Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

104results about How to "Flexible sharing" patented technology

Logistics management method, equipment and system based on cloud computing

The invention provides a logistics management method based on a cloud computing technology. After one or more logistics agencies and staff thereof register/login a logistics management server, the logistics management method is characterized by comprising the following steps of: registering logistics information; allocating a unique waybill number; based on the logistics information and the state of each logistics agency and the staff of the logistics agency, allocating a logistics task to an appropriate logistics agency and parties of the logistics agency; sending the logistics information and the waybill number to the terminal equipment of the parties; attaching a waybill having the waybill number or a radio frequency identification (RFID) tag, on which the waybill number is recorded, to corresponding goods; monitoring and recording the parties and position of the goods in the logistics process; providing logistics state information; and after the logistics process is finished, settling accounts. The invention also provides the logistics management server and a logistics management system. By adoption of the logistics management method, functions of tracking logistics state, sharing logistics resources and settling the accounts among a plurality of logistics companies can be realized.
Owner:BEIJING TIANDE SHITONG TECH DEV

Multi-controller dynamic deployment method of software defined spatial information network

The invention discloses a multi-controller dynamic deployment method of a software defined spatial information network. In the case of flow surge of switching nodes, the overload switch node can be migrated to an adjacent non-overload area by means of the collaboration of the controllers to realize the dynamic migration of the switch so as to reduce the processing pressure of the controllers and realize load balance of multiple controllers. A multi-target optimization method based on switch flow r, an interaction delay t and a controller volume f is provided in view of the migration problem of the overload switch by the controllers, a proper migration switch is selected according to the three parameters, and a target controller is selected according to the supportable residual load of the target controller; and with respect to the underload controller, the target is migrated by considering the requirement that the load of the other controllers can bear the migration of all switches in the underload controller, and then the underload controller is closed. By adoption of the multi-controller dynamic deployment method disclosed by the invention, the network response delay is shortened, the network throughput is improved, and the load balance among the controllers is guaranteed.
Owner:DALIAN UNIV

Book resource access control method based on ciphertext attribute authentication and threshold function

ActiveCN110912897AReduce computational and communication overheadAvoid Collusion AttacksPublic key for secure communicationInformation resourceThreshold function
The invention provides a book resource access control method based on ciphertext attribute authentication and a threshold function. The book resource access control method comprises the following steps that an authentication center and terminal members generate respective public/private key pairs; the terminal members interact with the authentication center to perform attribute authentication to obtain permission level values, and each terminal member sends the public key and the permission level value to the authentication center, and sends the public key and the permission level value to thecloud service platform after verification; the terminal member calculates an encryption key and a decryption key, encrypts the shared resource information into a ciphertext and uploads the ciphertextto the cloud service platform; and the terminal member determines a ciphertext resource to be checked according to the ciphertext, the cloud service platform verifies the identity of the ciphertext resource and opens an access link of the ciphertext resource, and the terminal member downloads the ciphertext for decryption. Personal privacy is protected by adopting a ciphertext attribute authentication technology, access permission is controlled by setting a threshold function to guarantee the safety of resource sharing, and collusion attack is prevented by adopting identity and permission dual authentication, so that information resource sharing in the Internet of Things is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Internet of Things data security sharing method based on privacy protection

The invention provides an Internet of Things data security sharing method based on privacy protection. The method comprises the following steps: initializing protocol parameters in an information sharing network domain; registering a terminal member; enabling the terminal member to acquire own attribute authority parameters, calculating encryption keys according to the Chinese remainder theorem, encrypting shared information resources and storing the encrypted information resources in an off-chain database; calculating intermediate parameters required for storing the information resources, generating index information of the shared ciphertext and packaging the index information in a block, and so on, enabling each terminal member to store related information of the ciphertext in the blockto generate a block chain; and accessing and sharing the ciphertext. Identity and attribute parameter matching dual authentication is adopted to prevent collusion attacks and protect personal privacy,an attribute matching access control strategy is combined with a block chain technology to guarantee the safety of shared resource information, the storage burden is reduced, information resource sharing in the industrial Internet of Things is more flexible, efficient and practical, and the method has important field research significance and commercial application value.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Dynamic authority access control method based on privacy protection

The invention provides a dynamic authority access control method based on privacy protection, which comprises the following steps: initializing protocol parameters in an information sharing network domain, carrying out identity authentication of hidden attributes on terminal members, and after the authentication succeeds, setting, by a data sharer, the access authority of the shared resources according to the attribute parameters of the data sharer, encrypting the shared resources and storing the encrypted shared resources into an encrypted database; searching for, by a data acquirer, the shared resource to be accessed according to a keyword, acquiring a ciphertext storage link after verifying the access authority, downloading the ciphertext resource through the link, and calculating a decryption key to decrypt and acquire the ciphertext resource; and meanwhile, updating, by a terminal member, the access authority of the terminal member by acquiring rewards or punishment and the like.Double authentication is used to prevent collusion attacks, the safety of shared resources is guaranteed, personal privacy is protected, flexible and fine-grained data resource access is achieved based on attribute matching dynamic access control, access management is greatly simplified, and resource sharing is more flexible, efficient and practical.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Optical network unit device for mutual-excitation multi-wavelength dynamic scheduling in passive optical network (PON)

The invention discloses an optical network unit device for mutual-excitation multi-wavelength dynamic scheduling in a passive optical network (PON), belonging to the technical field of optical communication. The optical network unit device comprises an uplink data transmitter, a downlink data receiver and an optical circulator, wherein the output end of the optical circulator is connected with the uplink data transmitter so as to transmit downlink data optical signals, and the input end of the optical circulator is connected with the uplink data transmitter so as to transmit uplink data optical signals; and the uplink data transmitter comprises two FP multi-longitudinal model lasers with the same model intervals, an adjustable band-pass filter, two optical circulator, an optical splitting and coupling device and a control module. Based on the mutual-excitation working mode of two FP multi-longitudinal model lasers, the invention can dynamically generate uplink optical carrier with adjustable multi-wavelength, flexibly and effectively share all uplink wavelength resources, improve the utilization rate of the uplink wavelength resources, has simple structure and low cost, and meet the development requirement on rapid increase of user uplink access capability.
Owner:SHANGHAI JIAO TONG UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products