Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

57results about How to "Unpredictable" patented technology

Method for quantitatively evaluating symptoms of tremor of patient with Parkinson's disease according to approximate entropy and cross approximate entropy

The invention provides a method for quantitatively evaluating the symptoms of tremor of a patient with Parkinson's disease according to the approximate entropy and the cross approximate entropy, belonging to the fields of health care and pattern recognition. The method is characterized by comprising the following steps of: collecting the data of specified tremor of the thumb, collecting the data of specified tremor of the index finger, and grading the specified tremor of the thumb and the specified tremor of the index finger according to a UPDRS (unified Parkinson's disease rating scale); preprocessing the data of tremor; separating a sample training set from a sample testing sample; calculating the approximate entropy and the cross approximate entropy of the data of tremor; constructing the model of a classifier, and verifying the effectiveness of a method. The regularity and the synchronization of the tremor of the patient with Parkinson's disease are disclosed effectively according to the approximate entropy and the cross approximate entropy, and the symptoms of tremor can be accurately and quantitatively classified according to the tremor amplitude, the tremor frequency and other characteristics of the patient. The method is used for objectively evaluating the symptoms of tremor of the patient with Parkinson's disease, and can be applied to the fields of treatment and rehabilitation assessment of the patient with Parkinson's disease and the like.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI +1

Design method of patrol robot full-coverage traversal path planning algorithm

The invention discloses a design method of a patrol robot full-coverage traversal path planning algorithm. The method includes the following steps that: a one-dimensional Chebychev mapping is selectedas a chaotic dynamic equation, and inverse sine transformation is utilized to improve the chaotic characteristic and uniform characteristic of the chaotic dynamic equation; two inverse sine-improvedone-dimensional Chebychev mapping equations are adopted to construct a two-dimensional chaotic path planner; the patrol area of a robot is decomposed into traversable sub-regions and obstacle regions;transition sub-regions re established, and a transition algorithm is designed; the traversable sub-regions in the patrol area are connected to form a traversal sequence diagram; the patrol robot full-coverage traversal path planning algorithm is designed according to the traversal sequence diagram and the transition algorithm, and the patrol robot full-coverage traversal path planning algorithm can be used for completing a patrol task. The algorithm of the invention has the advantages of simplicity, low repetition rate and high coverage rate, and can ensure the randomness and unpredictabilityof the patrol task while ensuring full coverage of the patrol area.
Owner:SHANDONG UNIV OF TECH

Ultrahigh frequency passive radio frequency identification reader and frequency hopping method thereof

The invention discloses an ultrahigh frequency passive radio frequency identification reader which mainly comprises a frequency synthesizer, an up-conversion mixer, a down-conversion mixer and a receiving-transmitting separator, wherein the up-conversion mixer and the down-conversion mixer are connected with the frequency synthesizer; the receiving-transmitting separator is respectively connected with the up-conversion mixer and the down-conversion mixer. The ultrahigh frequency passive radio frequency identification reader is characterized in that the frequency synthesizer is also connected with a true-random number generator. The invention also discloses a frequency hopping method of the ultrahigh frequency passive radio frequency identification reader. The true-random number generator is used for controlling frequency hopping, and a working channel of each frequency hopping is decided by the true-random number generator. Because a true-random number is not generated by calculating by an algorithm but comes from physical randomness, the true-random number has unpredictability. The invention effectively overcomes the defect that an ordinary ultrahigh frequency passive radio frequency reader adopting a pseudo-random number frequency hopping is easy to be inimically tracked and interfered.
Owner:成都三零盛安信息系统有限公司

On-chip true random number generator

The invention relates to an on-chip true random number generator, which comprises a random noise generator, an AD (Analog to Digital) sampler, a noise converter and a sequence generator. The on-chip true random number generator is characterized in that an on-chip temperature sensor is used as a noise source of the true random number generator; a temperature value is converted into a digital signal through AD sampling; the digital signal obtained through sampling is subjected to noise extraction conversion, and a group of true random sequences is obtained; and finally, a plurality of groups of random sequences are assembled through the sequence generator, and true random numbers in any bit are generated. An on-chip noise signal is used as a signal source of the true random number, so the characteristics of randomness, unpredictability and the like are realized, and the generated random numbers are in uniform distribution, comfort to the characteristics of irrelevance and the like and belongs to high-quality true random numbers. The on-chip true random number generator belongs to an on-chip true random number generator realized by using an integrated circuit; the technologies of chip design production line, synchronous processing, resource reuse and the like are utilized; and the on-chip true random number generator has the advantages that the cost is low, the stability is good, the velocity is high, the realization is easy, and the like.
Owner:JIANGSU HONGYUN TECH

Oscillator and true random number generating circuit formed by same

ActiveCN104182202ASolve the problem of poor randomnessUnpredictableRandom number generatorsLow speedRandom Number Seed
The invention discloses an oscillator and a true random number generating circuit formed by the same in the field of design of an integrated circuit. The oscillator adopts a novel structure; a main loop can adopt a quadrilateral, octagonal or dodecagonal structure or other structures, i.e. a 4n-gonn structure, wherein n is an integer greater than zero. The true random number generating circuit comprises a high-speed oscillator, a low-speed oscillator, an xor circuit, a clock circuit, a system clock circuit and a sampling circuit. The oscillator provides a random source for the true random number generating circuit, forms the high-speed oscillator and the low-speed oscillator and is controlled by two external enable signals a and b; signals at the output ends of the high-speed oscillator and the low-speed oscillator are different or the high-speed oscillator and the low-speed oscillator output primary random number seeds; the clock circuit and the system clock circuit control the sampling circuit to carry out sampling on the primary random number seeds for twice so as to generate a true random number sequence; the true random number generating circuit solves the problems of poor randomness and periodic generation of the true random number sequence.
Owner:泰芯智能科技(昆山)有限公司

Ultrahigh-frequency passive radio-frequency identification reader

The invention discloses an ultrahigh-frequency passive radio-frequency identification reader, which mainly comprises a frequency synthesizer, an upper frequency conversion mixer, a lower frequency conversion mixer, a receiving separator and a transmitting separator, wherein the upper frequency conversion mixer and the lower upper frequency conversion mixer are connected with the frequency synthesizer respectively; and the receiving separator and the transmitting separator are connected with the frequency conversion mixer and the lower upper frequency conversion mixer respectively. The ultrahigh-frequency passive radio-frequency identification reader is characterized in that the frequency synthesizer is also connected with a real random number generator. According to the invention, the frequency hopping is controlled by the real random number generator and a work channel of each frequency hopping is decided by the real random number. The real random number is not generated by an algorithm but originates from the physical randomness, so that the random number has the unpredictability. By using the invention, the defect that the general ultrahigh-frequency passive radio-frequency identification reader adopting the frequency hopping of the pseudo random number is easy to collide in the same area is overcome. Meanwhile, the defects that the general radio-frequency identification reader adopting the frequency hopping of the pseudo random number is tracked and intervened with hostility easily are overcome.
Owner:成都三零盛安信息系统有限公司

Multi-anchor user connection coordination control method and device, equipment and storage medium

The invention discloses a multi-anchor user connection coordination control method and device, equipment and a storage medium, and the method comprises the steps when the anchor users of a plurality of live broadcast rooms are in a connection live broadcast state: in response to a competition request of each anchor user for a preset target object, starting a token auction process, the token auction process comprises a plurality of token auction links with limited duration, each link receives an auction index generated by each live broadcast room, and allocates the control right of the token tothe anchor user with the highest auction index; in response to an allocation instruction of the anchor user obtaining the token control right within a specified duration, summing up the logo increment of the token into a logo pool of the target anchor user; and after the token auction process is finished, opening the control right of the preset target object to the anchor user of which the totallogo meets the preset condition. According to the invention, cheating behaviors of online activities in the online live broadcast state can be prevented, and the utilization rate of background resources of the live broadcast platform can be improved.
Owner:广州方硅信息技术有限公司

Data link anti-quantum computing communication method and system based on ID cryptography and symmetric key pool

The invention provides a data link anti-quantum computing communication method and system based on ID cryptography and a symmetric key pool. The method comprises the following steps: firstly, allocating respective identity IDs and private keys to two communication parties through an ID cryptography mechanism, calculating opposite side public keys by the two communication parties respectively by utilizing the IDs disclosed by the opposite sides, and calculating symmetric keys according to the own private keys and the opposite side public keys; when the two parties with the symmetric key communicate with each other, enabling asender and areceiver to perform frequency hopping synchronization through adoption of a synchronization header method, and appoint to select at least one part of information in the synchronization header as initial information; enabling the initial information to besubjected to root key transformation by a key pool, so that the initial information acquired by the enemy becomes useless information; and then, based on a true random number key sequence in three links of root key calculation information encryption and message authentication, direct sequence spread spectrum and frequency hopping which cannot be obtained by an enemy, achieving anti-quantum calculation of data transmission, and therefore the security of the whole data link system is greatly improved.
Owner:南京如般量子科技有限公司 +1

Image encryption method based on chaotic mapping and chaotic S-box substitution

The invention provides an image encryption method based on chaotic mapping and chaotic S-box substitution in the technical field of image encryption, and the method comprises the steps: S10, obtaining a color image file, carrying out the Hash calculation, obtaining a Hash value, and calculating a system parameter based on the Hash value; step S20, generating four initial values of four-dimensional hyper-chaotic mapping based on the Hash values, and further obtaining four groups of chaotic pseudo-random sequences; s30, extracting a sequence Wz based on the chaotic pseudo-random sequence and system parameters, and generating a chaotic S box by using the sequence Wz and the S box using the AES algorithm; step S40, performing Arnold scrambling on the color image file to obtain a scrambled image, and performing byte substitution on the scrambled image by using a chaos S box to obtain a substituted image; and S50, performing image diffusion encryption on the three components of the RGB in the substitution image by using the chaos pseudo-random sequence and the system parameters to obtain three pieces of ciphertext data, and obtaining an encrypted image based on each piece of ciphertext data. The method has the advantage that the security of image encryption is greatly improved.
Owner:HUAQIAO UNIVERSITY

Highly encrypted RFID authentication system for chip fingerprints

The invention discloses a highly encrypted RFID authentication system for chip fingerprints. The highly encrypted RFID authentication system comprises a server, a terminal server, a popularization and application module, communication equipment, a client and a database, wherein the server is in control connection with the terminal server; the server is in control connection with the communication equipment and used for achieving information exchange, modification and verification; the server is in control connection with the database, the client and the communication equipment in sequence; and the server and the database are used for controlling information uploading and downloading. In this way, the highly encrypted RFID authentication system for chip fingerprints utilizes the internal physical structure of the physical entity to uniquely identify a single physical entity to realize an effective authentication thought, fully utilizes the RFID of the PUF (Physical Unclonable Function), and utilizes the characteristics of robustness, unclonability and unpredictability of the PUF at the same time, so that the highly encrypted RFID authentication system for the chip fingerprint is widely applied to the field of authentication.
Owner:苏州因缇格电子科技有限公司

Application software digital right management method, device and system

The invention discloses an application software digital right management method, device and system. The application software digital right management method includes obtaining a software downloading request sent by a client side, wherein the software downloading request includes terminal information of a request user terminal and application software identification of request software; obtaining dynamic information and application software corresponding to the application software identification according to the software downloading request, wherein the dynamic information includes accumulated downloading times of the application software after online and/or software downloading request obtaining time; encrypting the application software according to the terminal information of the request user terminal and the dynamic information; and sending the dynamic information and the encrypted application software to the client side so that when the client side installs the application software on the user terminal, the encrypted application software can be decrypted according to the dynamic information and the terminal information corresponding to the user terminal. The application software digital right management method, device and system can effectively improve application software digital right management strength.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Method and system for safely accessing to target device by changing hardware identifiers

The invention discloses a method for safely accessing to a target device by changing hardware identifiers. The method is used for sending messages from a source device to the target device, comprising that: the source device obtains a corresponding first sequence number according to the sending sequence of the messages, generates random numbers based on the first sequence number and a first seed and adds the generated random numbers to the hardware identifiers of the target device of corresponding messages; after receiving the messages, the target device obtains a second sequence number according to the receiving sequence of the messages, generates corresponding random numbers based on the second sequence number and a second seed stored in the target device so as to reduce the hardware identifiers in the messages, compares the reduced hardware identifiers with own hardware identifiers, receives the messages when the reduced hardware identifiers are in accord with own hardware identifiers, and discards the messages when the reduced hardware identifiers are not in accord with own hardware identifiers. The invention also discloses a corresponding system for safety accessing to the target device. In application of the invention, the illegal monitoring difficulty is increased by adding random numbers to the hardware identifier so as to hidden the hardware identifiers; and the device accessing safety is ensured.
Owner:ZHEJIANG UNIVIEW TECH CO LTD

Hanging dyeing and colorful Ling dyeing process manufacture method for cashmere products

InactiveCN109652997AClear hierarchyStrong three-dimensional patternDyeing processDyeingEngineering
The invention discloses a hanging dyeing and colorful Ling dyeing process manufacture method for cashmere products. The method is characterized by including the steps: firstly, hanging dyeing: (1) washing a fabric by clear water, pressing and sizing, enabling the cashmere products to be smooth, and detecting and repairing defects; (2) soaking the cashmere products into dyeing liquid, slowly lifting the cashmere products from bottom to top, and enabling the products to be gradually dyed to form a graduated color; (3) firstly hanging and dyeing the cashmere products at the temperature of 85 DEGC for 35 minutes, and secondly fixing the color of the products at the temperature of 36 DEG C; (4) dyeing; (5) fixing the color for 20 minutes after hanging and lifting are completed; (6) washing andshrinkage washing the products after fixing is completed, adding quantitative softening agent, and washing, drying and pressing; secondly, colorful Ling dyeing: (1) horizontally placing the productsaccording to nature states, dyeing the products; (2) spraying dyes on the product at random to form a flying cloud effect. The method has the characterized that the products are clear in layer, unpredictable, high in pattern stereoscopic feeling, elegant in color, noble and rich, and patterns quickly change.
Owner:赤峰东黎羊绒设备有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products