Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

374results about How to "Guaranteed randomness" patented technology

Quality safety tracing method for food processing enterprises

InactiveCN103761546ANo repeated codes appearMeet randomnessCo-operative working arrangementsDebit schemesProduction lineRelational database
The invention discloses a quality safety tracing method for food processing enterprises. The quality safety tracing method includes the steps that a laser coder generates random tracing codes according to a coding rule when a laser marking machine in a production line device is dynamically read in an on-line tagging mode; the laser marking machine carries out tracing mode marking on products on a production line, and two-dimension codes and plain codes are all marked on packages; a fixed reader is used for scanning and reading designated tagged code portions of the products; the two-dimension codes are successfully scanned and read, the tracing codes are recorded, and relevance between the tracing codes and commodity attribute information is completed; if the two-dimension codes fail to be scanned, the two-dimension codes will be removed through a removing device; the commodity tracing code information and the commodity attribute information are recorded into a relational database; after the products are packaged, package code data and product tracing code data are related; the products are stacked, stacking codes and tagged stacking codes are generated, and the stacking codes and the product package code data are related; the stacking codes are scanned, storage of the products is completed, delivery orders and the stacking codes are scanned to complete delivery, and the database records delivery information.
Owner:武汉华工赛百数据系统有限公司

Electric power system power network planning method suitable for taking wind power random characteristic into account

The invention discloses an electric power system power network planning method suitable for taking the wind power random characteristic into account includes the steps that a power network planning model taking wind power into account is constructed, limit scenes of random variable wind power output and loads are acquired, H test scenes of all the limit scenes of the output and the loads of a fan are acquired according to a Taguchi orthogonal table, variables in the Taguchi orthogonal table are horizontally converted into respective corresponding horizontal values, the horizontal value of each variable in each test scene is substituted into the power network planning model, and thus H sets of deterministic formulae are obtained; the H set of deterministic formulae are solved with an outer approximation algorithm in the MINLP problem, and then the final power network planning scheme is obtained. On the basis of obtaining the wind power output probability characteristic, the wind power output limit value is selected, the constructed model is solved through the outer approximation algorithm based on the Taguchi orthogonal table, then the electric power system power network planning method suitable for taking the wind power random characteristic into account is obtained, and thus it can be guaranteed that an electric power system can adapt to the randomness of wind power.
Owner:GUANGXI UNIV

Strong physical unclonable function of fuzzy input and output

The invention is suitable for the technical field of information safety and integrated circuits, and provides a strong physical unclonable function of fuzzy input and output. The strong physical unclonable function comprises an input fuzzy module and an output fuzzy module, wherein the input fuzzy module is used for converting input excitation through a first random characteristic circuit and inputting the converted input excitation to the physical unclonable function; and the output fuzzy module is used for converting the output response of the physical unclonable function through a second random characteristic circuit and outputting the converted output response of the physical unclonable function to outside. The physical structure of the strong physical unclonable function of fuzzy input and output is that the strong physical unclonable functions and a weak physical unclonable function are integrated on a three-dimensional integrated circuit, wherein the weak physical unclonable function is positioned between two layers of strong physical unclonable functions. Therefore, the strong physical unclonable function can effectively resist modeling attack while the randomness and the stability of the strong physical unclonable function are guaranteed.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Method for achieving three-dimensional verification code

InactiveCN103514393AGuaranteed randomnessThree-dimensional prevention method is goodDigital data authenticationArray data structureRandom noise
The invention discloses a method for achieving a three-dimensional verification code. The method comprises the steps that a three-dimensional sphere capable of rotating is drawn and each point on the spherical surface of the three-dimensional sphere is expressed through a vector; a set of noise points are randomly added to the spherical surface of the three-dimensional sphere according to a preset rule; generated characters in the verification code are projected onto the three-dimensional sphere; two points are randomly chosen from the spherical surface of the three-dimensional sphere and are connected to form a line, so that a random noise line is generated; the random noise line is displayed on a verification interface to be identified by a user. A method for drawing the three-dimensional sphere capable of rotating comprises the steps that an icosahedron is drawn and coordinates of the icosahedron are stored in an array; in terms of each triangular face, midpoints of the three sides are obtained, and the length of the vector of each midpoint is adjusted to be identical to the radius of the sphere; each triangle is divided into four parts, the icosahedron is subdivided into an eighty-face body and a three-hundred-twenty-face body according to the recursive algorithm, and by parity of reasoning, the icosahedron is divided until a body similar to the sphere is obtained.
Owner:SHANGHAI HIGH SCHOOL

Data screening method and device, and securitization loan screening method and device

The invention discloses a method for data sieving and is applied in the sieving of the data records in a database at least comprising a first data item, a second data item and a third data item. The invention comprises that: the pre-sieving is executed, the data records which can not meet the sieving requirement are get rid of to form a preselection base; the data records which meet the sieving conditions are sieved from the preselection base to form a candidate base; the content of the first data item used for random distribution control and the content of the second data item used for concentration degree control are extracted; the random distribution control is executed according to the content of the first data item, a data record is randomly sieved, then the concentration degree control is made to the data record according to the content of the second data item; if the record meets the requirement of the concentration degree, whether the content of the third data item of the data record meets the matching conditions is judged, if the content of the third data item of the data record meets the matching conditions, the data record is moved into a target database. The invention also provides a data sieving device as well as a sieving method and a sieving device for securitization loan. The invention has less time consumption and higher efficiency during the data sieving.
Owner:CHINA CONSTRUCTION BANK

Generation method and device for source independent continuous quantum random number

The invention puts forward a generation method and device for a source independent continuous quantum random number. The method comprises the following steps that: a continuous physical random source generates a continuous light field; the continuous light field is subjected to heterodyne detection, and meanwhile, two non-commutative mechanical quantities of the light field are measured, wherein the two non-commutative mechanical quantities are a component X (regular coordinate) and a component P (regular momentum); the continuous measurement results of the two mechanical quantities are discretized to independently obtain an initial random sequence under one component and a checking sequence under the other component; according to the checking sequence, the maximum entropy of a continuous random source is calculated; and through an entropy uncertainty principle and a maximum entropy calculation result, the conditional minimum entropy of the initial random sequence is obtained, and a completely random binary system true random sequence is obtained through postprocessing. By use of the method, additional random number does not need to be provided, the method does not depend on a hypothesis for sources, a "trusted" part in the physical random source can be effectively extracted, and the quantum random number is generated.
Owner:PEKING UNIV

Quadratic congruence equation-based method for resisting denial-of-service attacks of wireless network

InactiveCN102196432AReduce the number of negotiationsIncrease the number of negotiationsAssess restrictionSecurity arrangementWireless mesh networkBeacon frame
The invention discloses a quadratic congruence equation-based method for resisting denial-of-service attacks of a wireless network, which belongs to the technical field of network safety, and mainly solves the problem that the DoS (Denial-of-Service) attacks exist in a wireless access authentication process of an IEEE (Institute of Electrical and Electronic Engineers) 802.11i protocol. The method is implemented by the following steps: an AP (Access Point) adds parameters used for constructing a puzzle into a beacon frame and broadcasts the beacon frame periodically by using the beacon frame in the IEEE 802.11i protocol; a client STA (Special Temporary Authority) acquires the beacon frame, extracts puzzle parameters from the beacon frame, constructs and solves the puzzle in combination with the current global parameters of the wireless network, adds the puzzle parameters and the solution into an authentication request message, and sends an authentication request message to the AP; and the AP receives an open system authentication message of the STA, and the AP sends the authentication request message to the STA to complete the association process when the solution of the puzzle is correct, or the request of the STA is terminated. When the method is adopted, the negotiation times increased to construct the puzzle in a traditional client puzzle scheme are reduced, and the negotiation efficiency and the DoS attach resistance of the wireless access authentication protocol are improved.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products