Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

67 results about "Composite number" patented technology

A composite number is a positive integer that can be formed by multiplying two smaller positive integers. Equivalently, it is a positive integer that has at least one divisor other than 1 and itself. Every positive integer is composite, prime, or the unit 1, so the composite numbers are exactly the numbers that are not prime and not a unit.

Secure transaction verification method and system based on blockchain

InactiveCN108711105AGuaranteed transaction processing speedPrevent leakageFinanceProtocol authorisationComposite numberVerification system
The invention discloses a secure transaction verification method and a secure transaction verification system based on a blockchain. The secure transaction verification method comprises the steps that: when a transaction with a transaction type and a transaction amount is processed by a node on the blockchain, an original balance of each transaction party is decrypted through a first decryption parameter transmitted by the transaction party, calculation is performed on the each original balance to obtain a new balance, the new balance is encrypted through an encryption parameter transmitted bythe transaction party to obtain an encrypted new balance, and the each encrypted new balance is broadcast to each node on the blockchain; after the broadcast encrypted new balance of the each transaction party is received by the node on the blockchain, an intelligent contract is activated to perform composite number verification; if the each composite number verification is passed, update is performed based on the corresponding encrypted new balance respectively; an external minus balance verification system is called to perform minus balance verification on single account balance, if the each minus balance verification is passed, it is judged that the transaction verification is passed. The secure transaction verification method and the secure transaction verification system of the invention have the beneficial effects that: whether a transaction is normal can be verified, and transaction processing speed on the blockchain also can be ensured without occupying system overhead.
Owner:四川吉鼎科技有限公司

Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys

A method is provided for an escrow cryptosystem that is essentially overhead-free, does not require a cryptographic tamper-proof hardware implementation (i.e., can be done in software), is publicly verifiable, and cannot be used subliminally to enable a shadow public key system. The keys generated are based on composite numbers (like RSA keys). A shadow public key system is an unescrowed public key system that is publicly displayed in a covert fashion. The keys generated by the method are auto-recoverable and auto-certifiable (abbrev. ARC). The ARC Cryptosystem is based on a key generation mechanism that outputs a public/private key pair, and a certificate of proof that the key is recoverable by the escrow authorities. Each generated public/private key pair can be verified efficiently to be escrowed properly by anyone. The verification procedure does not use the private key. Hence, the general public has an efficient way of making sure that any given individual's private key is escrowed properly, and the trusted authorities will be able to access the private key if needed. Since the verification can be performed by anyone, there is no need for a special trusted entity, known in the art as a "trusted third party". Furthermore, the system is designed so that its internals can be made publicly scrutinizable (e.g., it can be distributed in source code form). This differs from many schemes which require that the escrowing device be tamper-proof hardware. The system is efficient and can be implemented as a "drop-in" replacement to an RSA or Rabin cryptosystem. The system is applicable for law-enforcement, file systems, e-mail systems, certified e-mail systems, and any scenario in which public key cryptography can be employed and where private keys or information encrypted under public keys need to be recoverable. Another aspect of the system is the possibility to organize it in a hierarchical tree structure, where each element in the tree is an escrow authority (or authorities) capable to recover keys and/or information encrypted under these keys within the subtree rooted at the authority (or authorities) and only within this subtree.
Owner:CRYPTOPEAK SECURITY LLC

Anti-leakage CP-ABE method under strategy hiding and outsourcing decryption

The invention discloses an anti-leakage CP-ABE (Ciphertext Policy-Attribute-Based Encryption) method under strategy hiding and outsourcing decryption. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption mainly realizes a CP-ABE scheme with three characteristics: leakage resistance, strategy hiding and outsourcing decryption, and belongs to the information safety field. The anti-leakage CP-ABE method under strategy hiding and outsourcing decryption utilizes a composite number order bilinear group to construct parameters, and adds the elements in a sub group Gp2 of the composite number order bilinear group in the main public key and the encryption algorithm to achieve the effect of hiding the access strategy. Besides, the algorithm decomposes the decryption process and adds an outsourcing decryption algorithm, and at the same time utilizes a double key system to enable the third party to be unable to completely decrypt the cryptograph, thus reducing the computing cost and guaranteeing safety of the user private key and the cryptograph. Compared with traditional anti-leakage scheme, the anti-leakage CP-ABE method under strategy hiding and outsourcing decryption has the advantages of leakage resistance, strategy hiding, outsourcing decryption, and higher safety, and greatly reduces the computing cost for decryption for the user.
Owner:NANJING UNIV OF POSTS & TELECOMM

Binary compound flooding compound and preparation method thereof

The invention relates to a binary compound flooding compound and a preparation method thereof, mainly solving the problems that the oil displacement agent containing surface active agents has poor oil displacement efficiency and high using concentration under the high-temperature and high-salt conditions, and corrosion and scale deposition to a stratum and an oil well, caused by alkali in the ternary compound flooding, happen in the prior art. The binary compound flooding compound comprises the following components in percentage by weight: (1) 0.01-5.0 percent of N,N-bi fatty acyl group diamine neopentanoic acid di-polyoxyethylene ether bisulphonate; (2) 0.01-3.0 percent of polymer; (3) 92.0-99.98 percent of formation water, wherein in the general molecular formula of the component (1), R1 is C9-C17 alkyl group, R2 is C2-C6 alkyl group, n is adding composite number of ethoxy groups (EO) and is one integer from 2-7; M is one metal ion of K, Na or Li; the polymer is selected from one ofpolyacrylamide with superhigh molecular weight (viscosityaverage molecular weight is 25,000,000), temperature-resisting and salt-resisting polymer or xanthogen gum, and water is selected from the formation water of the oil field. By the technical scheme, the problems are better solved, and the binary compound flooding compound is suitable for tertiary oil recovery production in the oil field.
Owner:CHINA PETROLEUM & CHEM CORP +1

Oil displacement compound for tertiary oil recovery and preparation method thereof

The invention relates to an oil displacement compound for tertiary oil recovery and a preparation method thereof, mainly aiming at solving the problems that oil displacement agent containing surface active agents has poor oil displacement efficiency and high using concentration under the high-temperature and high-salt conditions, and corrosion and scale deposition to a stratum and an oil well, caused by alkali in the ternary compound flooding, happen in the prior art. The oil displacement compound for tertiary oil recovery comprises the following components according to mass percentage: (1) 0.01-5.0 percent of N,N-bi fatty acyl group diamine neopentanoic acid di-polyoxyethylene ether bisulphonate; (2) 0.01-3.0 percent of polymer; (3) 92.0-99.98 percent of formation water, wherein in the general molecular formula of the component (1), R1 is C9-C17 alkyl group, R2 is C2-C6 alkyl group, n is composite number of ethoxy groups (EO) and is one integer from 2-7; M is one metal ion of K, Na or Li; the polymer is selected from one of polyacrylamide with superhigh molecular weight (viscosityaverage molecular weight is 25,000,000), temperature resisting salt-resisting polymer or xanthogen gum, and water is selected from the formation water of the oil field. By the technical scheme, the problems are better solved, and the oil displacement compound is suitable for tertiary oil recovery production in the oil field.
Owner:CHINA PETROLEUM & CHEM CORP +1

Multiple prime number generation using a parallel prime number search algorithm

A process is provided for searching in parallel for a plurality of prime number values simultaneously includes the steps of: randomly generating a plurality of k random odd numbers (wherein k is preferably more than 2, but could also be one or more) expressed as n0,0, n1,0, . . . n((k−1)),0, each number providing a prime number candidate; determining a plurality of y additional odd numbers based on each one of the randomly generated odd numbers n0,0, n1,0, . . . n(k−1),0 to provide additional prime number candidates thereby yielding a total number of prime number candidates; sieving the total number of prime number candidates by performing a small divisor test on each of the candidates in order to eliminate candidates revealed to be composite numbers by the small divisor test thereby yielding a sieved number s of candidates; and performing a first probabilistic primality test on each of the sieved number s of candidates, each of the plurality of s first primality tests including an associated exponentiation operation executed by an associated one of a plurality of s of the exponentiation units, the exponentiation operations being performed by the plurality of s exponentiation units substantially simultaneously in order to eliminate candidates revealed to be composite numbers by the primality test thereby yielding a remaining number r of candidates.
Owner:HEWLETT-PACKARD ENTERPRISE DEV LP +1

A Fast Generation Method of Prime Number Family Applicable to the Application of Information Encryption Technology

The invention discloses a method for quickly generating a prime number group applicable to an information encryption technology. The method comprises the following steps of: establishing a probable prime number group by selecting a shrinkage residual system of a modulus M which is equal to 30; and according to the distribution rule and characteristics of composite numbers in the probable prime number group, screening out all composite numbers in the probable prime number group so as to accurately, quickly and completely generate all prime numbers of any section in a storage limitation range of a computer. In the field of information safety and cryptology, the acquisition and providing of large prime numbers are necessary flows in a public key algorithm. The convention method has the defects that: a single prime number can be provided at each time; most of the prime numbers are required to be subjected to primality detection; and operation time is over-long. The method provided by the invention has the advantages that: the primer number group can be generated by adopting computer software through simple screening operation, so that quick generation without complicated operation is realized on the computer; and a primality detection link is eliminated, and limitation of a prime number generation technology can be avoided, so that one-time pad can be realized, and related public key systems can perfectly work.
Owner:刘诗章 +1

Magnesium-based nano composite hydrogen storage material and preparation method thereof

The invention relates to a magnesium-based nano composite hydrogen storage material and a preparation method thereof and belongs to the technical field of functional materials. The temperature requirement of application is met by forming an ammoniated hydroboron by magnesium hydroboron and ammonium, and positive hydrogen energy introduced into a NH3 group can be combined with negative hydrogen ina BH4<-> group to release hydrogen, so that the hydrogen release path of the hydroboron is changed and release of impurity gas such as boroethane is reduced effectively; the ammonium complexing quantity is changed by means of an ammonium re-distributing method to prepare mono-ammoniated magnesium hydroboron, that is, the combining efficiency is the highest from the aspect of charge balance by adjusting the quantities of positive and negative hydrogen in ammoniated magnesium hydroboron, release of ammonia in a decomposing process of the magnesium hydroboron ammonate can be inhibited effectively, the purity of hydrogen released is improved, and meanwhile, the magnesium-based nano composite hydrogen storage material is combined with a magnesium-based alloy, so that the crystal structure of analloy hydride is changed and a catalytic effect role is played, and therefore, diffusion of hydrogen atoms is facilitated, and the kinetic performance of absorbing and releasing hydrogen by the alloyhydride is improved.
Owner:常州富思通管道有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products