-
公开(公告)号:US20240331441A1
公开(公告)日:2024-10-03
申请号:US18575813
申请日:2022-07-20
发明人: Peilin CHAI , Yixin DOU , Jiawei LAI , Kunpeng WANG , Kai BIAN , Jialiang KANG , Naigeng JI
IPC分类号: G06V40/16 , G06V10/75 , G06V10/774
CPC分类号: G06V40/172 , G06V10/75 , G06V10/774
摘要: Embodiments of the disclosure provide a recognition method, apparatus, device, and storage medium and relates to the field of artificial intelligence technology. The method includes obtaining a second decision-making threshold of a feature-matching model in a target scenario by joint testing of the feature-matching model and auxiliary detection model. The method takes into full consideration the mutual influence between different algorithm models in a scenario when multiple algorithm models are used for facial recognition. Compared to manually setting a decision-making threshold for each algorithm model independently, the methods in the disclosure are more adaptable to changing scenarios and scenarios with multiple models used in facial recognition. This improves the accuracy and efficiency of the obtained decision-making thresholds, thereby enhancing the accuracy of multi-model facial recognition.
-
公开(公告)号:US12088714B2
公开(公告)日:2024-09-10
申请号:US17619193
申请日:2020-07-10
发明人: Xi Shen , Jialiang Kang , Jien Zhou
CPC分类号: H04L9/14 , G06V10/10 , H04L9/3231 , H04L9/3239 , H04L9/3247
摘要: The application provides an image acquisition apparatus, a server, and encryption and decryption methods, and relates to the field of data processing. The image acquisition apparatus includes: an image acquisition device including an encryption processor and a data interface provided in the image acquisition device, wherein the encryption processor is configured to encrypt, by using a stored first key, image data acquired by the image acquisition device to obtain image ciphertext data; the data interface is configured to obtain the image ciphertext data and output the image ciphertext data to a terminal device. With the technical solution of the application, security of the image data can be ensured.
-
公开(公告)号:US20240281534A1
公开(公告)日:2024-08-22
申请号:US18570417
申请日:2022-08-15
发明人: Fen ZOU , Chengqian CHEN , Dingzhou LI , Xin WANG
CPC分类号: G06F21/57 , G06F21/53 , G06F2221/033
摘要: An electronic device and a trusted application calling method are provided. After a client application initiates call information, a trusted application development platform receives the call information, determines a native trusted application corresponding to first identification information of the electronic device carried by the calling information from native trusted applications corresponding to at least two (or more) TEE OSs connected to the trusted application development platform, and sends the calling information to the native trusted applications corresponding to the first identification information. The native trusted application corresponding to the first identification information receives the calling information, determines a bytecode trusted application corresponding to the second identification information from at least one bytecode trusted application installed in the native trusted application according to the second identification information carried by the calling information, and calls the bytecode trusted application corresponding to the second identification information.
-
公开(公告)号:US12045492B2
公开(公告)日:2024-07-23
申请号:US18013152
申请日:2021-09-18
发明人: Mingming Gan , Jijing Hu , Jie Li , Yanming Yang , Hai Zhao
IPC分类号: G06F3/06
CPC分类号: G06F3/0652 , G06F3/0607 , G06F3/067
摘要: This application provides a data storage method which is applied to a data storage device and includes: acquiring a first user identification and first user data of a first user; determining, from at least two preset distributed hosts in different areas, a first identification distributed host corresponding to the first user identification and a first data distributed host corresponding to the first user data; sending the first user identification to the first identification distributed host, so that the first identification distributed host stores the first user identification, and generates and stores a first identity identification corresponding to the first user identification; receiving the first identity identification; and sending the first identity identification and the first user data to the first data distributed host, so that the first data distributed host stores them in an associated manner.
-
公开(公告)号:US11830001B2
公开(公告)日:2023-11-28
申请号:US17044000
申请日:2019-01-25
发明人: Zhangyong Wei , Li Wang , Kunbiao Lu
CPC分类号: G06Q20/389 , G06F16/2379 , G06Q20/02 , G06Q20/0655 , G06Q30/0185 , G06Q40/12 , H04L63/12 , G06Q2220/00 , G06Q2230/00
摘要: A blockchain consensus method includes: an accounting node generating a block and broadcasting verification information of the accounting node to other accounting nodes among N accounting nodes; receiving and verifying acknowledgement information broadcast by the other accounting nodes; and adding the block to a blockchain when the received acknowledgement information satisfies a second set condition. The N accounting nodes are determined according to coin age information carried in election requests broadcast by M election nodes. The acknowledgement information broadcast by the other accounting nodes is generated and broadcast by a first accounting node when received preparation information of a second accounting node meets a first set condition; the preparation information of the second accounting node is generated and broadcast by the second accounting node when validating the verification information; and each of the first accounting node and the second accounting node is any one of the other accounting nodes.
-
公开(公告)号:US20230244405A1
公开(公告)日:2023-08-03
申请号:US18013152
申请日:2021-09-18
发明人: Mingming GAN , Jijing HU , Jie LI , Yanming YANG , Hai ZHAO
IPC分类号: G06F3/06
CPC分类号: G06F3/0652 , G06F3/067 , G06F3/0607
摘要: This application provides a data storage method which is applied to a data storage device and includes: acquiring a first user identification and first user data of a first user; determining, from at least two preset distributed hosts in different areas, a first identification distributed host corresponding to the first user identification and a first data distributed host corresponding to the first user data; sending the first user identification to the first identification distributed host, so that the first identification distributed host stores the first user identification, and generates and stores a first identity identification corresponding to the first user identification; receiving the first identity identification; and sending the first identity identification and the first user data to the first data distributed host, so that the first data distributed host stores them in an associated manner.
-
7.
公开(公告)号:US20230214815A1
公开(公告)日:2023-07-06
申请号:US17928542
申请日:2021-09-07
发明人: Zheng ZHANG , Wenbin QI , Hua CAI , Sishuang WAN
CPC分类号: G06Q20/3255 , G06Q20/401 , G06Q20/3829
摘要: A transaction method, a terminal device, a payment system, a merchant system, and a storage medium. The transaction method comprises: generating a payment request (101); sending the payment request in a rich media message format to a payment system (102); and receiving a payment processing result in a rich media message format from the payment system, wherein the payment processing result corresponds to the payment request (104). A user can make payment by sending and receiving rich media messages without needing to install multiple payment applications, thereby enabling convenient operation.
-
公开(公告)号:US11677815B2
公开(公告)日:2023-06-13
申请号:US17619745
申请日:2020-09-25
发明人: Bo Jiang , Jien Zhou , Tianyun Niu , Zhao Cheng , Fengke Wu , Zhengfeng Xu , Guanghui Shen
IPC分类号: H04L67/63 , H04L67/1008
CPC分类号: H04L67/1008 , H04L67/63
摘要: The application discloses a service invoking method, device, apparatus and medium. The service invoking method includes: receiving a first service request message sent by a service invoking end; determining, in response to the first service request message, header information of the first service request message; determining, under a condition that the header information includes a route identification, a target data center among a plurality of data centers according to the route identification; sending the first service request message to the target data center to enable the target data center to provide service for the service invoking end. Based on the embodiments of the application, efficiency of service invoking can be improved.
-
公开(公告)号:US20230080588A1
公开(公告)日:2023-03-16
申请号:US17799864
申请日:2021-01-13
发明人: Hang YUAN , Lijun ZU , Guobao LIU , Jun FU , Zhijie XUE
IPC分类号: H04L41/14 , H04L43/0811
摘要: The simulation device is provided with a user space and a network adapter. The method comprises: a simulation device obtains a serialization command of a simulation test and configures the serialization command for a plurality of MQTT client instances, controls the plurality of MQTT client instances to package the serialization command by using a simulation protocol stack of a user space so as to obtain a simulation message, transmits the simulation message to a network adapter, and the network adapter sends said message to an MQTT server for simulation testing.
-
公开(公告)号:US20220360441A1
公开(公告)日:2022-11-10
申请号:US17622610
申请日:2020-09-28
摘要: The application provides a data encryption and decryption method, device, storage medium, and encrypted file, and relates to the technical field of data processing. The method for data encryption includes: obtaining a first key, and performing an obfuscation operation on the first key and data to be encrypted to obtain obfuscation operation result data; obtaining a second key, and obtaining a first signature of the obfuscation operation result data according to the second key; obtaining a third key, and encrypting the first key, the data to be encrypted and the first signature using the third key to obtain a target ciphertext; obtaining a fourth key, and obtaining a second signature of the target ciphertext according to the fourth key; generating an encrypted file including the target ciphertext and the second signature. With the technical solutions of the application, security of data protection can be improved.
-
-
-
-
-
-
-
-
-