Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

1378 results about "Effective time" patented technology

Effective Time means the time at which the Distribution occurs on the Distribution Date. Effective Time means 12:01 a.m. on the Effective Date; Effective Time means 12:01 a.m. Eastern Time on the Closing Date. Effective Time means the time at which the Distribution is effective on the Distribution Date.

Method and system for cataloging news video

InactiveCN101616264AAutomatic catalog implementationSolve the problem of automatic semantic information annotationTelevision system detailsCharacter and pattern recognitionComputer moduleCataloging
The invention relates to a method and a system for cataloging news video. The method realizes automatic cataloging of the news video based on caption bars, anchorman and audio mute point information in a news program, and comprises the following steps: carrying out audio-video separation of news video stream and head leader music matching of audio data to determine the effective time range of a news program in a file; determining an audio mute point, an anchorman frame and the emerging time of a caption frame within the effective time range, and carrying out comprehensive analysis processing to determine the division time point of news items; and identifying video caption information, associating the caption information with a division result, and taking the caption information after association as cataloging semantic information. The system comprises a bar removing module and an educing module connected with a news video bar-removing result database as well as a browse module, a play module and a correction module connected in parallel between a client and the news video bar-removing result database. The method and the system solve the problems of news automatic bar removing and news item automatic semantic information labeling and realize automatic cataloging of news programs, thereby having the advantages of high efficiency and low cost.
Owner:INST OF AUTOMATION CHINESE ACAD OF SCI

Construction verification method and device capable of verifying security two-dimensional code offline

Embodiments of the invention provide a construction verification method and device capable of verifying a security two-dimensional code offline. The method comprises the following steps of inputting information that needs coding and type information, carrying out digital signature operation and encryption operation on the input information according to an information release type, constructing combination information, and encoding to generate a security two-dimensional code which can be verified off-line according to a two-dimensional code coding rule; inputting the information of the security two-dimensional code and identifying included combination information and type information, analyzing and decoding the combination information to obtain independent sub-information according to the type information of the two-dimensional code, and verifying digital certificate effectiveness information, a digital signature of the input information and an effective time limit of the input information; and if all verifications pass, showing that the offline verification of the security two-dimensional code is correct and the coding information source of the security two-dimensional code is credible, otherwise showing that the information release source of the security two-dimensional code is incredible. The method and the device have the beneficial effects that the security two-dimensional code cannot be tampered, counterfeited and denied, the public or private information can be released, and the integrity of the information of the security two-dimensional code and the authenticity of the source can be verified offline without a network connection.
Owner:王栋

Data interaction method, client and server

The invention provides a data interaction method, a client and a server, so as to solve the problems of requested replaying and client computer safety that cannot be solved by adopting HTTPS (Hyper Text Transfer Protocol Secure) technique. The method comprises the following steps: obtaining a timestamp from a service terminal; sending the first identifying information of a user, the timestamp and verifying data generated according to the first identifying information of the user and the timestamp to the service terminal; obtaining certified data encrypted by the service terminal, wherein the certified data comprises the encrypted data generated for the timestamp and second identifying information of the user; and using the certified data to access the service terminal. According to the method provided by the invention, HTTPS encryption and improved MD5 are used together while the encryptions at the client and service terminal are adopted, so that the possibility of distorting and falsifying data at 'end' and 'path' is efficiently avoided. Besides, the timeliness control is performed on interface calling by using effective time through the timestamp, so that the data damage risk caused by recording and largely replaying a user request is efficiently avoided.
Owner:BEIJING QIHOO TECH CO LTD

Authentication method for preventing replay attack

ActiveCN102739659ALegitimate service requests are immune to replay attacksGuaranteed accuracyTransmissionApplication serverAuthentication server
The invention discloses an authentication method for preventing a replay attack. The method comprises the following steps of transmitting an authentication evidence and service requests to an application server, wherein the authentication evidence is acquired from a login authentication server by a client side and is provided with a first time stamp; identifying the sequence of the user requests by using a unidirectional data chain; calculating the time difference between the current time and the first time stamp at the login authentication server end; packaging a judging result, the time difference and a unidirectional data chain value into verification information; and transmitting the verification information to the application server, wherein the application server judges whether the verification information is replay information or not according to the received unidirectional data chain value, and furthermore, whether the service requests are authenticated within effective time or not can be judged according to the time difference and the judging result. Time is not required to be synchronous, so that the complexity of the system or a protocol is avoided, and the delay caused by synchronization of time is also avoided. The probability that the user requests undergo the replay attack is avoided through the application of the unidirectional data chain.
Owner:SOUTH CHINA NORMAL UNIVERSITY +1

A fusion evaluation method of traffic information collected based on micro blogs

InactiveCN102163225ABreaking through the fusion matching problemEfficient extractionSpecial data processing applicationsReal time navigationData set
A fusion evaluation method of traffic information collected based on micro blogs comprises the steps of: constructing a data set of micro blog messages with traffic information as a theme; traversing road sections in a road network and selecting micro blog message records related to the road sections in the road network in an effective time window for establishing a micro blog message record set; extracting traffic information description indicators from the micro blog message records and formally conveying the traffic information contained in the micro blogs; performing fusion evaluation of the traffic information in the micro blog message record set and acquiring a real-time dynamic traffic information update table of the traffic information with regard to traffic restriction or traffic control; as for the traffic information with regard to road conditions, calculating clear degree and support degree of the road sections during corresponding period of time; establishing a dynamic feedback model and adjusting honesty degree of micro blog users; and circularly traversing all the roads in the road network and processing the traffic information of the whole road network covered in the micro blog message data set. The method in the invention realizes the rapid fusion evaluation of the traffic information contained in the micro blogs and provides an important data source for the collection of the urban traffic information, thereby being applicable to real-time navigation and location-based service systems, map websites, traffic planning management and emergence response plans.
Owner:INST OF GEOGRAPHICAL SCI & NATURAL RESOURCE RES CAS

Method and apparatus for simplified production of heat treatable aluminum alloy castings with artificial self-aging

InactiveUS6224693B1Simplifying even further the overall heat-treatmentProducing the casting in a considerably shorter timeCylinder headFree cooling
Simplified heat-treatment in making aluminum alloys castings of the type improved by aging, especially for automotive engine cylinder heads and motor blocks. The castings, after solidification and extraction from their molds, each have an end product (workpiece) portion and a riser portion (the latter being ultimately cut off as waste). The workpiece portion of the casting is selectively quenched from solution temperatures down to about 120° C. by spraying water or other appropriate liquid preferably as a gas driven mist onto the surfaces of the workpiece while maintaining the riser portion of the casting essentially unsprayed at relatively significantly higher temperatures. After the quench, the residual reservoir of heat thus retained by said riser portion, by internal heat conduction, reheats the workpiece portion and maintains such workpiece portion for an effective time period within the temperature range for artificial aging, thus obviating any need for the aging furnace used by the prior art. Preferably, the quench is immediately after the casting mold extraction (without the standard natural cooling, reheating, and solution heat-treatment, all prior to quenching), thus obviating also the need for a solution heat-treatment furnace, required by the conventional prior art.
Owner:TENEDORA NEMAK SA DE CV

Mobile Internet virtual key authorizing system and hardware door lock control method thereof

The invention relates to a mobile Internet virtual key authorizing system. The mobile Internet virtual key authorizing system comprises intelligent door locks with Bluetooth communication modules, a main smart phone with a Bluetooth communication module, a client smart phone with a Bluetooth communication module, and a server linked with all the smart phones through a wireless Internet. A control method comprises the following steps that firstly, each intelligent door lock with the Bluetooth communication module has a pair of RSA public and private secret keys; secondly, the server receives a secret key authorizing request of the main smart phone, generates an authorized secret key after verifying the ID of the main smart phone and sends the authorized secret key to the client smart phone; thirdly, the client smart phone and the intelligent door locks establish communication through Bluetooth; fourthly, the intelligent door locks obtain the secret key from the client smart phone through communication and then carry out comparison. By means of the system and the method, the effective time duration can be freely set, and thus the safety of virtual key remote authorization on the mobile Internet is greatly improved.
Owner:武汉市国扬科技集团有限公司

Channel monitoring method and device

The invention provides a channel monitoring method and device. The method is applied to a base station. The method comprises following steps: configuring a designated frequency of an energy saving signal to a terminal, defining designated effective time and range of the designated frequency, wherein the designated frequency is used to represent that the energy saving signal designates the effective range of subsequent discontinuous DRX receiving; generating a first notification message, which comprises the designated frequency and the designated effective time and range; sending the first notification message to a terminal so that the terminal can obtain the designated frequency and designated effective time and range from the first notification message, and according to the designated frequency and designated effective time and range, carrying out channel monitoring. The cooperation between an energy saving signal mode and a DRX mode is realized, if there is data, a base station can indicate a terminal to carry out intensive monitoring through the designated frequency; if there is no data, the base station can indicate the terminal to carry out sparse monitoring through the designated frequency; thus the channel monitoring efficiency is improved, and the resource waste is avoided.
Owner:BEIJING XIAOMI MOBILE SOFTWARE CO LTD

Multi-processing financial transaction processing system

A financial transaction processing system is disclosed, wherein substantial processing efficiencies are provided with, additionally, a substantial decrease in the size of the executable code. Each transaction processed by the transaction processing system is described by a transaction data descriptor that includes a series of subtransaction data descriptions of actions that can be performed independently of one another. Thus, complex transaction processing logic is substantially removed from the executable code, and instead such transaction data descriptors are processed interpretatively. Moreover, the independence of the subtransactions allows the subtransactions of a transaction to be processed in parallel when performed on a multiprocessor computer. Additionally, the transaction processing system provides account balancing enhancements in that there are control columns in various data tables that are automatically updated during transaction processing so that by comparing control column totals, an indication of the integrity of current financial records is provided. Additionally, the transaction processing system provides full auditability in that any changes to financial data can be traced for any effective period of time into the past so that auditors can periodically perform a full audit of the financial transaction data retained by the transaction processing system.
Owner:HINKLE WILLIAM H

Multi-processing financial transaction processing system

A financial transaction processing system is disclosed, wherein substantial processing efficiencies are provided with, additionally, a substantial decrease in the size of the executable code. Each transaction processed by the transaction processing system is described by a transaction data descriptor that includes a series of subtransaction data descriptions of actions that can be performed independently of one another. Thus, complex transaction processing logic is substantially removed from the executable code, and instead such transaction data descriptors are processed interpretatively. Moreover, the independence of the subtransactions allows the subtransactions of a transaction to be processed in parallel when performed on a multiprocessor computer. Additionally, the transaction processing system provides account balancing enhancements in that there are control columns in various data tables that are automatically updated during transaction processing so that by comparing control column totals, an indication of the integrity of current financial records is provided. Additionally, the transaction processing system provides full auditability in that any changes to financial data can be traced for any effective period of time into the past so that auditors can periodically perform a full audit of the financial transaction data retained by the transaction processing system.
Owner:N GINE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products