Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

39 results about "48-bit" patented technology

In computer architecture, 48-bit integers can represent 281,474,976,710,656 (2⁴⁸ or 2.814749767×10¹⁴) discrete values. This allows an unsigned binary integer range of 0 through 281,474,976,710,655 (2⁴⁸ − 1) or a signed two's complement range of -140,737,488,355,328 (-2⁴⁷) through 140,737,488,355,327 (2⁴⁷ − 1). A 48-bit memory address can directly address every byte of 256 tebibytes of storage. 48-bit can refer to any other data unit that consumes 48 bits (6 octets) in width. Examples include 48-bit CPU and ALU architectures are those that are based on registers, address buses, or data buses of that size.

Lift trackless hoist capable of receiving absorption and hanging in wireless manner

The invention relates to a lift trackless hoist capable of receiving absorption and hanging in a wireless manner. A traveling vehicle with a lift and hoist frame is used to complete the functions of storing and withdrawing goods and cars which respectively has at least two rows, 2-7 layers and more than 48 bits, and a lift movement operates without a track, a control wire and an insulated control roller. In the front of the hoist, an upper switch and a lower switch are bi-injected by infrared ray to search a target, high-low points at each row and each layer are controlled by a spiral encoder, each jointed action is completed by a wireless signal transmitter and a receiver, and actuation transport is finished by power supply of a dry battery after a magnetic field is generated by a magnet. As for the product in the invention, the manufacture cost can be lowered over 1 / 3 compared with the that of other similar products, and the car or goods storage amount can be improved by over 13 times (including the channel area) in the same area. The hoist can be used for parking, storing goods, jointed manufacture and common use; and the stall platens and containers can be increased or reduced according to the requirements of cars and goods quantity, and also can be used independently. By using the hoist, land resource and human source can be saved greatly. The storing and withdrawing of the cars and goods automatically operate by a specially-assigned person via magnetic cards, passwords or fingerprints.
Owner:傅黎明

Special-purpose double production line RISC instruction system and its operation method

The invention discloses a special double-pipeline RISC instruction system. The system is provided with two pipelines which are parallel mutually, and sequentially includes an instruction fetching unit, an instruction decoding unit, an instruction execution unit, a memory accessing unit and a data writing back unit. The system uses a double pipeline RISC instruction which comprises two incorporate single pipeline instructions. The invention further provides an operation method of the special double-pipeline RISC instruction system. The method includes the following steps: two parallel pipelines are arranged, namely, the instruction fetching unit, the instruction decoding unit, the instruction execution unit, the memory accessing unit and the data writing back unit are sequentially arranged; the double pipeline RISC instruction provided with two incorporate single pipeline instructions is arranged. Using the invention, the resource waste is avoided, wherein the resource waste is caused because a plurality of resources are not used during implementing algorithms when using a general digital signal processor. In addition, the invention has the advantages that the calculation more than 24 bits (48 bits inside) is realized, at the same time, the cost is low, and the power consumption is low.
Owner:SHANGHAI BEILING

Information encryption method and information encryption device used for mobile terminal and mobile terminal

The invention provides an information encryption method and an information encryption device used for a mobile terminal and the mobile terminal. The information encryption method comprises the steps that plaintexts requiring encryption are grouped in a way that each group includes 32 bits of plaintexts; initial permutation processing is performed on each group of data after grouping so that the order of all groups of data is arranged again, and secret key permutation processing is performed on preset 48 bits of secret keys so that multiple sub-keys are generated; product transformation processing is performed according to the multiple sub-keys and each group of data after initial permutation processing so that the data after transformation processing are obtained; and inverse initial permutation is performed on the data after transformation processing so that a ciphertext of 32 bits is obtained. According to the technical scheme, the burden of computation of data encryption can be obviously reduced under the premise of guaranteeing security of data encryption so that efficiency of data encryption can be enhanced, and power consumption of the mobile terminal in data encryption can be reduced.
Owner:NANJING COOLPAD SOFTWARE TECH

Data transmission method for grid mobile terminal based on improved DES encryption algorithm

The invention relates to a data transmission method for a grid mobile terminal based on an improved DES encryption algorithm, comprising: inputting an entry parameter of a DES encryption algorithm, translating and dividing the significant digits of the key Key into two parts, creating 16 sub-keys K[j][48] having a length of 48 bits, dividing the 64-bit plaintext data into 16 copies every four bits, encrypting the order of the sub-keys after the location exchange, encrypting the plaintext data, performing S-box operation to obtain the DES encryption result of the transmission, and decrypting the information transmitted. At the same time, a right control module, an anti-theft mode and positioning service module, and a smart dialing module are added on the mobile terminal side. The inventionmakes the attacker cannot obtain the transformation situation through a large amount of plaintext, reduces the complexity and cumbersomeness of the algorithm, and makes the operation efficiency of thealgorithm basically not affected, makes the complex degree of the exhaustive attack also become more cumbersome since the sub keys change corresponding to the order of the transformation, and greatlyimproves the security of data protection.
Owner:STATE GRID SHANDONG ELECTRIC POWER COMPANY RIZHAOPOWER SUPPLY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products