Patents
Literature
Eureka-AI is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Eureka AI

225results about How to "Reduce computational overhead" patented technology

Efficient condition privacy protection and security authentication method in internet of vehicles

The invention discloses an efficient condition privacy protection and security authentication method in an internet of vehicles. The efficient condition privacy protection and security authentication method comprises the following steps of: system initialization, generation of pseudonym identities and signature private keys of vehicles, signing and authentication of a message and tracing of real identities of the vehicles. The vehicles carry out cooperative communication with surrounding vehicles and roadside units deployed at both sides of a road by on-board units assembled on the vehicles, driving security of the vehicles can be effectively improved, and vehicle users can more conveniently and rapidly acquire related traffic services. The efficient condition privacy protection and security authentication method disclosed by the invention not only can meet security requirements in the internet of vehicles, but also optimizes the computing process of signature generation and verification in the communication. The efficient condition privacy protection and security authentication method is greatly improved on the aspect of efficiency of computing cost, communication cost and the like, and is more applicable to communication and application in the internet of vehicles.
Owner:ANHUI UNIVERSITY

Encryption and search method for revocable keyword search public keys in cloud storage

The invention discloses an encryption and search method for revocable keyword search public keys in cloud storage and belongs to the technical field of network security. The method includes: setting system public parameters and dividing system time into z time segments, and creating a public-private key pair at a client; when data storage requests occurs, selecting a keyword collection of a data file, selecting optional symmetrical encryption algorithm to encrypt the data file, utilizing the public key and the current time segment to encrypt the keyword collection, and transmitting the encrypted keyword collection to the cloud server; when the next time segment arrives, generating keyword collection cipher again, and updating the cloud server on a server; when a keyword search request occurs, by the client, utilizing the private key and the current time segment to calculate trap door information of the keywords, transmitting the trap door information to the cloud server, and by the cloud server, obtaining the search results and sending back file cipher containing the search keywords to users. The encryption and search method is suitable for cloud storage with high safety requirements, safe, and efficient, and has the capability of revoking server search.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Agricultural product traceability system based on block chain

The invention provides an agricultural product traceability system based on a block chain. The system comprises an agricultural product big data platform, an agricultural product traceability query platform, and a 5G network; the agricultural product big data platform comprises an agricultural product growth information module, a storage information module, a processing information module and a sales information module; the agricultural product traceability query platform comprises a data restoration module, an anti-counterfeiting query module and a traceability information query module; and each module carries out data uploading and traceability query through a 5G network. According to the invention, further optimization is carried out on the basis of a traceability system based on a block chain; an agricultural product tracing system combining the advantages of a private chain and a public chain is designed. On the basis of preventing the agricultural product information from being attacked and tampered, the certified product label is further prevented from being stolen and copied, the data storage efficiency is improved, the calculation expenditure is reduced, and consumers or supervision departments can quickly position production links and responsible persons of problematic agricultural products.
Owner:上海零数众合信息科技有限公司

Road-crossing driving control method for intelligent vehicles

InactiveCN104494598ASolve the problem of passing through the intersectionAvoid wastingExternal condition input parametersVideo imageRoad crossing
A road-crossing driving control method for intelligent vehicles belongs to the technical field of unmanned driving. Firstly, a monocular camera is mounted on a rear-view mirror in an intelligent vehicle and used for collecting video images so as to perform the lane line detection, the stop line detection, the stop line distance measurement, the pedestrian detection and the traffic light identification. Afterwards, the lane virtual center line is calculated according to the lane line detection result, and the intelligent vehicle is controlled to run along the center line by means of a PD control algorithm. The distance from the stop line, the pedestrian detection result and the traffic light identification result are synthesized to make the driving decision so as to control the vehicle to move forwards or stop. By means of only one camera, the intelligent vehicle can stably and safely pass many road crossings; when a pedestrian is detected or a red traffic light is identified, the system controls the intelligent vehicle to stop within 20 cm away from the stop line; and when a green traffic light is identified and no pedestrian is detected, the system controls the intelligent vehicle to normally move or make a turn. The execution cycle is controlled within 50 ms, and thus the requirement that the driving control period is 100 ms is met.
Owner:BEIJING UNION UNIVERSITY

Secret key changing and signature updating method for cloud data audit

The invention discloses a secret key changing and signature updating method for cloud data audit. The method comprises the following steps of a before-updating stage, an updating stage and an after-updating stage. In the before-updating stage, a data owner generates an initial secret key and a signature through calculation, a cloud server obtains initial data integrity authentication parameters through calculation according to the signature of the data owner and parameters received from the third audit party, and the third audit party is used for auditing the initial data integrity authentication parameters. In the updating stage, a data owner selects a random number generation secret key, calculates a secret key needed by a shared updated signature and sends the secret key to the cloud server, and the cloud server calculates a new signature according to data and the received parameters. In the after-updating stage, the data owner generates a signature through calculation according to the new secret key generated in the updating stage, the cloud server calculates new date integrity authentication parameters, and the third audit party is used for audit. The scheme guarantees safety and reduces cost of communication between the data owner and the server end and calculation cost of the data owner.
Owner:THE THIRD RES INST OF MIN OF PUBLIC SECURITY

Compressed spectrum sensing method based on autocorrelation matrix reconstitution

The invention provides a compressed spectrum sensing method based on autocorrelation matrix reconstitution and mainly solves the problem that an existing sensing algorithm is high in sampling speed and large computation overhead. The compressed spectrum sensing method comprises that a secondary user obtains an observation sequence of a frequency spectrum environment through compressed sensing and obtains an autocorrelation matrix estimated value of Nyquist sampling by utilizing autocorrelation vector quantity of a autocorrelation matrix reconstitution Nyquist sample sequence of the observation sequence; a multi-signal classification MUSIC algorithm is adopted to obtain an estimated value of occupied channel number according to a characteristic value of the autocorrelation matrix estimated value; a characteristic spectrum is constructed according to the characteristic value and the estimated value of the occupied channel number, spectral amplitude values corresponding to characteristics of channels are added to obtain a sum, and mark numbers of the occupied channels are judged. By means of the compressed spectrum sensing method, the sampling speed of a secondary user receiving machine can be reduced, algorithm complexity at the reconstitution end is low, and spectral amplitude occupying situation in a cognitive radio system can be judged quickly.
Owner:XIDIAN UNIV

Heterogeneous polymerization signcryption method in Internet-of-things environment

The invention discloses a high-efficiency polymerization signcryption solution in an Internet-of-things environment, wherein the high-efficiency polymerization signcryption solution mainly settles theproblems of relatively small application range and relatively low practicability caused by relatively high calculation expenditure in an existing polymerization signcryption solution. The high-efficiency polymerization signcryption solution comprises the following realizing steps of 1, performing system initialization by a secret key generating center KGG and a certificate issuing mechanism CA; 2, registering a perception entity Ni in a CLC system and a user U in a PKI system to KGC and CA; 3, broadcasting a common random number and a public key certificate by the user U in the PKI system, and performing verification and receiving by the Ni; 4, selecting a message generating signcryption cryptograph by the perception entity Ni in the CLC system, transmitting the message generating signcryption cryptograph to an aggregator Nn for forming aggregated signcryption, and transmitting the aggregated signcryption to the user U by the aggregator Nn; and 5, performing polymerization de-signcryption and restoring corresponding plaintext information. The high-efficiency polymerization signcryption solution has isomerism and higher practicability. The high-efficiency polymerization signcryption solution can be used for smart home, intelligent traffic, intelligent medical service and intelligent industrial detection.
Owner:陕西链诚致远科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products