Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3188 results about "Restoration method" patented technology

Method, system, and program for recovery from a failure in an asynchronous data copying system

InactiveUS20050071708A1Application downtime is minimizedMemory loss protectionUnauthorized memory use protectionRecovery methodDevice form
A method of recovery from a data storage system failure in a data storage system having a host computer writing data updates to a local storage controller at a local site. The local controller is associated with a local storage device. The local storage controller is also configured to asynchronously copy the updates to a remote storage controller associated with a remote storage device at a remote site. In addition, the remote storage controller is configured to store a consistent point in time copy of the updates on a backup storage device. The consistent point in time copy is known as a consistency group. Upon detection of a failure associated with the local site, a determination is made whether a group of updates pending for storage on the backup storage device form an intact consistency group. If an intact consistency group has not formed, corrective action may be taken to create an intact consistency group. The recovery method further consists of synchronizing the remote storage device, initiating recovery operations and, upon recovery of the local site, resynchronization of the local storage device and the backup storage device to recovery consistency group without the need for full volume storage copies and while minimizing application downtime.
Owner:IBM CORP

Block chain key trusteeship and recovery method and device based on secrecy sharing technology

The invention discloses a block chain key trusteeship and recovery method and device based on a secrecy sharing technology. The method comprises the steps that A1, a user groups a private key sk1 in a(t, n) secrecy sharing mode, wherein the n is the number of fragments of shared secrecies obtained by splitting the private key, the t is the minimum number of the fragments for recovery of the private key, and the t is greater than or equal to 2 and is smaller than or equal to the n; A2, information containing user identification information is taken as a private key protection key, and then grouping encryption is carried out on the private key through utilization of the key; and A3, secrecy string information containing encrypted ciphertexts is dispersely stored to a block chain or is sentto trusted nodes for trusteeship and storage, when the user discovers that own private key is lost, a key recovery request is generated, at least t secrecy strings are obtained from the trusted nodesor the block chain in a secrecy string storage mode of the key, and the content in the secrecy strings is extracted, decrypted and recombined, so the private key is recovered. According to the methodand the device, the secrecy sharing technology is applied to a block chain scene for the first time, thereby solving the private key trusteeship and recovery security problem.
Owner:JUZIX TECH SHENZHEN CO LTD

Lightweight back-up and efficient restoration method of health block chain data encryption keys

The invention provides a lightweight back-up and efficient restoration method of health block chain data encryption keys.Body area networks achieve physiological parameters acquisition of healthy body health, health block chains are produced by a group of credible IT devices appointed by multiple health institutions and used for receiving and storing health data of the body area networks, the health block chain data encryption keys are produced by utilizing a fuzzy technology fuzzy vault and physiological signals acquired by the body area networks, human physiological data acquired in different time periods is encrypted by utilizing different data encryption keys and then is saved in the block chains of the IT devices without storage of historical data encryption keys; historical secret keys are restored by utilizing the health data acquired by the body area networks in real time.The lightweight back-up and efficient restoration method integrates the body area networks with the health block chains, avoids huge burden brought by secret key splitting related in a traditional secret key restoration method and safe storage and retrieval of shadow secret keys and greatly reduces management complexity of the health block chain data encryption keys.
Owner:QILU UNIV OF TECH

Digital oral fixed restoration method and device

The invention provides a digital oral fixed restoration method and device. Preparing and planning of a tooth preparation are completed by obtaining a three-dimensional digital model of an oral cavity of a patient before a dentist prepares the tooth preparation, and the tooth preparation is cured on a specially-made cutting guide plate, thereby greatly improving the quality of the tooth preparation prepared by the dentist and improving the efficiency of preparing the tooth preparation prepared by the dentist by the cutting guide plate. Furthermore, the invention can provide a complete set of digital scheme for oral fixed restoration, namely, simulation cutting of the three-dimensional digital model of teeth of the patient is completed in a computer, thereby acquiring a three-dimensional digital model of the tooth preparation of the patient; the oral fixed restoration body can be directly and digitally designed and manufactured on the basis. By virtue of the digital oral fixed restoration method and device, the tooth preparation cutting guide plate of the patient and the restoration body can be delivered to the dentist and the patient together; the patient can directly wear the individually designed and manufactured restoration body during accurate preparing of the tooth preparation; the efficiency and the effect of oral fixation can be greatly improved.
Owner:南京易形信息科技有限公司 +1

Packet restoration method, packet restoration system, and mobile terminal and intermediate device used in the method

The present invention discloses a technique for providing a packet recovery method, and the like, capable of starting packet recovery processing without waiting for a wasteful latency (time-out) at a mobile terminal by giving notice of information on a packet discard in a gateway device in real time, thereby enabling improvement in communication quality and communication efficiency. According to the technique, there is provided a packet recovery method for recovering a packet discarded by an intermediate device positioned on a communication path between a mobile terminal and a correspondent node of the mobile terminal among packets exchanged between the mobile terminal and correspondent node, the method including: a step of causing the intermediate device to transmit a discard notification message to the mobile terminal based on information on a communication flow for which transmission of the discard notification message indicating that the packet has been discarded is required; and a step of causing the mobile terminal to transmit the correspondent node a retransmission request message for requesting retransmission of the discarded packet based the discard notification message.
Owner:PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA

Edge information-based multi-scale blurred image blind restoration method

The invention discloses an edge information-based multi-scale blurred image blind restoration method, which comprises the following steps of: circularly and gradually restoring an image from a small scale layer to a large scale layer, setting self-adaptive parameters at different scales, and processing each scale layer, namely bilaterally filtering the restored image to obtain an image of which the noise and ripple are removed; performing shock wave filtering to obtain an image with high-strength contrast edges; solving the edges, and combining a fuzzy core initial value and a fuzzy graph to obtain an accurate fuzzy core; restoring a fuzzy image at the current scale to obtain a clear restored image by using the solved fuzzy core; sampling and amplifying in the current scale layer to obtain the restored image and a fuzzy core initial value of an adjacent large scale layer, and performing cycle operation on the adjacent large scale layer. The edge information-based multi-scale blurred image blind restoration method can effectively converge various images in different fuzzy degrees, and compared with a general blind restoration method which directly solves the energy minimization, the blurred image blind restoration method has the advantages of low computational complexity and high noise suppression capacity.
Owner:ZHEJIANG UNIV

Ecological restoration method for city watercourse

InactiveCN103882828AHas the ability to resist external interferenceEasy to viewWater resource protectionStream regulationEcological environmentRestoration method
The invention relates to an ecological restoration method for a city watercourse. The ecological restoration method for the city watercourse is characterized in that the polluted city watercourse is comprehensively restored with the combination of physical, biological and ecological technologies, the ecological theory is used for reference in the treatment process, the ecological idea is used as the guiding thought, a complex water ecosystem structure is constructed and restored, the original natural state of the watercourse is restored, the self-cleaning capacity of a river system is improved, the environment is beautified, and the local city microclimates are improved at the same time. The ecological restoration method mainly comprises the steps of (1) controlling a pollution source, (2) modifying the river bank, (3) optimizing the environment of the river bottom, (4) modifying the watercourse, (5) conducting aeration and oxygenation, (6) constructing an aquatic plant community, (7) constructing a fish and macrobenthos community, and (8) maintaining the system. The watercourse ecological system restored through the ecological restoration method has the certain anti-interference capacity, on the premise that a large amount of exogenous pollution is cut off, the certain-strength interference can be resisted, and the good ecological environmental effect is obtained. After one-time input, the better ecological benefit can be obtained only with a small number of maintenance costs.
Owner:深圳市益水生态科技有限公司

Method, system, and program for recovery from a failure in an asynchronous data copying system

A method of recovery from a data storage system failure in a data storage system having a host computer writing data updates to a local storage controller at a local site. The local controller is associated with a local storage device. The local storage controller is also configured to a synchronously copy the updates to a remote storage controller associated with a remote storage device at a remote site. In addition, the remote storage controller is configured to store a consistent point in time copy of the updates on a backup storage device. The consistent point in time copy is known as a consistency group. Upon detection of a failure associated with the local site, a determination is made whether a group of updates pending for storage on the backup storage device form an intact consistency group. If an intact consistency group has not formed, corrective action may be taken to create an intact consistency group. The recovery method further consists of synchronizing the remote storage device, initiating recovery operations and, upon recovery of the local site, resynchronization of the local storage device and the backup storage device to recovery consistency group without the need for full volume storage copies and while minimizing application downtime.
Owner:INT BUSINESS MASCH CORP

Restoration method for damaged ecosystem in steep-slope area in water-level-fluctuating zone of reservoir

The invention relates to a restoration method for a damaged ecosystem in a steep-slope area in a water-level-fluctuating zone of a reservoir. The method comprises the following steps:when the impounded water level is at the lowest point, cleaning the upstream slope in the water-level-fluctuating zone, and manually tamping; digging planting holes at the top of the slope, and planting Chinese red pines and the like to form a multifunctional protective forest belt; digging planting grooves and planting holes within the range of the water-level-fluctuating zone, laying jute geotextile, planting vetiver within the range with the water-level-fluctuating depth of 2m to form a hedgerow; and mixedly planting vetiver and wire grass within the range with the water-level-fluctuating depth of 2-10m to form a combined vegetation slope restoration belt. The protective forest belt, the hedgerow and the combined vegetation slope restoration belt form a three-dimensional restoration space together, thereby ensuring that plants can take roots and restore in the steep-slope area in the water-level-fluctuating zone. By restoring the vegetation in large area, the invention effectively reduces the overland flow and the soil erosion, and improves the fertility and the properties of the soil, thereby restoring the damaged ecosystem. The invention has the advantages of convenient construction and less investment, can not be easily damaged by water, and is applicable to the water-level-fluctuating zone of a reservoir with large water-level-fluctuating range and precipitous topography.
Owner:HUAZHONG AGRI UNIV

Database backup and recovery system based on block chain technology, and database backup method based on block chain technology, and database recovery method based on block chain technology

The invention provides a database backup and recovery system based on a block chain technology. The database backup and recovery system comprises a switching center, wherein the switching center is connected with a client side, is connected with one or a plurality of databases and is connected with one or a plurality of block chain nodes through a block chain adapter, and the switching center manages mapping relationships between the plurality of databases and the plurality of block chain nodes for data backup and recovery. The invention also provides a database backup method based on the block chain technology, and a database recovery method based on the block chain technology. The block chain technology is used, the characteristics that the block chain technology can not be tampered and can be permanently stored are utilized, meanwhile, data is distributed in the block chain nodes, overall failure caused by the faults of a center point can be avoided, so that safe and reliable database backup is realized, most of organizations can properly control cost and effectively deploy a backup scheme in existing environment to enable the requirements of most of organizations to be met, and the methods and the system can be generally implemented and have a very wide application scene.
Owner:BEIJING ZHONGXIANG BIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products