Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31 results about "Random series" patented technology

Ultrasound excitation method for eliminating robot ultrasound ranging system interference

An ultrasonic excitation method for eliminating the crosstalk of a robot ultrasonic ranging system adopts the pseudo-random pulse position modulation mode for constructing a sole transmitting sequence for each ultrasonic transducer and uses the genetic optimization algorithm for optimizing the time interval between the adjacent pulses in the pseudo-random pulse position modulation sequence, thus allowing the duration of the transmitting sequence of each ultrasonic transducer to be 1.5 to 2ms. The ultrasonic excitation method comprises the following steps: 1. a string of pulse signals X are generated; 2. K groups of different pseudo-random series Psi are generated; 3. the pulse positions in the pulse signals X are respectively modulated by using the K groups of pseudo-random series, thus obtaining K groups of pseudo-random pulse position modulation sequences; 4. the best pseudo-random pulse position modulation sequence of the K groups is obtained; 5. K groups of ultrasonic transducers are respectively excited. The ultrasonic excitation method can lead each ultrasonic transducer to have the sole transmitting sequence, thus fundamentally avoiding the occurrence of the crosstalk; the real-time requirement of the robot navigation can be ensured; the working efficiency of a robot ultrasonic obstacle avoidance system can be effectively improved; and the reliability of the robot ultrasonic obstacle avoidance system can be greatly improved.
Owner:TIANJIN UNIV

Wireless encryption smart home remote monitoring method and system

The invention provides a wireless encryption smart home remote monitoring method, and the method comprises the steps: S0, storing an alarm drive instruction at a smart home control center in advance, and carrying out the statistics of the type and time of a control instruction sent by a mobile terminal; S1, prestoring the same random number list, wherein the random number list comprises a plurality of random numbers and the reading sequence of the random numbers; S2, transmitting a calculation result to the intelligent smart home control center through a self-defining communication protocol; S3, enabling the smart home control center to read the random numbers in the random number list stored at the smart home control center according to the reading sequence of the other random numbers sent by the mobile terminal, employing an asymmetric algorithm for calculation, and enabling the smart home control center to transmit the calculation result to the mobile terminal through the self-defining communication protocol; S4, enabling the mobile terminal to read the random numbers in the random number list stored in the mobile terminal according to the reading sequence of the other random numbers, and employing the asymmetric algorithm for calculation.
Owner:浙江凡双科技有限公司

Equipment area provable security verification method with resistance to collusion attack

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.
Owner:XIDIAN UNIV

Lithium ion battery protector

The invention discloses a lithium ion battery protector which comprises a circuit break protection switch made of shape memory alloy. The circuit break protection switch comprises two contacts at the two sides. At a normal temperature, the contacts at the two sides are contacted; and when at a memory temperature, the contacts at the two sides are separated. The lithium ion battery protector utilizes the memory performance of the shape memory alloy, so that the anti-interference and anti-high-voltage capability and passive over-current capability are improved, and a complex protection system for the lithium ion battery is simplified; and the battery is modularized, so that the defects, such as short service life, poor stability, weak anti-interference capability, weak anti-high-voltage capability and weak anti-over-current capability and the like at present, of an electronic semiconductor (such as MOSFET) are overcome, and the problem of the safety of the lithium ion battery is effectively solved. The physical characteristics of the material of the switch are utilized, so that when temperature signals are utilized to trigger the switch, the cell balancing and over charge inhibition function are taken into consideration, the battery module can be guaranteed to realize predictable random series/parallel connection usage, and the usage threshold of the power lithium battery is reduced.
Owner:SINONEWENERGY SUZHOU TECH

Ultrasound excitation method for eliminating robot ultrasound ranging system interference

An ultrasonic excitation method for eliminating the crosstalk of a robot ultrasonic ranging system adopts the pseudo-random pulse position modulation mode for constructing a sole transmitting sequence for each ultrasonic transducer and uses the genetic optimization algorithm for optimizing the time interval between the adjacent pulses in the pseudo-random pulse position modulation sequence, thus allowing the duration of the transmitting sequence of each ultrasonic transducer to be 1.5 to 2ms. The ultrasonic excitation method comprises the following steps: 1. a string of pulse signals X are generated; 2. K groups of different pseudo-random series Psij are generated; 3. the pulse positions in the pulse signals X are respectively modulated by using the K groups of pseudo-random series, thus obtaining K groups of pseudo-random pulse position modulation sequences; 4. the best pseudo-random pulse position modulation sequence of the K groups is obtained; 5. K groups of ultrasonic transducers are respectively excited. The ultrasonic excitation method can lead each ultrasonic transducer to have the sole transmitting sequence, thus fundamentally avoiding the occurrence of the crosstalk; the real-time requirement of the robot navigation can be ensured; the working efficiency of a robot ultrasonic obstacle avoidance system can be effectively improved; and the reliability of the robot ultrasonic obstacle avoidance system can be greatly improved.
Owner:TIANJIN UNIV

Device area provable security verification method against collusion attack

The invention discloses an equipment area provable security verification method with resistance to collusion attack and mainly solves the problem of absence of a security verification method with areas as credential information in existing position-based cryptography technologies. The implementation scheme of the method comprises steps as follows: a provable security verification model is built, and a prover is located in a target area; verifiers select information sources and random series and share information with one another, and the verifiers replay information in a broadcasting manner; a metric value is generated by the prover, and a verification value is calculated, and position information of the prover is broadcasted; the verifiers verify correctness of the verification value, whether the position information of the prover is accepted is judged, if the verification value passes the verification, the position information of the prover is broadcasted, otherwise, the verification value does not pass the verification, that is, the position claimed by the prover is not in the area, and the verification is finished. According to the method, any prover in the target area can effectively resist the collusion attack of multiple opponents after verification, and the security verification of the position of the prover is realized. The method can be used for verifying whether the equipment, namely, the prover, is located in the target area.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products