Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

123 results about "Attribute level" patented technology

Levels Attributes. Description. levels provides access to the levels attribute of a variable. The first form returns the value of the levels of its argument and the second sets the attribute.

Systems and methods for validating design meta-data

A metadata validation process that allows for deferring object model validation until after the objects are created. The process also allows for multi-threaded processing of the validation rules, thus increasing overall performance. Validation is performed by enforcing a series of validation rules on an appropriate subject. Rules are specified according to the subject that they are validating (i.e., attribute level, association level, object level or collection level). The metadata driven validation process implements several validation types on different validation units. Correctness validation rule types ensure that a validation unit satisfies all semantic rules defined for it. Completeness validation rule types ensure that a validation unit contains all the necessary data and is ready for further use. At design time, only correctness type validation is performed. Thus, the present invention advantageously allows for incomplete objects to be created at design time. The developer, however, in this case may opt to perform completeness validation at any time. In general, a developer may opt to perform completeness and / or correctness validation at any time independent of deployment processing. In another aspect, full validation (e.g., completeness and correctness) is automatically performed on the objects during the process of creating a configuration prior to deployment.
Owner:ORACLE INT CORP

Systems and methods for validating objects models

A metadata validation process that allows for deferring object model validation until after the objects are created. The process also allows for multi-threaded processing of the validation rules, thus increasing overall performance. Validation is performed by enforcing a series of validation rules on an appropriate subject. Rules are specified according to the subject that they are validating (i.e., attribute level, association level, object level or collection level). The metadata driven validation process implements several validation types on different validation units. Correctness validation rule types ensure that a validation unit satisfies all semantic rules defined for it. Completeness validation rule types ensure that a validation unit contains all the necessary data and is ready for further use. At design time, only correctness type validation is performed. Thus, the present invention advantageously allows for incomplete objects to be created at design time. The developer, however, in this case may opt to perform completeness validation at any time. In general, a developer may opt to perform completeness and/or correctness validation at any time independent of deployment processing. In another aspect, full validation (e.g., completeness and correctness) is automatically performed on the objects during the process of creating a configuration prior to deployment.
Owner:ORACLE INT CORP

Differential private data publishing method based on wavelet transformation

The invention discloses a differential private data publishing method based on wavelet transformation. The method is characterized in that the attribute values of an original data set are generalized the values of the topmost layer in a predefined generalization tree structure, and the subdivided values of the generalization tree structure from top to bottom are used to convert the generalized attribute values into subdivided attribute values; a known index noise adding method is used on a selection algorithm for selecting attributes to perform subdivision; a wavelet transformation noise adding method is introduced into the noise adding of leaf nodes, so that the noises of the newly published data set relative to the original data set is reduced to the greatest extent under the premise that differential privacy protection is satisfied. The method has the advantages that the wavelet transformation and an index mechanism are combined to perform noise adding in a synergy manner, noise accumulation during the noise adding process of an original data set is reduced effectively, the method conforms to the definition of differential privacy protection, cost of privacy protection is reduced, and the utilization rate of the data set after differential privacy protection.
Owner:SHANGHAI JIAO TONG UNIV

Attribute-oriented protection digital identity service method and system thereof

InactiveCN103312675AMeet attribute requirementsTransmissionDigital identityData connection
The invention discloses an attribute-oriented protection digital identity service method and a system thereof, which belong to the field of information safety. The method comprises the following steps: adopting an attribute supplier and a trust supplier to jointly form a trust domain, and supplying attribute service and trust certificate service to application systems in a management domain and a user; jointly deploying an identity service supplier and the application systems in a business domain, providing identity management service to the application systems, and meanwhile, calling service of the attribute supplier in the trust domain to replace a business system to finish demand service on the user attribute. The system comprises at least one trust domain and at least one business domain; the trust domain is respectively connected with the business domain through a network; each business domain comprises the identity service supplier and a plurality of application systems in data connection with the identity service supplier; each trust domain comprises the trust supplier and the attribute supplier in data connection with the trust supplier. According to the attribute-oriented protection digital identity service method and the system thereof, on the premise of guaranteeing privacy safety of a user, the user attribute demand of business is met.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Revocable attribute-based encryption system and method for cloud storage

The invention discloses a revocable attribute-based encryption system and method for cloud storage. An attribute authorization module generates a public key and a main private key of an encryption system, and an attribute private key and an attribute group initial key of a data user; a data owner module constructs a data access structure, and obtain initial ciphertext by encrypting the plaintext;a data management module generates a attribute group key through the constructed key encryption key tree, performs re-encryption processing on the initial ciphertext to generate a ciphertext file anda ciphertext header of the ciphertext file, and stores the ciphertext file via a storage module; the data management module can also update the attribute group key after the data user module attributeis revoked, and process to obtain an updated ciphertext file. The data user module accesses the ciphertext file and decrypts the ciphertext file to obtain a plaintext corresponding to the ciphertextfile. Therefore, the attribute-level user revocation capability is implemented, the collusion attack between a revoking user and a non-revoking user can be resisted, and fixed-length ciphertext lengthand higher efficiency are achieved.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Multi-modal dialogue system and method guided by user attention

The invention discloses a multi-modal dialogue system and method guided by user attention. The multi-modal dialogue system and method can respectively encode multi-modal utterances and generate multi-modal replies by adopting a multi-modal encoder and a multi-modal decoder. The system comprises a data acquisition module, a text feature extraction module, a multi-mode encoder and a multi-mode decoder; the data acquisition module acquires text information and visual image information of the commodity; the text feature extraction module generates attention-weighted text features; the multi-mode encoder extracts visual features of the visual image by adopting a convolutional neural network model, and inputs the visual features into the classification-attribute combination tree for traversal toobtain attribute-level visual features; multi-modal decomposition bilinear pooling processing is performed on the visual features and the text features to generate multi-modal utterance vectors; themulti-modal decoder generates a context vector; and based on the context vector, a visual image and a text attribute of a certain amount of required commodity are selected, the visual image and the text attribute are decoded, and a multi-modal commodity representation is generated.
Owner:SHANDONG UNIV

Organization application permission management method and service system based on tree-shaped organization model

ActiveCN108322432AAvoid repetitive operationsSimplify the authorization operation processDigital data protectionTransmissionRights managementTree shaped
The invention discloses an organization application permission management method and service system based on a tree-shaped organization model. The method comprises the steps of: establishing the tree-shaped organization model among organizations, i.e., an organization tree, wherein each organization corresponds to one node in the organization tree; setting applications and personnel for the organizations, and according to the organizations to which the personnel belongs, setting public application access permissions of the organizations to which the personnel belongs for the corresponding personnel; and setting a corresponding attribute level for each personnel, and for each application, according to an attribute level of a user, respectively setting a corresponding access strategy, wherein each organization has a unique organization ID and a subordinate path, and the subordinate path of each organization represents positions of the organization on the organization tree, i.e., the organization IDs which need to be passed through from a root node of the organization tree to the node corresponding to the organization. According to the invention, a subordinate relationship among different hierarchies of organizations, subordinate personnel and the applications is managed by the tree-shaped organization model, and when the application permission management operation is simplified,the requirement for the access permission difference is met.
Owner:INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products