room video stream synthesis method and apparatus, and terminal equipment. The method includes steps: outputting pre-protocol information including live-broadcasting room feature information and anchor identity information in response to an operation instruction for turning on multi-source live broadcasting by an anchor user; configuring an anchor user terminal as a server terminal, and receiving a connection request initiated by a second terminal according to the pre-protocol information; receiving a second video stream acquired by the second terminal in response to the connection request after it is confirmed that the anchor user is connected with at least one second terminal; synthesizing a first video stream and the second video stream acquired in a local manner as a third video stream, and uploading the third video stream to a server so that the server pushes the third video stream to each user in the live-broadcasting room. According to the method and apparatus, and the equipment, the anchor terminal is configured as the server terminal, the video stream pushed to the live-broadcasting room is synthesized, the occupation of the bandwidth is reduced, the pressure of the server of a live-broadcasting platform is reduced, and the playing front-end of live-broadcasting videos is liberated.
Owner:GUANGZHOU HUADUO NETWORK TECH

Audio frequency feature based method and system for marking and identifying broadcast television program

The invention provides an audio frequency feature based method and system for marking and identifying a broadcast television program. The method includes steps of extracting feature data of a program audio frequency file through a server-side to obtain program audio frequency feature data; merging the program audio frequency feature data, a program identifier and interactive applications, and the transmitting to a mobile terminal; recording a record audio signal of the program through the mobile terminal; extracting the audio frequency feature of the record audio signal to obtain record audio frequency feature data; determining whether there is program audio frequency feature data matching with the record audio frequency data in a program audio frequency feature database or not, and outputting a matched program identifier, playing time and corresponding interactive applications, if the program audio frequency feature data exists; and further, calculating time difference of the program and outputting the calculated time difference of the program. By adopting the audio frequency feature based method and system for marking and identifying the broadcast television program, a user can enjoy various interactive applications corresponding to a broadcast television program being watched at present through just easily operating the mobile terminal, and privacy of the user can be effectively protected so as to raise user experience.
Owner:CHINA TELEVISION INFORMATION TECH BEIJINGCO

Anti-counterfeiting authentication processing method, transaction terminal and processing system

InactiveCN103177367AEnsure authenticity and uniquenessImprove anti-counterfeiting effectCommerceInternet privacyData library
The invention relates to the field of anti-counterfeiting authentication, and discloses an anti-counterfeiting authentication processing method, a transaction terminal and a processing system. The method mainly comprises the following steps: receiving authentication associated information uploaded by a transaction terminal through a server; according to an identity in the authentication associated information, determining whether the identity of a transaction product is consist with the identity of a product in an anti-counterfeiting database through the server; if so, adding transaction information in the authentication associated information into the anti-counterfeiting database, and uniquely corresponding the transaction information of the product to the identity. After receiving an authentication request of any one user, the server inquires whether the identity of a product to be authenticated is consist with the identity of a product in the anti-counterfeiting database, and if so, acquiring the transaction information of the product from the anti-counterfeiting database, and feeding back the transaction information to the user. Through the technical scheme disclosed by the invention, anti-counterfeiting effect of product is enhanced, and uniqueness and authenticity of authentication information acquired by customers are guaranteed.
Owner:欧家奇

Alliance chain consensus method and alliance chain system

The embodiment of the invention provides an alliance chain consensus method and an alliance chain system. The method comprises the steps that a consensus main node splits proposed data to be consensusinto data blocks corresponding to consensus backup nodes based on an erasure code technology, and the data blocks split from the proposed data correspond to hash values obtained through calculation based on the erasure code technology; the consensus master node sends the data blocks split by the proposed data to the corresponding consensus backup nodes, receives the consensus backup node of the data block sent by the consensus main node, and forwards the data block to other consensus backup nodes; the consensus master node initiates consensus of the proposed data based on a practical Byzantine fault-tolerant PBFT protocol so as to send hash values of data blocks obtained by splitting the proposed data to the consensus backup node through a message of the PBFT protocol; the consensus backup node verifies the obtained data blocks split by the proposed data based on the hash values of the data blocks in the message of the PBFT protocol so as to execute the consensus logic of the PBFT protocol on the proposed data which is successfully verified.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Electric energy meter event information copying and reading method

The invention discloses an electric energy meter event information copying and reading method, and relates to a collection method. At present, a master node can only achieve control by sending information frames to slave nodes, namely electric energy meters, one by one in a periodically polling way. The electric energy meter event information copying and reading method comprises the following steps: sending a broadcast reading event information message on a bus by the master node; actively sending corresponding event information to the master node by each electric energy meter receiving the message, and if a certain electric energy meter senses that the master node is in a conversation with another electric energy meter, randomly delaying sending; if the master node does not receive the information replied by all the smart electric energy meters within the receiving timeout period, sending the broadcast reading event information message again; if the master node still does not receive the information replied by any of the smart electric energy meters, copying and reading the unsuccessful smart electric energy meters in a roll call manner. According to the technical scheme, abnormal event information query is performed in a broadcast mode, so that the efficiency is high; when the master node is in data transmission with one electric energy meter slave node, the other slave nodes send random delay so as to avoid congestion.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +2

Method and system for determining electricity utilization maturity of regional users

The invention discloses a method and a system for determining the electricity utilization maturity of regional users. The method comprises the following steps: acquiring annual power consumption loaddata, historical annual power consumption and historical annual maximum load data of a year to be analyzed collected by a regional power consumer intelligent electric meter terminal; calculating an index representing load level maturity, an index representing power consumption behavior maturity and an index representing interaction capability maturity according to the annual power consumption loaddata, the historical annual power consumption and the historical annual maximum load data of the year to be analyzed; determining the power utilization maturity by comprehensively representing the index of the load level maturity, the index of the power utilization behavior maturity and the index of the interactive capability maturity; and uploading the power utilization maturity to a data centerfor processing by the data center. According to the method and the system for determining the electricity utilization maturity of the regional users, electricity utilization maturity analysis can becarried out on the regional power users, a large amount of data is prevented from being uploaded to a data center, and the data processing efficiency is improved.
Owner:STATE GRID CORP OF CHINA +1

Virtual installing device and method for mobile phone programs

The invention discloses a virtual installing device and method for mobile phone programs. The virtual installing device comprises an obtaining unit provided with the server-side, a running unit arranged on the server-side and used for executing file installation, running installation programs and sending operating interfaces of the installation programs to the client-side, a simulation unit arranged on the client-side and used for receiving operation instructions with respect to the operating interfaces and sending the operation instructions to the server-side, an acquisition unit arranged on the server-side and used for acquiring operation behavior information of the installation programs, and an analysis unit arranged on the server-side and used for judging whether the operation behavior information is malicious operation behavior information or not and sending the malicious operation behavior information to the client-side. The operation non-required programs are directly installed in a mobile phone is avoided through the programs installed on the server-side and by simulating and experiencing functions on the mobile phone. In addition, program behaviors are further detected, behavior analysis reports are generated, and malicious programs are prevented from being directly installed in the mobile phone.
Owner:ZHUHAI JUNTIAN ELECTRONICS TECH +3

Blockchain-oriented Internet of Things chip lightweight data encryption method

The invention belongs to the technical field of Internet of Things information security, and particularly relates to a blockchain-oriented Internet of Things chip lightweight data encryption method. The method specifically comprises the following steps: an Internet of Things terminal generates a public and private key by using a true random number, obtains a digital certificate through a certificate issuing mechanism, and exchanges a symmetric key with a block chain gateway by using an ECDH key exchange algorithm; and the blockchain gateway receives the digital certificate and the public key from the Internet of Things terminal and submits a transaction request to the alliance blockchain. And the alliance block chain uplinks the trusted device list after endorsement and sorting. And if thedata user requests to use the data, the Internet of Things terminal sends the ciphertext data to the block chain gateway and attaches an ECDSA digital signature, and the block chain gateway forwardsthe ciphertext data to the data user. And the data user queries the trusted device list on the chain and verifies the digital signature by using the trusted public key so as to ensure that the data source is real and trusted. According to the invention, credible data source, safe data transmission and credible sharing on the data link can be realized.
Owner:DALIAN UNIV OF TECH

Electricity consumption information collection system electric energy meter sensing method based on narrow band power line carrier wave

The invention discloses an electricity consumption information collection system electric energy meter sensing method based on narrow band power line carrier wave, and relates to a collection method. During the application process, if electric energy meters are increased or replaced, the change of the electric energy meter archive information cannot be reported to the main station of the collection system in time. The method comprises the following steps: (11) carrying out abbreviated addressing and automatic table searching by a collector, and forming an electric energy meter archive; (12) once the change of the electric energy meter archive is sensed by the collector, actively reporting the change information to a concentrator by a narrow band power line carrier wave channel; and (13) reporting the archive information to the main station of a collection system in time by the concentrator. The automatic sensing of carrier wave is adopted, the assembly and disassembly of electric energy meters can be found out in time, other incidents are not taken into account, and the processing is real-time. After a meter or collector is installed, the information can be reported in several seconds. The active reporting is realized, and the information replacement efficiency is improved effectively.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +2

Multi-mechanism collaborative learning system and method based on hierarchical parameter server

The invention discloses a multi-mechanism collaborative learning system based on a hierarchical parameter server. The multi-mechanism collaborative learning system comprises a central mechanism and aplurality of participation mechanisms connected with the central mechanism through a WAN network. Based on the system, the invention further discloses a multi-mechanism collaborative learning method based on the hierarchical parameter server. According to the method, the data island problem of big data is solved, the data privacy safety problem during multi-party cooperation is solved, and the problems of high communication cost, high maintenance cost, high safety risk and low resource utilization rate of an existing system are solved. On the premise of ensuring data privacy safety, efficientcommunication and efficient calculation multi-party collaborative learning is realized, and the method is suitable for cross-domain interconnection of multiple independent mechanisms and multiple datacenters. The system provided by the invention supports a platform mode and a participation mode, can be used as a platform to provide multi-party knowledge fusion service, and can also be used as a tool to support sharing cooperation among a plurality of independent mechanisms.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products