Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33 results about "Number series" patented technology

True random number generator

The invention discloses a true random number generator, comprising a stochastic source module and a post-processing module. The stochastic source module is used for generating digital signals having random characteristics and providing the digital signals for the post-processing module; the post-processing module carries out post-processing for the digital signals by using a loop code error-correcting method, thereby eliminating bias of data signals to obtain random number series. The stochastic source module can be composed of a plurality of sets of inverter oscillating rings, and the post-processing module is realized by a linear feedback shift register (LFSR). The TRNG (True Random Number Generator) has simple structure and only general digital logic devices are used, so the true random number generator has good technology weak correlation and can be rapidly transplanted in an integrated circuit design flow after prototype verification is carried out, thereby improving the efficiency of module design and reducing the development risk.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and apparatus for delivering certificate revocation lists

The present invention discloses an apparatus and method for delivering a revocation list over a one-way broadcast network to receivers with limited memory capabilities. In one example, the revocation list is partitioned to form a first certificate revocation list (CRL) sequence if the number of entries in the revocation list exceeds a predetermined value. Individual identification numbers belonging to a first identification number series are subsequently assigned to partitions of the first CRL sequence. Afterwards, the first CRL sequence is interleaved into a first content transport stream.
Owner:GOOGLE TECH HLDG LLC

Method, system, client and server for providing related audio information

The invention discloses a method, a system, a client and a server for providing related audio information. The method comprises the following steps: a client resolves local audio files and acquires audio segments with a set duration as original fingerprint data; frames of the original fingerprint data are segmented, and fast Fourier transform (FFT) is carried out to each frame so that the originalfingerprint data are transformed into a set of number series as the fingerprint information of the client; the fingerprint information of the client is sent to a special server to match fingerprint information prestored in the server; and when the fingerprint information of the client is successfully matched with one fingerprint information of the server, audio information corresponding to the fingerprint information of the server is searched and submitted to the client. The invention ensures that the local audio files of the client has integral and uniform audio information and improves theuse experience of a user.
Owner:北京亮点时间科技有限公司

High-Security Communication System, and Transmitter and Receiver Both Used Therein

The objective of the invention is to provide an encoding method and a communication method wherein bit-error correction is easy for a authorized recipient but difficult for an unauthorized recipient. A transmission channel in which bit errors are moderately controlled is used to transmit / receive a random number sequence. A common key is shared between a transmitter and a receiver in advance; each bit value of the common key is connected with each slot of the random number sequence; the common key is used to divide the random number sequence into two or more random number series in accordance with the connection; and each random number series is independently encoded and parity check symbols are generated. The unit of the encoding is equal to or greater than the length of the common key so as to make a partial analysis by an unauthorized recipient impossible.
Owner:HITACHI LTD

Deterministic random number generator for cryptography and digital watermarking

A deterministic random number generator comprising:number series generator adapted to generate an infinite Pi series;summation means adapted to generate a partial sum of said infinite Pi series;computation means adapted to compute a finite sequence from said partial sum of infinite Pi series;shuffling means adapted to shuffle said computed finite sequence to obtain a shuffled sequence;masking means adapted to mask said shuffled sequence to obtain a masked sequence;non-linear function means adapted to process said masked sequence to obtain a non-linear processed sequence; andlinear feedback shift register means adapted to receive and shift bits of said non-linear processed sequence in a pre-determined manner to obtain a deterministic random number and a method for generating a deterministic random number for cryptography and watermarking.
Owner:TATA CONSULTANCY SERVICES LTD

Authentication encryption method, authentication decryption method, and information-processing device

An information-processing device is provided with: a plaintext input unit for inputting plaintext; an initial vector generation unit for generating an initial vector; a common key block encryption unit for performing common key block encryption on the initial vector and generating an encrypted initial vector; a pseudorandom number generation unit which, accepting the encrypted initial vector as input, generates a pseudorandom number series in the same length as the plaintext; a keyed hash unit which, accepting the first portion of a ciphertext in which the pseudorandom number series and the plaintext are exclusive-OR'ed as input, generates a hash value; and a ciphertext output unit for concatenating the second and first portions of a ciphertext in which the hash value and the encrypted initial vector are exclusive-OR'ed and outputting the concatenated portions as a ciphertext.
Owner:NEC CORP

Method of gaining access to a device

The method is for activating a device. A communication device (14) is provided that is in communication with a server unit (20) that has a processor for generating a number series (38). An application device (16) has a processor (19) for generating a number series (36). The communication device (14) is not communicating directly with the application device (16). The user sends a message (32) including the identification number (30) to the server (20). The server (20) identifies a code number pointed at by a pointer (44) and sends back the code number. The pointer (44) steps forward in the number series (38) at predetermined time intervals. The user enters the code number into the application device (16). The processor (19) compares the code number with a number pointed at by a pointer (37) and sends an activation signal to an activation device (16) to activate the application device.
Owner:TELKEY SOLUTIONS AB

Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon

InactiveUS7003666B1Preventing overwriting and replacementAuthentication smallUser identity/authority verificationUnauthorized memory use protectionData seriesPattern recognition
An object of the present invention is to provide an information embedding / tamper detecting apparatus and method capable of distinguishing between changes caused by image processing and intentional image tampering, and further capable of localizing, on a regional basis, a tampered position on an image. A tamper-detection-information embedding apparatus 1 divides the image into a plurality of frequency bands to obtain transform coefficients, and then generates a pseudo-random number series by using key data, and further generates authentication data. The key data and the authentication data are embedded in the transform coefficients of MRA and MRR, respectively. the image in which the information is embedded is reconstructed by using MRA and MRR. A tamper-detecting apparatus 2 extracts the key data from MRA obtained by dividing the image into frequency bands and generates the authentication data assumed to have been embedded, and further extracts the embedded information from MRR. The image is divided in to a plurality of blocks composed of a predetermined number of pixels. For each block, an information series embedded in the transform coefficients of MRR representing the same spatial region as the unit block is compared, for verification, with the corresponding authentication data series so that the tamper is determined on a regional basis.
Owner:SOVEREIGN PEAK VENTURES LLC

Data encryption device and memory card

The invention provides a data encryption device that can perform high-speed access to an arbitrary page when encrypting data and writing it to a storage device that can be accessed in a page unit or reading data therefrom and decrypting it. The device: encrypts data and writes it to the storage device or reads data from the storage device and decrypts it by a stream cipher; uses a counter mode of a block cipher to generate pseudorandom number series; specifies a data position in the storage device based on a page number and a page block number, by dividing one page into plural page blocks having a block length of the block cipher; and uses a value determined by a function of the page number, the page block number, and an arbitrary offset value, as an initial value of a pseudorandom number to be used in the counter mode.
Owner:SHARP KK

Date display assembly for an electronic device

A date display assembly for displaying the day of the month in an electronic device, the assembly comprising a units ring and a tens disc, the units ring comprising at least one series of numerals from 0 to 9 and the tens disc comprising a series of numerals from at least 1 to 3 and optionally the numeral 0; wherein the units ring and the tens disc being positioned relative to each other so as to display in the space of a window two numerals side by side, one of which is carried by the units ring and the other of which is carried by the tens disc, wherein the units ring is divided into ten sectors or a multiple of ten sectors each separating the numerals 0 to 9, the one sector separating the numerals 9-0 having an angular extent equal to ¾ of the angular extent of the sectors separating the other numerals. In the preferred embodiment, the device is a timepiece and a wristwatch in particular.
Owner:TIMEX GROUP

A verification code generation method based on hidden graphics

The invention relates to a verification code generation method based on hidden graphics, which comprises the following steps: S1, presetting M large graphics, each containing N sub-graphics; 2, extract n sub-graphics from N sub-graphics of each large graphics, and preprocess that n sub-graphics; 3, randomly selecte J graphics and correspond pre-processed K sub-graphics from that large graphics; 4,randomly selecte k sub-graphics as a verification code accord to that K sub-graphics obtained after the pre-processing at random; S5: setting the obtained k subgraph number series to S0; S6: outputting the selected k verification codes to the front end, and simultaneously recording the output sequence S1 of the k verification codes; S7: outputting J large graphics to the front end S8: setting a rule for selecting an implied sub-graphics; S9, recording the input and the clicking sequence of the authentication code clicked by the user, and generating the input series S0 'and the sequence sequence S1'; S10, respectively comparing the values of S0 and S0 'and the values of S1 and S1', and judging whether the authentication code input by the user is correct or not.
Owner:XIAMEN UNIV TAN KAH KEE COLLEGE

Network topology system and method

A network topology system comprises a plurality of nodes, each of the plurality of nodes having a set of connection rules which is built by the steps of: generating a series of prime number differences; generating a series of communication strategy numbers; extracting as many terms as the number of connecting nodes from a recursive sequences to serve as an index series; generating a series of connection strategy numbers by extracting the Nth terms from the series of communication strategy numbers, wherein N stands for each number of the index series; and generating a series of connecting nodes numbers by calculating the sum of each odd number and each term of the series of connection strategy numbers so as to build the connection rules for each odd-numbered node to connect the nodes numbered in corresponding with the numbers of the connecting nodes number series.
Owner:NAT CHENG KUNG UNIV

LED chip thermal vibration accelerated life prediction method based on gray system theory

The invention discloses a LED chip thermal vibration accelerated life prediction method based on gray system theory, which comprises the following steps: firstly, applying acceleration stress under different loading modes to an LED chip, and acquiring life experiment original data under different acceleration stress; then, carrying out grey processing on the experiment original data by using a grey system theory to obtain grey analysis data, and constructing a grey system theory prediction model; and finally, carrying out grey correlation degree analysis on the constructed grey system theory model. Compared with the prior art, the grey system prediction model does not need to consider a temperature-vibration interaction relationship and a statistical model related to a physical failure rule, and can obtain efficient and accurate prediction and evaluation. According to the method, the service life of the LED chip under the thermal and vibration double stress in normal work can be estimated through the original service life data under the acceleration stress and the number series prediction of the gray system theory, the prediction result is closer to the engineering practice, and ascientific data theory reference basis can be provided for designing and producing the LED chip with high performance and high stability.
Owner:JIANGSU UNIV

Chinese intelligent telephone capable of batch updating push-to-talk service

The invention provides a one-key-is-enough service Chinese intelligent telephone which can be mass-refreshed, belonging to the communication filed and aiming at overcoming the defects that the one-key-is-enough function of the common PSTN telephone lacks of flexibility and can not be mass-upgraded and the Chinese intelligent telephone is low in popularizing rate, wherein a PSTN network based Chinese intelligent telephone panel is additionally provided with more than one one-key-is-enough service grouping keys, each of which is responsible for C to 9 one-key-is-enough services, thereby when a grouping key is pressed, the one-key-is-enough service list which includes service names and service number series corresponding to the number key of 0 to 9 is displayed; when a corresponding number key is pressed, the one-key-is-enough service dial can be directly realized; the names and the short code dialing contents in the one-key-is-enough service list can be modified and refreshed by the PC communication or a built-in intellect SIM card read-write device; the grouping key can also be renamed by silk-screen printing again or using the self-adhesive tapes with printing types; the invention can meet the requirements of the telecommunication voice added value and the flexible customization of the industry VIP clients.
Owner:北京益通利智能通讯技术有限公司

Multi-speed ring oscillator

An annular oscillator comprises a control circuit for receiving the frequency selecting signal; the frequency selecting signal can be operated as processing the selection in at least two different annular oscillator frequencies; the control circuit uses the control signal to generate a first control signal and a second control signal; a main chain with the odd number series-connecting connections, the main chain comprises a main switch non-gate; the main switch non-gate is responding to the first control signal which can be operated as implementing the logical non-function or ignoring function for the first oscillating inputting signal to output the first outputting signal; and a slave chain series-connecting non-gate; the slave chain is collaterally connected to the main switch non-gate of the main china at least; the slave chain comprises a slave switch non-gate; the slave switch non-gate is responding to the second control signal which can be operated as implementing the logical non-function or ignoring function for the second oscillating inputting signal to output the second outputting signal.
Owner:TECH PROPERTIES

Hollow thin electric conduction link

InactiveCN106129757ARealize the application of continuous rotary functionRotary current collectorSlip ringNumber series
The invention relates to the technical field of electrical apparatuses and particularly provides a hollow thin electric conduction link. The traditional electric conduction link mostly has a solid shaft, collector rings and electric brushes are arranged in an axial overlapped mode, no channel for adding of wires exists in the axis direction, line connection between certain execution devices in need of serial connection and with relative rotary motion relies on external open wires, playing of the continuous rotary function of devices is limited, and the devices can only rotate within 360 DEG. In order to solve the problem of wire number application expansion of the electric conduction link, the invention provides a hollow and thin electric conduction link, and a certain number of wires can pass through the hollow channel. With a middle piece associated with a fixing ring and a moving ring, radial and axial constraints on the moving ring by the fixing ring are formed, an electric conduction link structure with the fixing ring and the moving ring capable of rotating relatively combined into a whole is formed, a hollow hole in the moving ring becomes the channel for expanding the wires, and the purpose of wire number series expansion can be realized.
Owner:沈阳凤天机器人科技有限公司

A code bearer

The present invention relates to a code bearer, a data-coding device and a method for coding data onto a bearer, provided for manual reading of a first code followed by an input of the first code to a machine, said bearer comprising at least one numerical data field comprising the first code as a series of multiple figures. A second code is generically provided specifying the numerical data field with the first code through modulo arithmetic with a predetermined base, represented by at least one symbol accomplished through compressing each series of multiple figures in the at least one data field. The symbols are concatenated in a predetermined pattern for entering into the machine, wherein enhanced readability of the first code through the symbol pattern applied for the first code is accomplished, thus providing an aid for facilitated, protected and error-minimized input of data belonging to the first code into the machine / apparatus.
Owner:KOZICA MARCUS +1

Method of Gaining Access to a Device

The method is for activating a device. A communication device (14) is provided that is in communication with a server unit (20) that has a processor for generating a number series (38). An application device (16) has a processor (19) for generating a number series (36). The communication device (14) is not communicating directly with the application device (16). The user reads an identification number (30) and sends a message (32) including the identification number (30) to the server (20). The server (20) identifies a code number (42c) pointed at by a pointer (44) and sends back the code number (42c). The user enters the code number (42c) into the application device (16). The processor (19) compares the code number (42c) with a number (40c) pointed at by a pointer (37) and sends an activation signal to an activation device (18) to activate the application device.
Owner:MAGNUSSON NIKLAS +1

Method for storing character string matching rule and character string matching by storing rule

The invention discloses a method for storing character string matching rules. The method divides the keywords of the rules to be saved into several sub-keywords, each sub-keyword is connected in series with the corresponding leaf number to form a string, and then the Word strings are used as keywords to construct leaves in the rule tree, so that the keyword of the rule and the data part of the rule are inserted into the rule tree to save; the invention also discloses a method for string matching using the rule tree, which will be The matching string is divided into several sub-keywords, each sub-keyword is concatenated with the corresponding leaf number to form a string, and the longest prefix match of these strings is found in the above rule tree, so as to realize the string matching process. The method can save long character string matching rules, and because no subtree is needed when using the rule tree to save the rules, it can reduce the occupation of hardware resources and improve the processing capacity.
Owner:HUAWEI TECH CO LTD

Management of calling name delivery in telephone networks providing for telephone number portability

A system and a method for managing calling name (CNAM) queries in a plurality of telephone networks (1-3) including a plurality of subscribers (10, 30, 50) each assigned a telephone number in a predetermined number series associated with a particular switch (12, 32, 52) in one of the telephone networks, wherein at least one of the number series is a portable number series including telephone numbers assigned by one network but connected to another network. According to the present invention (FIGs. 2A-B), if the calling party number (CgPN) belongs to a portable number series, gapping will be applied to CNAM queries containing either portable telephone numbers associated with a location routing number (LRN) identifying the switch and network to which the CgPN is connected, or non-portable telephone numbers belonging to the same number series as the LRN. On the other hand, if the CgPN does not belong to a portable number series, gapping will be applied to CNAM queries containing telephone numbers belonging to the same number series as the CgPN.
Owner:TELEFON AB LM ERICSSON (PUBL)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products