Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

110 results about "Value code" patented technology

Copyright authorization method based on block chain

The invention discloses a copyright authorization method based on a block chain. The method comprises steps of: 1, uploading a work to a client so as to enable the work to become a multi-level hash value code identification document; 2, generating a self identity identifier in a copyright block chain database; 3, enabling a digital copyright gateway server to store the generated multi-level hash value code identification document uploaded by an applicant in self identity into a copyright block chain database; 4, enabling the applicant to fill in a copyright application agreement in detail through a digital copyright application website; 5, enabling the digital copyright application website system to search the duplicate records of various levels of digital identification codes in the block chain database, and to give a copyright authorization conclusion; 6, determining the ownership of copyright according to the copyright authorization conclusion, and sending to the applicant a copyright authorization certificate or an electronic copyright authorization certificate; and 7, enabling two copyright traders to apply for authorization and an authorization transaction at the digital copyright application website system. The method solves the shortcomings of conventional copyright authorization and ensures the high security and reliability of the copyright.
Owner:无锡井通网络科技有限公司

Tourism electronic contract digital certificate storage system and certificate storage method based on regional chain

The invention discloses a tourism electronic contract digital storage system and a storage method based on a regional chain, which comprises an electronic contract signing system, an electronic contract service database, a block chain access interface, a distributed block chain network module and a signature storage system. The electronic contract signing system includes contract establishing module, contract changing module, contract approving module, tourist signing module and contract filing inquiry module. The signature storage system comprises a hash operation module, an electronic signature module, a block creation module and a block chain forensics module. Hash operation is carry out on that business data related to the electronic contract to form the hash value code certificate data; Signing and encrypting the generated hash value encoded certificate data combined with the operator private key of the related service; Distributed storage of hash value encoded certificate data iscarried out in the node of the area chain; The invention adopts the block chain technology, realizes the electronic management of the contract, realizes the zero loss of the electronic contract data,and ensures that the transmission process cannot be tampered with.
Owner:MASHANGYOU TECH CO LTD

Prepaid pay television system

The aim of this invention is to propose an innovating way to offer access to paying TV to a large clientele all by drastically diminishing the costs connected to the management of the subscribers. This aim is reached by a system having a managing center (CAS) transmitting a data stream encrypted by control words (CW), these control words being included in control messages (ECM), this data stream intending to be received by at least one user unit (STB) linked to a security module (SC) identified by a unique address (UA), this security module (SC) containing a credit (CR) which is deducted according to the purchase of products or the consumption of data stream, characterized in that the security user comprises means to deduct the credit of an amount (M1) relating to a product or an amount (M2) relating to a duration (T), this amount (M1, M2) and/or this duration (T) being defined in the management message (ECM) or in a management message (EMM), the user having means to transmit to the managing center (CAS) a representative identifier of the unique address (UA) and a value code representing an amount (TA) of credit to reload (CR), the managing center having means to deal with and check the value code (VC) and to transmit, an encrypted message having the unique address (UA) and the amount (TA) to reload the credit (CR) to the security module (SC).
Owner:NAGRAVISION SA

Virtual press key realization method and device of Android system intelligent terminal

The invention discloses a virtual press key realization method and device of an Android system intelligent terminal. The method comprises the following steps of detecting whether the Android system intelligent terminal has the root authority or not; when the condition that the Android system intelligent terminal has the root authority is detected, judging whether the current application obtains the root authority or not; after the condition that the current application obtains the root authority is judged, determining the virtual press key function to be realized; obtaining key value code corresponding to the virtual press key function; creating and executing a shell instruction corresponding to the key value code; after the shell instruction is successfully executed, calling and executing the preset jar base file so as to perform reflection calling of an injection virtual press key function through the main function of the jar base file, wherein the jar base file stores files required for realizing the virtual press key functions; after the reflection calling of the injection virtual press key function is successful, realizing the virtual press key function. The method has the advantages that the virtual press key functions can be conveniently realized; low cost, flexibility and reliability are realized.
Owner:竞技世界(北京)网络技术有限公司

Method and system for extracting facial features

The invention provides a method and a system for extracting facial features. The method comprises the following steps of: 1, acquiring and comparing grayscale values of each pixel of a facial image and surrounding pixels in an image library, and determining grayscale difference values between the pixels and the surrounding pixels in the facial image; 2, performing probability density statistics on the grayscale difference values to obtain the accumulated probability distribution of the grayscale difference values, and encoding the grayscale difference values according to the accumulated probability distribution of the grayscale difference values and a requirement for the number of feature vector encoding bits to obtain grayscale difference value codes; 3, performing computation on the grayscale difference value codes in a linear local binary mode to obtain a feature vector P1 in a horizontal direction and a feature vector P2 in a perpendicular direction; 4, performing computation on the grayscale difference value codes on a statistical local binary mode to obtain a feature vector P3 in the horizontal direction and a feature vector P4 in the perpendicular direction; and 5, combining the feature vectors P1, P2, P3 and P4 to represent the facial features of the facial image.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Self-discharge screening method for improving matching consistency of lithium ion batteries

InactiveCN109482521AFully self-dischargedAccurate measurementSortingElectrical batteryScreening method
The invention discloses a self-discharge screening method for improving the matching consistency of lithium ion batteries. The self-discharge screening method for improving the matching consistency ofthe lithium ion batteries comprises the following steps that after the same batch of batteries are subjected to conventional capacity grading, 5-20% SOC state-of-charge electric quantity is charged in a 4-6A current constant current charging mode. After the batteries are put on hold at normal temperature for 24-48h, the battery voltage is measured as OCV1, then the temperature is turned to 45 DEGC, and the batteries are put on hold for 120-168h, then the battery voltage is measured as OCV 2, then the batteries are put on hold at normal temperature, the battery voltage is measured as OCV3 again, values of OCV1, OCV2 and OCV3 are measured, and the voltage difference is calculated, that is , delta V1= OCV1-OCV2 and delta V2= OCV2-OCV3; and an out-of-tolerance value code of the delta V1 is VO1, an out-of-tolerance value code of the delta V2 is VO2, a batch of out-of-tolerance batteries can be roughly eliminated with a VO1 set value, and then a batch of the batteries can be finely eliminated with a VO2 set value. The self-discharge screening method for improving the matching consistency of the lithium ion batteries has simple and convenient implementation, high matching precision, good consistency and high matching efficiency, and is especially suitable for batch production application.
Owner:JIANGSU FRONT NEW ENERGY +1

Binary code dictionary tree-based search method

The invention discloses a binary code dictionary tree-based search method. The method comprises the steps of obtaining a binary code of each image in a database, and dividing each binary code into m sections of substrings; for the jth sections of the substrings of all images in the database, establishing a binary code dictionary tree of the jth sections of the substrings, wherein the number of binary code dictionary trees is m, and each binary code dictionary tree comprises internal nodes and external nodes; obtaining the binary code of the to-be-queried image and the m sections of the substrings of the binary code; for the jth section of the substring of the binary code of the to-be-queried image, searching for the binary code with a Hamming distance not exceeding a value defined in the specification in the binary code dictionary tree corresponding to the jth sections of the substrings of all the images in the database; and traversing all the substrings of the binary code of the to-be-queried image to obtain a query result of each substring, wherein j is smaller than or equal to m. According to the method, the search quantity can be reduced during accurate nearest neighbor search of Hamming space, so that the search speed is increased.
Owner:PEKING UNIV

Implementation method of multi-channel temperature chip interface based on fpga

FPGA-based multi-channel temperature chip interface implementation method, the steps include: (1) frequency division to obtain the system clock (2) system reset (3) system initialization (4) simultaneously write to the n-way temperature chip and skip reading the ROM code, by writing 0 and write 1 operations are completed in order from low to high; then write the start temperature conversion code to n channels at the same time (5) judge whether n channels are busy, if all channels are busy, continue to query until n channels are not busy, the system performs the second Initialize (6) skip reading ROM codes for n channels at the same time, and then write and start reading temperature value codes for n channels at the same time (7) read the temperature values ​​of each channel and store them in corresponding registers, and address each shift register for The CPU reads (8) the system is reset, and a new round of temperature collection is started. The present invention realizes the method of generating timing in FPGA and communicating with multi-channel temperature chips through the idea of ​​parallel processing, and solves the existing problems of low temperature acquisition accuracy, too much FPGA resources occupied, and too much CPU time occupied by timing operations.
Owner:SICHUAN AEROSPACE LIAOYUAN SCI & TECH CO LTD

Keyboard input method of control system display control terminal

InactiveCN104007837AOvercome multi-functional operation needsRealize the mappingInput/output processes for data processingSoft keyKey pressing
The invention provides a keyboard input method of a control system display control terminal. According to the method, small keyboard physical keys, user function interface soft keys of the display control terminal and a mapping module are included, and the method comprises the steps that when the small keyboard physical keys are pressed, a key-pressing event is triggered, when the key trigger time at two times is longer than 300ms, the mapping module reads tab information of a main interface, the pressed key value code is scanned, the soft keys corresponding to the pressed key value are analyzed through the mapping module, the key attribute is changed to be true from acquiescent false, a static value change event is triggered, and the corresponding function trigger is achieved. The keyboard input method has the advantages that the defect that due to the facts that the space size is restrained, and the number of the small keyboard physical keys is limited, the multifunctional operation requirement of a user for the control system display control terminal cannot be met is overcome, reuse and expanding of the small keyboard physical keys is achieved, and the real-time man-machine interaction of a complex control system is completed.
Owner:BEIJING INST OF SPACE LAUNCH TECH +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products