Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

73 results about "Random interval" patented technology

Method of randomly and dynamically checking configuration integrity of a gaming system

In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and verifiable manner is disclosed. The dynamically generated executable modules are created on a server machine and are themselves signed using industry standard PKI techniques, and contain randomly chosen subset from a repertoire of proven hashing and encryption algorithms that are executed on the system to be checked to create a unique signature of the state of that system. The dynamically generated executable module returns the signature to the server machine from which it was downloaded and deletes itself from the system being checked. The next time such an executable module is downloaded, it will contain a different randomly chosen subset of hashing and encryption algorithms. The server that is performing the system configuration integrity check maintains a database of expected system configurations and performs the same subset of hashing and encryption algorithms as contained in the dynamically generated executable module. The result returned by the downloaded executable module is compared to that computed locally, and an error condition is raised if they do not match.
Owner:IGT

Method of randomly and dynamically checking configuration integrity of a gaming system

In a gaming environment, a method of periodically downloading dynamically generated executable modules at random intervals that perform system configuration integrity checks in a secure and verifiable manner is disclosed. The dynamically generated executable modules are created on a server machine and are themselves signed using industry standard PKI techniques, and contain randomly chosen subset from a repertoire of proven hashing and encryption algorithms that are executed on the system to be checked to create a unique signature of the state of that system. The dynamically generated executable module returns the signature to the server machine from which it was downloaded and deletes itself from the system being checked. The next time such an executable module is downloaded, it will contain a different randomly chosen subset of hashing and encryption algorithms. The server that is performing the system configuration integrity check maintains a database of expected system configurations and performs the same subset of hashing and encryption algorithms as contained in the dynamically generated executable module. The result returned by the downloaded executable module is compared to that computed locally, and an error condition is raised if they do not match.
Owner:IGT

Method and apparatus for creating an expanded functionality digital video disc

A method and apparatus for creating an expanded functionality digital video disc (DVD) creates an enhanced DVD with index tables for the program streams on the DVD. Index tables point to key locations in an MPEG program stream with each entry in the index table set to point to a group of pictures (GOP) header in the MPEG stream. The invention can select GOP headers at predefined intervals, semi-random intervals, or at key locations. The invention creates an index table either during storage of a program stream on a hard disk, during a scan of program material already stored on a local hard disk, or while program material is being read out of the hard disk and written to a DVD. The invention adds a new directory to the DVD structure and writes the index table(s) for the stream(s) into the directory. The new directory and its content are only recognized by invention-enabled DVD players and DVRs. Each media stream file in the VIDEO_TS and AUDIO_TS directories has a corresponding index table file in the new directory. Alternatively, the index table files could be stored in the respective VIDEO_TS and AUDIO_TS directories. When an enhanced DVD created by the invention is inserted into a invention-aware DVR or DVD player, the index table files on the DVD are utilized to enable smooth special effects functionality.
Owner:ROVI PROD CORP

High-throughput screening system and method of fast growing microalgae strains

InactiveCN106148159AImprove accuracySolve the technical bottleneck of difficult to obtain single-cell level analysisBioreactor/fermenter combinationsBiological substance pretreatmentsBiotechnologyHigh-Throughput Screening Methods
The invention belongs to the technical field of biology and particularly relates to a high-throughput screening system and method of fast growing microalgae strains. The system comprises a liquid drop monodisperse single cell wrapping unit and a reinjecting screening unit. The method comprises steps as follows: microalgae cells are washed and dispersed in gel to proper concentration and injected into a micro-fluidic chip to form monodisperse single cell liquid drops, and microspheres wrapped in an oil phase are subjected to deoiling, filtration and redispersion and cultured in a constant-temperature incubator; whether living cells exist and the growing speed of the cells are judged according to imaging by the aid of an inverted microscope, gel amplification pictures are collected through random interval sampling, gel microspheres where the cells grow are counted, the growth condition of microalgae in the single cell level is further monitored, and the microalgae strains with remarkable growth rate difference are separated on the basis. According to the constructed high-throughput screening system and method of the fast growing microalgae strains, the system is simple, the cost is low, and the system and the method can be used for screening of phenotypic correlation of growth of a mutant library of alga.
Owner:SOUTHWEST UNIVERSITY +1

Press machine upper cross beam robust optimization design method based on negative ideal solution close distance

ActiveCN109992848AIn line with engineering practiceOvercome the disadvantage of uncertain optimization resultsGeometric CADForecastingPerformance functionGenetic algorithm
The invention discloses a press machine upper beam robust optimization design method based on a negative ideal solution approaching distance. The method comprises the following steps: considering randomness of loads borne by an upper cross beam of a press machine and interval uncertainty of material attributes of the upper cross beam, and establishing a robust optimization design model for upper beam with random-interval mixed uncertainty variable based on a 6 sigma robustness design principle;directly solving the optimization model based on a double-layer nested genetic algorithm; enabling the inner layer to perform interval robustness analysis on each design vector by using a Kriging prediction model, and calculate a mean value and a standard deviation of the target function and each constraint performance function by using a Monte Carlo method; and enabling the outer layer to use an inner layer calculation result, and classify sort and optimize all the design vectors based on the constraint performance function total feasible robustness coefficient and the negative ideal solution close distance. The method conforms to engineering practice, subjective interference is avoided, andgood engineering practicability is achieved.
Owner:ZHEJIANG UNIV

Voice encryption and decryption method for conversion parties on basis of voice print

The invention relates to a voice encryption and decryption method for conversion parties on the basis of voice print, comprising the following steps of: (1) exchanging a section of shared secret by conversion parties; (2) starting the voice conversation by conversion parties, and determining a format of a network transmission packet; (3) in the process of conversion, calculating the MFCC (Mel Frequency Cepstral Coefficient) parameter of the voice characteristic information of self at certain interval by a voice sender, and extracting a secret key from the MFCC parameter; (4) numbering a voicepacket participating in calculating the MFCC parameter when the voice sender sends the voice packet; (5) receiving the voice packet by a voice receiver, and splicing the voice packet containing sequence numbers in order, calculating the MFCC parameter, and extracting the secret key from the MFCC parameter; (6) after the voice sender finishes sending the voice packet containing the vocal print secret key, sending a countdown voice packet at certain interval; and (7) after receiving the countdown voice packet, beginning countdown by the voice receiver, and replacing the current secret key when time is up, wherein both parties have symmetrical operation from steps (3) to (7). The voice encryption and decryption method generates the secret key by the voice characteristics of conversion parties, the length of the secret key can be chosen as required, and randomness is excellent.
Owner:HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products