METHOD OF HASHING VECTOR DATA BASED ON MULTI-SCALE CURVATURE FOR VECTOR CONTENT AUTHENTICATION

    公开(公告)号:US20190207753A1

    公开(公告)日:2019-07-04

    申请号:US15905276

    申请日:2018-02-26

    IPC分类号: H04L9/06 G06F17/16

    摘要: The present invention relates to a method of hashing a perceptual vector model based on a multi-scale curvature. According to a first aspect, there is provided a method of hashing a perceptual vector model based on a multi-scale curvature including: generating a multi-dimensional feature coefficient matrix, and obtaining a multi-dimensional intermediate hash coefficient matrix; and obtaining a final binary hash matrix, and enabling the multi-dimensional binary hash matrix to be hierarchically authenticated. In addition, according to a second aspect, there is provided a method of hashing a perceptual vector model based on a multi-scale curvature including: generating a hash by using a hash function; and authenticating a vector model. In addition, an error detection probability for an object attack can be lower by about 2×10−5˜2.8×10−2, and a uniqueness probability is raised by about 0.014. In addition, an entropy can be raised by about 0.875˜2.149.

    METHOD FOR CONTROLLING A HOME-AUTOMATION FACILITY

    公开(公告)号:US20180270075A1

    公开(公告)日:2018-09-20

    申请号:US15740694

    申请日:2016-06-30

    申请人: SOMFY SAS

    IPC分类号: H04L12/28 H04L12/24

    摘要: The present invention concerns a method for controlling a home-automation facility comprising at least one central control unit (U1, U2) belonging to a home-automation facility; the method being executed by a user terminal (T) and comprising the following steps: selecting (ECTLT1) a first local connection mode (CM1) or a second wide area network connection mode; establishing (ECTLT2) a connection between the user terminal and at least one target unit (U1, U2, Sv), said at least one target unit (U1, U2, Sv) being a central control unit (U1, U2) in the case in which the first local connection mode (CM1) has been selected, and a management unit (Sv) in the case in which the second wide area network connection mode has been selected; sending (ECTLT3) a discovery message (MCTLD1, MCTLD2, MCTLD′) linked with a facility identifier (StID) to at least one target unit (U1, U2,Sv); receiving (ECTLT5, ECTLT7) at least one topology description message originating from the target unit (U1, U2, Sv) comprising a description of a group of devices (DGrSt) attached to the facility identifier (StID).

    Forwarding table synchronization method, network device, and system

    公开(公告)号:US10079781B2

    公开(公告)日:2018-09-18

    申请号:US15432762

    申请日:2017-02-14

    发明人: Pu Cheng Yinqiao Xie

    摘要: A data plane of a first network device receives a first packet sent by a multi-homing access device, sends the first packet to a control plane of the first network device, adds an MC-LAG identifier to the first packet to obtain a second packet, and sends the second packet to a data plane of a second network device through a data forwarding path. The control plane generates a forwarding entry according to an ingress port of the first packet on the first network device and the first packet, updates a first forwarding table on the control plane according to the forwarding entry, and sends the forwarding entry to the data plane of the first network device. The data plane of the first network device updates a second forwarding table on the data plane of the first network device according to the forwarding entry.

    Methods and systems for managing VPN tunnels

    公开(公告)号:US09960966B2

    公开(公告)日:2018-05-01

    申请号:US15389475

    申请日:2016-12-23

    摘要: The present invention discloses methods and systems for managing VPN tunnels. A VPN concentrator establishes a first aggregated VPN connection and a second aggregated VPN connection with a first host and a first network device respectively. When the first aggregated VPN connection comprises a first plurality of VPN tunnels, the VPN concentrator applies uplink and downlink bandwidth limits to each of the plurality of VPN tunnels. Similarly, when the second aggregated VPN connection comprise a second plurality of VPN tunnels, the VPN concentrator applies uplink and downlink bandwidth limits to each of the plurality of VPN tunnels. The first host encapsulates a first data packet in a first encapsulating packet and transmits the first encapsulating packet to a VPN concentrator using a first aggregated VPN connection. When the VPN concentrator receives the first encapsulating packet, the VPN concentrator decapsulates the first data packet from the first encapsulating packet and encapsulates the first data packet in a second encapsulating packet. The VPN concentrator then transmits the second encapsulating packet to a first network device using a second aggregated VPN connection.