Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

46results about How to "Less fairness" patented technology

Identity-based anonymous authentication method and system

The invention relates to an identity-based anonymous authentication method and system. The method comprises the following steps: a server generates two partial private keys and sends the same to double parties P1 and P2 participating in the authentication respectively, wherein P1 and P2 generate a main authentication code (the formula is described in the specification) and R in an authentication process, and the privacy and reliability of the interactive information between P1 and P2 are ensured by using zero knowledge proof; after the P1 obtains the main authentication code, the P1 generatesa pseudo-address AID, generates a third temporary public key R3, calculates a final authentication code alpha, and sends the authentication information (AID, R, R3, alpha, T) the server, and the server verifies the authentication information and feeds back the authentication information to a user, after the successful completion of three times of handshake, the server can establish secure communication with the user. The identity-based anonymous authentication method and system are suitable for jointly completing identity-based distributed anonymous authentication without exposing the respective partial authentication private keys of the both parties together, the both parties holding the partial private keys must participate in the authentication at the same time, and the complete authentication private key does not need to be restored.
Owner:WUHAN UNIV

Upstream bandwidth allocation scheduling algorithm of O-OFDM (optical orthogonal frequency division multiplexing) access system

The invention discloses an upstream bandwidth allocation scheduling algorithm of an O-OFDM (optical orthogonal frequency division multiplexing) access system. The upstream bandwidth allocation scheduling algorithm comprises the following steps of collecting a bandwidth requirement of each user; comparing whether bandwidth required by the system is larger than the maximum bandwidth capable of being provided by the system or not; if yes, enabling the power consumption of the system to be minimum on the premise of ensuring the service quality of each user; otherwise, keeping the fairness of each low-priority service on the premise of ensuring the high-priority service quality; and displaying a bandwidth allocation result and the total power consumption of the system. When the bandwidth requirements of the system are smaller than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm disclosed by the invention can try hard to reduce the power consumption of the system on the premise of ensuring the bandwidth requirement of each ONU (optical network unit) so as to realize the purpose of energy saving; and when the bandwidth requirements of the system are larger than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm can effectively allocate the bandwidth resource so as to be capable of ensuring that the system has the high-priority service quality and also to be capable of ensuring the fairness of the low-priority services.
Owner:SHANGHAI JIAO TONG UNIV

Method for jointly generating SM2 digital signature by multiple parties

The invention discloses a method for jointly generating SM2 digital signature by multiple parties. The method comprises following steps that all parties P1, P2, ... , P<Tau> joining digital signaturerandomly select partial private keys x1, x2, ... , x<x>(belonging to Zn), and two partial random numbers k1, k2, ... , k<x>(belonging to Zn) and Rho1, Rho2, ... , Rho<x>(belonging to Zn); then all parties calculate through an interactive ideal function F<MULT> to obtain a public key P<pub>=(Q-G)=(Sigma<lota=1><Tau>x<lota>G-G) of SM2, and two intermediate variables R=Sigma<lota=1><Tau>k<lota>G=(r<x>,r<y>) and alpha =xRhomode n; for a message m, all parties separately calculate a hash value e=h(m) and a first signature r=r<x>+e mod n, and calculates through the interactive ideal function F<MULT>to obtain a third intermediate variable beta=Rho(k+r)mod n; and finally, all parties separately calculate a second signature s=min{alpha<-1>beta-r, n-alpha<-1>beta+r}, and outputs complete SM2 digital signature (r,s) after signature verification succeeds. Through adoption of the method, an SM2 digital signature is generated by multiple parties jointly, it is ensured that all parties do not disclose partial private keys in signing, and digital signature involves all parties, so that multi-party signature is safe and fair.
Owner:WUHAN UNIV

Ultra-dense network wireless resource allocation method based on NOMA and beam forming

The invention discloses an ultra-dense network wireless resource allocation method based on NOMA and beam forming. The method comprises the steps: combining beam forming and NOMA; enabling a base station equipped with multiple antennas to communicate with user equipment equipped with multiple single antennas; employing beam forming to improve the coverage rate and the signal to noise ratio of signals from a macro base station to a small base station; adopting NOMA in the process that the small base station transmits the signals to users, and distributing different transmission powers to the different users so as to adapt to the situation that the users cannot feed back effective network state information according to the change of the network environment. According to the invention, inter-cluster interference and intra-cluster user interference are effectively suppressed; moreover, the fairness among users is ensured to a certain extent, the throughput performance of the system is improved, and power distribution is fairly and effectively carried out, so the system has the advantages of high throughput, high signal quality and high power efficiency, simultaneous communication of alarge number of users is supported, and the system performance and the spectrum utilization rate are greatly improved.
Owner:DONGGUAN UNIV OF TECH

Energy-saving transfer path selection method for user side in heterogeneous network based on D2D relay

The invention discloses an energy-saving transfer path selection method for a user side in a heterogeneous network based on a D2D relay. A relay link is selected in a classification manner by distinguishing a network type of a relay user. When a macro base station user is selected as the relay, the power consumption proportion of the macro relay user is controlled by adopting a minimum relay powerconsumption proportion method under the condition that the total power consumption of the relay link is ensured to be minimum; and when a small base station user is selected as the relay, the power consumption of the relay user is reduced by adopting the minimum relay power consumption proportion method under the condition that the lowest energy consumption required for normal communication of the link is ensured, at the same time, the effective rate of an uplink of the small base station relay user is adjusted, and the load of the relay user accessing the surrounding small base station is balanced. The method controls the total power consumption of the relay link, reduces the power consumption of the user terminal and balances the load of the surrounding receiving base station while meeting normal communication of the user, and is suitable for a real-time communication system.
Owner:江苏三台山数据应用研究院有限公司

An Identity-Based Anonymous Authentication Method and System

The invention relates to an identity-based anonymous authentication method and system. The method comprises the following steps: a server generates two partial private keys and sends the same to double parties P1 and P2 participating in the authentication respectively, wherein P1 and P2 generate a main authentication code (the formula is described in the specification) and R in an authentication process, and the privacy and reliability of the interactive information between P1 and P2 are ensured by using zero knowledge proof; after the P1 obtains the main authentication code, the P1 generatesa pseudo-address AID, generates a third temporary public key R3, calculates a final authentication code alpha, and sends the authentication information (AID, R, R3, alpha, T) the server, and the server verifies the authentication information and feeds back the authentication information to a user, after the successful completion of three times of handshake, the server can establish secure communication with the user. The identity-based anonymous authentication method and system are suitable for jointly completing identity-based distributed anonymous authentication without exposing the respective partial authentication private keys of the both parties together, the both parties holding the partial private keys must participate in the authentication at the same time, and the complete authentication private key does not need to be restored.
Owner:WUHAN UNIV

Uplink Bandwidth Allocation and Scheduling Algorithm in Optical Orthogonal Frequency Division Multiplexing Access System

The invention discloses an upstream bandwidth allocation scheduling algorithm of an O-OFDM (optical orthogonal frequency division multiplexing) access system. The upstream bandwidth allocation scheduling algorithm comprises the following steps of collecting a bandwidth requirement of each user; comparing whether bandwidth required by the system is larger than the maximum bandwidth capable of being provided by the system or not; if yes, enabling the power consumption of the system to be minimum on the premise of ensuring the service quality of each user; otherwise, keeping the fairness of each low-priority service on the premise of ensuring the high-priority service quality; and displaying a bandwidth allocation result and the total power consumption of the system. When the bandwidth requirements of the system are smaller than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm disclosed by the invention can try hard to reduce the power consumption of the system on the premise of ensuring the bandwidth requirement of each ONU (optical network unit) so as to realize the purpose of energy saving; and when the bandwidth requirements of the system are larger than the maximum bandwidth capable of being provided by the system, the upstream bandwidth allocation scheduling algorithm can effectively allocate the bandwidth resource so as to be capable of ensuring that the system has the high-priority service quality and also to be capable of ensuring the fairness of the low-priority services.
Owner:SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products