Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

272 results about "Binary strings" patented technology

Binary strings. A binary string is a sequence of bytes. Unlike character strings, which usually contain text data, binary strings are used to hold non-traditional data such as pictures, voice, or mixed media. Character strings of the FOR BIT DATA subtype may be used for similar purposes. Binary strings are not associated with a code page.

Quantum cryptography

A method of establishing a shared secret random cryptographic key between a sender and a recipient using a quantum communications channel is described. The method comprises: generating a plurality of random quantum states of a quantum entity, each random state being defined by a randomly selected one of a first plurality of bases in Hilbert space, transmitting the plurality of random quantum states of the quantum entity via the quantum channel to a recipient, measuring the quantum state of each of the received quantum states of the quantum entity with respect to a randomly selected one of a second plurality of bases in Hilbert space, transmitting to the recipient composition information describing a subset of the plurality of random quantum states, analysing the received composition information and the measured quantum states corresponding to the subset to derive a first statistical distribution describing the subset of transmitted quantum states and a second statistical distribution describing the corresponding measured quantum states, establishing the level of confidence in the validity of the plurality of transmitted random quantum states by verifying that the first and second statistical distributions are sufficiently similar, deriving a first binary sting and a second binary string, correlated to the first binary string, respectively from the transmitted and received plurality of quantum states not in the subset, and carrying out a reconciliation of the second binary string to the first binary string by using error correction techniques to establish the shared secret random cryptographic key from the first and second binary strings.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP +1

Industrial Internet intrusion detection method based on flow feature map and perception hash

InactiveCN107070943AMeet the robustnessGood intrusion detection performanceData switching networksSingular value decompositionData set
The invention provides an industrial Internet intrusion detection method based on a flow feature map and perception hash for mainly solving the problems of low detection performance and poor adaptability of the existing industrial Internet intrusion detection method. The industrial Internet intrusion detection method draws lessons from an image processing method and comprises the following steps: firstly obtaining a standard test bed experimental data set, performing feature selection by using an information entropy method to construct a flow feature vector, and performing a normalization operation on a part of attributes; then, converting the flow feature vector into a triangle area mapping matrix by using a multivariate correlation analysis method to construct the flow feature map; and finally, obtaining a hash abstract of the flow feature map by using an image perception hash algorithm based on discrete cosine transform SVD and singular value decomposition SVD, and generating an intrusion detection rule set in the form of a binary character string. Moreover, hash matching is performed by using an accurate matching method based on character strings, a similarity measurement method based on a normalized Hamming distance and a clustering analysis method based on a Euclidean distance so as to detect abnormal flow and malicious intrusion in the industrial Internet.
Owner:LANZHOU UNIVERSITY OF TECHNOLOGY

Vector dot product accumulating network supporting reconfigurable fixed floating point and configurable vector length

The invention discloses a vector dot product accumulating network supporting reconfigurable fixed floating point and configurable vector length, comprising a parallel reconfigurable multiplying unit for receiving vectors B, C, FBS and U as input, and performing vector multiplying operation to obtain multiplying result B*C of the vectors B and C; a floating point index and mantissa pre-processing part for receiving multiplying result B*C of the parallel reconfigurable multiplying unit and scalar A as input, finishing operations of selecting maximum floating point index, subtracting the indexes, shifting and aligning, complementing bits and converting and sticky compensating to obtain processed vector result B*C and scalar result A; a reconfigurable compressor for receiving processing result of the floating point index and mantissa pre-processing part, and compressing the result to obtain a sum string S and a binary string C; and a floating point index and mantissa post-processing/fixed point operating part for receiving the sum string S and the binary string C of the reconfigurable compressor, and finishing mantissa addition and post-processing to obtain a final vector dot product accumulating result.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Authority control method and system under micro-service architecture, and access token

The invention relates to a permission control method and system under a micro-service architecture, and an access token, and aims to solve the problem of low efficiency caused by frequent request of authentication service by each resource service and frequent query of a database by the authentication service to obtain current user permission information in the micro-service architecture. Accordingto the technical scheme, the method comprises the steps that a client obtains an access token which is returned by an authentication server and contains an authority bit stream, wherein the authoritybit stream is a binary string with a fixed bit number, the bit number of the binary string is determined according to the number of system authorities, each bit in the binary string is in one-to-onecorrespondence with the authority in the system, and the value of each bit represents the state of the corresponding authority; a client carries the access token to send a resource request to the APIgateway; an API gateway carries out security authentication on the access token and forwards the resource request to the corresponding micro-service after the authentication is passed, and the accesstoken is carried during forwarding; and a micro-service verifies the permission according to the value of the bit corresponding to the requested resource on the permission bit stream in the access token.
Owner:POWERCHINA HUADONG ENG COPORATION LTD +1

Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping

The invention discloses an encrypted domain H.264 / AVC video data hiding method based on CABAC binary string mapping. The encrypted domain H.264 / AVC video data hiding method based on the CABAC binary string mapping includes H.264 / AVC video encryption, encrypted domain H.264 / AVC video data hiding and hidden data extracting, to be specific, using syntax elements of a bypass coding mode in a CABAC to carry out equal-length binary string substitution to encrypt a video, hiding data through a CABAC binary string mapping method for an absolute value of a motion vector difference, wherein both the encryption and data hiding do not change the code rate of a H.264 / AVC video streaming. Both the encryption and the data hiding are finished under CABAC entropy coding and are completely compatible with the CABAC entropy coding, and the encrypted video streaming with hidden data can be decoded through a standard H.264 / AVC video decoder; a person who hides the data can directly embed secrete information in the H.264 / AVC video, even if the person who hides the data does not know the original video content, the person can effectively guarantee the video content safety and avoid the privacy disclosure problem; and in addition, the encrypted domain H.264 / AVC video data hiding method based on the CABAC binary string mapping can effectively extract the hidden data from the encrypted domain and decryption domain.
Owner:NINGBO UNIVERSITY OF TECHNOLOGY

Parallel evolution super-network DNA micro array gene data sorting system and method based on GPU

The invention provides a parallel evolution super-network DNA micro array gene data sorting system and method based on a GPU and relates to the technical field of intelligent information processing. After preprocessing on DNA micro array data is carried out, a processed binary string is used as input information of a super-network, the super-network is initialized on a CUP of a host computer, the initialized super-network is transferred to the GPU, a hyperedge bank is divided into a plurality of sets of hyperedges, evolution studies based on a genetic algorithm are executed in parallel on the GPU respectively to acquire priori knowledge, the best hyperedge with decision-making ability is searched, and the super-network after evolution carries out classification on input samples by utilizing the hyperedges together. According to the parallel evolution super-network DNA micro array gene data sorting system and method based on the GPU, super-network parallel evolution studies based on the genetic algorithm are achieved on the GPU, study time and recognition time are short, and system execution efficiency is high. The super-network can classify the samples by utilizing a plurality of singles with the decision-making ability together, and therefore system recognition rates and generalization ability are high.
Owner:博拉网络股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products