Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

272results about How to "The result is valid" patented technology

Fast byzantine paxos

A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices, and provide a minimum of message delays between receiving a client request and providing a response, when each device within the system verifies the sender of any message it receives, and the propriety of the message. The sender can be verified through message authentication schemes or digital signature schemes. The propriety of a message can be verified by receiving a sufficiently large number of equivalent, properly authenticated messages. If the number of malicious devices is represented by the variable “M”, a sufficient number of equivalent, properly authenticated messages to verify that the message is true can be any number of messages greater than M. Furthermore, to verify that a leader device is not maliciously submitting different proposals to different devices using the same proposal number, a quorum of devices can be required to select a proposal, where a quorum is a sufficiently large number of devices such that any other quorum has, as a majority of its devices, non-malicious devices from the first quorum. Therefore, the distributed computing system can operate properly with M number of malicious failures and F number of total failures, and with a minimum of message delays, if the number of constituent devices in the distributed computing system is greater than 3F+2M. Additionally, if the distributed computing system can revert to a more traditional algorithm if too many devices fail or become malicious, it can use a message-delay-reducing algorithm while having as few as 2Q+F+2M+1 constituent devices, where Q is the number of devices that can fail and still allow the system to use a message-delay-reducing algorithm.
Owner:MICROSOFT TECH LICENSING LLC

Ceria-based mixed-metal oxide structure, including method of making and use

A homogeneous ceria-based mixed-metal oxide, useful as a catalyst support, a co-catalyst and/or a getter, is described. The mixed-metal oxide has a relatively large surface area per weight, typically exceeding 150 m<2>/g, a structure of nanocrystallites having diameters of less than 4 nm, and including pores larger than the nanocrystallites and having diameters in the range of 4 to about 9 nm. The ratio of the pore volumes, VP, to skeletal structure volumes, VS, is typically less than about 2.5, and the surface area per unit volume of the oxide material is greater than 320 m<2>/cm<3>, such that the structural morphology supports both a relatively low internal mass transfer resistance and large effective surface area for reaction activity of interest. The mixed metal oxide is made by co-precipitating a dilute metal salt solution containing the respective metals, which may include Zr, Hf, and/or other metal constituents in addition to Ce, replacing water in the co-precipitate with a water-miscible low surface-tension solvent, and relatively quickly drying and calcining the co-precipitate at moderate temperatures. A highly dispersive catalyst metal, such as Pt, may be loaded on the mixed metal oxide support from a catalyst-containing solution following a selected acid surface treatment of the oxide support. The mixed metal oxide, as catalyst support, co-catalyst or getter, is applied in various reactions, and particularly water gas shift and/or preferential oxidation reactions as associated with fuel processing systems, as for fuel cells and the like.
Owner:INT FUEL CELLS

Byzantine paxos

A distributed computing system can operate in the face of malicious failures on the part of some of its constituent devices when each device within the system verifies the sender of any message it receives, and the propriety of the message. The sender can be verified through message authentication schemes or digital signature schemes, though message authentication can provide a more computationally efficient solution. The propriety of a message can be verified by receiving a sufficiently large number of equivalent, properly authenticated messages such that, even if every malicious device transmitted a message, at least one message would have been sent by a properly functioning device. If the number of malicious devices is represented by the variable “M”, a sufficient number of equivalent, properly authenticated messages to verify that the message is true can be any number of messages greater than M. Furthermore, the receipt of more than 2M equivalent properly authenticated messages can allow the receiving device to prove the propriety of the message to any device it forwards the messages onto. The proper operation of the distributed computing system can, therefore, proceed in the face of M number of malicious failures and F number of total failures, which can include malicious and non-malicious failures, if the number of constituent devices in the distributed computing system is greater than 2F+M.
Owner:MICROSOFT TECH LICENSING LLC

User behavior analysis method and system based on big data

InactiveCN104462213AGain interest in timeEffective and accurate pushWebsite content managementSpecial data processing applicationsEngineeringContext data
The invention discloses a user behavior analysis method and system based on big data. According to the method, user behavior data are collected through a client side in real time, user behaviors and contextual information of a page URL are combined, the real scene that a user browses Web pages is reproduced to the greatest extent, comprehensive user behavior tracks are extracted, and effective data assurance is provided for analyzing the user behaviors; security assurance is provided for the user behavior data through a safety analysis module, and a user behavior data body model is used for modeling the user behaviors, so that behavior information semantic levels are shared and reused, and the interoperability and the reliability of the model are improved; the user behavior and context data are collected in real time for analysis, so that a result is more reliable; body and behavior information is stored through a column storage database, and therefore the foundation of massive data management is laid; the powerful processing capacity and the large-scale data storage capacity of the cloud computing technology, the body and a reasoning and knowledge discovery method of the body are combined, the massive user behavior data are analyzed in real time to obtain user interest in time, and then effective and accurate user push is achieved.
Owner:成都逸动无限网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products