Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

136 results about "Candidate key" patented technology

In the relational model of databases, a candidate key of a relation is a minimal superkey for that relation; that is, a set of attributes such that...

Camera pose estimation apparatus and method for augmented reality imaging

ActiveUS20100232727A1Satisfactory accuracyFast and efficient implementationImage enhancementImage analysis3d cameraCandidate key
An apparatus for providing an estimate for a 3D camera pose relative to a scene from 2D image data of 2D image frame provided by said camera. A candidate 2D key points detector determines candidate 2D key points from the 2D image frame. A detected 3D observations detector determines detected 3D observations from pre-recorded scene data and the candidate 2D key points. A detected 3D camera pose estimator determines a detected 3D camera pose estimate from the camera data, the detected 3D observations and the candidate 2D key points. A first storage stores the detected 2D candidate key points and the 2D image data, and outputs in response to a 3D camera pose estimate output previous 2D image data and candidate 2D key points related to a previous 3D camera pose estimate output. A second storage stores and outputs a previous 3D camera pose estimate. A tracked 3D observations detector determines tracked 3D observations from the 2D image data, the candidate 2D key points, the camera data, the previous 2D image data and candidate 2D key points, the previous 3D camera pose estimate and 3D scene model data. A pose estimate selector outputs a selected one of the detected camera pose estimate and the previous 3D camera pose estimate. A 3D camera pose estimator computes and outputs the 3D camera pose estimate from the camera data, the detected 3D observations, the tracked 3D observations and the selected 3D camera pose estimate.
Owner:APPLE INC

Computer readable medium having a private key encryption program

A digital wallet stores an cryptographically camouflaged access-controlled datum, e.g., a private key encrypted under the user's PIN. Entry of the correct PIN will correctly decrypt the stored key. Entry of certain pseudo-valid PINs will also decrypt the stored key, but improperly so, resulting in a candidate key indistinguishable from the correct key. Such pseudo-valid PINs are spread thinly over the space of PINs, so that the user is unlikely to realize a pseudo-valid PIN via a typographical error in entering the correct PIN. In existing wallet technologies, which lack pseudo-valid PINs, only the correct PIN produces a decrypted key; thus, hackers can find the correct PIN by entering all possible PINs until a key is produced. The present invention's plurality of candidate keys prevent a hacker from knowing when he has found the correct key. In addition, hacker detection may be moved off-line into devices accepting messages signed with candidate keys, and/or the lockout threshold may be increased. Thus, the wallet can be forgiving of typographic or transposition errors, yet a hacker trying large numbers of PINs will eventually guess a pseudo-valid (but still incorrect) PIN and recover a candidate private key whose fraudulent use will be detected. The wallet may be used with associated key generation, certification, and verification technologies. Such technologies may include pseudo-public keys embedded in pseudo-public certificates, i.e., public keys that are not generally known and which are contained in certificates that are verifiable only by entities so authorized by the certifying authority.
Owner:CA TECH INC

Voice abstract forming method and voice abstract forming system for conference

The invention discloses a voice abstract forming method and a voice abstract forming system for a conference, and relates to the field of voice recognition. According to the invention, the speaking position, the identity information, the personnel data and other information of a speaker in a conference are analyzed, and then the weight coefficient of the speaker is determined. As a result, candidate key speaking segments corresponding to different speakers can be obtained by using different preset strategies according to the weight coefficients of speakers. Furthermore, according to the characteristics of the speaking content, for example, the large-probability interval of the important content of the utterance on a speaking time axis, key transitional words and key connection words in theimportant content of statements, and the like, a set of candidate key speaking segments is intercepted. The intercepted set of candidate key speaking segments is processed and then a set of audio/video segments for forming a voice abstract is obtained. As a result, more content is extracted from important statements, while less content is extracted from non-important statements. The content of afinally formed abstract is more reasonable. The more effective help is provided for users.
Owner:SHENZHEN EAGLESOUL TECH CO LTD

Equipment and method for detecting key word in continuous speech

The invention discloses equipment and a method for detecting a key word in continuous speech. The equipment comprises an input device, an identification device, a prosodic feature extraction device, a prosodic word boundary determination device, a confidence adjustment device, a judgment device and an output device, wherein the input device is used for inputting the continuous speech; the identification device is used for identifying a candidate key word from the continuous speech, giving out corresponding confidence, and identifying filling sounds included in the continuous speech; the prosodic feature extraction device is used for extracting prosodic features related with adjacent specific filling sounds; the prosodic word boundary determination device is used for determining the boundary between the adjacent specific filling sounds to be the probability of the prosodic word boundary according the prosodic features; the confidence adjustment device is used for adjusting the confidence of the candidate key word according to the boundary which is between the adjacent specific filling sounds included in a speech segment corresponding to the candidate key word and serves as the probability of the prosodic word boundary; the judgment device is used for judging whether the adjusted confidence of the candidate key word is higher than a preset threshold value; and the output device is used for outputting the candidate key word which has the adjusted confidence higher than the preset threshold value and serves as the key words.
Owner:FUJITSU LTD

Method and system for authentication, data communication, storage and retrieval in a distributed key cryptography system

A method for protecting the transfer and storage of data by encryption using a private key encrypted with a first key encrypting key, which is encrypted using a second key encrypting key. This latter key is encrypted using a hashed passphrase value, obtained by hashing a passphrase known only to the authorized user. Upon receipt of a request initiated by the user by entering a passphrase, a first hashed passphrase is transferred to a first data processing system, where it is compared with a predefined hash string. If they match, the first data processing system transfers to a second data processing system the encrypted second key encrypting key. A candidate key is obtained by decrypting the encrypted second key encrypting key using a second hashed passphrase. Upon successful validation of the candidate key, the passphrase is verified and the user is authenticated. After the user has been authenticated, the first data processing system transmits to the second data processing system the encrypted private key and the encrypted data. The second processing system then decrypts the encrypted first key encrypting key using the second key encrypting key, decrypts the encrypted private key using the first key encrypting key and finally decrypts the data using the private key.
Owner:EISST

Camera pose estimation apparatus and method for augmented reality imaging

ActiveUS8452080B2Satisfactory accuracyFast and efficient implementationImage enhancementImage analysis3d cameraCandidate key
An apparatus for providing an estimate for a 3D camera pose relative to a scene from 2D image data of 2D image frame provided by said camera. A candidate 2D key points detector determines candidate 2D key points from the 2D image frame. A detected 3D observations detector determines detected 3D observations from pre-recorded scene data and the candidate 2D key points. A detected 3D camera pose estimator determines a detected 3D camera pose estimate from the camera data, the detected 3D observations and the candidate 2D key points. A first storage stores the detected 2D candidate key points and the 2D image data, and outputs in response to a 3D camera pose estimate output previous 2D image data and candidate 2D key points related to a previous 3D camera pose estimate output. A second storage stores and outputs a previous 3D camera pose estimate. A tracked 3D observations detector determines tracked 3D observations from the 2D image data, the candidate 2D key points, the camera data, the previous 2D image data and candidate 2D key points, the previous 3D camera pose estimate and 3D scene model data. A pose estimate selector outputs a selected one of the detected camera pose estimate and the previous 3D camera pose estimate. A 3D camera pose estimator computes and outputs the 3D camera pose estimate from the camera data, the detected 3D observations, the tracked 3D observations and the selected 3D camera pose estimate.
Owner:APPLE INC

Function-level code vulnerability detection method based on slice attribute graph representation learning

The invention discloses a function-level code vulnerability detection method based on slice attribute graph representation learning, and the method comprises the steps: firstly introducing a new slice criterion, proposing the concept of a slice attribute graph, and generating a slice attribute graph of a code based on the slice criterion and a program slice technology; extracting graph structure information, node attribute information and code context information which have a dependency relationship with the vulnerability candidate key points; then, performing representation learning on the slice attribute graph by utilizing a relation graph convolutional neural network and combining a dual attention mechanism based on nodes and sub-graphs so as to learn a more comprehensive and accurate vulnerability mode; and finally, fusing the vulnerability identification results of the slice attribute graphs to realize function-level vulnerability detection, and determining a set of vulnerability candidate statements and grammatical elements associated with vulnerabilities. More vulnerability candidate key points can be covered, structures, attributes and context information related to vulnerabilities are fully learned and expressed, and the vulnerability detection accuracy is improved.
Owner:HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products