Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "Fix usability issues" patented technology

Intelligent image verification method and intelligent image verification system

The invention discloses an intelligent image verification method and an intelligent image verification system. The system comprises a data receiving module, an image code generating and verifying module, a timer module, an image data generating module, a database module, an image verification module and a data transmitting module. The data receiving module is used for receiving access requests, image verification code input and image selection sequence of a client user, the image code generating and verifying module is used for generating and verifying image verification codes, the timer module is used for performing timing and aging limiting for client access, the image data generating module is used for randomly generating prompting codes and corresponding N images, the database module is used for performing storage and index access for processing keywords, the prompting codes and image filenames, the image verification module is used for comparing the received image selection sequence of the client user with the image sequence generated by the image data generating module, and the data transmitting module is used for transmitting the image verification codes, the prompting codes, the N images and verification results to the client user, wherein the prompting codes and the N images are generated during image verification. By the aid of the intelligent image verification method and the intelligent image verification system, contradiction between usability and safety of an existing system is solved, whether the client user is a machine or not can be automatically identified, and network safety is improved.
Owner:SOUTHWEST PETROLEUM UNIV

Process threading-based copy-protection system and copy-protection storage medium

The invention relates to the technical field of copy-protection and anti-piracy of computer information security and data security, in particular to a process threading copy-protection system and a copy-protection storage medium. In the system, a copy-protection lead module, a copy-protection core module and a copy-protection loading decryption module are arranged in the copy-protection storage medium, and copy-protection information cannot be copied illegally under an arbitrary condition by virtue of cooperative operation of the three modules. The system is used for solving the problems of security, availability and usability of the information security copy-protection technology, and is applicable in multiple industries and fields, so that digital content is protected from illegal copy, stealing and piracy; the basic unit of the information security copy-protection technology is firstly locked as a process and a thread of a current basic execution unit in an operation system, and is combined with a corresponding copy-protection storage medium technology to expand all security defense lines, so that the aims of protecting data and media assets of users from illegal copy, duplication and piracy are achieved.
Owner:CHENGDU QIQIAO SOFTWARE

Method and device for generating self-defined services, computer equipment and storage medium

The embodiment of the invention discloses a method and device for generating self-defined services, computer equipment and a storage medium. The method includes the steps that a service interface obtains service requirement information; the service interface corresponds to multiple function points, the function points are correlated with a list of service plug-in instances, and the service plug-ininstances are generated through a plug-in configuration file corresponding to the service interface; the service interface obtains the service plug-in instances matched with requirement identity identifications in the list of the service plug-in instances corresponding to all the function points respectively, and obtains function point execution results corresponding to all the function points respectively according to the obtained service plug-in instances and requirement parameter information; the service interface combines the function point execution results corresponding to all the function points respectively to obtain a service processing result corresponding to the service requirement information. In the technical scheme, the method flexibly supports personalized requirements of all the services and fault isolation of all the services.
Owner:杭州贝购科技有限公司

Data hiding method based on Lagrange interpolation method and multiple clouds

The invention discloses a data hiding method based on a Lagrange interpolation method and multiple clouds, which is applied in a system under a multi-cloud environment. The system comprises four parts: a user, a client, a data uploading layer, a data downloading layer and the clouds; before data are uploaded, an information segmentation algorithm of Reed Solomon erasure codes is used for segmenting the user data on the client, the Lagrange interpolation method is then used for carrying out information hiding on each block of segmented data, and finally, each block of data is stored in a different cloud storage. During data downloading, the data only need to be obtained from part of the cloud storages, the Lagrange interpolation method is first used for carrying out hidden information recovery on each block of data, and a recovery algorithm in Reed Solomon is then used for merging the data blocks to recover the original data. The data hiding method based on the Lagrange interpolation method and the multiple clouds solves the availability problem of services and the limitation of a single cloud storage; while reducing storage spaces, the usage of the Reed Solomon algorithm can tolerate the errors of the cloud storages; the usage of the Lagrange interpolation method solves the confidentiality problem of data, protecting the privacy of user data.
Owner:WUHAN UNIV OF SCI & TECH

Dynamic self-adaptive SRAM type FPGA system fault tolerance method based on BRAM detection

The invention relates to a dynamic self-adaptive SRAM (Static Random Access Memory) type FPGA (Field Programmable Gate Array) system fault tolerance method based on BRAM detection, which belongs to the field of intelligent fault tolerance systems and comprises the following steps of: 1) dividing a reconfigurable region and a static region on an SRAM type FPGA; 2) constructing a dynamic adaptive structure fusing non-redundancy to multi-redundancy for a part of dynamic reconstruction area on the FPGA; 3) designing an SEU rate detection structure based on a BRAM embedded block, carrying out faultcounting, and detecting and correcting errors; 5) calculating a current turnover rate, and judging a redundancy scheme needing to be adopted; 6) implementing a redundancy scheme through a control unit of the FPGA system; and 7) calculating and evaluating the availability and performance of the adaptive FPGA system. Conditions in actual application of the FPGA are comprehensively considered, contradiction between availability and performance resources is balanced, an adaptive redundant structure of the FPGA system is dynamically changed according to the predicted radiation level (SEU rate), the task execution efficiency of the system is improved, the power consumption of the system without faults is reduced, and good portability is achieved.
Owner:BEIHANG UNIV

Method for designing optimal PID parameters of closed-loop control system of nuclear power plant

The invention belongs to the technical field of nuclear industry intelligent algorithm application, and particularly relates to a method for designing optimal PID parameters of a closed-loop control system of a nuclear power plant. The method comprises the following steps of: S1, determining the closed-loop control system and a controlled object needing PID parameter optimization; S2, performing nuclear power plant analogue simulation on a nuclear power plant design verification platform, and operating the closed-loop control system; S3, determining a model structure and model parameters of the controlled object, and identifying the controlled object by using a genetic algorithm to obtain model parameters for optimal identification; S4, carrying out PID parameter optimization by using a genetic algorithm to obtain the optimal PID parameters; S5, substituting the controlled object model and the optimal PID parameters into a closed-loop control system block diagram for simulation through mathematical software until the optimal PID parameters meet engineering index requirements; and S6, writing the optimal PID parameters meeting the engineering index requirements into an engineering design file. The PID parameters obtained by adopting the method can be applied to debugging and operation of the closed-loop control system of the nuclear power station.
Owner:CHINA NUCLEAR POWER ENG CO LTD

Method and system for achieving availability of RMB cashier counter on foreign trade e-commerce platform

The invention relates to a method and system for achieving the availability of an RMB cashier counter on a foreign trade e-commerce platform. The method is characterized in that through a process in which the RMB cashier counter monitors JOB (scripts), the availability of payment modes, including UnionPay payment, quick payment, third-party payment and platform account payment, can be automatically detected, and different processing procedures can be carried out according to different situations; if a bank payment mode is unavailable, whether a backup channel exists or not is detected; if the backup channel exists, automatic routing to a new bank of the backup channel is carried out for payment; and if the new bank payment mode is still unavailable, a bank payment icon is hidden. The method has the advantages that a client can freely choose an available payment mode during payment, and can give priority to the payment mode with the lowest cost, so that the user experience for foreign trade e-commerce platform payment is improved, client loss caused by slow payment and unsatisfactory experience on the platform is prevented, the availability of the RMB cashier counter on the foreign trade e-commerce platform is achieved, and operation risks of the platform are reduced.
Owner:数贸科技(北京)有限公司

Electronic certificate ex-warehouse method based on OFD format

The invention discloses an electronic certificate ex-warehouse method based on an OFD format document format. The method comprises the following steps: selecting information needing to be added according to an ex-warehouse demand, and generating an impression picture with a specified size; generating standard seal data according to the signature password technical specification and the informationrequired by the signature password technical specification; detecting whether the generated seal data meets specifications and specification standard requirements or not; the user selects a positionwhere information needs to be added for ex-warehouse; verifying the PIN code of the key disk required by the user signature; stamping the newly generated seal at a specified position; generating standard signature data according to the signature password technical specification; and according to data specification requirements of an OFD format, generating the generated seal data and signature datato a specified position in the document. According to the invention, the validity of the signature data of the original electronic certificate is ensured, other instructions and information can be added during ex-warehouse, and new seal data can be synthesized again and stamped into the electronic certificate to be delivered.
Owner:江西金格科技有限公司

An intelligent image verification method and system

The invention discloses an intelligent image verification method and an intelligent image verification system. The system comprises a data receiving module, an image code generating and verifying module, a timer module, an image data generating module, a database module, an image verification module and a data transmitting module. The data receiving module is used for receiving access requests, image verification code input and image selection sequence of a client user, the image code generating and verifying module is used for generating and verifying image verification codes, the timer module is used for performing timing and aging limiting for client access, the image data generating module is used for randomly generating prompting codes and corresponding N images, the database module is used for performing storage and index access for processing keywords, the prompting codes and image filenames, the image verification module is used for comparing the received image selection sequence of the client user with the image sequence generated by the image data generating module, and the data transmitting module is used for transmitting the image verification codes, the prompting codes, the N images and verification results to the client user, wherein the prompting codes and the N images are generated during image verification. By the aid of the intelligent image verification method and the intelligent image verification system, contradiction between usability and safety of an existing system is solved, whether the client user is a machine or not can be automatically identified, and network safety is improved.
Owner:SOUTHWEST PETROLEUM UNIV

Internet of Things search system based on artificial intelligence control and search method thereof

The invention discloses an Internet of Things search system based on artificial intelligence control. An input end of an artificial intelligence terminal is connected with an input module; an output end of the input module is connected with an input end of an execution module; an output end of the execution module is connected with an input end of an intelligent search module; an output end of theintelligent search module is connected with an input end of a database calling module; an output end of the database calling module is connected with an input end of an information acquisition module; an output end of the information acquisition module is connected with an input end of an intelligent identification module, an output end of the intelligent identification module is connected with an input end of the collection module, an output end of the collection module is connected with an input end of an intelligent extraction display module, and an output end of the intelligent extractiondisplay module is connected with an input end of the intelligent storage module. According to the invention, the problem that an Internet of Things search system is inconvenient to store is avoided,so that the Internet of Things search system can be well stored and is convenient to use next time.
Owner:GUANGDONG POWER GRID CO LTD +1

A fault-tolerant method for dynamic adaptive sram type fpga system based on bram detection

The invention relates to a dynamic adaptive SRAM type FPGA system fault-tolerant method based on BRAM detection, which belongs to the field of intelligent fault-tolerant systems and comprises the following steps: 1) dividing reconfigurable regions and static regions on the SRAM type FPGA; Part of the dynamic reconfiguration of the regional structure combines no-redundancy to multi-redundancy dynamic adaptive structure; 3) Design the SEU rate detection structure based on the BRAM embedded block, count the faults and detect and correct errors; 5) Calculate the current flip rate and judge The redundancy scheme that needs to be adopted; 6) Implement the redundancy scheme through the control unit of the FPGA system; 7) Calculate and evaluate the availability and performance of the adaptive FPGA system. The present invention comprehensively considers the situation in the actual application of the FPGA, weighs the contradiction between usability and performance resources, and dynamically changes the adaptive redundant structure of the FPGA system according to the expected radiation level (SEU rate), thereby improving the efficiency of the system when performing tasks, reducing the It ensures the power consumption of the system when there is no failure, and has good portability.
Owner:BEIHANG UNIV

A Data Hiding Method Based on Lagrange Interpolation and Cloudiness

The invention discloses a data hiding method based on a Lagrange interpolation method and multiple clouds, which is applied in a system under a multi-cloud environment. The system comprises four parts: a user, a client, a data uploading layer, a data downloading layer and the clouds; before data are uploaded, an information segmentation algorithm of Reed Solomon erasure codes is used for segmenting the user data on the client, the Lagrange interpolation method is then used for carrying out information hiding on each block of segmented data, and finally, each block of data is stored in a different cloud storage. During data downloading, the data only need to be obtained from part of the cloud storages, the Lagrange interpolation method is first used for carrying out hidden information recovery on each block of data, and a recovery algorithm in Reed Solomon is then used for merging the data blocks to recover the original data. The data hiding method based on the Lagrange interpolation method and the multiple clouds solves the availability problem of services and the limitation of a single cloud storage; while reducing storage spaces, the usage of the Reed Solomon algorithm can tolerate the errors of the cloud storages; the usage of the Lagrange interpolation method solves the confidentiality problem of data, protecting the privacy of user data.
Owner:WUHAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products