Data protection method of cnf formula in outsourcing process of sat problem solving
A data protection, formula technology, applied in digital data protection, program/content distribution protection, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0117] Such as Figure 5 As shown, the implementation steps of the CNF formula data protection method in the outsourcing of SAT problem calculation in this embodiment are as follows:
[0118] 1) Generate Husk formula S 2 , Husk formula S 2 is a CNF formula with only one satisfiable solution, and the Husk formula S 2 The assignment of the solution variable is not all 0 or all 1, and the satisfiable solution refers to the solution that makes the CNF formula true;
[0119] 2) The original CNF formula S to be solved in outsourcing will be calculated 1 , Husk formula S 2 Both, on the premise of keeping the solution space unchanged, the confusion generation has and the original CNF formula S 1 New CNF formula S for different CNF structures, and generated for recording the original CNF formula S 1 , Husk formula S 2 The variable mapping table M of the mapping relationship between the two and their variables. Each entry in the variable mapping table M includes two fields, the v...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



