Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

89results about How to "Reduce the amount of data interaction" patented technology

Credible data access control method applied to cloud storage of mobile devices

The invention relates to a credible data access control method applied to cloud storage of mobile devices. The credible data access control method includes six steps including user registering, user login, secret key generation, data encryption uploading, data downloading and decryption in three stages. The first step is user registering, the second step is user login with an authentication process, the third step is encryption secret key generation, the fourth step is user data encryption uploading, the fifth step is secret key sharing among the multiple mobile devices, and the sixth step is data downloading and decryption. According to the credible data access control method, transmitting of a credible chain in the secret key exchanging process is guaranteed by a user through a mobile TPM chip, the length of a secret key is reduced through encryption based on a elliptic curve, it is guaranteed that the multiple mobile devices can safely share the secret key, compared with a traditional server terminal or client terminal data encryption method provided by a cloud storage service provider, the credible data access control method is safe, reliable, high in confidence degree and small in interaction data amount, and the good practical value and the wide application prospect are achieved in the technical field of cloud storage safety.
Owner:BEIHANG UNIV

Data integrity verifying method under multi-cloud environment

Disclosed is a data integrity verifying method under a multi-cloud environment. The data integrity verifying method comprises the following steps of preprocessing, challenging-responding, user verifying and dynamic upgrading. The first stage (preprocessing) is executed by a client side and comprises the steps of initializing, file partitioning, data label generating and file, label and public parameter storing. The second stage (challenging-responding) is an interaction process between a user and a cloud service provider, the user initiates a challenge to the cloud service provider before data upgrading or after data upgrading, a server makes a corresponding response and the user conducts integrity verifying according to the response made by the server. The third stage (user verifying) is executed by the user, when the user receives data P={P1, P2} returned by an organizer, the user obtains stored public parameters from a reliable third party, the integrity of the data stored in the cloud service provider is verified and if verification successes, accept is output and otherwise reject is output. In the fourth stage (dynamic upgrading), when the user needs to conduct dynamic operation on the data, the user works out new labels and sends the new labels to the organizer and then, the organizer conducts distributed storage.
Owner:BEIHANG UNIV

Method and system for positioning fault of power distribution network

The invention discloses a method for positioning the fault of a power distribution network. The method comprises the following steps: carrying out machine learning training on a deep neural network model frame containing a multilayer network module and a bidirectional long and short time memory network module, and obtaining an optimal deep neural network model; carrying out working condition waverecording on the power distribution network in each monitoring terminal to obtain wave recording data, and intercepting the wave recording data to obtain a fault waveform area; using the multilayer network module in the optimal deep neural network model to carry out feature extraction on the fault waveform area; uploading feature data to a system master station in each monitoring terminal, and carrying out feature data collection on the system master station, and combining the feature data of the monitoring terminals on the same transmission line into a feature data sequence according to a topological structure of the power distribution network; and inputting the feature data sequence into the bidirectional long and short time memory network module so as to obtain relative positions between each monitoring terminal and the fault point.
Owner:BEIJING INHAND NETWORKS TECH

Virtual key mutual authentication system and method

The invention relates to the technical field of communication, in particular to a virtual key two-way authentication system and method. The system comprises a terminal, which is used for generating terminal authentication request information and sending it to the locked end for authentication. If the authentication passes, the generated terminal session key is sent to the locked end for authentication. If the authentication passes, the session key editing and unlocking instruction is sent to the locked end. The locked end is used for generating the authentication request information of the locked end and sending it to the terminal for authentication. If the authentication passes, the locked end session key is generated and sent to the terminal for authentication. If the authentication passes, the locked end session key is unlocked according to the unlocking instruction sent by the terminal. An offline communication module is used for transmitting information between the terminal and the locked end. The invention does not require on-line authentication of a third party when unlocking, but directly carries out information interaction between the terminal and the locked end, reduces the sensitivity of the whole system and the method to the network, and improves the safety and reliability in the use process.
Owner:北京信长城科技发展有限公司

Quick switch method and system under protected mode in passive optical network and optical network unit

The invention discloses a quick switch method and system under the protected mode in a passive optical network and an optical network unit. The method comprises the following steps: the optical network unit stores the identifier of a protected path corresponding to the optical port of an optical line terminal and a protected path building parameter; after a service path for data communication between the optical network unit and the optical line terminal is invalid, the optical line terminal starts an available optical port and synchronizes with the optical network unit via a path corresponding to the optical port, namely a destination path; the optical line terminal sends a quick switch indication message to the optical network unit and carries the identifier of the destination path, the optical network unit extracts the protected path building parameter of the destination path according to the identifier and completes the subsequent building process with the destination path of the optical line terminal by using the protected path building parameter to enter into the operation state. The invention can reduce the switching time of the optical network unit under the protected mode, reduce the data exchange amount in switching and improve the time for the optical network unit to restore normal work to millisecond level.
Owner:ZTE CORP

Virtual key sharing system and method

The invention relates to the technical field of communications, in particular to a virtual key sharing system and method. The system comprises a user terminal, which is used for interacting with a target terminal and generating authentication information of the target terminal and authentication information of the user terminal. The target terminal is used for verifying the received authenticationinformation of the user terminal, generating a session key of the target terminal, and sending an unlocking instruction edited by the session key to the locked terminal. The locked end is used for verifying the received authentication information of the target terminal with the private key of the user terminal, generating a session key of the locked end, and unlocking according to an unlocking instruction sent by the target terminal. An offline communication module is used for transmitting information between the terminal and the locked end. The user terminal and the target terminal of the invention carry out authentication of the identity information through the interactive public key, and only if the authentication is successful, the target terminal can use the identity information of the user terminal to unlock the locked end, which has the advantages of simple structure, simple method and safe and convenient use.
Owner:北京信长城科技发展有限公司

Power information physical system joint simulation platform and synchronization method thereof

The invention discloses an electric power information physical system joint simulation platform and a synchronization method thereof, which can be used for simulating a large-scale electric power information physical system and improving the simulation efficiency while ensuring the simulation precision. According to the simulation platform and the synchronization method thereof, by storing the simulation result of each step length of the electric power simulation software into a state cache in a certain time window; acquiring a key event of a power system, sending data to communication simulation software only when the key event occurs, judging whether the state of the power system is changed or not by a simulation platform according to a simulation result of the communication simulation software, and recalling power simulation only when the state is changed and the action time is before the current simulation time, the unnecessary data interaction amount and the simulation start-stopfrequency between the electric power simulation software and the communication simulation software are reduced, the simulation precision and speed are considered, and the efficiency of joint simulation of the electric power information physical system is improved.
Owner:SOUTHEAST UNIV +1

Master control system of two-loop DC power transmission system and configuration method

The invention discloses a master control system of a two-loop DC power transmission system and a configuration method. A sending end or a receiving end of a two-loop direct current are arranged at thesame converter station, and the two-loop direct current is designed and runs independently due to factors such as stage construction and attachment to different industries; and since the two-loop direct current shares the same AC bus, and synergic control is needed on aspects of active power and reactive power. The invention proposes a two-loop DC master control system. The master control systemcomprises two parts of a stable control host and a synergic control host, wherein the stable control host and the synergic control host are independent to each other, signal interaction with a two-loop DC control system is performed, a two-loop DC active power synergic control module and a system safe and stable control module are arranged in the stable control host, and a two-loop DC reactive power synergic control module and an additive control synergic control module are arranged in the synergic control host. By reasonable host arrangement and functional allocation, and the two-loop DC synergic control can be achieved when the two-loop DC sending end or the receiving end are arranged at the same converter station.
Owner:NR ELECTRIC CO LTD +2

Screening module and screening method based on FPGA (Field Programmable Gate Array)

The invention discloses a screening module and a screening method based on an FPGA (Field Programmable Gate Array), belonging to the field of quantum secret communication, for solving the problem that great storage burden is caused as the conventional screening module and the screening method are poor in real-time property of key generation velocity and large in data interaction. The screening method comprises the following steps: calculating the times that one of two adjacent events, which meets the condition that K is either 0 or 1 through a run length encoding module, wherein the two adjacent events both meet the condition that K is neither 0 nor 1, obtaining counting result run_1en, adding an identification bit to the counting result run_1en, subsequently conveying the counting result run_1en as a run length code run1en_code to an Alice module for processing to obtain a screening code Alice_siftedkey of the Alice module, further resulting the position information of the screening code Alice_siftedkey output from the Alice module to a key extract module in a Bob module, further extracting and outputting a screening code Bob_siftedkey from a valid naked code Bob_key according to the position information result of the screening code Alice_siftedkey, and outputting the screening code to the Bob module through the screening code Bob-siftedkey. The screening module and the screening method are applicable to the field of key screening in quantum secret communication.
Owner:深圳数安智行科技有限公司

Safety management and control system and method for capital construction site

The invention discloses a safety management and control system for a capital construction site, and the system comprises a camera device which is used for shooting a monitoring image of a preset area of the capital construction site in real time, and uploading a monitoring image which is shot subsequently to operation gateway equipment if the monitoring image of the current frame is different from a pre-stored image; the operation gateway equipment is used for carrying out image recognition on the received monitoring image, obtaining abnormal condition information in a preset area and uploading the abnormal condition information to the background server; and the background server sends an alarm prompt according to the abnormal condition information. The safety management and control system is simple in equipment structure, easy to configure and install, low in operation and use cost and capable of being repeatedly used on a plurality of capital construction sites, the safety maintenance cost of the capital construction sites is reduced to a great extent, and urbanization is facilitated. The invention further provides a safety control method for the capital construction site, and the safety control method has the above beneficial effects.
Owner:GUANGDONG POWER GRID CO LTD +1

Interaction method and device based on virtual article and storage medium

The invention discloses an interaction method and device based on a virtual article and a storage medium. The method comprises the steps of: displaying a first augmented reality picture in a first terminal; in response to a virtual article placement instruction triggered by the first terminal, presenting a virtual article in the first augmented reality picture, and determining target attribute information of the virtual article, wherein the target attribute information comprises first geographic position information of a placement place of the virtual article and first scene feature information when the virtual article is placed; and sending the target attribute information. According to the embodiment of the invention, the placement of the virtual article is realized through the first terminal, the searching and receiving of the virtual article are realized through the target attribute matching of the second terminal, and the server, the remote monitoring terminal and the like store the target attribute information and forward the data, so that the operation burden and pressure of the server, the remote monitoring terminal and the like are reduced, and richer user interaction experience is provided, and the method can be widely applied to the technical field of computers.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Information synchronization method and device

The embodiment of the invention provides an information synchronization method and device. The information synchronization method comprises the steps that game information of a player located in a game scene, which is sent by a first game terminal is received, and the game information comprises game state information and player position information; a game area where the player is located currently is selected from a plurality of game areas according to the player position information to serve as a first game area; a plurality of second game areas adjacent to the first game area are determinedaccording to the adjacent relation among all game areas; information of a player located in the first game area and second game areas is obtained, the player is taken as a target player, and a game terminal corresponding to the target player is selected from a plurality of second game terminals is taken as a target game terminal; the game information is broadcasted to the target game terminal toupdate current game information displayed in the target game terminal. The information synchronization method and device can effectively reduce the bandwidth consumption and performance cost which arebrought by information synchronization when a great number of player states change.
Owner:HANGZHOU ELECTRONICS SOUL NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products