Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

952results about How to "Reduce the number of interactions" patented technology

Reliable data transmission method and device thereof

The invention provides a reliable data transmission method and a device thereof. The method comprises the following steps: a data transmitting end divides a file to be transmitted into a data packets with serial numbers; according to a preset buffer data packet format, the data packets are packaged into data packets to be transmitted, and then are added to a transmission buffer area: the data packets to be transmitted in the transmission buffer area are transmitted in sequence; the data packets confirmed at a data receiving end in the transmission buffer area are deleted; whether the stoppingtime of the data packets in the transmission buffer area is over a preset time threshold or not is judged, and if so, the data packets are reset to be the data packets to be transmitted; and the transmission process is repeated. In the scheme of the invention, as only the data format and the transmission process at the transmitting end and the receiving of the data packets are controlled, no special data packets are needed to be transmitted between the transmitting end and the receiving end to carry out handshake connection operation, and under the condition that the system expense is less and the data transmission efficiency is high, the problem that the existing UDP (User Datagram Protocol) can not reliably transmit the data can be solved.
Owner:厦门市美亚柏科信息安全研究所有限公司

Safety data repetition removing method and system applicable to backup system

The invention discloses a safety data repetition removing method applicable to a backup system. The method includes the following steps that a backup request submitted by a user is received; all files needing backup are partitioned and multiple data blocks of different sizes are obtained; the Hash algorithm is used for calculating the Hash value F1 of each data block, wherein the Hash values F1 serve as encrypting keys of the data blocks; the Hash algorithm is used again for calculating the Hash value F2 of the Hash value F1 of each data block, wherein the Hash values F2 serve as fingerprints of the data blocks to identify repeated data blocks and the classic encryption algorithm and a private key of the user are used for encrypting the Hash values F1 of the data blocks to obtain ciphertexts E (F1) of the Hash values F1 of the data in order to protect the encrypting keys of the data blocks. All the data block fingerprints F2 and the like are packaged in sequence into fingerprint segments which are transmitted to a storage server. The SSL protocol is adopted in all communication processes. According to the safety data repetition removing method applicable to the backup system, the safety data repetition removing method is adopted to ensure that storage safety problem that data are lost or tampered is solved under the condition that the data repetition removing rate is not changed.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for realizing local file system through object storage system

InactiveCN107045530AReduce the number of interactionsImprove the performance of accessing swift storage systemSpecial data processing applicationsApplication serverFile system
The invention discloses a method for realizing a local file system through an object storage system. A metadata cache algorithm of the file system and a memory description structure are adopted, so that the interactive frequency of an application and a background of a swift storage system is reduced and the performance of accessing the swift storage system by the application is improved; a policy of pre-allocating a memory pool and recovering idle memory blocks in batches in a delayed manner is adopted, so that the efficiency of traversing a directory comprising a large amount of subdirectories and files is improved; a memory description structure of an open file handle is adopted, so that the application can efficiently perform file reading-writing operation; a pre-reading policy is adopted, so that the frequency of network interaction between an application server and a swift storage back end is effectively reduced and the reading performance of the file system is improved; and a zero copying and block writing policy is adopted, so that no any data copying and caching exist in a file writing process, system call during each write is a complete block writing operation, and the file writing efficiency is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Data processing method and apparatus

Embodiments of the present invention provide a data processing method and apparatus. The data processing method comprises: receiving a trigger request of a user for a target picture in a webpage; determining a tag of interest of the user according to a historical access record of the user; according to an industry category of the target picture, determining an entity object matched with the tag of interest of the user in a site corresponding to the webpage, wherein the entity object is used for performing recommendation associated with the tag of interest to the user; and calling the entity object in the webpage and displaying the entity object. According to the method and apparatus provided by the embodiments of the present invention, the product matched with the tag of interest of the user can be directly found, so that product information that interests the user can be directly output to the user. The process precisely orients the demand of the user, reduces the number of interaction times obviously compared with the prior art, shortens consumed duration, improves data processing efficiency, provides information desired by the user for the user rapidly and precisely, reduces a website bounce rate and improves a conversion rate of advertisements in the website.
Owner:BEIJING SOGOU TECHNOLOGY DEVELOPMENT CO LTD

Outsourcing encrypted data-orientated verifiable intersection operation method and system

The invention relates to an outsourcing encrypted data-orientated verifiable intersection operation method and system and belongs to the verifiable outsourcing computation field. The method is carried out among a third-party trusted entity, at least two client entities and an outsourcing server side; the client entities are holders of data sets and requesters of data set intersection operation; the third-party entity is mainly responsible for the initialization and distribution of common parameters; the two client entities are mainly responsible for generating keys, encrypting data sets, calculating authentication information, verifying results and proofs returned by the outsourcing server side and decrypting an ciphertext data set returned by the outsourcing server side; the outsourcing server side is mainly responsible for performing data set intersection operation; and a plaintext data set is not required to be obtained through decryption when the outsourcing server side performs intersection operation, and the outsourcing server performs operation on a ciphertext, and therefore, the privacy of user data can be ensured. The method and system have the advantages of low frequency of interaction among the entities, low communication cost and efficient correctness verification of operation results.
Owner:NORTHEASTERN UNIV

Cross-site script vulnerability detection method based on percolation test

The invention discloses a cross-site script vulnerability detection method based on a percolation test. According to the cross-site script vulnerability detection method, the technical problem of low detection efficiency in a traditional cross-site script vulnerability detection method is solved. The technical scheme provided by the invention is that the cross-site script vulnerability detection method comprises the following steps of: firstly, acquiring a page; secondly, extracting form information and carrying out the percolation test on the extracted form; and finally, carrying out session retaining and redirection tracking. Due to the adoption of a session retaining and redirection tracking method, the conditions that the analysis for Web pages is incomprehensive are reduced, all pages of a Web site are analyzed and detected and further the automatic detection capability is improved. According to a percolation test strategy, the detection range of the XSS (Cross-Site Script) is gradually narrowed and the depth detection for the safe pages is avoided. While test statements are injected, test statements for closing HTML (Hypertext Markup Language) statements are actively constructed according to the returned page information, so that interaction frequencies with a server are reduced and the detection efficiency of the XXS vulnerabilities of large complex Websites is improved.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Method for discovering PMTU (Path Maximum Transfer Unit) and node

The invention provides a method for discovering a PMTU (Path Maximum Transfer Unit). The method comprises the following steps that: a source node searches whether PMTU routes corresponding to messages to be sent exist or not, creates or updates MTU (Maximum Transfer Unit) values of the PMTU routes to be specified values which are not more than the minimal MTU value of a system if the PMTU routes corresponding to the messages to be sent do not exist or the MTU values of the searched PMTU routes are invalid, carries out fragmentation treatment the messages to be sent by using the specified values, and sends the messages which carry PMTU detection indication; each intermediate node forwards the messages when each intermediate node receives the messages which carry the PMTU detection indication, and sends the packet-too-big messages to the source node, and carries an MTU of an output interface; and the source node receives the packet-too-big messages returned by each intermediate node, and determines the MTU values of corresponding PMTU routes according to the MTU values carried by the packet-too-big messages. The invention further provides a node. With the adoption of the method and the node provided by the invention, the problem of the loss of data messages in a PMTU learning process is solved, and the number of message interaction in the PMTU learning process is reduced.
Owner:ZTE CORP

Communication method, device and system based on combined public key cryptography system

The invention provides a communication method, device and system based on a combined public key cryptography system. The method includes the steps of obtaining a private key of a first node from a secret key generating center through the first node, obtaining identification of a second node according to an adjacent node identification list, calculating a public key of the second node according to the identification of the second node, calculating a shared secret key parameter of the first node according to the secret key of the first node and the public key of the second node, then, calculating a shared secret key of the first node according to the shared secret key parameter of the first node, generating a first secret key verification code corresponding to the shared secret key of the first node, sending shared secret key verification information with the first secret key verification code to the second node, and receiving shared secret key response information from the second node. The calculation steps can be completed offline, the number of times of interaction between the nodes is lowered, and therefore when the first node starts verification, verification can be completed in a quite short period of time, and verification efficiency is improved.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products