Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35 results about "Computation sharing" patented technology

Key exchange method and device, storage medium and computing device

The invention provides a key exchange method and a device, a storage medium and a computing device, and relates to the technical field of information security. The method comprises the following steps: receiving an RB sent by opposite-end equipment; if it is determined that the RB meets the elliptic curve equation, calculating QA based on rA, RB, dA and PB; if it is determined that the QA meets the elliptic curve equation, generating a shared key KA according to a KDF key derivation function and specified parameters, and other parameters, except for the coordinate (xA, yA) corresponding to theQA, in the specified parameters are the same as those of the opposite-end equipment for calculating the shared key. Therefore, the execution steps of the two key exchange parties are the same, the algorithm is simple, and the two key exchange parties are convenient and efficient. And the information is transmitted only once, so that the processing resource consumption caused by multiple times ofinformation interaction is reduced, and the key negotiation efficiency can be improved. Moreover, in the transmission process, even if the RB is intercepted, the shared key cannot be obtained, so thatthe security of the shared key is ensured.
Owner:BEIJING HAITAI FANGYUAN HIGH TECH

Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication

The invention discloses a Chinese remainder theorem based location privacy method in Internet-of-Things sensing layer authentication, and belongs to the technical field of Internet-of-Things safety. The method comprises the following steps that (1) at the distribution stage of key material, the key material is distributed from a key server and written into a radio frequency tag and a reader-writer; (2) at a search and authentication stage, the reader-writer and the radio frequency tag conduct data communication and authenticate validity of each other; (3) at the negotiated generating stage of a symmetric key, the reader-writer and the radio frequency tag calculates the shared key respectively, and the ID of the tag and other information are transmitted under the protection of the key. The method guarantees safety of location privacy in sensing layer authentication, and meets the requirement for safety of passive RFID. The method can enable the position of the tag to be hidden very well, namely, only the legal reader-writer can found that the tag exists nearby, and information of the tag is read; an illegal reader-writer can not found whether the tag exists nearby, and the purpose of hiding the position of the tag is achieved.
Owner:SOUTHEAST UNIV

Shared bicycle skeleton network extraction method

The invention discloses a shared bicycle skeleton network extraction method, belongs to the technical field of computer application, and can perform backbone network extraction on a network composed of network nodes with spatial position features. The method comprises the following steps: constructing a shared bicycle network; and calculating the significance of all edges in the shared bicycle network, and keeping the edges with the significance greater than zero as the edges of the backbone network; and calculating the topological potential of all nodes in the shared bicycle network; performing spatial density clustering on all nodes in the shared bicycle network according to the geographic positions of the nodes, and acquiring a riding area cluster ; For each riding area cluster, performing descending sorting on the network nodes in the current riding area cluster according to the value of the topological potential, and selecting the front set number of nodes after descending sortingto form a backbone core node of the current riding area cluster; and combining the backbone core nodes of all the riding area clusters, and connecting the backbone core nodes by using the edges of the backbone network to form a skeleton network.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

A Wi-Fi positioning method for shared bicycles based on 3D calibration

The invention relates to the field of shared bicycle communication positioning, and provides a shared bicycle WiFi positioning method based on three-dimensional calibration. The method comprises the following steps: before a shared bicycle is put into operation, performing AP (Access Point) three-dimensional calibration and establishing an AP information database; after the shared bicycle is put into operation, acquiring AP positioning information in an area by a WiFi positioning module, and transferring the acquired AP positioning information to a processor; processing the AP positioning information by the processor and controlling a GPRS module to upload the processed information to a server; calculating the current position of the shared bicycle by the server according to the received information and the AP information database; and responding to a positioning request of a display client by the server, performing data screening and calculation according to the positioning request, and transmitting calculated position information to a positioning display client in real time. According to the shared bicycle WiFi positioning method based on the three-dimensional calibration provided by the invention, when the AP information database is established, only a database of AP label number coordinate information in the area is established, thus the workload is saved and the load of the server is reduced.
Owner:JIANGSU UNIV

Shared station intelligent distribution method, server, equipment and system

The invention provides a shared station intelligent distribution method. The method comprises the steps: receiving a preset shared station request transmitted by a user terminal; calculating the interestingness of the user to each shared station in the shared station knowledge graph; sending the interestingness to a user terminal so that the user terminal can display stations identified accordingto the interestingness and generate a station selection interface; receiving station selection information sent by the user terminal, wherein the station selection information comprises a station identifier and a predetermined time period; and allocating shared stations according to the station selection information, and sending an allocation result to the user terminal, so that the user terminaldisplays the allocation result. The invention solves the problem of lack of a reasonable and efficient shared station allocation method in the prior art, and provides the intelligent reservation method, the server, the equipment and the system which can enable a user to find and reserve a proper shared station more quickly, reduce the time cost of the user and improve the user experience. The system can be applied to the fields of incubator offices, office buildings implementing shared stations, enterprises and the like.
Owner:广州腾新科技有限公司

Container storage utilization rate monitoring method and device, computer equipment and storage medium

PendingCN113608963AReduce the impact of input and outputImprove experienceResource allocationHardware monitoringComputer hardwareFile system
The invention relates to the technical field of information security, is suitable for the financial field, and particularly relates to a container storage utilization rate monitoring method and device, computer equipment and a storage medium. The method comprises the steps of obtaining the number of containers currently running on a host machine, the total storage usage amount of a shared file system and the current storage usage amount of the shared file system; according to the number of the containers, the total storage usage amount of the shared file system and the current storage usage amount of the shared file system, judging whether the storage of the host machine meets an over-limit condition or not; if the host machine storage meets the over-limit condition, sending host machine storage exception information; and determining an abnormal container according to the host machine storage abnormal information. According to the method, the storage resource utilization rate of the shared file system is calculated through the cluster monitoring system, an alarm is given to the container exceeding the storage upper limit threshold value, the disk input and output influence caused by full-disk scanning is accurately and effectively reduced, the service efficiency is improved, and the user experience is further optimized.
Owner:INDUSTRIAL AND COMMERCIAL BANK OF CHINA

A network extraction method for shared bicycle skeleton

The invention discloses a shared bicycle skeleton network extraction method, belongs to the technical field of computer application, and can perform backbone network extraction on a network composed of network nodes with spatial position features. The method comprises the following steps: constructing a shared bicycle network; and calculating the significance of all edges in the shared bicycle network, and keeping the edges with the significance greater than zero as the edges of the backbone network; and calculating the topological potential of all nodes in the shared bicycle network; performing spatial density clustering on all nodes in the shared bicycle network according to the geographic positions of the nodes, and acquiring a riding area cluster ; For each riding area cluster, performing descending sorting on the network nodes in the current riding area cluster according to the value of the topological potential, and selecting the front set number of nodes after descending sortingto form a backbone core node of the current riding area cluster; and combining the backbone core nodes of all the riding area clusters, and connecting the backbone core nodes by using the edges of the backbone network to form a skeleton network.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Ecological biological recognition method based on R-FCN algorithm

PendingCN114581937ARealize computing sharingAnalyzing displacement sensitivityGeneral water supply conservationCharacter and pattern recognitionEcologyComputation sharing
The invention discloses an ecological biological recognition method based on an R-FCN algorithm, and the method comprises the following steps: collecting ecological biological characteristics, carrying out the collection and classification of the collected ecological characteristics, and building a distributed ecological characteristic database; initiating an ecological biological recognition request, and collecting biological image data in the ecological environment according to the request; processing the acquired biological image data to obtain processed biological image data; performing target detection on the processed biological image data through an R-FCN algorithm; and carrying out comparison identification on the detected biological image data and the feature data in the distributed ecological feature database. According to the method, the full convolution network is used, complete calculation sharing is achieved, the speed is 2.5-20 times higher than that of the Faster R-CNN and reaches 0.17 s/img, the accuracy is slightly improved under the condition of speed advantage compared with that of the Faster R-CNN, the displacement sensitivity of classification and detection is analyzed, and a solution is provided.
Owner:澜途集思(深圳)数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products