Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

632results about How to "Reduce storage overhead" patented technology

ATM secure authentication and pre-alarming method based on face recognition

The invention discloses an ATM security certificate and a pre-warning method based on face recognition. The invention introduces face recognition and video detection into the applications of ATM and bank card business for the first time, which can obviously improve the security of ATM financial system, effectively reduce and overawe various ATM fraud and criminal activities. The complete system operation process in the method of the invention is: firstly, registering the face information of a holder at a service window which arranges an infrared face acquisition equipment or with the registration by the users themselves on ATM in bank, and saving the encrypted face information to a bank database and a bank card. Then, determining whether the ATM operator to be recognized is the holder of the bank card or not through verifying the user's identity by a face recognition engine; determining and recognizing whether existing behaviors that threaten ATM and the users though a behavior monitoring engine; and determining whether to trigger corresponding pre-warning mechanism or not according to the recognition result. The invention can extend to the applications of bank book business, public security monitoring and pursuing escaped criminals, etc.
Owner:哈尔滨维科智能系统有限公司

Improved positioning method of indoor fingerprint based on clustering neural network

The invention discloses the technical field of wireless communication and wireless network positioning, and in particular relates to an improved positioning method of an indoor fingerprint based on a clustering neural network. According to the technical scheme, the positioning method is characterized by comprising the following steps of: an offline phase: constructing a fingerprint database by fingerprint information collected from a reference point, sorting fingerprints in the fingerprint database by utilizing a clustering algorithm, and training the fingerprint and position information of each reference point by utilizing a artificial neural network model to obtain an optimized network model; and an online phase: carrying out cluster matching on the collected real-time fingerprint information and a cluster center in the fingerprint database to determine a primary positioning area, and taking the real-time fingerprint information in the primary positioning area as an input end of the neural network model of the reference point to acquire final accurate position estimation. The method has the advantages that low calculation and storage cost for the clustering artificial neural network fingerprint positioning method can be guaranteed, the positioning accuracy of the clustering artificial neural network fingerprint positioning method can be improved, and accurate positioning information is provided for users.
Owner:BEIJING JIAOTONG UNIV

Route exchange method suitable for GEO/LEO double layered constellation network

The invention discloses a route exchange method suitable for a GEO/LEO double layered constellation network. According to the method, a system period is divided into equal-duration time sections based on a dynamic boundary value; a GEO layer satellite high in on-board processing capacity is used for calculating the best route and the second best route for each LEO satellite; in the processes of information transmission and exchange, when loads of the LED satellites are large, the GEO satellite shares part of low priority services in time for the LED satellites, and it is guaranteed that important information is reliably transmitted in real time; when link congestion, node ineffectiveness and other emergency conditions happen in the satellite network, in order to avoid rerouting of the whole network, and the GEO satellite only calculates rerouting for affected routes; after link congestion is eliminated, the LED satellites recover route information in time before congestion in order to avoid link resource waste in the network. In the network that topology time varying happens, links are prone to congestion, on-board resources are limited, continuous high-load flows are prone to being generated, and nodes are prone to being ineffective at the special period, the method can reduce constellation system cost, shorten convergence time, save the on-board resources, increase the utilization rate of the link resources, guarantee that important information is reliably transmitted in real time and improve invulnerability and robustness of the satellite network.
Owner:中国人民解放军西安通信学院

Method for detecting and classifying all-network flow abnormity on line

The invention discloses a method for detecting and classifying all-network flow abnormity on line. The method comprises the following steps of: (I) acquiring network flow (NetFlow), namely, receiving a NetFlow data packet transmitted from a border router by adopting a NetFlow collector, resolving the data packet and aggregating data streams to form data suitable for statistical analysis, and transmitting the data to a central control board through network to store in a database; (II) building a flow matrix taking the entropy of flow characteristics as measure; (III) detecting the flow abnormity on line by adopting a main increment component analyzing method; and (IV) constructing sample points in four-dimensional space by utilizing residual vector acquired through on-line detection and classifying the flow abnormity on line by adopting an increment k-mean value clustering method. The method has the advantages of detecting the flow abnormity on line, classifying the flow abnormity on line in real time, meeting the requirement on the real-time detection and classification of the flow abnormity better and laying the technical foundation for subsequently defending against network attack, along with lower time complexity and storage expenditure.
Owner:中国人民解放军陆军炮兵防空兵学院

Multi-user supported searchable encryption system and method

The invention discloses a multi-user supported searchable encryption system and method and accordingly the problem that specific encrypted files cannot be searched accurately in the prior art is mainly solved. The multi-user supported searchable encryption system comprises a credible authorization center TA, service providers and users; the credible authorization center TA is formed by a system initialization module, a secret key generation and management module and a user information management module; the service providers comprise a file server and a management server; the users comprise data providers and data receivers. The multi-user supported searchable encryption method comprises the steps of system initialization, secret key distribution, file encryption, business outsourcing, file retrieval, user decryption and user logout and adding. According to the multi-user supported searchable encryption system and method, the file retrieval time of the users is shortened due to the establishment of a key word index on files, the storage and computational overhead of the users is reduced due to the accurate file retrieval, the file retrieval is accurate, meanwhile the forward and backward security of the files is ensured, and meanwhile the multi-user simultaneous decryption is supported.
Owner:西安电子科技大学昆山创新研究院 +1

Achievement method of certificate-less public key cryptosystem without bilinear pairing operation

The invention provides an achievement method of a certificate-less public key cryptosystem without bilinear pairing operation and belongs to the field of information safety. The achievement method is used for solving the problems of generation of a secret key of a user, usage and authentication of a public key of the user. According to the achievement method, firstly, a user sets a secret value and calculates a temporary public key, then a secret key generating center generates the other part of the secret key for the user and enables the two parts to be bound, and finally the user synthesizes a his/her actual public and secret key pair. The defect that public key replacement and signature counterfeit possibly exist in a common certificate-less cryptosystem is overcome, the user has complete control right on the secret key, the secret key can be revoked and re-generated, and the signature of the user has non-repudiation. The achievement method adopts a public key cryptographic algorithm of a standard elliptic curve, does not adopt the bilinear pairing operation, is few in occupied resources and high in safety and can operate without the secret key generating center when being applied to signature, authentication and secret key negotiation. By means of the achievement method, identity authentication, communication security and non-repudiation application demands of large-scale systems and low-power-consumption devices can be met.
Owner:北京百旺信安科技有限公司 +1

Efficient verifiable multi-keyword sequencing searchable encryption method supporting preference search and logic search

The invention discloses an efficient verifiable multi-keyword sequencing searchable encryption method supporting a preference search and a logic search. The encryption method comprises the following steps that a data owner encrypts a document, constructs a cryptogram index based on a document collection, generates summary information of the document by utilizing a secret key and the content of thedocument, and then sends a cryptogram document, an encrypted index and the summary information to a cloud server; a data user shares the information of the secret key, which is generated by the dataowner, generates a query trap door according to a query, and sends an encrypted query trap door and the number K of to-be-obtained documents to the cloud server; the cloud server can execute safe inner product operation after receiving the cryptogram index and the query trap door, searches for K documents most relevant to the query of the user, sequences according to relevant values among the K documents and the query, then generates verification objects, and finally returns the most relevant K documents and the verification objects to the data user, and the data user verifies the correctnessand completeness of a return result through a verification algorithm.
Owner:SOUTH CHINA UNIV OF TECH

Authentication authorization method and system

The invention discloses an authentication authorization method and an authentication authorization system and solves the problem that the traditional authentication authorization method is ineffective when the passwords are deciphered or stolen. The method includes: respectively collecting infrared image data and visible light image data on the same image; extracting the infrared characteristic information and the visible light characteristic information; carrying out characteristic integration treatment on the infrared characteristic information and the visible light characteristic information to generate the characteristic information of one image; comparing the image characteristics after being integrated with the pre-memorized image characteristics to carry out authentication authorization. Compared with the traditional password authentication authorization method, the authentication authorization method of the invention based on face identification has high safety and no dangers that the passwords are deciphered or stolen; besides, a user need not to memorize the passwords, thus being more convenient for using. The invention also discloses an authentication authorization system and a terminal system that is matched to be used. The invention can be used in the authentication process of face identification.
Owner:CHINA UNIONPAY

Method for precisely synchronizing time of industrial wireless network on basis of prediction and compensation

The invention relates to technologies for industrial wireless networks, in particular to a method for precisely synchronizing time of an industrial wireless network on the basis of prediction and compensation. The method includes constructing the factory-automation-oriented industrial wireless network into a star network on the basis of an IEEE (institute of electrical and electronics engineers) 802.11 single-hop basic service set (BBS) structure; setting a master clock and slave clocks according to types and functions of nodes in the industrial wireless network; enabling a master clock side and slave clock sides to interact with one another via two-way timestamp information and computing a time deviation value of a current synchronizing cycle; predicting a time deviation value of a next synchronizing cycle by the aid of the time deviation value of the current synchronizing cycle; compensating clock drift by the aid of the predicted time deviation value of the next synchronizing cycle and correcting the clocks. The method has the advantages that the method is implemented on the premise that application requirements of factory automation are sufficiently considered, so that high time synchronization precision can be realized by the aid of few wireless communication resources, and purposes of high precision, high efficiency, low expenditure and easiness in implementation can be achieved.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI

Method and system for carrying out multi-dimensional regional inquiry on distribution type sequence table

The invention discloses a method and a system for carrying out multi-dimensional regional inquiry on a distribution type sequence table. The method comprises the following steps of: respectively establishing a sheet of corresponding secondary index table for each index list of the distribution type sequence table, and the principal linkage of the corresponding secondary index table of each index list is a combination value of an index list value, the principal linkage of the distribution type sequence table, and the length of the index list value; and when a regional inquiry request is received, according to the field name of the inquiry request, searching a corresponding secondary index table of the field name from each secondary index table, according to the field value of the inquiry request, searching a record position corresponding to the field value of the inquiry request from a corresponding secondary index table, and directly reading corresponding data from the record position of the distribution type sequence table. According to the method and the system, a multi-dimensional regional inquiry speed can be greatly accelerated, and the requirements on high performance, low storage cost and high reliability can be met at the same time.
Owner:北京东方国信科技股份有限公司

Optimizing method for storing virtual machine mirror images based on CAS (content addressable storage)

The invention relates to an optimizing method for storing virtual machine mirror images based on CAS (content addressable storage). The method specifically comprises the following steps of adopting a CAS method to divide a virtual machine mirror image file into blocks, calculating fingerprint sequences, and judging the repetitive data through the fingerprint sequences. Only one data block is reserved for the data blocks with the same content, and the number of corresponding share times is stored in each block file. The original file is actually stored with the finger sequences (as shown in Figure 3), and the data part is stored in a shared storage system. To ensure the transparent storage of a virtual machine monitor and the portability of the shared storage system, the operation process of the virtual machine mirror images is packaged into the realizing process of a corresponding system calling and response interface by a FUSE (filesystem in user space)-based framework, so as to service a FUSE inner module to obtain an I/O (input/output) request generated by an upper-layer user operating a virtual machine, and convert the direct storage of the virtual machine mirror image files into the storage based on the CAS method. The method for eliminating the repetitive data based on the CAS has the advantages that the occupation amount of disks of the vertical machine mirror images is reduced by more than 50%, and the application prospect is wide for the current states of the large-scale application of the existing virtual machine.
Owner:BEIHANG UNIV

Query optimization method based on join index in data warehouse

The invention relates to a query optimization method based on a join index in a data warehouse. The method comprises the following steps: creating a fact table foreign key join index based on a dimension table surrogate key; creating a join index update strategy; when a predicate condition exists on a dimension table, making a predicate judgment after direct access to dimension table record through the join index, and performing calculation through a dynamic bitmap join index by reference to a bitmap join index to generate a join bitmap index; when the selection rate on the dimension table is very low, further compressing a dimension table bitmap in order to raise the cache level of dimension table bitmap calculation; and calculating simple memory address access by only using an array-bitmap data structure with a reference bitmap join index calculation method based on co-processor memory calculation. Through adoption of the query optimization method, the calculation performance of the bitmap index can be effectively increased. Moreover, the query optimization method can be combined with high-performance co-processors such as GPU and Intel Xeon Phi TM to accelerate the index calculation performance, and can be widely applied to the field of data warehouses.
Owner:RENMIN UNIVERSITY OF CHINA

Consistency maintenance device for multi-kernel processor and consistency interaction method

The invention discloses a consistency maintenance device for a multi-kernel processor and a consistency interaction method, mainly solving the technical problem of large directory access delay in a consistency interaction process for processing read-miss and write-miss by a Cache consistency protocol of the traditional multi-kernel processor. According to the invention, all kernels of the multi-kernel processor are divided into a plurality nodes in parallel relation, wherein each node comprises a plurality of kernels. When the read-miss and the write-miss occur, effective data transcription nodes closest to the kernels undergoing the read-miss and the write-miss are directly predicted and accessed according to node predication Cache, and a directory updating step is put off and is not performed until data access is finished, so that directory access delay is completely concealed and the access efficiency is increased; a double-layer directory structure is beneficial to conversion of directory storage expense from exponential increase into linear increase, so that better expandability is achieved; and because the node is taken as a unit for performing coarse-grained predication, the storage expense for information predication is saved compared with that for fine-grained prediction in which the kernel is taken as a unit.
Owner:XI AN JIAOTONG UNIV

Light-weight authentication key negotiation method based on implicit certificate

The invention relates to a light-weight authentication key negotiation method based on an implicit certificate, and belongs to the technical field of identity authentication. The method is used for establishing a secure channel between an OPC UA server and an OPC UA client and generating of a session key. Three entities, a credible certification authority (CA), the OPC UA client A and the OPC UA server B, are involved in an authentication key negotiation process. The OPC UA server B and the OPC UA client A acquire the own implicit certificates after the CA completes identity registration. Then the OPC UA server B and the OPC UA client A complete bidirectional authentication and key negotiation between the entities by using a light-weight algorithm. According to the method provided by the invention, the light-weight authentication key negotiation method based on the implicit certificate is provided aiming at the problem that an existing OPC UA security mechanism is not applicable to a resource-constrained communication environment. The method provided by the invention can be efficiently and safely applicable to an industrial network with a large amount of resource-constrained embedded OPC UA equipment.
Owner:KYLAND TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products