Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34 results about "String database" patented technology

Implement method for Chinese wubi cursive script dictionary query system

The invention relates to an implement method for a Chinese wubi cursive script dictionary query system. The method comprises a wubi cursive script character pattern query method as per Chinese character and a corresponding Chinese character query method as per wubi cursive script character pattern, wherein the wubi cursive script character pattern query method as per Chinese character comprises the following two steps: establishing a data mapping between a wubi cursive script character pattern and a corresponding Chinese character, and realizing web service and providing query function; the corresponding Chinese character query method as per wubi cursive script character pattern comprises the following two steps: establishing a characteristic word string database for a wubi cursive script character pattern, and establishing implement method and algorithm for recognizing the wubi cursive script character pattern. The implement method provided by the invention is original, and through applying the Chinese wubi cursive script query system established in the method, devotees of wubi cursive script can figure out the style of writing of corresponding wubi cursive script as per Chinese character, learners of wubi cursive script can query the corresponding Chinese character of a certain wubi cursive character pattern, and the method is beneficial for people to understand and learn Chinese wubi cursive script and is beneficial for worldwide popularization and application of Chinese cursive script.
Owner:张朝亮

Authentication method and system for CAPTCHA Turing test based on static characters

The invention discloses an authentication method and a system for CAPTCHA Turing test based on static characters. The authentication method and the system for the CAPTCHA Turing test based on the static characters include the following steps of establishing a communication connection between a server and a client, selecting randomly a static string in a static string database stored the server in advance, segmenting the static string into single characters, then calling a character image to generate a function which converts single characters into image representation, placing the single characters represented by the image into a region formed by a circular or elliptic boundary to show as a verification code on the client so as to carry out the Turing test CAPTCHA. Utilizing the region formed by the circular or elliptic boundary to place the verification code, the method can effectively prevent the character from being segmented by conventional pixel segmentation, and thus increases the difficulty of attack. The method carries out distortion, mirror image, and increasing interference lines for characters. The method carries out the characters arrangement according to the specific semantics of the characters and increases more human participation and can guarantee the safe man-machine interaction.
Owner:COMMUNICATION UNIVERSITY OF CHINA

Method and device for retrieving work order address of power distribution network

The invention provides a retrieval method for a work order address of a power distribution network and a retrieval device of the work order address of the power distribution network. The method comprises the steps that a target full-spelling character corresponding to the work order address is acquired; the target full-spelling character is retrieved in a pre-stored spelling character library; if the target full-spelling character is not retrieved in the pre-stored spelling character library, a target initial letter string of the target full-spelling character can be extracted; and the target initial letter string is retrieved in a pre-stored initial letter string database, and a first candidate address corresponding to a candidate initial letter string matched with the target initial letter string can be obtained. According to the scheme, retrieval are conducted for twice in different scopes, so that wrongly writer characters, homophonic characters, character surplus, character lack and so forth appearing in client address information can be corrected automatically, and thus the correct work order address can be found rapidly and accurately. In this way, situations such as confirmation of the work order address based on repeated contact with a client, and wrong work assignment caused by the wrong work order address can be avoided, and processing efficiency of work orders of the power distribution network can be increased.
Owner:STATE GRID SHANDONG ELECTRIC POWER +1

Firmware vulnerability discrimination method and system based on open source component version identification

The embodiment of the invention provides a firmware vulnerability discrimination method and system based on open source component version identification, and the method comprises the steps: scanning afirmware decoding package library, and obtaining a first path list of a to-be-analyzed component; traversing the first path list of the to-be-analyzed component, and associating and verifying the to-be-analyzed component and the open source component string database to obtain a second path list of the to-be-analyzed component; carrying out the version identification on the to-be-analyzed component to obtain a firmware open source component version number corresponding to the to-be-analyzed component; traversing the open source component version vulnerability dictionary, and if a firmware opensource component version number exists in the open source component version vulnerability dictionary, judging and knowing that the to-be-analyzed component is a suspicious vulnerability component; performing vulnerability verification on the suspicious vulnerability component, and storing the to-be-analyzed component passing the vulnerability verification into a firmware vulnerability component library. According to the embodiment of the invention, suspicious vulnerabilities can be efficiently searched, the reliability of firmware security evaluation is high, and the vulnerability discovery efficiency and accuracy are improved.
Owner:INST OF INFORMATION ENG CAS

Character string matching method based on finite state automation and content filtering equipment

The invention discloses a character string matching method based on a finite state automation and content filtering equipment. The character string matching method comprises the step of combining two sequence-associated states meeting the set conditions in a DFA (Deterministic Finite Automaton) to obtain a combined DFA; the corresponding matching process of character strings comprises the following steps of: sequentially reading characters from a character string database and judging whether the matching is character string matching according to the current state and the read characters; if not, skipping to the next state according to the current state and the read characters; if so, acquiring a matched character string of the current state from the corresponding storage address of the character string, reading next character and judging whether to be matched with next character matched with the character string or not; during matching, continuously reading next character and skippingto the next state until the character strings are successfully matched; and if not, skipping to the next state according to the current state and the read characters. By using the method, the times for accessing a memory during the matching of the character strings can be reduced and the speed and the efficiency for the matching of the character strings can be improved.
Owner:RUIJIE NETWORKS CO LTD

Beautifying home shop data monitoring method and device, equipment and medium

The invention provides a beauty salon shop data monitoring method and device, equipment and a medium. The method comprises the steps of acquiring branch store affair data in real time, extracting to-be-converted data from the branch store affair data, wherien the to-be-converted data comprise registered user data, project reservation data and financial data; acquiring local historical to-be-converted data, converting the local historical to-be-converted data into a historical character string, establishing a character string database according to the character string converted from the local historical to-be-converted data, converting the to-be-converted data into a to-be-identified character string, identifying the to-be-identified character string according to the character string database, and acquiring an identified character string; storing the identified character string into a character string database. The store data is converted into the character string form, the monitoring strength of a head office on the branch store data can be enhanced. Meanwhile, the store data is encrypted, and the store data is decrypted before conversion, so that the data can be effectively prevented from being tampered, and the authenticity of the branch store data is improved.
Owner:武汉安诠加信息技术有限公司

Computer-aided translation method and system for voice sequence and visual terminal

The invention provides a computer-aided translation method and system for a voice sequence and a visual terminal, and belongs to the technical field of computer-aided translation. The method comprises the following steps: translating a voice sequence of a first source language into a text sequence of a second target language, displaying a target text string in a predetermined picture format, and meanwhile, performing voice broadcast on an output text sequence of the second target language. The system comprises a recording storage subsystem, a pause point detection subsystem, a sequence segmentation subsystem, a target voice string recognition subsystem, a voice-to-text subsystem, an abstract generation subsystem, a text translation subsystem, a display subsystem, a voice broadcast subsystem, a sequence merging subsystem, a target voice string database and a target text string picture database. The invention further provides a visual terminal for implementing the method. According to the method, quick recognition and translation output display of key target voice strings can be realized for voice input sequences, and readability and relative integrity of translation results are realized while real-time performance of voice translation is ensured.
Owner:IOL WUHAN INFORMATION TECH CO LTD

Implementation method of Yizitong Chinese Wubi cursive dictionary query system

The invention relates to an implement method for a Chinese wubi cursive script dictionary query system. The method comprises a wubi cursive script character pattern query method as per Chinese character and a corresponding Chinese character query method as per wubi cursive script character pattern, wherein the wubi cursive script character pattern query method as per Chinese character comprises the following two steps: establishing a data mapping between a wubi cursive script character pattern and a corresponding Chinese character, and realizing web service and providing query function; the corresponding Chinese character query method as per wubi cursive script character pattern comprises the following two steps: establishing a characteristic word string database for a wubi cursive script character pattern, and establishing implement method and algorithm for recognizing the wubi cursive script character pattern. The implement method provided by the invention is original, and through applying the Chinese wubi cursive script query system established in the method, devotees of wubi cursive script can figure out the style of writing of corresponding wubi cursive script as per Chinese character, learners of wubi cursive script can query the corresponding Chinese character of a certain wubi cursive character pattern, and the method is beneficial for people to understand and learn Chinese wubi cursive script and is beneficial for worldwide popularization and application of Chinese cursive script.
Owner:张朝亮
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products