Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36 results about "Surrogate key" patented technology

A surrogate key (or synthetic key, entity identifier, system-generated key, database sequence number, factless key, technical key, or arbitrary unique identifier) in a database is a unique identifier for either an entity in the modeled world or an object in the database. The surrogate key is not derived from application data, unlike a natural (or business) key which is derived from application data.

Multi-dimensional OLAP (On Line Analytical Processing) inquiry processing method facing column storage data warehouse

The invention discloses a multi-dimensional OLAP (On Line Analytical Processing) inquiry processing method facing a column storage data warehouse. In the multi-dimensional OLAP inquiry processing method, the OLAP inquiry is decomposed into a bitmap filtering operation, a grouping operation and an aggregation operation. In the bitmap filtering operation, firstly, the predication is executed on a dimension table and a predicate vector bitmap is generated; and a connection operation is converted into a direct dimension table record access operation by surrogate key address mapping so as to implement access according to the positions. In the grouping operation, the pre-generation of grouping units is carried out on fact table records which meet the filtering conditions according to grouping attributes in an SQL (Structured Query Language) command and increasing IDs (identity) are distributed. In the aggregation operation, the grouping aggregation calculation which is carried out according to a grouping item of a grouping filtering vector of a fact table is implemented by carrying out column scanning on the metric attribute of the fact table for once. According to the invention, all OLAP processing tasks can be completed only by carrying out column scanning on the fact table for once, so that the cost of repeatedly scanning is avoided.
Owner:RENMIN UNIVERSITY OF CHINA

Using gaa to derive and distribute proxy mobile node home agent keys

A Generic Authentication Architecture bootstrapping procedure is performed between a mobile terminal and a bootstrapping server function resulting in the mobile terminal and the bootstrapping server function each acquiring at least a bootstrapping transaction Identifier associated with the mobile terminal and a corresponding shared key. The mobile terminal derives a network application function specific key based on at least the acquired shared key and an identifier of said network application function. The bootstrapping transaction identifier and the network application function specific key are sent from the mobile terminal to the proxy mobile node. A request message for Mobile Internet Protocol registration is sent from the proxy mobile node to a home agent on behalf of the mobile terminal, the request message including the bootstrapping transaction identifier and an identifier of the proxy mobile node. The registration message is verified in the home agent with the use of a network application function specific key obtained from the bootstrapping server function or a network application function. The request message for Mobile Internet Protocol registration is authenticated with the proxy mobile node acting on behalf of the mobile terminal by verifying the message authentication code with the obtained network application function specific key.
Owner:WSOU INVESTMENTS LLC

Method and system for certificateless and pairing-free identity-based proxy signcryption

The embodiment of the invention provides a method and a system for certificateless and pairing-free identity-based proxy signcryption. The method mainly comprises the following steps: a sender generates a private key and a public key thereof according to common parameters of the system and identity information parameters of the sender, generates proxy information based on the private key and the public key thereof, and sends the proxy information to a proxy; after the proxy information passes verification of the proxy, the proxy generates a proxy key, performs signcryption on a message needing to be sent based on the proxy key and the common parameters of the system to obtain a signcrypted message and an intermediate parameter, and sends the signcrypted message and the intermediate parameter to a receiver; and the receiver recovers the signcrypted message with the use of the intermediate parameter and the common parameters of the system to obtain a recovered message, and verifies the recovered message. The certificateless and pairing-free identity-based proxy signcryption scheme provided by the embodiment of the invention has both signature and encryption characteristics and has the feature of proxy. A key generation center only generates part of keys of a user, no certificate is needed, and the problem of key escrow is solved.
Owner:AEROSPACE INFORMATION

OLAP grouping aggregation method based on function dependency relationship

The invention relates to an OLAP grouping aggregation method based on a function dependency relationship. The method comprises following steps: a function dependency tree structure among grouping attributes is defined, and the function dependency relationship between the grouping attributes and attributes among tables is defined; the grouping attribute of the GROUP BY clause is detected according to the grouping attribute function dependency tree; a query grouping attribute is divided into two subgroups which are formed by function dependency key attributes and other grouping attributes respectively; mode resolution is performed on a dimension table according to the function dependency relationship, wherein the dimension table adopts surrogate key mechanism and memory column storage mechanism; under the mechanisms of dimension table mode resolution and surrogate key index, grouping aggregation calculation further converts the subgroup attributes into function dependency attributes; after the grouping aggregation calculation is completed, the function dependency attributes are directly mapped to a memory offset address of related dimension table records according to function dependency attribute values to complete the operation of extracting other related grouping attributes. By means of the method, the size of grouping attributes can be reduced, and the Hash grouping calculating efficiency is increased.
Owner:RENMIN UNIVERSITY OF CHINA

Hash calculation method and signcryption method based on homomorphic chameleon Hash function

The invention discloses a Hash calculation method and a signcryption method based on a homomorphic chameleon Hash function. According to the provided homomorphic chameleon hash function, a chameleon hash value result adopts a logarithm form, a signcryption result based on the hash in the signcryption method is also a logarithm form, so that the homomorphic property is achieved, the homomorphic aggregation can be conducted in hash calculation, hash is more efficiently calculated, and the homomorphic chameleon hash function has both the homomorphic state and the key leakage prevention characteristics. The signcryption method is realized on the basis of the homomorphic chameleon hash function, the homomorphic aggregation signcryption ensures the homomorphism, the system public parameters generated by the system initialization are used together by the chameleon hash function and the signcryption, and two password schemes share one set of system parameters, so that multiple function effectscan be realized under one set of shared system parameters, and multiple functions are supported under the same framework. Secondly, the proxy key generation and proxy re-signature steps realize the proxy re-signature, and the non-repudiation is realized through a repudiation step.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Anti-quantum computing proxy digital signature method and signature system based on asymmetric key pool, and computer equipment

The invention relates to an anti-quantum computing proxy digital signature method and an anti-quantum computing proxy digital signature system based on an asymmetric key pool, and computer equipment.The anti-quantum computing proxy digital method comprises the steps that: an original signature party uses a signature private key of the original signature party to generate a proxy key, and transmits an original text to be signed, the proxy key and a public key pointer random number corresponding to a signature public key of the original signature party to a proxy signature party; the proxy signature party obtains the signature public key of the original signature party from a secret key card of the proxy signature party according to the public key pointer random number, and utilizing the signature public key to verify the proxy key; performing signature operation on the original text by utilizing the proxy key to generate a file signature by the proxy signature party after the verification passes, and transmitting the original text, the file signature and the public key pointer random number to a verification party; and the verification party obtains a signature public key of the original signature party from a secret key card of the verification party according to the public key pointer random number, and verifies file the signature by utilizing the signature public key.
Owner:RUBAN QUANTUM TECH CO LTD

A query optimization method based on join index in data warehouse

The invention relates to a query optimization method based on a connection index in a data warehouse. The steps are: creating a connection index of a fact table foreign key based on a dimension table proxy key; creating a connection index update strategy; when there is a predicate condition on the dimension table, through the connection After the index directly accesses the dimension table records, it needs to judge the predicate, and refer to the bitmap connection index to generate the connection bitmap index through dynamic bitmap connection index calculation; when the selection rate on the dimension table is very low, the dimension table bitmap is further compressed to improve the dimensionality. The cache level of the table bitmap calculation; the calculation method of the reference bitmap connection index based on the coprocessor memory calculation is adopted, and only the array and the bitmap data structure are used to calculate the simple memory address access. The invention can effectively improve the computing performance of the bitmap index, and can be combined with high-performance coprocessors such as GPU and Xeon PhiTM to accelerate the computing performance of the index, and can be widely used in the field of data warehouses.
Owner:RENMIN UNIVERSITY OF CHINA

Certificateless and pairless identity-based proxy signcryption method and system

The embodiment of the invention provides a method and a system for certificateless and pairing-free identity-based proxy signcryption. The method mainly comprises the following steps: a sender generates a private key and a public key thereof according to common parameters of the system and identity information parameters of the sender, generates proxy information based on the private key and the public key thereof, and sends the proxy information to a proxy; after the proxy information passes verification of the proxy, the proxy generates a proxy key, performs signcryption on a message needing to be sent based on the proxy key and the common parameters of the system to obtain a signcrypted message and an intermediate parameter, and sends the signcrypted message and the intermediate parameter to a receiver; and the receiver recovers the signcrypted message with the use of the intermediate parameter and the common parameters of the system to obtain a recovered message, and verifies the recovered message. The certificateless and pairing-free identity-based proxy signcryption scheme provided by the embodiment of the invention has both signature and encryption characteristics and has the feature of proxy. A key generation center only generates part of keys of a user, no certificate is needed, and the problem of key escrow is solved.
Owner:AEROSPACE INFORMATION

A Grouping Aggregation Method of Olap Based on Functional Dependency

The invention relates to an OLAP grouping aggregation method based on a function dependency relationship. The method comprises following steps: a function dependency tree structure among grouping attributes is defined, and the function dependency relationship between the grouping attributes and attributes among tables is defined; the grouping attribute of the GROUP BY clause is detected according to the grouping attribute function dependency tree; a query grouping attribute is divided into two subgroups which are formed by function dependency key attributes and other grouping attributes respectively; mode resolution is performed on a dimension table according to the function dependency relationship, wherein the dimension table adopts surrogate key mechanism and memory column storage mechanism; under the mechanisms of dimension table mode resolution and surrogate key index, grouping aggregation calculation further converts the subgroup attributes into function dependency attributes; after the grouping aggregation calculation is completed, the function dependency attributes are directly mapped to a memory offset address of related dimension table records according to function dependency attribute values to complete the operation of extracting other related grouping attributes. By means of the method, the size of grouping attributes can be reduced, and the Hash grouping calculating efficiency is increased.
Owner:RENMIN UNIVERSITY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products