Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50 results about "Bitmessage" patented technology

Bitmessage is a decentralized, encrypted, peer-to-peer, trustless communications protocol that can be used by one person to send encrypted messages to another person, or to multiple subscribers. In June 2013, the software experienced a surge of new adoptions after news reports of email surveillance by the US National Security Agency.

Quantum key distribution after-treatment system and method based on polar code correction

The invention discloses a quantum key distribution after-treatment system and a quantum key distribution after-treatment method based on polar code correction. The system comprises a key screening module, a parameter estimation module, a polar code correction module, a consistency verification module and a privacy amplification module which are connected in sequence. The method comprises the following steps: only keeping original keys with the same base selection to form screening keys after quantum bite information is transmitted on a quantum channel; commonly selecting partial key bits from the screening keys to perform disclosed comparison; coding and decoding undisclosed key bits by adopting a system polar code algorithm under the condition that the quantum bit error rate is not higher than a safety threshold value; verifying the consistence of the corrected quantum keys by adopting cryptographic algorithm; and calculating safety information entropy and performing information compression to obtain absolutely safe key bits. The quantum key distribution after-treatment system has linear coding / decoding complexity characteristics, so that the after-treatment time delay and key length increase have linear relationship, and the after-treatment speed is improved.
Owner:JINAN UNIVERSITY

Method for generating dot matrix pattern capable of recording multiple-bit information

The invention relates to a method for generating a dot matrix pattern capable of recording multiple-bit information in the field of information processing. According to the method, a point with a website can record the multiple-bit information, only one reference dot matrix line needs to be set on a 45-degree inclination angle, correction of position printing errors on a printing machine can be achieved, and efficiency of information recording can be improved. The invention also provides another dot matrix pattern capable of recording the multiple-bit information. The gray value of the dot matrix pattern is only 1/4 the maximum gray value of a common two-dimensional bar code, in addition, the information amount is large, network addresses, anti-fake information and the like can be hidden in a commodity logo, the dot matrix pattern capable of recording the multiple-bit information is especially suitable for being recognized and read by public cell phones and can serve as a network inlet of Internet of Things, and any commodity can be connected with the network. The invention further provides a method for obtaining randomly-distributed variable information only through common printing, therefore, printing cost is reduced, anti-fake grades are improved, and popularization is facilitated.
Owner:TIANJIN APOLLO ELECTRONICS

Encoding method, encoder and decoder

Disclosed is an encoding method to change an encoding rate of an erasure correcting code, while decreasing a circuit scale of an encoder and a decoder. 12k bit (wherein k represents a natural number) which is an encoding output using LDPC-CC with an encoding rate of ½, and comprises information and parity, is defined as one cycle. From the one cycle, only the information is arranged in the output order of the encoding output to obtain 6k bit information X6i, X6i+1, X6i+2, X6i+3, X6i+4, X6i+5, . . . , X6(i+k−1) X6(i+k−1)+1, X6(i+k−1)+2, X6(i+k−1)+3, X6(i+k−1)+4, and X6(i+k−1)+5. Known information is inserted, in 3k pieces of information (Xj) among the 6k bit information, so that when 3k pieces of mutually different j is divided by 3, there is a remainder of 0 regarding k pieces, there is a remainder of 1 regarding k pieces, and there is a remainder of 2 regarding k pieces, to thereby obtain the parity from the information containing the known information.[Numerical formulas](Da1+Da2+Da3)X(D)+(Db1+Db2+Db3)P(D)=0  (1-1)(DA1+DA2+DA3)X(D)+(DB1+DB2+DB3)P(D)=0  (1-2)(Da1+Da2+Da3)X(D)+(Dss1+Dss2+Dss3)P(D)=0  (1-3)wherein X(D) is a polynomial expression of the information X; P(D) is a polynomial expression of the parity; a1, a2, a3 are integers (with the proviso that a1≠a2≠a3); b1, b2, b3 are integers (with the proviso that b1≠b2≠b3); A1, A2, A3 are integers (with the proviso that A1≠A2≠A3); B1, B2, B3 are integers (with the proviso that B1≠B2≠B3); a1, a2, a3 are integers (with the proviso that a1≠a2≠a3); ss1, ss2, ss3 are integers (with the proviso that ss1≠ss2≠ss3); and “c % d” represents “a remainder when c is divided by d”.
Owner:PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA

Physical layer security algorithm combining subcarrier grouping and exclusive-OR operation

The invention belongs to the technical field of wireless communication physical layer security, particularly relates to a physical layer security algorithm combining subcarrier grouping and exclusive-OR operation, and is suitable for a multicarrier communication network combining OFDM technical characteristics. InanOFDM system, only the channel characteristics of two legal communication parties are utilized; the subcarriers isreorderedaccording to the channel quality difference among the subcarriers of the legal user; original bit data symbols are transmitted on the subcarriers with better channel quality; exclusive-OR processing is performed on the bit information symbols transmitted by the subcarriers with poor channel quality and the bit information symbols transmitted by the subcarriers with good channel quality, and then the processed symbols is transmitted; therefore, a legal user can correctly receive and recover the data information of each subcarrier according to the transmission protocol, an eavesdropper cannot correctly recover the data information of each subcarrier, the confidentiality requirement of a physical layer is met, the channel state information of the eavesdropper does not need to be obtained by the algorithm, and the channel quality of the legal user does not need to be superior to that of an eavesdropping channel.
Owner:STATE GRID HENAN ELECTRIC POWER ELECTRIC POWER SCI RES INST +1

Improved multi-user DCSK chaotic communication system

The invention discloses an improved multi-user DCSK chaotic communication system, and belongs to the technical field of communication. A traditional differential chaos shift keying (DCSK) modulation technology is improved so as to achieve the purpose of improving the bit error rate performance. An improved chaotic signal generator is used at a sending end to generate a group of orthogonal chaoticsequences xi and k, so that each path of information signal can transmit two bits and is expanded into multiple users, and each frame of signal can transmit 2N information bits. At a receiving end, received signals ri and k are converted through an editor used by the sending end, then corresponding correlation operation is carried out, and after threshold judgment is carried out, corresponding bitinformation can be recovered, wherein the threshold judgment criterion is as follows: if the output result of the related demodulator is greater than or equal to 0, the sent information signal is judged to be '+1'; otherwise, it is judged that the sent information signal is'-1'. Compared with a DCSK system, an OMU-DCSK system and an NISI-MU-CDSK system, the system provided by the invention has better error code performance. Therefore, the improved multi-user DCSK chaotic communication system has important application value in the field of communication.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

High-efficiency and energy-saving differential chaos communication system

The invention provides a high-efficiency and energy-saving differential chaos communication scheme. The scheme belongs to the field of communication systems. Through effective improvement of a prior frame structure of a DCSK system, transmission time of each frame is shortened. The DCSK system subjected to transformation remains a prior frame structure; the reference time slot length is changed to1/P(P=beta/R) of the prior length and the data time slot length remains the same. The frame structure is composed of P times duplication, which carries 2 bit information, of the sum of the referencetime slot and the reference time slot of the last frame. A demodulation terminal adopts a non-coherent demodulation method. In order to demodulate each bit of information, a synchronization clock is adopted. The received reference time slot is correlated to the corresponding data time slot and finally sending information is acquired through demodulation with a judgment threshold. Namely, if the correlation value is greater than zero, +1 is judged; if the correlation value is not greater than zero, -1 is judged. The scheme provided by the invention achieves higher transmission rate than a DCSKsystem. At the same time, lower bit energy is consumed compared with the DCSK system. Good performance of SERT-DCSK enables a good application prospect in the wireless communication field.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

LDPC code sparse check matrix reconstruction method and system

The invention relates to an LDPC code sparse check matrix reconstruction method and system. The method comprises the following steps: randomly extracting bit information of the whole low-density parity check code LDPC once, analyzing the bit information randomly extracted once, and determining the minimum extraction frequency; based on the minimum number of extraction times, randomly extracting multiple times of bit information from the LDPC code, and determining a suspected sparse check vector according to the multiple times of bit information; acquiring a channel error code rate, and determining a minimum error decision threshold based on the signal error code rate; judging whether the suspected sparse check vector is a correct sparse check vector or not according to the minimum error decision threshold; if yes, reconstructing a sparse check matrix according to the correct sparse check vector, wherein the sparse check matrix is used for decoding communication information; and if not,randomly extracting the bit information of the LDPC code for multiple times again. According to the invention, the calculation complexity can be reduced and the fault-tolerant performance can be improved.
Owner:NAVAL AERONAUTICAL UNIV

Robust chaos keying secret communication system and communication method, terminal and storage medium

The invention belongs to the technical field of chaos secrecy, and discloses a robust chaos keying secure communication system and communication method, a terminal and a storage medium. At a sending end, a double-delay feedback chaos keying system is designed, one fixed delay feedback is used for guaranteeing the chaos characteristic of the system, the other controllable delay feedback is used for bearing 0 and 1 bit information, and uses a 0 or 1 state for controlling on / off state of delay feedback; the sending end respectively trains a neural network by using a chaotic signal output by a system and a delay signal thereof to establish two relation models in an on / off state of a delay keying modulation module. At a receiving end, segmented verification is performed on the mapping relation between the modulated chaotic signal and the delay signal by using the two models, and decryption is performed on the premise of not recovering the chaotic carrier of the sending end. The secure communication system based on robust chaos keying comprises a nonlinear transformation module, a delay keying modulation module, a plaintext electric signal module, a relation model establishment module, a channel, a first delay prediction module, a second delay prediction module, an analog-to-digital conversion module, a clock control module, a segmentation similarity comparison module and a demodulation module. The method can effectively resist the return mapping attack for chaos keying, and provides possibility for secure transmission under severe communication conditions.
Owner:CHINA UNIV OF GEOSCIENCES (WUHAN) +1

Method and device for preventing false detection of PDCCH and readable storage medium

The invention provides a method and a device for preventing false detection of a PDCCH and a readable access medium. The method comprises the following steps: performing hard decision on soft bit data output after performing rate de-matching on blind detection data; decoding and cyclic redundancy check are carried out on the soft bit data, and the data passing through the cyclic redundancy check are coded; comparing the coded data with a hard decision result, and calculating the ratio of different bits between the coded data and the hard decision result relative to soft bit data; when it is judged that the ratio is larger than or equal to a preset first threshold value and the blind detection data meet a first condition, or when the ratio is smaller than the preset first threshold value and the blind detection data meet a second condition, different bit numbers between bit information of the blind detection data and bit information of the PDCCH successfully detected last time in historical information are determined; determining a difference representation value according to different bit numbers; and determining that PDCCH false detection is generated when judging that the difference characterization value is greater than a second threshold value. According to the invention, the situation of false detection of the PDCCH can be prevented.
Owner:BEIJING ZHILIANAN TECH

A method, device and readable storage medium for preventing pdcch false detection

The present disclosure provides a method, device and readable access medium for preventing false detection of PDCCH, including: performing hard judgment on the soft bit data output after performing rate matching on the blind detection data; decoding and looping the soft bit data Redundancy check, encode the data after passing the cyclic redundancy check; compare the encoded data with the result of the hard judgment, and calculate the ratio of the different bits between the two to the soft bit data; judge When the ratio is greater than or equal to a predetermined first threshold and the blind detection data meets the first condition, or, when the ratio is less than the predetermined first threshold and the blind detection data meets the second condition, determine the bit information of the blind detection data The number of bits different from the bit information of the last successfully detected PDCCH in the historical information; determining the difference characteristic value according to the different number of bits; determining that a PDCCH misdetection occurs when the difference characteristic value is greater than the second threshold value. The present disclosure can prevent the occurrence of PDCCH false detection.
Owner:BEIJING ZHILIANAN TECH

Large-scale RFID system lost tag identification method based on balanced collision binary tree

Aiming at the limitation of the prior art, the invention provides the method for identifying the lost tag of the large RFID system based on the balanced collision binary tree, the data structure of the balanced collision binary tree is proposed and used for the first time in the field, and a binary query tree of which the leaf nodes are highly balanced is constructed for a target RFID system, so that the lost tag of the target RFID system is identified. Compared with a traditional collision tree, the height is obviously reduced, and the time overhead of broadcasting information by the reader-writer is further greatly reduced; the Manchester encoding principle and the CPT tree structure are combined, so that the use of an empty time slot is thoroughly avoided, and whether two tags are lost or not can be synchronously detected from one time slot only by using one-bit information, thereby greatly improving the utilization rate of frames and time slots. On the premise of ensuring the same recognition accuracy, compared with the prior art, the method has the advantages that the progressive overhead is maximally reduced by a multiple factor which is nearly log N, the performance is greatly improved in various parameter environments, and the robustness and the expansibility are good.
Owner:SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products