Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

578results about How to "Reduce the risk of loss" patented technology

Method for storing mass of small files on basis of master-slave distributed file system

ActiveCN103020315ATo achieve fault toleranceSolve the problem when storing a large number of small filesSpecial data processing applicationsDistributed File SystemData file
The invention discloses a method for storing a mass of small files on the basis of a master-slave distributed file system, and aims to solve the problem about storing the mass small files in the master-slave distributed file system. The technical scheme includes that the method includes that a mass small file storage system is deployed and initialized, and then small files are created and read by a SmallFileAPI (small file-application program interface) of a client side according to a command received from a keyboard. When the small files are created by a system, the SmallFileAPI creates data files of the small files according to small file paths obtained from the client side, writes in small file data and simultaneously creates small file indexes at data nodes; when the small files are read by the system, data node information corresponding to a parent directory is acquired according to the small file paths, an index request is transmitted to any of the data nodes, and finally the small file data are read from the data files according to index information. By the aid of the method, the problem about mass of storage metadata of the mass of small files is solved, writing efficiency of the mass small file storage system is improved, and reliability of the system is guaranteed.
Owner:NAT UNIV OF DEFENSE TECH

Flow rate level prediction method based on convolutional neural network deep learning

The invention provides a flow rate level prediction method based on convolutional neural network deep learning. The method comprises the following steps that: selecting an impact factor which is potentially related to the inflow flow rate of a reservoir as an input set; carrying out sample set classification and original input dataset construction; carrying out standardized processing on the original input dataset in the sample set; building a multilayer convolutional neural network; taking mean square error minimization as a loss function to determine prediction accuracy; carrying out networkparameter training; carrying out network performance testing; checking prediction accuracy; carrying out the rolling learning training on model parameters; automatically saving a learning training achievement, and automatically updating the knowledge record of a real-time library; and through a network model, carrying out calculation to obtain a final flow rate level prediction result. By use ofthe method, low-layer characteristics are combined to form high-layer characteristic fusion, so that an objective can be subjected to advanced abstract description, a data input pattern and a spatialand temporal distribution rule can be found through automatic learning, and therefore, the method can be effectively applied to the field of drainage basin water regimen forecasting.
Owner:CHANGJIANG SURVEY PLANNING DESIGN & RES

Vehicle driving service terminal system and working method thereof

ActiveCN102354405ASolve the difficult problem of determining the liability for violationsRealize acquisitionTicket-issuing apparatusRegistering/indicating working of vehiclesEngineeringVehicle driving
The invention relates to a vehicle driving service terminal system comprising a vehicle driving service terminal, a supervision server and a database server, wherein the supervision server is in communication connection with the vehicle driving service terminal and the database server. The vehicle driving service terminal can be used for collecting vehicle moving status information and storing the vehicle moving status information through a far end without being connected with a vehicle body; vehicle travel tracks and driver information are bound and stored in a far-end server, thereby reducing risk of data loss and further solving the problem that violation liability in vehicle driving services is difficult to determine; the vehicle driving service terminal is connected with the supervision server so that real-time supervision of vehicle over-speed behavior is realized; serious traffic accidents can be identified in a condition that the vehicle driving service terminal is not connected with the vehicle body by using an accident identification method based on an acceleration and GPS (Global Position System) technology; and furthermore, by using a billing method of an 'equidistant interval' sample based on the GPS technology, a billing error caused by disturbance of a GPS signal is effectively decreased and accurate billing is realized.
Owner:马龙泉

Parameter management method and system based on embedded type equipment flash memory

The invention discloses a parameter management method based on an embedded type equipment flash memory. The method comprises the following steps: according to a fixed format, parameters are encapsulated to obtain parameter data blocks; the parameter data blocks are sequentially stored in a parameter storage region; according to a parameter ID of a new parameter which is prepared to read, whether a parameter containing the same parameter ID exists in the parameter storage region is retrieved; if existing, the current parameter is marked as trash data; whether the residual space in the parameter storage region can contain the new parameter is judged; if not existing, whether the residual space in the parameter storage region can contain the new parameter is directly judged; and when the residual space in the parameter storage region can contain the new parameter, the new parameter is read in the finishing position of the last parameter in the parameter storage region. The invention also discloses a parameter management system based on the embedded type equipment flash memory; and the method and the system can improve the utilization rate of the space of the flash memory, prolong the service life of the flash memory and improve the safety in reading or modifying the parameters.
Owner:ZTE CORP

Block chain technology-based health detection data management system and method

The invention relates to the field of data management and discloses a block chain technology-based health detection data management system. The system comprises a plurality of terminal nodes, a plurality of super nodes, at least one user group and a root node server, wherein each terminal node corresponds to a service terminal device for bearing user health detection; the service terminal device is used for generating health detection data and caching the health detection data; the user group includes at least one super node; the root node server is used for converting the terminal nodes to the super nodes according to running time of the terminal nodes and system resource abundance degree, and establishing the user group; and the root node server is also used for synchronizing the health detection data stored between the super nodes in the user group. The invention also discloses a block chain technology-based health detection data management method. According to the block chain technology-based health detection data management system and the block chain technology-based health detection data management method, the safety, completeness and reliability of the user health detection data which are stored in a distributed system for a long time can be effectively guaranteed.
Owner:哈尔滨爱宁智慧科技有限公司

Mobile terminal and combined terminal device

The invention relates to mobile terminals, in particular to a mobile terminal and a combined terminal device formed by splicing the multiple mobile terminals. The mobile terminal comprises a display screen, a first side surface, a second side surface, a first magnetic attraction element and a second magnetic attraction element, the first side surface and the second side surface which are parallel are located on the two reverse sides of the display screen, the first magnetic attraction element is arranged on the first side surface, the second magnetic attraction element is arranged on the second side surface, and when another mobile terminal is spliced with the current mobile terminal, the first magnetic attraction element on the first side surface of the current mobile terminal can be attracted to the second magnetic attraction element on the second side surface of another mobile terminal so that the first side surface of the current mobile terminal can be attached to the second side surface of another mobile terminal in an aligned mode. Due to the first magnetic attraction element and the second magnetic attraction element, the mobile terminal does not need to be specially provided with inserting grooves for splicing, and accordingly the using hand feeling of the mobile terminal is kept.
Owner:ZHEJIANG GEELY HLDG GRP CO LTD +1

Safe storage system and method for off-chain data of block chain

The invention discloses a safe storage system and method for off-chain data of a block chain. The method comprises the steps of reading current off-chain data, and after preprocessing, generating a data authentication code of the current off-chain data according to a policy for generating data authentication codes, wherein the data authentication code can be used for authenticating all off-chain data; verifying the correctness of written off-chain data and the corresponding data authentication code, and writing the off-chain data which is authenticated successfully into a backup buffer area; according to a set policy for writing data into a main chain of the block chain by the system, writing the processed off-chain data on the backup buffer area into the main chain of the block chain. According to the safe storage system and method for the off-chain data of the block chain, by introducing reliable storage of a third party, the loss problem of the off-chain data is solved; by utilizing the characteristic that the data authentication code of the current off-chain data can be used for authenticating all the off-chain data, the loss risk of the off-chain data can be further reduced, the reliability and security of a block chain branching technique are improved, and meanwhile the authentication speed is increased.
Owner:北京中科锐链科技有限公司

Network information security protection system based on Internet

The invention discloses a network information security protection system based on the Internet. The network information security protection system comprises a cloud platform, a registration and loginunit, a database, an information auditing unit, an intrusion detection module, a user management module, an alarm unit and a protection unit. The method comprises the following steps: detecting systemdata through an intrusion detection module, acquiring illegal access times, virus type quantity and vulnerability quantity of a system, acquiring a system intrusion coefficient Y through a formula, and comparing the system intrusion coefficient Y with an intrusion coefficient threshold value: if the system intrusion coefficient Y is less than or equal to the intrusion coefficient threshold value,judging that intrusion does not exist in the system; generating a system security signal and sending the system security signal to the cloud platform; if the system intrusion coefficient Y is greaterthan the intrusion coefficient threshold, judging that intrusion exists in the system, generating a system danger signal and sending the system danger signal to an alarm unit. After the system is detected, viruses are eliminated before data loss of the system, so that the data security is improved, and the risk of data loss is reduced.
Owner:安徽思珀特信息科技有限公司

Blockchain data sharing encryption and decryption method, equipment, and storage medium

The invention discloses a blockchain data sharing encryption and decryption method, equipment and a storage medium, which belong to the technical field of blockchains. The blockchain data sharing encryption and decryption method comprises the steps of: creating a homomorphic proxy re-encryption key pair private key A and public key A1 by at least one first party; encrypting a plaintext a to obtaina ciphertext a1; uploading the ciphertext a1 to a blockchain; creating a homomorphic proxy re-encryption key pair private key B and public key B1 by at least one second party; encrypting a plaintextb to obtain a ciphertext b1; uploading the ciphertext b1 to the blockchain; acquiring a public key C1 from an intelligent contract of the blockchain by the first party and the second party; performingproxy re-encryption on the public key C1 and the private key A to obtain a secret key rekey A by the first party, and uploading the secret key rekey A to the blockchain; and performing proxy re-encryption on the public key C1 and the private key B to obtain a secret key rekey B by the second party, and uploading the secret key rekey B to the blockchain, wherein the intelligent contract creates akey pair private C and public key C1 through homomorphic encryption. The blockchain data sharing encryption and decryption method solves the homomorphic problem of conducting safety calculation basedon private data of the blockchain, reduces the interaction process between users and the blockchain and between the users, moves some operations under the chain to the chain, and makes calculation more credible.
Owner:湖南智慧政务区块链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products