会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Constant temperature outlet structure
    • 恒温出口结构
    • US08757210B2
    • 2014-06-24
    • US13437728
    • 2012-04-02
    • Shaohua TangWuqin GaoXiaodong Li
    • Shaohua TangWuqin GaoXiaodong Li
    • E03C1/01E03C1/042
    • C25D7/04E03C1/0404Y10T137/9464
    • A constant temperature outlet structure is disclosed. A wall is disposed inside a housing of the constant temperature outlet structure. A cavity and an outlet pipeline are separated by the wall. A hose joint is disposed on the wall. A first hole of the housing is disposed corresponding to the outlet pipeline and a second hole is disposed at the wall. Two ends of the second hole are respectively connecting the cavity and the first hole. Thereby, the electroplating solution accumulated in the cavity surrounding the hose joint can be flowed downwardly from the second hole, through the first hole, and then discharged when the constant temperature outlet structure is slantwise hanged.
    • 公开了恒温出口结构。 壁设置在恒温出口结构的壳体内。 空腔和出口管道被墙分隔开。 软管接头设置在墙壁上。 壳体的第一孔对应于出口管道设置,第二孔设置在壁上。 第二孔的两端分别连接腔和第一孔。 因此,积聚在软管接头周围的空腔中的电镀液可以从第二孔向下流过第一孔,然后当恒温出口结构倾斜悬挂时排出。
    • 3. 发明申请
    • Secure group key management approach based upon N-dimensional hypersphere
    • 基于N维超球的安全组密钥管理方法
    • US20110058668A1
    • 2011-03-10
    • US12744480
    • 2009-03-31
    • Zhimin YangShaohua TangBorong Lu
    • Zhimin YangShaohua TangBorong Lu
    • H04L9/00
    • H04L9/0833
    • This invention publishes a secure group key management approach based upon N-dimensional hypersphere. After initialization, the GC admits the new members and assigns identifiers to them when there are new members joining the group, and deletes the leaving members' private information when there are members leaving the group. If a lot of members join and other members leave the group at the same time, the GC deletes the leaving members' private information, admits the new members, assigns indemnifiers to the new members, and then chooses mapping parameters, mapping each member's and its private information to the points in a multi-dimensional space. The GC calculates the central point of the hypersphere, and publishes the central point, the mapping parameter and the identifiers of leaving members if there are members leave. The group members calculate the mapping points, and then calculate the group keys. The invention can effectively reduce user storage, user computation, and amount of update information while re-keying. The independence of the group keys can be kept.
    • 本发明公开了基于N维超球面的安全组密钥管理方法。 初始化后,当新成员加入组时,GC会允许新成员并为其分配标识符,并在成员离开组时删除离开成员的私有信息。 如果许多成员加入其他成员同时离开组,则GC会删除离职成员的私人信息,承认新成员,向新成员分配赔偿,然后选择映射参数,映射每个成员及其成员 私人信息到多维空间中的点。 GC计算超球体的中心点,如果有成员离开,则发布中心点,映射参数和离开成员的标识符。 组成员计算映射点,然后计算组密钥。 本发明能够在重新键入时有效地减少用户存储,用户计算和更新信息量。 可以保留组密钥的独立性。
    • 4. 发明申请
    • Redundant Wireless Base Station
    • 冗余无线基站
    • US20080253280A1
    • 2008-10-16
    • US11971478
    • 2008-01-09
    • Shaohua TangEamonn F. Gormley
    • Shaohua TangEamonn F. Gormley
    • H04L12/26H04Q7/20
    • H04B1/74H04L1/22H04L69/40H04W24/04H04W88/08
    • In a redundant wireless network, a first baseband processing unit is defined as an active baseband processing unit and a second baseband processing unit as a standby baseband processing unit. An active address is associated with the first baseband processing unit and a standby address is associated with the second baseband processing unit. Subscriber traffic is routed to the first baseband processing unit via the active address. If the second baseband processing unit becomes an active baseband processing unit and the first baseband processing unit becomes a standby baseband processing unit, he active address is associated with the second baseband processing unit, and the standby address is associated with the first baseband processing unit. Subscriber traffic is routed to the second baseband processing unit via the active address.
    • 在冗余无线网络中,将第一基带处理单元定义为有源基带处理单元,将第二基带处理单元定义为备用基带处理单元。 活动地址与第一基带处理单元相关联,并且备用地址与第二基带处理单元相关联。 订户业务经由活动地址路由到第一基带处理单元。 如果第二基带处理单元变为有源基带处理单元,并且第一基带处理单元变为备用基带处理单元,则其活动地址与第二基带处理单元相关联,并且待机地址与第一基带处理单元相关联。 订户业务经由活动地址路由到第二基带处理单元。
    • 5. 发明授权
    • Group key management approach based on linear geometry
    • 基于线性几何的组密钥管理方法
    • US08848921B2
    • 2014-09-30
    • US13055380
    • 2009-12-24
    • Shaohua TangJintai DingGuangdong YangYujun Liang
    • Shaohua TangJintai DingGuangdong YangYujun Liang
    • H04L29/06G06F21/00H04L9/08
    • H04L9/0833H04L2209/08
    • A group key management approach based on linear geometry is disclosed. The approach includes the following steps: step 1: a group controller selects a mapping f and a finite field F; each group member selects a m-dimensional private vector over the finite field F, and sends it to the group controller via secure channel; step 2: the group controller selects a mapping parameter in the finite field F randomly, and maps the private vectors of all the group members into a new set of vectors by using the mapping f according to the mapping parameter; step 3: the group controller selects a random number k in the finite field F as a group key, and constructs a system of linear equations by using the new set of vectors and the group key; the group controller computes the central vector, and sends the central vector and the mapping parameter to all the group members via open channel; step 4: after the group members receive the central vector and the mapping parameter, the private vector of each group member is mapped to a new vector in a vector space according to the mapping parameter, and the group key is obtained by calculating the inner product of the new vector and the central vector. This invention requires small memory and little computation, has high security property, and is effective against brute-force attacks.
    • 公开了一种基于线性几何的组密钥管理方法。 该方法包括以下步骤:步骤1:组控制器选择映射f和有限域F; 每个组成员在有限域F上选择m维私人向量,并通过安全信道将其发送到组控制器; 步骤2:组控制器随机选择有限域F中的映射参数,并根据映射参数通过映射f将所有组成员的私有向量映射到新的向量集合; 步骤3:组控制器选择有限域F中的随机数k作为组密钥,并通过使用新的向量集合和组密钥构建线性方程组; 组控制器计算中心向量,并通过开放信道将中心向量和映射参数发送给所有组成员; 步骤4:组成员接收到中心向量和映射参数后,根据映射参数将每个组成员的私有向量映射到向量空间中的新向量,并通过计算内部产物获得组密钥 的新向量和中心向量。 本发明需要小的记忆和少量的计算,具有很高的安全性能,并且有效抵抗暴力攻击。
    • 7. 发明申请
    • Parallel Device For Solving Linear Equation Set In Finite Field
    • 用于求解有限域中线性方程组的并联装置
    • US20140297704A1
    • 2014-10-02
    • US14127227
    • 2012-05-25
    • Shaohua TangHaibo Yi
    • Shaohua TangHaibo Yi
    • G06F5/01
    • G06F5/01G06F7/724G06F17/12
    • The present invention relates to a parallel device for solving linear equations over finite fields, including a processor, an input port, an output port, a pivot finding component, a partial inversion component, a normalization component and an elimination component. The processor is connected to each of the pivot finding component, the partial inversion component, the normalization component, the elimination component, and the input port and the output port. The partial inversion component is connected to the elimination component and the normalization component. The pivot finding component is connected to the elimination component. The present invention enables parallel computing to a certain extent with fast solving speed and simple design, and thus can be widely used in various engineering fields.
    • 本发明涉及一种用于求解有限域线性方程的并行装置,包括处理器,输入端口,输出端口,枢轴发现部件,部分反转部件,归一化部件和消除部件。 处理器连接到枢轴发现组件,部分反转组件,归一化组件,消除组件以及输入端口和输出端口中的每一个。 部分反转分量连接到消除分量和归一化分量。 枢轴查找部件连接到消除部件。 本发明能够在一定程度上以快速求解的速度和简单的设计进行并行计算,从而可以广泛应用于各种工程领域。
    • 8. 发明申请
    • HIERARCHICAL GROUP KEY MANAGEMENT APPROACH BASED ON LINEAR GEOMETRY
    • 基于线性几何的分层组关键管理方法
    • US20130058479A1
    • 2013-03-07
    • US13386362
    • 2010-05-27
    • Shaohua TangYujun LiangJintai Ding
    • Shaohua TangYujun LiangJintai Ding
    • H04L9/00
    • H04L9/0836
    • A hierarchical group key management approach based on linear geometry is disclosed. The approach includes the following steps: step 1, the central controller selects a finite field F, a mapping parameter f and a constant N for use in the group; the central controller selects a N-dimensional private vector for each subgroup; step 2, the central controller selects a mapping parameter r and maps the private vector to a new set of vectors in the vector space; step 3, the central controller selects a subgroup key for each subgroup and constructs n linear systems of equations, and solves the solution of the linear equation systems, that is, the public vector, and the n sets of public vectors form a public vector; the public vector and the mapping parameter r are broadcasted or multicasted by the central controller to all the subgroup controllers; step 4, each subgroup controller solves the confidential vector of its own, and a set of key vectors is obtained by linear transformation of the confidential vector and the public matrix. This invention is simple and flexible, and is effective against brute-force attacks.
    • 公开了一种基于线性几何的分层组密钥管理方法。 该方法包括以下步骤:步骤1,中央控制器选择有限域F,映射参数f和常数N用于组中; 中央控制器为每个子组选择一个N维私人向量; 步骤2,中央控制器选择映射参数r,并将私有向量映射到向量空间中的一组新的向量; 步骤3,中央控制器为每个子组选择一个子组密钥,并构造n个线性方程组,并求解线性方程组解的解,即公共向量,n组公共向量形成一个公共向量; 公共向量和映射参数r由中央控制器广播或组播到所有子组控制器; 步骤4,每个子组控制器解决其自身的机密向量,通过机密向量和公共矩阵的线性变换获得一组关键向量。 本发明简单灵活,有效打击暴力攻击。
    • 9. 发明申请
    • GROUP KEY MANAGEMENT APPROACH BASED ON LINEAR GEOMETRY
    • 基于线性几何的组密钥管理方法
    • US20120263303A1
    • 2012-10-18
    • US13055380
    • 2009-12-24
    • Shaohua TangJintai DingGuangdong YangYujun Liang
    • Shaohua TangJintai DingGuangdong YangYujun Liang
    • H04L9/08
    • H04L9/0833H04L2209/08
    • A group key management approach based on linear geometry is disclosed. The approach includes the following steps: step 1: a group controller selects a mapping f and a finite field F; each group member selects a m-dimensional private vector over the finite field F, and sends it to the group controller via secure channel; step 2: the group controller selects a mapping parameter in the finite field F randomly, and maps the private vectors of all the group members into a new set of vectors by using the mapping f according to the mapping parameter; step 3: the group controller selects a random number k in the finite field F as a group key, and constructs a system of linear equations by using the new set of vectors and the group key; the group controller computes the central vector, and sends the central vector and the mapping parameter to all the group members via open channel; step 4: after the group members receive the central vector and the mapping parameter, the private vector of each group member is mapped to a new vector in a vector space according to the mapping parameter, and the group key is obtained by calculating the inner product of the new vector and the central vector. This invention requires small memory and little computation, has high security property, and is effective against brute-force attacks.
    • 公开了一种基于线性几何的组密钥管理方法。 该方法包括以下步骤:步骤1:组控制器选择映射f和有限域F; 每个组成员在有限域F上选择m维私人向量,并通过安全信道将其发送到组控制器; 步骤2:组控制器随机选择有限域F中的映射参数,并根据映射参数通过映射f将所有组成员的私有向量映射到新的向量集合; 步骤3:组控制器选择有限域F中的随机数k作为组密钥,并通过使用新的向量集合和组密钥构建线性方程组; 组控制器计算中心向量,并通过开放信道将中心向量和映射参数发送给所有组成员; 步骤4:组成员接收到中心向量和映射参数后,根据映射参数将每个组成员的私有向量映射到向量空间中的新向量,并通过计算内部产物获得组密钥 的新向量和中心向量。 本发明需要小的记忆和少量的计算,具有很高的安全性能,并且有效抵抗暴力攻击。
    • 10. 发明授权
    • Composite finite field multiplier
    • 复合有限域乘法器
    • US09201847B2
    • 2015-12-01
    • US14123761
    • 2012-05-25
    • Shaohua TangHaibo Yi
    • Shaohua TangHaibo Yi
    • G06F17/10G06F7/72
    • G06F17/10G06F7/724G06F2207/7209
    • A composite finite field multiplier is disclosed. The multiplier includes a controller, an input port, an output port, a GF((2n)2) multiplier, a GF(2n) standard basis multiplier, and a GF(2n) look-up table multiplier; the controller is connected respectively to the input port, the output port, the GF((2n)2) multiplier, the GF(2n) standard basis multiplier and the GF(2n) look-up table multiplier; the GF((2n)2) multiplier is connected respectively to the GF(2n) standard basis multiplier and the GF(2n) look-up table multiplier. By using the GF((2n)2) multiplier, the GF(2n) standard basis multiplier and the GF(2n) look-up table multiplier, the multiplication of three operands is realized. Compared with the existing multiplier, the multiplier of the present invention has significant advantages in the speed of multiplying three operands over GF((2n)m).
    • 公开了一种复合有限域乘法器。 乘法器包括控制器,输入端口,输出端口,GF((2n)2)乘法器,GF(2n)标准基乘法器和GF(2n)查找表乘法器; 控制器分别连接到输入端口,输出端口,GF((2n)2)乘法器,GF(2n)标准基乘法器和GF(2n)查找表乘法器; GF((2n)2)乘法器分别连接到GF(2n)标准乘法器和GF(2n)查找表乘法器。 通过使用GF((2n)2)乘法器,GF(2n)标准乘法器和GF(2n)查找表乘法器,实现了三个操作数的乘法。 与现有乘法器相比,本发明的乘法器在GF((2n)m)上乘以三个操作数的速度具有显着的优点。