Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

565results about How to "Reduce communication delay" patented technology

Multifunctional V2X intelligent roadside base station system

The invention requests to protect a multifunctional V2X intelligent roadside base station system. The system comprises roadside sensing equipment, an MEC server, a high-precision positioning service module, a multi-source intelligent roadside sensing information fusion module and a 5G/LTE-V communication module. An intelligent roadside device integrating C-V2X communication, environmental perception and target recognition, high-precision positioning and the like is designed, and the problem that multi-device information fusion and integration are inconvenient in intelligent transportation is solved. In the system, a C-V2X intelligent road side system architecture and a target layer multi-source information fusion method are designed. Road side multi-source environment cooperative sensing is combined, real-time traffic scheduling of the intersection is realized by using a traffic scheduling module in the MEC server, and communication and high-precision positioning services are providedfor vehicle driving, and finally the target information after fusion processing is broadcasted to other vehicles or pedestrians through a C-V2X RSU (LTE-V2X/5G V2X and the like) according to an application layer standard data format, so the driving and traffic safety is improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Intersection bus signal priority control system and control method based on C-V2X

The invention provides an intersection bus signal priority control system and control method based on C-V2X. Instrumentation from buses to a road traffic signal control machine and interconnection between a signal control center system and a bus operation management system are supported, dynamic priority adjustment of bus signals and active bus priority are achieved, the intersection bus signal priority control system comprises the road traffic signal control machine, traffic signal lamps, a road traffic signal control system, a RSU device, a C-V2X communication base station, a V2X server, a V2X application platform, the bus operation management system and a OBU device, the OBU device uploads bus information and sends the bus information to the road traffic signal control system, the roadtraffic signal control system is in interaction with the bus operation management system and sends bus signal priority requests and estimated time of arrival to the road traffic signal control machine, and the road traffic signal control machine makes decisions to respond to the priority requests or not to respond to the priority requests, gives out a priority control strategy to adjust phase positions of the traffic signal lamps and gives bus traffic priority.
Owner:TRAFFIC MANAGEMENT RES INST OF THE MIN OF PUBLIC SECURITY

Vehicle fog data light-weight anonymous access authentication method based on blockchain assistance

The present invention provides a vehicle fog data light-weight anonymous access authentication method based on blockchain assistance, and relates to the technical field of network communication safetyof urban traffic operation management. The method comprises the steps of: arranging one witness node (WP) in a management range of each service manager (SM), initializing system parameters through antrusted center AD, and registering the SM and a OBU (On Board Unit); allowing the SM to authenticate the validity of the OBU, storing the authentication information, broadcasting an authentication result to the WP, and providing fog service to the OBU according to the authentication result by a roadside facility unit RSU; and writing the authentication result into a public account by the WP to complete OBU consensus. The vehicle fog data light-weight anonymous access authentication method based on blockchain assistance can protect the user privacy information while ensuring the identity authenticity of a vehicle user accessing the fog service so as to achieve the vehicle anonymous authentication and allow users to select the time and the frequency of replacement of the pseudonym by themselves; the non-interactive autonomous cross-domain authentication is achieved, and the communication delay is effectively reduced; and moreover, the authentication information management is simplified,and the risk that a single database is tampered is effectively avoided.
Owner:BEIJING JIAOTONG UNIV

Route configuration method and gateway after thermal migration of virtual machine in large two-layer network

The invention provides a route configuration method and a gateway after thermal migration of a virtual machine in a large two-layer network. The method includes the following steps that the gateway obtains address information of a VM migrating into a first subnet and address information of a CN performing communication with the VM; the VM thermally migrates from a second subnet into the first subnet. The gateway sends a message of requesting set-up of a channel to the CN according to the address information of the CN; the message of requesting set-up of the channel is used for requesting set-up of a channel between the gateway and the CN and configures the channel to a route from the CN to the VM. According to the route configuration method and the gateway after thermal migration of the virtual machine in the large two-layer network, the gateway sets up the channel between the gateway and the CN and configures the channel to the route between the CN and the VM by obtaining the address information of the VM migrating into the subnet where the gateway exists and the address information of the CN which performs communication with the VM and sending the message of requesting set up of the channel to the CN. The path of the route between the CN and the VM is shortened and communication delay after the thermal migration of the VM of the large two-layer network is reduced to a certain degree.
Owner:HUAWEI TECH CO LTD

Node discovering method and system in communication network

The invention provides a node discovering method and a node discovering system in a communication network. The method comprises the following steps that a source node sends discovery request messages to a next hop of node, and the discovery request messages carry the address information of the source node, the identity information of the source node, the address information of a target node and the challenge value generated by the source node; a node receiving the discovery request messages returns verification information, submitted to the source node by the node, to the source node; whether the node is a target node or not is judged according to the address information, and if the node is not the target node, the discovery request messages are transferred to the next hop of node of the node; after the source node receives the verification information returned by the target node, each node is verified according to the verification information submitted by each node; if the verification is completely passed, each node is determined to be trusted nodes. The method and the system provided by the invention have the advantages that the safety and the reliability of the communication transmission between network equipment can be ensured, and the communication delay is reduced.
Owner:INST OF INFORMATION ENG CAS +1

Parallel Processing

A system and methods comprising a plurality of leaf nodes in communication with one or more branch nodes, each node comprising a processor. Each leaf node is arranged to obtain data indicative of a restriction A|IS of a linear map from Rn to Rm represented by a first matrix, A, to a subspace IS of Rn and to carry out a calculation of data indicative of at least a leading part of the SVD of a matrix representation of the restriction A|IS. One or more of the plurality of leaf nodes or branch nodes is arranged to use results of the calculations to compute data indicative of a subspace OS of each node input subspace IS and to pass that data and a corresponding restriction A|OS of A to one of a plurality of the one or more branch nodes. Each of the one or more branch nodes is arranged to receive data indicative of node output spaces OS1, . . . , OSk and the corresponding restrictions A|OS1, . . . , A|OSk for k≧2, to use this data to form a further node input space IS=OS1+ . . . +OSk, and to carry out a further calculation indicative of the leading part of the SVD of a matrix representation of a further restriction A|IS, of the linear map A to the further node input space IS. One or more of the one or more branch nodes is arranged to these results of the further calculations to compute data indicative of a further node output space OS of the further node input space IS and, if further processing of the data indicative of a further node output space OS is required, to pass the data indicative of the further node output space OS and a corresponding restriction A|OS of A to one or a plurality of the one or more branch nodes.
Owner:ISIS INNOVATION LTD

Method, device and system for key agreement

The invention discloses a method, a device and a system for key agreement. The method comprises the following steps: a first key agreement device receives a first key agreement request sent by a first terminal, wherein the identification information of a second terminal is contained in the first key agreement request; the first key agreement device generates a random number R1 according to the received first key agreement request and sends a second key agreement request and the random number R1 to a second key agreement device corresponding to the second terminal according to the identification information of the second terminal; the second key agreement device generates a random number R2 and sends the random numbers R1 and R2 and a third key agreement request to the second terminal; the second terminal generates a session key according to the random numbers R1 and R2; the first key agreement device receives the random number R2 sent by the second key agreement device and sends the random numbers R1 and R2 to the first terminal; and the first terminal generates a session key according to the random numbers R1 and R2 and communicates with the second terminal on the basis of the session key. Accordingly, the invention can achieve the encrypted communication between the first terminal and the second terminal.
Owner:HUAWEI TECH CO LTD

Certificateless aggregation signature LTE-R network group authentication key negotiation method

A certificateless aggregation signature LTE-R network group authentication key negotiation method comprises the following main operation steps: A, system establishment and participant registration: anentity participating in authentication completing registration at a key generation center, and obtaining public and private key information; B, initial access authentication: the user equipment beinguniformly accessed to LTE-before departure of a train; when R network is carried out, executing the certificateless signature algorithm to generate respective signatures, sending the signatures to the relay server, and the relay server executing the certificateless aggregation signature algorithm to realize rapid mutual authentication among the user equipment, the relay server and the roadside base station and negotiating to share the key; C, switching authentication: in the running process of the train, the user equipment being always stably connected with the relay server, and the relay server and the roadside base station realizing quick and frequent switching authentication by executing a certificateless signature algorithm; D, terminating the session. The method is high in authentication efficiency, low in signaling overhead and good in security.
Owner:CHINA ACADEMY OF RAILWAY SCI CORP LTD +1

Small file access method accelerated based on solid state disk for distributed file system

The invention discloses a small file access method accelerated based on a solid state disk for a distributed file system. The small file access method comprises the following steps of setting the threshold value of the size of an embedded file; when a client establishes a file, if the size of the established file is less than the threshold value of the size of the embedded file, embedding and storing the established file in a file metadata area, which is located in the solid state disk, of a metadata server as the embedded file, otherwise, storing the established file in an object storage server; when a process of the client opens the file, according to a storage position in file metadata information, responding to the access request of a user and returning an execution result by the metadata server or the object storage server. According to the small file access method, the data of a small file are directly stored in a metadata area of the solid state disk; the computing time of the storage position of the data of the small file is saved; the access communication time delay of the small file is saved; the access performance of the small file is promoted; the small file is conveniently optimized; the load of the metadata server cannot be aggravated; the overall performance of the distributed file system cannot be decreased.
Owner:NAT UNIV OF DEFENSE TECH

Adaptive rate control method based on mobility and DSRC/WAVE network relevance feedback

The invention, which belongs to the technical field of car networking communinication, relates to an adaptive rate control method based on mobility and DSRC/WAVE network relevance feedback. The method comprises establishment of a traffic flow density prediction module, a t+1 time communication interference calculation module, an SINR calculation module, a t+1 time available link bandwidth calculation module, a channel congestion cost calculating module and an adaptive message generation rate calculation module. A traffic flow density value at a next time is predicted; according to the density value of the next time, a transmitting power, and a rate, an interference module of a communication process is established, a signal to noise ratio is calculated, and an available link bandwidth of a node at the next time is predicted; on the basis of mismatching of a transmission rate and mismatching of a transmission queue length, a channel congestion cost module is established, so that a message generation rate at the next time is adjusted adaptively. According to the method, adaptive rate adjustment is carried out in advance by using the prediction technology, so that the channel congestion is avoided; and the low communication delay and the high data packet transmission rate are guaranteed with the low calculation time and cost.
Owner:DALIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products