Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

343 results about "Hidden data" patented technology

Stealth packet switching

Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and / or optical stealth-enabled networks using specially modified packets, cells, frames, and / or other “stealth” information structures. This enables stealth packets to have a low probability of detection, a low probability of interception, and a low probability of interpretation. Stealth packets are only detected, intercepted, and correctly interpreted by stealth-enabled network equipment. In its simplest form, stealth packet switching modifies the packet structure, protocols, timing, synchronization, and other elements through various rule-violations. This creates stealth packets, which normal equipment cannot receive correctly, and hence normal equipment discards the stealth packets. Stealth packets may be further enhanced with encryption techniques which focus on encrypting the packet structure itself, as opposed to merely encrypting the data. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques. Combining stealth packets with time-based reservation packet switching enables total encryption of the packet (including header and preamble encryption) capable of routing through multiple hops without decryption of headers and preamble at each hop. Time-based reservation packet switching can also guarantee real-time stealth packet delivery through a network that is totally congested from data storms, virus caused congestion, and / or denial of service attacks.
Owner:HOWE WAYNE RICHARD

System and method for secret communication

We present a communication system which enables two or more parties to secretly communicate through an existing digital channel which has a primary function other than this secret communication. A first party receives a series of cover data sets, hides a certain amount of auxiliary data in the cover data sets, and then relays these cover data sets containing hidden data to a second party, aware of the hidden data. This second party may then extract the hidden data and either restore it to its original state (the state it was in before the first party received it) and send it along to its original intended destination, or may just simply extract the hidden auxiliary data. There exist a plethora of techniques for hiding auxiliary data in cover data, and any of these can be used for the hiding phase of the system. For example, in a JPEG cover data set, a Huffman table may be modified in such a way as to have no impact on the observable nature of the image, and several such schemes are presented here. Since there are so many ways in which to exploit a particular cover data set for secret communication, it is necessary that the first and second parties have pre-established a set of rules by which they will communicate. There must be agreement on the hiding technique, cover data type and location of the hidden data within the cover.
Owner:IBM CORP

High-efficiency visible monitoring analysis system for large-scale traffic data

InactiveCN103309964AQuick comprehension comparisonLowering the Barrier to AnalysisDetection of traffic movementSpecial data processing applicationsData streamDensity based
The invention relates to a high-efficiency visible monitoring analysis system for large-scale traffic data. The system is mainly based on a visible 'fingerprint' data model previously proposed by an inventor; the collected original traffic data is converted into the visible 'fingerprint' data model through a data conversion module under large-scale real-time data flow; and complex abstract conceptions such as periodic flow changes, track exceptions and hidden data errors in the traffic data can be visualized into simple and intuitional visual effects so as to provide automatic detection and analysis of city hot spot regions based on density, road traffic flow analysis based on historical traffic flow dynamic properties and real-time monitoring analysis of the traffic track exceptions based on vehicle historical data and statistic information for a user. The periodical flow change properties in the large-scale traffic data are analyzed in real time based on the historical data and the statistic information to find hidden rules and errors so as to provide analysis and support for the decision of the user. Therefore, the convenience is provided for an analyzer to quickly understand the data and the information, the analysis threshold is reduced, the application range is expanded, and the analysis efficiency and accuracy are improved.
Owner:GUANGZHOU HKUST FOK YING TUNG RES INST

Power system transient stability evaluation method based on deep learning technology

The invention relates to a power system transient stability evaluation method based on a deep learning technology. Firstly, a time domain simulation method is used to generate a sample set {x<0>, y<0>}; characteristic variable vectors are then extracted according to the sample set, and a training set {x<1>, y<0>} is formed, wherein the training set is the characteristic variable vector set; training parameters are determined, a stacked automatic encoder is trained based on the training set, characteristic extraction is carried out on the training set to generate a calculation set {x<2>, y<0>};and finally, based on the calculation set, classification model training is carried out on a convolution neural network, and a power system transient stability evaluation model is formed. The stackedautomatic encoder is used to carry out layer-by-layer characteristic extraction on the characteristic variable vectors, a hidden data mode is mined, high-order characteristics more facilitating transient stability evaluation are formed, the convolution neural network is further used to build a stable classification model, the evaluation performance of the model is thus ensured, the misjudgement rate of unstable samples can be reduced, noise interference in a wide area measurement system of the power system can be effectively overcome, and an important significance is provided for online safeand stable evaluation on the power system.
Owner:STATE GRID HUBEI ELECTRIC POWER COMPANY +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products