Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

78results about How to "Reduce interaction process" patented technology

Timing trigger switching method based on ephemeris and user position calculation

The invention discloses a timing trigger switching method based on ephemeris and user position calculation, and belongs to the field of low-orbit satellite communication. The working principle is as follows: (1) a gateway station receives a position and speed measurement report periodically sent by a user, (2) the gateway station calculates and judges a target wave beam/satellite/gateway station and a switching mode according to the ephemeris; (3) a delta t1 value is calculated according to the conditions of the source gateway station, the target gateway station and the switching mode, (4) a toff-treport value and a delta t2 value are calculated based on the ephemeris and the user position; (5) pre-switching judgment is carried out according to the calculated value; (6) if a pre-switchingcondition is met, a timer is established; (7), pre-switching is initiated by the gateway station according to the timing of the timer; and (8), a switching command is issued to a user by the gateway station after the timing of the timer (toff-treport-delta t1-delta t2). By means of the method, the low-orbit satellite system switching preparation stage depends on gateway station calculation, the terminal does not need to conduct neighbor cell/wave beam pilot frequency measurement, the switching problem of a small wave beam overlapping area is effectively solved, and meanwhile the method is widely applied to various scenes of the low-orbit satellite system.
Owner:成都天奥集团有限公司

Authentication method and authentication system

The application discloses an authentication method and an authentication system. The authentication method comprises the steps that: a client transmits assignment request information of a first temporary key to a client server; the client server generates first responding information comprising a user key account, the first temporary key and conversation policy information and transmits to the client after checking the assignment request information; the client transmits cloud service request information generated on base of the first responding information to the cloud server;the cloud service request information carries the user key account, the conversation policy information and a signature of the cloud service request information generated by using the first temporary key; the signature of the cloud service request information is authenticated on base of the user key account and the conversation policy information via the cloud server; after authenticating, second responding information responding to the cloud service request information is transmitted to the client. According to the implementation mode of the application, the authentication method reduces the interactive flow between the client server and the cloud server and debases the authentication press of the cloud server.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Encryption method and system of mobile instant message

The invention belongs to the technical field of instant messages and discloses an encryption method of a mobile instant message. The encryption method comprises the steps that the instant message is encrypted by a random number R; the random number R is encrypted by a public key of a password server simultaneously; the password server decrypts the random number R with a private key of the password server and encrypts the random number R with a public key of a mobile terminal of a receiver; the instant message and the random number are sent to the mobile terminal of the receiver; the mobile terminal of the receiver decrypts the random number R with a private key of the mobile terminal, and then decrypts the instant message with R; and the instant message is received and displayed. The instant message is encrypted by the random number R, and the private key R is encrypted during transmission. Confidentiality of the instant message is strengthened. Meanwhile, all password processing such as matching of a user identity with a password, and password conversion are performed on a server with higher processing capacity, so that the terminal burden is reduced, and the purposes of ensuring message transmission security and reducing the computation of the terminal are achieved. In addition, an additional communication flow is not required to be added between the terminal and the server when the encrypted message is transmitted, so that the limited wireless broadband resource is saved.
Owner:成都三零瑞通移动通信有限公司

Wireless television live broadcasting system and live broadcasting method thereof

The invention discloses a wireless television live broadcasting system and a live broadcasting method thereof. The wireless television live broadcasting system mainly comprises a live broadcasting server, a forwarding server and a user terminal, wherein the live broadcasting server is used for converting live broadcasting information into streaming media data and sending the streaming media data; the forwarding server is used for receiving the streaming media data sent by the live broadcasting server and forwarding the streaming media data according to the HTTP (Hyper Text Transport Protocol); and the user terminal is used for sending an HTTP request to the forwarding server and watching live television according to the received streaming media data after being connected with the forwarding server through wireless network. According to the television live broadcasting system and the live broadcasting method, the forwarding server sends streaming media data to the user terminal through the HTTP, so that the defect can be avoided that the traditional broadband IP access network adopts the RTSP (Real Time Streaming Protocol) / RTP (Real-time Transport Protocol) to transmit multimedia data, so that the number of file headers is large, and signalling interaction is cumbersome.
Owner:SUZHOUSNGJIA INFORMATION TECH

Blockchain data sharing encryption and decryption method, equipment, and storage medium

The invention discloses a blockchain data sharing encryption and decryption method, equipment and a storage medium, which belong to the technical field of blockchains. The blockchain data sharing encryption and decryption method comprises the steps of: creating a homomorphic proxy re-encryption key pair private key A and public key A1 by at least one first party; encrypting a plaintext a to obtaina ciphertext a1; uploading the ciphertext a1 to a blockchain; creating a homomorphic proxy re-encryption key pair private key B and public key B1 by at least one second party; encrypting a plaintextb to obtain a ciphertext b1; uploading the ciphertext b1 to the blockchain; acquiring a public key C1 from an intelligent contract of the blockchain by the first party and the second party; performingproxy re-encryption on the public key C1 and the private key A to obtain a secret key rekey A by the first party, and uploading the secret key rekey A to the blockchain; and performing proxy re-encryption on the public key C1 and the private key B to obtain a secret key rekey B by the second party, and uploading the secret key rekey B to the blockchain, wherein the intelligent contract creates akey pair private C and public key C1 through homomorphic encryption. The blockchain data sharing encryption and decryption method solves the homomorphic problem of conducting safety calculation basedon private data of the blockchain, reduces the interaction process between users and the blockchain and between the users, moves some operations under the chain to the chain, and makes calculation more credible.
Owner:湖南智慧政务区块链科技有限公司

Bluetooth networking method and system

The embodiment of the invention provides a Bluetooth networking method and system, and the method comprises the steps: obtaining a unique mark of to-be-networked first Bluetooth equipment, adding theunique mark of the to-be-networked first Bluetooth equipment into a first queue, and enabling the first queue to be used for recording the unique mark of the to-be-networked first Bluetooth equipment;selecting a second Bluetooth device from the first queue according to a preset number, generating a first broadcast message according to the unique identifier of the selected second Bluetooth deviceand the mac address of the Bluetooth base station, and broadcasting the first broadcast message, so that after receiving the first broadcast message, the Bluetooth device compares whether a unique mark corresponding to the Bluetooth device exists in the first broadcast message or not; receiving a network-accessed broadcast message replied by the second Bluetooth device, determining that the secondBluetooth device accesses the network, and moving the unique identifier of the network-accessed second Bluetooth device out of the first queue. The complexity of the processing flow of the Bluetoothdevice can be reduced, and the real-time performance of Bluetooth data transmission can be improved.
Owner:ROUTON ELECTRONICS CO LTD

Security authentication method and device and electronic equipment

The invention discloses a security authentication method and apparatus, and an electronic device. The method comprises the steps of sending a verification request to a verification terminal; receivinga first data packet and obtaining third preset data, fourth preset data, second time data, a control instruction and fifth preset data, wherein the first data packet is determined by the verificationend in response to the verification request; generating a key according to the third preset data, the fourth preset data, the second time data and the first data packet; encrypting the control instruction and fifth preset data according to the key to generate first encrypted data; sending the first encrypted data to a verification end, so that the verification end sends the control instruction and fifth preset data to an execution end, and the execution end executes the control instruction according to the following method: judging whether the fifth preset data is the same as the built-in preset data or not; and if so, executing the control instruction. According to the invention, the interaction process can be reduced, the time delay experience is improved, and the risk of malicious power consumption caused by NFC-Key encryption and decryption behaviors triggered by fake messages of the card reader is reduced.
Owner:GEELY AUTOMOBILE INST NINGBO CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products