Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 31. Отображено 31.
22-12-2016 дата публикации

THIRD-PARTY APPLICATION CHARGING METHOD AND APPARATUS, AND APPLICATION FUNCTION DEVICE

Номер: WO2016201999A1
Принадлежит:

Provided are a third-party application charging method and apparatus, and an application function device. The third-party application charging method comprises: an operator charging control system receiving a user third-party application session request message initiated by an application function device, wherein the session request message includes a third-party application subscription user identifier of a user; and the operator charging control system performing charging management on a third-party application of the user according to the session request message. The solution solves the problem in the prior art that usage amount counting and charging execution cannot be performed according to a third-party subscription user identifier, providing an individual usage amount and charging bill regarding a third-party application for a subscription user of the third-party application, enabling settlement and account checking of the two parties.

Подробнее
24-06-2010 дата публикации

METHOD FOR REALIZING POLICY AND CHARGING CONTROL

Номер: WO2010069170A1
Принадлежит:

A method for realizing Policy and Charging Control (PCC), includes that: the Policy and Charging Rules Function (PCRF) receives a policy and charging rules request message sent by the Policy and Charging Enforcement Function (PCEF), then compares acquired service flow of user with accumulative used flow, and according to the comparing result, constitutes PCC rule in term of local configured or acquired flow control policy. PCRF of the present invention makes PCC rule decision according to acquired service flow of user, accumulative used flow and flow control policy, and transmits PCC rule to the PCEF to execute. And, PCEF reports to PCRF when the service flow of user arrives at a threshold, PCRF makes PCC rule decision again and transmits to PCEF to execute, consequently the purpose of policy and charging control according to the service flow of user is achieved.

Подробнее
27-06-2023 дата публикации

Edge-end collaborative deep learning calculation acceleration system and method

Номер: CN116341624A
Принадлежит:

The invention relates to an edge-end collaborative deep learning calculation acceleration system and method, the system comprises at least one terminal device (1) and at least one edge server (2), and the terminal device (1) is configured to: under the condition of entering the service range of the at least one edge server (2), the terminal device (1) is configured to execute the edge server (2) on the condition of entering the service range of the at least one edge server (2); determining a strategy of interlayer partition and/or intra-layer partition of a deep learning model based on first configuration information of the edge server (2) and second configuration information of the edge server (2); the edge server (2) is configured to respond to reasoning request information, and execute strategies of inter-layer partition and/or intra-layer partition of the deep learning model for collaborative reasoning. According to the method, the execution time of the DNN model is predicted by adopting ...

Подробнее
20-08-2015 дата публикации

VISIT POLICY CONTROL METHOD AND DEVICE

Номер: WO2015120731A1
Принадлежит:

Disclosed are a visit policy control method and device. The method comprises: receiving, by a visit policy and charging rules function entity (VPCRF), an IP-CAN session establishment request which is sent by a visit policy and charging enforcement function entity (VPCEF), and sending the IP-CAN session establishment request to a home policy and charging rules function entity (HPCRF); and receiving, by the VPCRF, a policy and charging control function (PCC) rule which is sent by the HPCRF, and sending the PCC rule to the VPCEF, wherein the PCC rule is made by the HPCRF according to the IP-CAN session establishment request and subscription information. The present invention solves the problem in the related art of the defect of a Gx port roaming solution based on the VPCEF and the HPCRF, and has the effects of enhancing the permission of a VPCRF policy, achieving a visit policy control and roaming a local service.

Подробнее
08-09-2017 дата публикации

A cow's mobile data management system and method thereof

Номер: CN0104599059B
Принадлежит:

... 本发明公开了种基于智能手机和移动互联网的奶牛移动数据管理系统及其方法,包括奶牛手机客户端,奶牛服务器端和奶牛网页浏览器端。用户可以使用奶牛手机客户端向奶牛服务器端发送奶牛的实时数据,奶牛服务器端从奶牛网页浏览器端接收经过科研单位分析过的数据结果,用于奶牛饲养中。科研单位通过网页浏览器端浏览奶牛服务器端的实时数据,研究分析结果指导用户生产。奶牛移动数据管理系统可以广泛应用于牛场,奶牛散户,科研机构等奶牛饲养个相关领域,科学严谨,易于使用,对我国农业信息化和现代化具有积极的推动作用。 ...

Подробнее
16-05-2023 дата публикации

Graph processing apparatus and method

Номер: CN116127135A
Принадлежит:

The invention discloses a graph processing device and method, relates to the field of data processing, and aims to improve the throughput of data processing. The graph processing device comprises at least one kernel, a topology-aware traversal path regularization (TATR) circuit and a prefetch index (PI) circuit, the TATR circuit is used for obtaining a common traversal path according to vertexes accessed by at least one kernel in the graph structure, and the common traversal path is used for indicating a sequence of the vertexes accessed by the at least one kernel; and the PI circuit is used for sending the information of the vertexes to at least one kernel according to the sequence indicated by the common traversal path.

Подробнее
12-09-2017 дата публикации

A virtualization environment to a task under the parallel programming model optimization method

Номер: CN0104765613B
Автор: 吴松, 金海, 彭亚琼
Принадлежит:

... 本发明公开了种虚拟化环境下面向任务并行编程模型的优化方法;在位于客户虚拟机的前端监控部分获取任务并行编程模型中失败的窃取操作;在位于虚拟机监控器的后端加速部分根据加速发起者和被加速候选者的运行状态和所在物理CPU的信息,做出是否执行加速的决策。若执行加速,将加速发起者的剩余时间片提供给被加速候选者,当被加速候选者被虚拟机监控器抢占(时间片耗尽或被阻塞)时,若被加速候选者处于可运行状态,恢复其原本的调度路径;本发明为现有任务并行编程模型增加了针对虚拟化环境的优化,减少了运行小偷线程的虚拟CPU对计算资源的浪费,降低了运行有用线程的虚拟CPU的调度延时,从而实现将物理计算资源最大化地投入到有效计算中。 ...

Подробнее
04-07-2023 дата публикации

Reading scoring method and device, equipment and storage medium

Номер: CN116386665A
Автор: JIN HAI, WU KUI, SHENG ZHICHAO
Принадлежит:

The embodiment of the invention discloses a reading scoring method and device, equipment and a storage medium, and the method comprises the steps: converting a reading text into a corresponding phoneme sequence, and extracting the acoustic features of each voice frame of voice data corresponding to the reading text; obtaining pronunciation characterization of each phoneme in the phoneme sequence based on the acoustic characteristics of each voice frame; the pronunciation representation of any phoneme is at least used for determining a pronunciation error detection result of any phoneme; obtaining pronunciation characterization of any word based on pronunciation characterization of phonemes contained in any word in the reading text; the pronunciation representation of any word is used for determining the pronunciation score of any word; obtaining the pronunciation representation of any sentence based on the pronunciation representation of the word contained in any sentence in the reading ...

Подробнее
27-06-2023 дата публикации

Efficient and safe personal information multi-copy deletion method and system

Номер: CN116346364A
Принадлежит:

The invention relates to an efficient and safe personal information multi-copy deletion method and system, and the method comprises the steps: signing personal information and a personal information main body identifier, uploading the signed personal information and personal information main body identifier to an information domain, and storing the signed personal information and personal information main body identifier as personal information copies by the information domain; the personal information copies circulate among the information domains, and each personal information copy records the source and the purpose of the personal information copy; when the information domain receives a deletion command, the deletion command is transmitted to each information domain based on the personal information main body identifier and target information in the personal information copy, and deletion operation is executed; after the information domain is deleted, the domain identifier of the information ...

Подробнее
02-06-2023 дата публикации

Core machine for controlling stability of rotor shafting based on runner matching

Номер: CN116201635A
Принадлежит:

The invention belongs to the field of aero-engine design, and relates to a core engine for controlling rotor shafting stability based on runner matching, which comprises a high-pressure compressor, a combustion chamber and a high-pressure turbine, the number of the high-pressure turbine first-stage guide blades is integral multiples of that of the combustion chamber nozzles, and each combustion chamber nozzle directly faces one high-pressure turbine first-stage guide blade or directly faces the middle position of two adjacent groups of high-pressure turbine first-stage guide blades; when each combustion chamber nozzle directly faces one high-pressure turbine first-stage guide blade, high-temperature hot spots can be accurately stripped by the high-pressure turbine first-stage guide blade, so that an inlet gas flow field with relatively low peak temperature and relatively low disorder degree can be created for the high-pressure turbine first-stage rotor blade; when the combustion chamber ...

Подробнее
28-04-2016 дата публикации

METHOD AND DEVICE FOR SELECTING POLICY AND CHARGING RULES FUNCTION

Номер: WO2016062025A1
Принадлежит:

A method and device for selecting a policy and charging rules function. The method comprises: a diameter routing agent (DRA) receives identification information of a specified service that is subscribed by a user, the identification information being acquired by a bearer binding and event report function (BBERF) from a home subscriber server (HSS) in a gateway control session setup process; or, the DRA receives identification information of a specified service that is subscribed by a user, the identification information being acquired by a policy and charging enforcement function (PCEF) from an HSS in an IP-connectivity access network (IP-CAN) session setup process; and the DRA selects, for a terminal UE or an IP-CAN session according to the identification information of the specified service, a policy and charging rules function (PCRF) that supports the implementation of the specified service. By means of embodiments of the present invention, different PCRFs can be selected according to ...

Подробнее
16-05-2023 дата публикации

Wheel disc crack propagation life calculation method considering limited load working condition

Номер: CN116127801A
Принадлежит:

The invention belongs to the field of fatigue life calculation, and particularly relates to a wheel disc crack propagation life calculation method considering a limited load working condition. Comprising the steps of obtaining stress or strain distribution of a wheel disc under the action of an I-type cyclic peak load working condition; prefabricating an initial crack at the characteristic part of the wheel disc to obtain a stress intensity factor distribution curve of the front edge of the initial crack; according to the first crack propagation plan, performing crack propagation under the action of the I-type cyclic peak load working condition to obtain crack propagation morphologies with different crack propagation sizes; acquiring stress or strain distribution of the wheel disc under the action of the limited load working condition; calculating the maximum value of the stress intensity factor of the crack front edge corresponding to each crack propagation morphology; fitting a relation ...

Подробнее
27-06-2023 дата публикации

Isolation device for preventing nuclear pollution diffusion of nuclear pollution wounded person

Номер: CN116335457A
Автор: JIN HAI, LIANG GUOBIAO
Принадлежит:

The invention relates to the technical field of medical instruments, in particular to an isolation device for preventing diffusion of nuclear pollution of a nuclear pollution wounded person, and the isolation device for preventing diffusion of the nuclear pollution of the nuclear pollution wounded person comprises an isolation cabin which is provided with a placement area for the wounded person to recuperate; the anti-radiation assembly is arranged in the placement area in a surrounding mode so as to form the cabin wall of the isolation cabin; the cabin wall on the side portion of the isolation cabin is made of a transparent material so that medical staff can monitor the condition of the placement area from the outside of the isolation cabin. According to the isolation device for preventing nuclear pollution diffusion of the nuclear pollution wounded person, the side wall of the isolation cabin forms a visual structure, so that medical personnel can monitor the wounded person in the isolation ...

Подробнее
10-11-2016 дата публикации

CONTROL METHOD FOR APPLICATION FEATURE RULES AND APPLICATION FEATURE SERVER

Номер: WO2016177167A1
Принадлежит:

A control method for application feature rules. The method comprises: an application feature server preprocesses a feature field of a third party application; and the application feature server provides the preprocessed feature field and a corresponding application identifier as application feature rules to an application detection and control entity. The technical solution of the present application allows rapid deployment of a mega-level third party application.

Подробнее
04-08-2023 дата публикации

Automatic information deletion method and system based on time synchronization and credible counting

Номер: CN116541386A
Принадлежит:

The invention relates to an automatic information deletion method and system based on time synchronization and credible counting, and the method at least comprises the steps: standardly defining various data structures which at least comprise configuration information; triggering conditions for automatically deleting the information are set, wherein the triggering conditions comprise an automatic deleting condition based on time synchronization and/or an automatic deleting condition based on credible counting; keeping the configuration information synchronization among the domains; and under the condition that the information transfer data triggers the triggering condition, the information source domain and/or the information propagation domain execute an automatic deletion operation of the information. In order to solve the problem that based on a data deletion mechanism, deletion cannot be carried out according to the retention period of information, through a synchronization technology ...

Подробнее
25-07-2023 дата публикации

Intelligent weight grouping system for beef cattle breeding

Номер: CN116472970A
Автор: JIN HAI, XU LEI, ZHAO SHUANPING
Принадлежит:

The invention relates to the technical field of beef cattle breeding, and discloses an intelligent weight grouping system for beef cattle breeding, which comprises a cattle house and a distinguishing channel arranged in the cattle house, one side of the distinguishing channel is provided with a first shed arranged in the cattle house, the other side of the distinguishing channel is provided with a second shed arranged in the cattle house, and a communication assembly is arranged in the cattle house. A pedal communicating with the distinguishing channel is arranged on the outer side of the cowshed, a weighing plate is slidably connected into the pedal, a weight sensor is fixed to the inner wall of the pedal, a containing groove is formed in the bottom of the weighing plate, and the sensing end of the weight sensor slides in the containing groove. According to the beef cattle weighing device, beef cattle can be rapidly weighed, the weighed beef cattle can be subjected to partition management ...

Подробнее
26-08-2010 дата публикации

SERVICE POLICY CONTROL METHOD AND SYSTEM

Номер: WO2010094188A1
Принадлежит:

A service policy control method and system, wherein said method includes: a Policy and Charging Rules Function (PCRF) or a Policy and Charging Execution Function (PCEF) makes decisions on the basis of the time condition of service control policy of a service and the cumulative time for using the service, and obtains the decision information for service policy control. A PCEF implements the service policy control on the basis of the decision information.

Подробнее
04-04-2023 дата публикации

Code classification deep learning model interpretation method and system based on sample difference

Номер: CN115905926A
Принадлежит:

The invention relates to a code classification deep learning model interpretation method and system based on sample difference, and the method comprises the steps: an offline interpreter model training step: constructing code transformation for each code sample in a training set to generate a difference sample, generating the difference sample through deleting features, calculating feature importance scores, and carrying out the offline interpreter model training step; generating a difference sample through fragment interception, calculating a feature importance score, and inputting the original sample, the difference sample and the feature importance score into a neural network for training to obtain a trained interpreter; an online code sample interpretation step: extracting important features in code samples from target code sample segments by using an interpreter, then searching a training sample having the greatest contribution to test sample prediction in a training set by using a ...

Подробнее
28-04-2016 дата публикации

METHOD AND DEVICE FOR SELECTING POLICY AND CHARGING RULES FUNCTION

Номер: WO2016062026A1
Принадлежит:

A method and device for selecting a policy and charging rules function. The method comprises: a diameter routing agent (DRA) acquires, from a subscription profile repository (SPR) or a business and operation support system (BOSS), subscription information of a specified service that is subscribed by a user; and the DRA selects, for the UE or an IP-connectivity access network (IP-CAN) session according to the subscription information, a policy and charging rules function (PCRF) that supports the implementation of the specified service. By means of embodiments of the present invention, different PCRFs can be selected according to different services.

Подробнее
29-08-2023 дата публикации

Megawatt power output system of medium bypass ratio turbofan engine

Номер: CN116658328A
Принадлежит:

The invention belongs to the field of aero-engine design, and relates to a medium-bypass-ratio turbofan engine megawatt-level power output system which comprises an air inlet branch pipe, a power turbine and a generator. The air inlet branch pipe is connected with an engine outer duct channel, the power turbine is connected with an outlet of the air inlet branch pipe in a sealed mode, the power turbine is connected with the generator through a power transmission rod, and a cable connected with the airborne high-energy weapon is arranged on the generator. Fuel gas exhausted after the medium bypass ratio turbofan engine works is exhausted backwards through an engine outlet pipeline and enters an exhaust pipeline, outer culvert cooling gas entering an air inlet branch pipe from an engine outer culvert channel drives a power turbine to work to drive a generator to work, and electric energy is transmitted to multiple sets of airborne high-energy weapons. The multiple sets of airborne high-energy ...

Подробнее
22-08-2023 дата публикации

Graph data processing method and chip

Номер: CN116627887A
Принадлежит:

The invention provides a graph data processing method, which is applied to an integrated chip, the integrated chip comprises a plurality of computing processing units, communication links are arranged among the computing processing units, and the method comprises the following steps: the integrated chip assigns a workload to the computing processing units; and the integrated chip updates node information of nodes in the graph data according to the workload. According to the graph data processing method provided by the invention, the expandability of the integrated chip is improved, the communication overhead of a computing and processing unit in the integrated chip is reduced, and the processing efficiency of the integrated chip on the graph data is improved.

Подробнее
04-08-2023 дата публикации

TLS fingerprint information identification method and system based on finite-state machine

Номер: CN116545901A
Принадлежит:

The invention relates to a TLS fingerprint information identification method and system based on a finite state machine. The system at least comprises a model deduction module (200) used for deducing a state machine model realized by a target TLS based on mapping information sent by a message mapping module (100); the fingerprint extraction module (600) is used for analyzing the state machine model and extracting multi-level fingerprints realized by the target TLS; and the version identification module (300) is used for verifying the validity of the multi-pin fingerprint and/or identifying version information realized by an unknown TLS. Compared with other network protocol identification systems, the method has the advantages that fine-grained information such as specific implementation types and versions of the TLS protocol can be identified and judged, and the method is highly automatic and has good availability and expandability.

Подробнее
13-06-2023 дата публикации

Monitoring video anti-deletion system and method based on block chain

Номер: CN116260926A
Принадлежит:

The invention relates to a monitoring video anti-deletion system and method based on a block chain, and the system at least comprises a plurality of camera assemblies (1) which are used for shooting videos; the at least one photographer node (2) is used for being connected with a block chain network and randomly generating a key pair; cutting a video file sent by the camera component (1) into a plurality of video file blocks, randomly sending the video file blocks to each node in a block chain network for storage, and recording a stored file hash value and node information; and the block chain network device updates the video file hash value uploaded by the photographer node based on the smart contract. According to the invention, the video uploading storage time of the camera is recorded through the smart contract on the block chain, and a non-tampering time reference is provided for law enforcement; a redundant space does not need to be introduced while the video record is prevented from ...

Подробнее
27-06-2023 дата публикации

Trusted third-party auditing method and system for personal information deletion

Номер: CN116346592A
Принадлежит:

The invention relates to a trusted third-party auditing method and system for personal information deletion. The method comprises the following steps: acquiring a plurality of log data of any one personal information source domain deletion main body and an associated domain deletion main body in a network; normalizing the log data through a preset analysis rule and generating normalized log data; and performing notification consistency and operation compliance analysis on the normalized log data in a correlation analysis mode. According to the method, whether the information deletion process meets the multi-dimensional or multi-level auditing judgment condition or not is known based on the auditing analysis of the log file, and the abnormal deletion behavior of the personal information is obtained in time, so that the personal information deletion is ensured to meet the compliance internal control requirement, the industry standard and the policy and regulation.

Подробнее
07-07-2004 дата публикации

扫描图像的方法和装置

Номер: CN0001510902A
Принадлежит:

... 一种扫描图像的方法和装置。该方法包含判定在图像输入传感器中检测到的光亮度是否在预定亮度范围内,如果判定该光亮度不在预定亮度范围内,则该成像装置的盖板是打开的,然后被关闭,并且执行图像扫描操作。然而,如果判定该光亮度在预定亮度范围内,则该成像装置的盖板是关闭的,并且该成像装置保持在初始化状态。 ...

Подробнее
30-05-2023 дата публикации

Interstage duct aero-engine

Номер: CN116181518A
Принадлежит:

The invention belongs to the field of aero-engine design, and relates to an interstage duct aero-engine which comprises a casing, a combustion chamber, a high-pressure axial system, a low-pressure axial system and a heat exchanger. The low-pressure shaft system comprises an air inlet fan rotor, a booster stage rotor, a turbofan assembly and a low-pressure turbine shaft. The high-pressure shaft system comprises a high-pressure compressor rotor, a high-pressure turbine and a high-pressure turbine shaft. During working, outside air enters from the air inlet casing, after passing through the air inlet fan rotor, air flow is divided into inner duct air flow and outer duct air flow by the flow dividing ring, the inner duct air flow enters the inner duct channel, and the outer duct air flow enters the outer duct channel; and after flowing through the outer duct flow channel of the intermediate case, the outer duct airflow passes through the heat exchanger in the first-stage supercharging area, ...

Подробнее
27-06-2023 дата публикации

Incremental meta-path storage and dynamic maintenance method and system

Номер: CN116340581A
Принадлежит:

The invention relates to an incremental meta-path storage and dynamic maintenance method, which comprises the following steps of: in an initialization stage, acquiring all meta-path instances, and converting the meta-path instances of a given heterogeneous graph and a given type of meta-path into a novel storage format of the meta-path instances, namely a path graph; after graph updating occurs, in response to received graph updating information, executing dynamic maintenance on the path graph, namely traversing the meta-path storage format to obtain a meta-path updating position and updating the meta-path updating position; for the meta path with the meta path length larger than 2 and the central part symmetrical, the storage formats are subjected to center merging operation, so that the storage formats are simplified, and the follow-up reduction step is accelerated; and executing a recovery operation on the path diagrams which do not meet the merging condition. According to the method ...

Подробнее
04-08-2023 дата публикации

Information deletion and verification method and system based on information overwriting

Номер: CN116541207A
Принадлежит:

The invention relates to an information deletion and verification method and system based on information overwriting. The method at least comprises the steps that a deletion request and random number seed information are received; performing fine-grained overwriting operation on the information in a random overwriting mode; in response to the extraction request of the state information after the information is deleted, the master node of the information source domain broadcasts the extraction request of the state information after the information is deleted to at least one slave node; and sending the state information and related verification parameters after the information fed back by the slave node is deleted to a verification terminal, so that the verification terminal verifies the overwritten content based on the verifiable pseudo-random function. According to the method and the device, the problem of information logic deletion recoverability is effectively solved, the verifiability ...

Подробнее
22-06-2016 дата публикации

Hardware framework that NS3 parallel simulation simulation system used

Номер: CN0205336305U
Принадлежит:

... 本实用新型公开了一种NS3并行模拟仿真系统用的硬件构架。包括集群系统(1),集群系统(1)分别与存储交换机(2)和采集交换机(3)连接,存储交换机(2)与存储系统(4)连接,采集交换机(3)与路由器(5)连接;所述的集群系统(1)包括刀片服务器机箱(6),刀片服务器机箱(6)上架设有一个以上的刀片服务器(7),刀片服务器(7)与交换矩阵(9)连接;所述的交换矩阵(9)分别与存储交换机(2)和采集交换机(3)连接。本实用新型具有准确性高、仿真时间短和仿真效率高的特点。 ...

Подробнее
06-06-2023 дата публикации

Graph construction acceleration method and system based on FPGA (Field Programmable Gate Array)

Номер: CN116227397A
Принадлежит:

The invention relates to an FPGA-based graph construction acceleration method and system, and the method comprises the steps: sampling the neighborhoods of all vertexes in storage data one by one, and recording the traversal sequence of all vertexes; according to the vertex traversal sequence, dividing all vertexes into a plurality of blocks, and processing according to the granularity of the blocks to at least solve the distance between sampling neighbors of each vertex in each block; updating the neighborhoods of the two vertexes according to the distance between the sampling neighborhoods of each vertex; and after all the vertex blocks are processed, executing the next round of iteration from the step 1 until the precision of the constructed graph meets the precision requirement or the number of iterations is limited. According to the method, the advantages of reconfigurability, low power consumption and high degree of parallelism of the FPGA platform are utilized, and the characteristics ...

Подробнее
04-08-2023 дата публикации

Information encryption and trusted deletion method and system

Номер: CN116541879A
Принадлежит:

The invention relates to an information encryption and trusted deletion method and system. The method at least comprises the following steps: dividing an information field into at least two sensitive levels based on the difference of sensitive degrees; generating encryption keys and key fragments based on a preset threshold value, establishing mapping between a target and the key fragments, encrypting information fields of corresponding sensitive levels based on the encryption keys of different sensitive levels, and deleting original information data; and under the condition that a recovery request is received, recovering the encryption key based on the key fragment and decrypting the encryption key to obtain original information data. Aiming at the problem that the information is difficult to store safely and delete trustingly, multi-party secure key deletion of the encrypted personal information is realized.

Подробнее