Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

81 results about "Identity mapping" patented technology

Log-on service providing credential level change without loss of session continuity

A security architecture has been developed in which a single sign-on is provided for multiple information resources. Rather than specifying a single authentication scheme for all information resources, the security architecture associates trust-level requirements with information resources. Authentication schemes (e.g., those based on passwords, certificates, biometric techniques, smart cards, etc.) are employed depending on the trust-level requirement(s) of an information resource (or information resources) to be accessed. Once credentials have been obtained for an entity and the entity has been authenticated to a given trust level, access is granted, without the need for further credentials and authentication, to information resources for which the authenticated trust level is sufficient. The security architecture allows upgrade of credentials for a given session. This capability is particularly advantageous in the context of a single, enterprise-wide log-on. An entity (e.g., a user or an application) may initially log-on with a credential suitable for one or more resources in an initial resource set, but then require access to resource requiring authentication at higher trust level. In such case, the log-on service allows additional credentials to be provided to authenticate at the higher trust level. The log-on service allows upgrading and/or downgrading without loss of session continuity (i.e., without loss of identity mappings, authorizations, permissions, and environmental variables, etc.).
Owner:ORACLE INT CORP

Virtual subscriber identifier system and method

The invention provides a virtual subscriber identifier system and method of a communication network. According to one embodiment of the invention, a subscriber generates virtual subscriber identifiers by him/her self, generates a subscriber identity mapping data by which a identifier service provider can figure out the real identifier of the owner of the virtual subscriber identifier, and informs peers of the virtual subscriber identifiers. The subscriber identify mapping data may be a data in which a virtual subscriber identifier is associated to the real identifier of the subscriber, and be registered by the subscriber with the identifier service provider. A peer generates a communicating request including a virtual subscriber identifier as target, and sends the request to the identifier service provider, the identifier service provider determines the real identifier of the subscriber from the subscriber identity mapping data, and forwards the communication between the peer and the subscriber's terminal. In another embodiment, the subscriber identity mapping data may be a secret data of the subscriber, by which the virtual subscriber identifier can figure out the real identifier of the subscriber. When receiving the communication request, the identifier service provider decrypts the real identifier of the owner of the virtual subscriber identifier from the secret data received from the peer. In one embodiment, the virtual subscriber identifier is generated from the public key of the subscriber. The virtual subscriber identifier may be equipped with a certificate, or be associated with a magic word. With the invention, the use of the virtual subscriber identifiers is more flexible to the system and versatile to the subscriber.
Owner:NEC (CHINA) CO LTD

Identity authentication method, identity authentication device, and computer-readable medium

The embodiment of the present application discloses an identity authentication method,an identity authentication device and a computer-readable medium. The method comprises the following steps: the second user node obtains the first identity mapping information corresponding to the first user address identification from the block chain according to the first user address identification of the first user, the first identity mapping information including the first user address identification, the first public key and the first identity fingerprint; the second user node obtains the first identitymapping information corresponding to the first user address identification from the block chain according to the first user address identification. Encrypting the second public key of the second userby using the first public key, obtaining an authentication request, and broadcasting the authentication request to the whole network; receiving identity feedback information; the feedback informationis verified according to the second user private key and the first identity fingerprint, and if the verification is passed, it is determined that the first user address identification is the user address identification of the first user. As shown in the embodiment of the present application, the user's public key can be distributed securely, efficiently and inexpensively, and the user's identitycan be effectively verified.
Owner:PING AN TECH (SHENZHEN) CO LTD

Rolling bearing fault diagnosis method based on multi-branch multi-scale convolutional neural network

The invention discloses a rolling bearing fault diagnosis method based on a multi-branch multi-scale convolutional neural network. The rolling bearing fault diagnosis method comprises the steps of: acquiring acceleration vibration signals of rolling bearings without faults and with different faults in different operating states at first; setting a fault state label according to the fault state corresponding to each acceleration vibration signal; standardizing each acceleration vibration signal; training a multi-branch multi-scale convolutional neural network model by taking the standardized acceleration vibration signals as a training sample, wherein the multi-branch multi-scale convolutional neural network model comprises a low-frequency branch convolutional network, an identity mapping branch convolutional network, a denoising branch convolutional network, a feature fusion layer, a global average pooling layer and a Softmax layer; and then acquiring current acceleration vibration signals of the rolling bearings, and sending the current acceleration vibration signals into the multi-branch multi-scale convolutional neural network model for fault diagnosis. By adopting the multi-branch multi-scale convolutional neural network model, the rolling bearing fault diagnosis method can effectively improve the fault diagnosis performance of the rolling bearing in a strong noise environment and under a variable load working condition.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Face retrieval method and apparatus as well as storage medium and device

The invention discloses a face retrieval method and apparatus as well as a storage medium and device, which belongs to the technical field of deep learning. The method comprises the following steps: acquiring a target face image to be retrieved; extracting features of the target face image according to each residual block connected successively in a deep residual network to obtain target face feature information, wherein any one residual block comprises an identity mapping and at least two convolution layers, and the identity mapping of any one residual block points, from an input end of anyone residual block, to an output end of any one residual block; and performing the face retrieval in a face database according to the target face feature information to obtain a face retrieval result, wherein the face retrieval result at least comprises an identity marker matched with the target face feature information. By adopting the face retrieval method and apparatus, the face retrieval is realized on the basis of the deep residual network, the retrieval accuracy of the deep residual network is not prone to influence by external factors, the face retrieval method is excellent in stability, and the face retrieval accuracy is also ensured.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1

Non-invasive load decomposition method and system

The invention discloses a non-invasive load decomposition method and system. According to the scheme, the method comprises the steps of acquiring a load total power sequence of a target user within aperiod of time; and based on the load total power sequence of the user and set load types, decomposing load total power to obtain power characteristic sequences of the load types in the time period according to pre-trained relations between the total power sequence and the power characteristic sequences of the load types, wherein the load types are determined by using conditions of household appliances by the user. The training process comprises the steps of performing receptive field amplification based on identity mapping and a time sequence. The non-invasive load is decomposed through the pre-trained relations between the total power sequence and the power characteristic sequences of the load types, so that the correctness and accuracy of a load decomposition result are improved; and inthe training process, the load total power is subjected to a receptive field method according to the time sequence through the identity mapping, so that the problem of gradient disappearance in the load decomposition process is solved, the receptive field is expanded, and the load decomposition result is more authentic.
Owner:CHINA ELECTRIC POWER RES INST +3

Method for realizing intelligent home based on RFID (radio frequency identification devices) labels and identity mapping of hash functions

The invention discloses a method for realizing an intelligent home based on RFID (radio frequency identification devices) labels and identity mapping of hash functions. The method specifically comprises the following steps: deploying an active RFID label for each home sensor, and putting active RFID label readers in corresponding intelligent home gateways; collecting real-time state index data by the sensors; encapsulating the collected real-time state index data and sensor parameters into the corresponding active RFID labels in the form of an electronic data table of a transmitter with the standard of IEEE1451.7; accessing the RFID labels by the active RFID label readers, performing normalized mapping transformation on the accessed RFID labels and the numbers of the intelligent home gateways through different hash functions, and generating identity symbols with unified lengths and formats; analyzing the numbers of the intelligent home gateways, the real-time state index data of various home detecting targets and the sensor parameters by an intelligent home monitoring and managing platform according to the corresponding hash functions. According to the invention, the wiring limitation of a wired network is solved, standard signal collecting interfaces and unified data formats of the sensors are realized, the safety is high, and the management is efficient and unified.
Owner:WUHAN POST & TELECOMM RES INST CO LTD

Method, system and access gateway for intercommunication between local equipment and IMS (IP Multimedia Subsystem) network

ActiveCN103338213AConversation processing is simple and convenientEasy to deployNetwork connectionsSession Initiation ProtocolDomain name
The invention discloses a method, a system and an access gateway for intercommunication between local equipment and an IMS (IP Multimedia Subsystem) network. The method comprises the steps that an IMS network host identity field is added in the SIP (Session Initiation Protocol); the collaborative fusion access gateway generates IMS network host identities and host names for the local equipment, then a mapping relationship between the IMS network host identities and the host names is registered in a DNS (Domain Name Server) in the IMS network; IMS users inquire to obtain the host identifies of the local equipment and write the host names and the host identities of the local equipment in the host identity field in SIP session requests; and the collaborative fusion access gateway performs addressing for the local equipment according to the host identity field to realize the adaptation and the forwarding of signaling protocols and data protocols between the local equipment and the IMS users. The collaborative fusion access gateway comprises a bottom layer interface management module, a local registration management module, a local session management module, a data transceiver module, an SIP signaling management module and an identity mapping management module. The method, the system and the access gateway for intercommunication between the local equipment and the IMS network have the advantages that the communication between the IMS users and the designated local equipment is realized and the application prospect is wide.
Owner:PLA UNIV OF SCI & TECH

Lattice-based multi-identity fully homomorphic encryption method

PendingCN111526002AImprove throughputCorrect fully homomorphic operationKey distribution for secure communicationPublic key for secure communicationIdentity transformAlgorithm
The invention discloses a lattice-based multi-identity fully homomorphic encryption method. The method comprises the following steps: initializing a system; extracting a user key: mapping the first user identity and the second user identity into a reversible matrix by using a full-rank function, and generating a first private key corresponding to the first user identity and a second private key corresponding to the second user identity through vector operation; performing ciphertext generation: obtaining encryption selection of a first user identity, selecting a plaintext message to be encrypted, and performing encrypting to obtain a first ciphertext; decrypting the single identity: decrypting the first user identity through a first private key to obtain a plaintext message; identity conversion: converting the first ciphertext of the first user identity into a second ciphertext corresponding to a second user identity through an identity conversion algorithm; and performing fully homomorphic evaluation: carrying out fully homomorphic operation on the ciphertext after identity conversion and then decrypting the ciphertext. Encryption and decryption of a ciphertext with a single identity are converted into encryption and decryption of a ciphertext with multiple identities, and correct fully homomorphic operation can be realized.
Owner:JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products