Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

124 results about "Communication complexity" patented technology

In theoretical computer science, communication complexity studies the amount of communication required to solve a problem when the input to the problem is distributed among two or more parties. The study of communication complexity was first introduced by Andrew Yao in 1979, while studying the problem of computation distributed among several machines. The problem is usually stated as follows: two parties (traditionally called Alice and Bob) each receive a (potentially different) n-bit string x and y.

Man-machine interactive system and man-machine interactive method of smart television

The invention discloses a man-machine interactive system and a man-machine interactive method of a smart television. The man-machine interactive system comprises a 3D (three-dimensional) television, a virtual interface generating and control module, a 3D image sensor and a user gesture recognition module, wherein the virtual interface generating and control module is used for generating and controlling optimal positions and angles of virtual interface imaging; the 3D image sensor is used for obtaining object depth or three-dimensional visual information; and the user gesture recognition module is used for analyzing user depth or three-dimensional image information to recognize postures or gestures of a user, obtaining a user operating intention and sending a corresponding control command by combining virtual interface information. The system obtains the user position and the distance by the aid of the 3D image sensor, the user performs point touch actions on a virtual interface with fingers by the aid of the virtual interface generating and control module and by controlling the projected virtual interface of the 3D television, and the system obtains the operating intention of the user by capturing gesture information of the user and combining the virtual interface to perform corresponding operations, so that man-machine interaction is achieved. Communication complexity is greatly simplified by relying on the virtual interface, and the system is high in practicality.
Owner:XI AN JIAOTONG UNIV

Method and device for sharding of blockchain based on application

The invention discloses a method and device for sharding of a blockchain based on application, and belongs to the technical field of blockchains. The method comprises the steps of: dividing the blockchain into a main chain layer and a layer consisting of a plurality of application sub-shardings, wherein the main chain layer is used for taking charging of overall management of the blockchain, primary asset transactions and collection for state checkpoint of the plurality of application sub-shardings; enabling an application flag and a transaction partiton_num carried by each transaction to be set correspondingly to the corresponding application sub-sharding; determining the application sub-sharding to which the transaction belongs according to the application flag and the transaction partiton_num carried by each transaction; and performing communication among the plurality of application sub-shardings through a cross-sharding protocol of the main chain layer. The method of the inventionhas the beneficial effects that communication complexity in a communication blockchain network is greatly reduced while security is balanced, and a consensus efficiency and network expansibility areimproved, thus the method has a good application prospect, and can be promoted in various fields related to the blockchain.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD +1

Block chain data interaction method and device capable of switching consensus algorithms

InactiveCN110365695AEasy to monitor and maintainControllable monitoring operation and maintenanceTransmissionSmart contractChain system
The invention provides a block chain data interaction method and device capable of switching consensus algorithms. Different consensus algorithms are accessed for different service scenes, pluggable access is realized, the consensus efficiency of the block chain system is improved, the data interaction response time is shortened, powerful support is provided for function and performance of big data services with complex block chain processing logic, convenience is provided for function development, and the research and development efficiency is improved. According to the method, high couplingof a consensus algorithm and a block chain system verification node is solved, a design idea of a pluggable consensus algorithm is provided, system consensus and intelligent contract decoupling are realized, the consensus algorithm is high in availability and easy to expand, and monitoring operation and maintenance of the consensus node are more convenient and controllable. Meanwhile, the problemthat the communication cost of the original PBFT algorithm is too high in a private chain environment is solved, and the communication complexity is reduced after the RAFT algorithm is used. The average response time of the block chain can be effectively reduced, the utilization rate of a CPU and a memory of a server is reduced, and the resource overhead is saved.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

Method for balancing capacitor voltage of modularization multilevel converter

The invention discloses a method for balancing capacitor voltage of a modularization multilevel converter. The method comprises the following steps: (1) the present value of submodule capacitor voltage is sampled to obtain increment of capacitor voltage in a power frequency period; (2) the increment of the capacitor voltage and the present value of submodule capacitor voltage are ranked; (3) a new corresponding relation between a drive signal and a submodule is obtained; (4) the drive signal is allocated to the submodule again according to the new corresponding relation. According to the method, the requirement for real-time performance is lower, and the computing resource of controllers is saved, so that the controllers can be used for processing a large-scale MMC system; no bridge arm current needs to be detected, so that the communication complexity among the controllers is simplified, part of the cost of a current sensor is saved, an additional hardware circuit is not needed to be added, and additional system cost is avoided; under the control of the method, all switch frequencies of the submodule are the same, the switch frequency is lower, the switch stresses are consistent and the system thermal design is facilitated and the system reliability is realized.
Owner:ZHEJIANG UNIV

Alliance chain master-slave multi-chain consensus method based on tree structure

The invention discloses an alliance chain master-slave multi-chain consensus method based on a tree structure. An alliance chain consensus group is divided; an upper-layer channel and a lower-layer channel are obtained; channels are mutually isolated, classification and data isolation of different digital assets are realized; privacy requirements of data isolation are met; concurrent processing ofmultiple channels is carried out, the transaction performance is improved, the problems that an existing block chain is low in throughput and too high in transaction delay are solved. The invention provides a master-slave multi-chain architecture of a tree structure and the occupancy fault-tolerant consensus algorithm based on the threshold signature under the master-slave multi-chain architecture to solve the problem of consistency caused by diversified digital asset classification concurrent processing; the method has the advantages of low communication complexity and signature verification complexity, the master-slave multi-chain structure breaks through the function and performance constraint of a single chain and has good high-concurrency transaction performance, meanwhile, isolation protection of privacy data is considered, and diversified business requirements of enterprises are met.
Owner:芽米科技(广州)有限公司

A secure multi-party computing method and device

The embodiment of the invention provides a secure multi-party computing method and device, and relates to the technical field of information security, and the method is applied to any participant in asecure multi-party computing system, and comprises the following steps of determining an input value required to be submitted for completing a target computing task; randomly generating a secret value, encrypting the input value by using the secret value, and broadcasting the encrypted input value in the system; generating an encryption set corresponding to other participants, and sending the encryption set to the other participants; receiving an encryption input value and an encryption set broadcasted by other participants; based on the encryption input value and the encryption set, calculating to obtain a feedback value; encrypting the feedback value by using public keys of other participants, and sending the encrypted feedback value to the participants; and receiving the encrypted feedback value sent by other participants, and completing the target calculation task based on the encrypted feedback value and the ID of each participant in the system. By applying the scheme provided bythe embodiment of the invention, the communication complexity of secure multi-party calculation can be reduced, and the communication resources are saved.
Owner:BEIJING UNIV OF POSTS & TELECOMM

On-line charging method, access proxy equipment and system

The embodiment of the invention discloses an on-line charging method, access proxy equipment and a system, and belongs to the technical field of communication. The method comprises the following steps of: receiving a credit control request (CCR) message in a type based on an event or a session, which is transmitted by a charging trigger function (CTF), wherein the CCR message comprises a specified number corresponding to the type of the CCR message and a number of user equipment; and initiating an analog intelligent call to a prepaid service (PPS) subscribed by the user equipment number according to the received CCR message, and setting a called number in the analog intelligent call as the specified number corresponding to the type of the CCR message, so the PPS processes the analog intelligent call, and implements corresponding on-line charging on the service of the user equipment according to the specified number. The access proxy equipment comprises a reception module and a processing module. The system comprises the access proxy equipment and the PPS subscribed by the user equipment. By the technical scheme provided by the embodiment of the invention, the diameter credit control (DCC) charging complexity and cost, and the communication complexity are greatly reduced.
Owner:深圳市前海滕翔科技信息有限公司

Block chain full fragmentation method and device based on P2P storage network and multi-layer architecture

The invention discloses a block chain full fragmentation method and device based on a P2P storage network and a multi-layer architecture. On one hand, network fragmentation is utilized to divide wholenetwork block chain nodes into a fragmentation chain, a relay chain and a beacon chain; namely, a beacon-relay-fragmentation three-layer architecture is adopted to realize cross-chain communication of fragments; the network requirements of the nodes and the total TPS number of the network form a linear relationship; on the other hand, the transaction is divided into W primitives and D primitives,the D primitives are grouped, the hash values corresponding to the D primitives are calculated, and the essence is that the W primitives are executed on fragments of an initiator, the D primitives are stored in a P2P storage network, and the hash values corresponding to the D primitives can perform cross-chain communication and are finally executed on fragments of a receiver. By means of the design, through the P2P storage network, a large amount of data only need to be subjected to cross-chain communication through hash values of the data, the communication complexity and bandwidth requirements are reduced, and the expansibility of the block chain fragmentation technology is greatly improved.
Owner:SICHUAN INTERSTELLAR ROEWE TECH CO LTD

Binary weighted Byzantine fault-tolerant consensus method applied to permission blockchain

The invention discloses a binary weighted Byzantine fault-tolerant consensus method applied to a permission blockchain, and belongs to the technical field of blockchains. The method is provided for realizing weighted Byzantine fault tolerance consensus in O (n2) communication complexity in a weak synchronization network environment. The technical key points are that: the network comprises a plurality of nodes participating in consensus, and continuously monitors messages from a client or other nodes; before consensus begins, the system needs to configure global parameters including node addresses, transaction types, main node information and decision thresholds, and weight distribution is completed by each node; in an initial stage, when a main node monitors a request from the client, themain node initiates consensus; the binary weighted Byzantine fault-tolerant consensus is composed of four stages including a pre-preparation stage, a voting stage, a decision stage and a submitting stage, and after the node finishes updating a ledger, an execution result needs to be returned to the client, so that the client masters the consensus completion condition. The method is suitable for solving a consensus problem in a non-open network and a non-uniform trust permission blockchain.
Owner:HARBIN INST OF TECH +1

Safe multi-party calculation control method for realizing approximate maximum value calculation based on computer software and corresponding system

The invention relates to a safe multi-party calculation control method for realizing approximate maximum value calculation based on computer software. The method comprises the following steps: a public information negotiation module negotiates to determine an effective value range and divides intervals; the secret data preprocessing module determines the serial number of the value interval where the secret information is located and carries out calculation; the secure multi-party addition calculation and communication module performs secure multi-party summation calculation with other entities; the maximum value interval calculation module calculates an interval serial number where the maximum value is located. The invention further relates to a safe multi-party calculation control systemfor achieving approximate maximum value calculation based on computer software. By adopting the safe multi-party calculation control method for realizing approximate maximum value calculation based oncomputer software and the corresponding system, the interval where the maximum value of all secret information is located can be safely calculated under the condition that the communication complexity does not exceed O (n2), i.e., the secret information of the user is not leaked to other participating entities.
Owner:SHANGHAI GUANYUAN INFORMATION TECH +1

Multi-dimensional cloud resource interval finding method based on hierarchical cloud peer-to-peer network

InactiveCN105357247AGood time complexityGood space complexityTransmissionComputation complexityNetwork size
The invention relates to a multi-dimensional cloud resource interval finding method based on a hierarchical cloud peer-to-peer (P2P) network. The method comprises the following steps: establishing a multi-dimensional index by using a resource type and a resource attribute value of cloud resources respectively based on the hierarchical cloud P2P network, aggregating relevant data, and storing the aggregated relevant data in one resource bundle; and partitioning a value domain of the attribute value into a plurality of sections in order to satisfy more complex inquiries. Meanwhile, mechanisms such as resource bundle fusion and section neighbor maintenance are established, so that retrieval can be finished through an algorithm on the basis of logarithmic-degree computation complexity. The advantages of an existing structured P2P network are utilized fully. The cloud resources are stored in bundles through a hierarchical structure. The resource bundles are rapidly located at relatively low cost through a resource bundle locating technology. Meanwhile, HChord rings are established in the resource bundles, so that data relevance is kept. The structure is simple, and easy to implement. Very high time, space and communication complexity is achieved; the inquiries are finished within a logarithmic-degree hop count; and an algorithm routing hop count does not increase rapidly along with the increase of a network scale.
Owner:UNIV OF SHANGHAI FOR SCI & TECH

Consensus output block generation method based on blockchain node network

The invention discloses a consensus output block generation method based on a blockchain node network. The method comprises the following steps: firstly, output block voting nodes are selected; a voting node of a next output block is obtained; then, all the block chain nodes send the corresponding block output opportunity values OP to the voting nodes respectively; the received block output opportunity values OP is subjected to priority division and digital signature via the voting node, a digital signature voting request is generated and sent to the corresponding sending node, and the sending node obtains a voting result according to the digital signature voting request and outputs a block according to the voting result. According to the method disclosed in the invention, priority division is carried out by selecting voting nodes according to the OP; according to the method, voting is carried out substantially according to the block output opportunity values OP, so that communicationfrequency and the number of the voting nodes form a linear relationship, communication complexity can be reduced, all block chain nodes can be used to send the block output opportunity values OP, a decentration degree is guaranteed, and high safety performance is realized.
Owner:SICHUAN INTERSTELLAR ROEWE TECH CO LTD

Personal file permission chain management system and method based on improved multi-layer PBFT

The invention provides a personal file permission chain management system and method based on improved multi-layer PBFT, belongs to the technical field of block chains, and comprises a node managementmodule, a hierarchical division module and a consensus module which are connected in sequence. The node management module is used for performing node creation, grade allocation and node deletion management on participated nodes by utilizing a personal file permission chain; the hierarchical division module is used for carrying out hierarchical division on all the nodes according to the levels ofthe nodes and carrying out user-defined hierarchical processing through the node levels and the slave node ID list; and the consensus module is used for realizing optimization in combination with a PBFT consensus algorithm, the multi-layer nodes and an excitation mechanism. Through the design, the problems that a license chain system is poor in node expansibility, high in inter-node communicationcomplexity, low in system efficiency after the number of nodes is increased and the like are solved, the total single consensus communication duration of the license chain management system is effectively shortened, and the single consensus communication frequency is greatly reduced.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA +1

Efficient and safe two-party computing system and computing method based on cooperation

The invention discloses an efficient and safe two-party computing system and method based on cooperation, and the system comprises: a function-independent preprocessing module which is used for pre-generating verifiable random bit sharing shares and a label pair set of an input line, which are needed by safe computing, for two communication parties; a function correlation preprocessing module, wherein participants serve as confusion parties respectively, and verifiable confusion circuit sharing shares are generated for the first half circuit and the second half circuit respectively; an input preprocessing module, wherein a calculation side obtains a label set corresponding to a true value masking value form of each input line of the circuit; a circuit analysis module, wherein participants serve as calculation parties in sequence, confusion circuits of a front half circuit and a rear half circuit are recovered and analyzed respectively, and the correctness of circuit calculation is verified; and an output module, wherein the two communication parties obtain the corresponding masking values from the output line labels and recover the output true values. According to the system, circuit calculation correctness and input privacy can be ensured, communication complexity is low, both parties share calculation pressure, safety calculation efficiency is high, and malicious opponents can be resisted.
Owner:BEIHANG UNIV

Uninterruptible power supply (UPS) method and equipment having active voltage adjustment

The invention relates to UPS equipment. The UPS equipment comprises at least one power supply, at least one UPS device and a bus; the power supply receives commercial power voltage, and performs voltage conversion of the commercial power voltage so as to generate power supply voltage; the UPS device generates backup voltage; the bus outputs one of the power supply voltage and the backup voltage to a load, wherein the UPS device judges whether the power supply voltage is abnormal or not according to the level of the power supply voltage; if the power supply voltage is abnormal, the UPS device increases the level of the backup voltage to the power supply voltage, which is greater than the power supply voltage when the power supply voltage is abnormal, and outputs backup current to the load through the bus; furthermore, the UPS device gradually decreases the level of the backup voltage, and detects whether the level of the backup current is less than a pre-set current value or not, so that whether the power supply voltage is still abnormal or not is judged; the UPS device determines whether the backup current is supplied or not directly and actively; the fact that the power supply condition is known according to an external state signal from the power supply or the load is unnecessary; and the wiring and communication complexity can be lightened.
Owner:LITE ON ELECTRONICS (GUANGZHOU) LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products