InvestorsHub Logo
Followers 2
Posts 1540
Boards Moderated 0
Alias Born 05/06/2017

Re: None

Monday, 12/05/2022 9:46:32 AM

Monday, December 05, 2022 9:46:32 AM

Post# of 767
WiMi Develops Data Grading and Digital Fingerprint Encryption Technology.

Source
https://www.newstrail.com/wimi-develops-data-grading-and-digital-fingerprint-encryption-technology/

December 5, 2022


The Internet has now become an indispensable element in people’s daily life. Our life is firmly integrated with the Internet in the era of smartphones. Now, we have started to step into the age of Web 3.0. Web 3.0 is not merely the update and upgrade of business models, browsing habits, and experiences but also the continuous upgrade and evolution of underlying technologies. Presently, the data on the Internet has a high degree of dependency, relevance, diversity, and variability, and users often encounter problems, such as information redundancy and irrelevant content. To solve these problems in the future, developers should scale and optimize data requests according to the characteristics of Internet data and business needs, reduce the number of data requests in the network, improve system performance and enhance the effectiveness of recommendations by verifying the actual system.

WiMi Hologram Cloud, Inc. (NASDAQ:WIMI) released a method and system for the hierarchical expansion of data acquisition requests within the Internet. The system includes a mobile terminal sending a network connection request, a network address of a mobile terminal, and an identifier of a mobile terminal to an authentication server within the Internet.

The network connection request includes:
authentication data and a network connection duration; when the authentication server receives the network connection request, the network address of the mobile terminal and the identifier of the mobile terminal from the mobile terminal, it generates a random string based on the identifier of the mobile terminal without verifying the authentication data in the network connection request and generates a first combination based on the random string and the network address of the mobile terminal string; the mobile terminal sends the network connection request, the network address of the mobile terminal and the identifier of the mobile terminal to the authentication server in the Internet; the authentication server sends the random string and the first hash value to the content server in the Internet; the content server generates the second hash value and sends the metadata set to the mobile terminal when the second hash value is equal to the first hash value; the authentication server sends the the first attribute and the second attribute of the network connection request of the mobile terminal to the content server; the content server retrieves to obtain a plurality of data files based on the first attribute and the second attribute of the network connection request.

WiMi also applies hash value to the method and system of hierarchical expansion of data acquisition requests within the Internet for information encryption. Hash Function, also known as the hash algorithm, creates a digital “fingerprint” in data. A hash function compresses information or data into a summary, making the amount of data more minor and fixing the data format. The function breaks up the data and mixes it to create a new digital fingerprint called hash values. Hash values are represented by a short string of random letters and numbers, which can often be seen in distributed download calls and blockchain applications.
Random number generation is an integral part of many cryptographic operations. For example, the cryptographic key needs to be as random as possible in order to make the generated key hard to reproduce. Cryptographic random number generators must create outputs that cannot be computationally extrapolated (below a probability of p < .05); that is, any method of figuring the next output bit must not have a higher likelihood of success than a random guess.

WiMi’s system can be used for hierarchically scaling data acquisition requests within the Internet, generating a random string based on an identifier of a mobile terminal, which includes:
randomly transforming the position of each character (of a plurality of characters) included in the identifier of the mobile terminal to generate a random string. Alternatively, the identifier of the mobile terminal is input to a random string generator to generate a random string by the random string generator. Alternatively, at least one or two random characters are added between any two adjacent characters of the plurality of characters included in the identifier of the mobile terminal to generate the random string. Alternatively, at least five, ten, or fifteen random characters are added at the beginning or end of the identifier of the mobile terminal to generate the random string.

Generating the first combined string based on the random string and the network address of the mobile terminal includes:
character concatenating the random string and the network address of the mobile terminal to generate the first combined string. The mobile terminal receives the metadata set and stores the metadata set in the first memory, parses the metadata assigned to determine the metadata of each data file, determines the storage size of each data file based on the metadata of each data file, determines the total storage size of all data files associated with the search condition based on the storage size of each data file, and the mobile terminal determines the storage size in the second memory based on the total storage size and the expansion coefficient; when the mobile terminal determines that the remaining storage space in the second memory is greater than the reserved storage space, it sends a second response message to the authentication server for indicating that the storage space of the mobile terminal is available.

While the authentication server sends a random string and a first hash value to the content server within the Internet, the authentication server obtains the authentication data and the network connection duration in the network connection request, parses the authentication data to determine whether the authentication data includes the user-inputted fingerprint information of the mobile terminal. Suppose it is determined that the user-inputted fingerprint information is included in the authentication data. In that case, the first attribute of the network connection request of the mobile terminal is set to the personal level based on the identifier of the mobile terminal to obtain the user’s pre-stored fingerprint information from the authentication database in the authentication server. When the user-inputted fingerprint information and the user’s pre-stored fingerprint information are the same, the network connection request of the mobile terminal is set to the private level. When it is determined that the authentication data does not include the fingerprint information entered by the user or the fingerprint information entered by the user is not the same as the fingerprint information stored in advance by the user, the first attribute of the network connection request of the mobile terminal is set to public level.

When the first attribute of the network connection request is a public level, a network connection is established between the mobile terminal and the public content library in the content server. The content server obtains the second attribute of the network connection request of the mobile terminal. When the second attribute is a high expansion level, it performs high-level expansion for the retrieval conditions in the data acquisition request. It increases the network connection duration by a first-time length so that the mobile terminal can use the high-level expanded retrieval conditions through the established network connection within the network connection duration with the first-time size increased to data retrieval in the public content repository to obtain multiple data files.
When the second attribute is a medium expansion level, a medium expansion level is provided for the retrieval conditions in the data acquisition request, and the network connection duration is increased by a second time length so that the mobile terminal can retrieve multiple data files in the public content repository using the retrieval conditions expanded by the medium level within the network connection duration increased by the second time length through the established network connection.
When the third attribute is a low expansion level, a low-level expansion is performed for the retrieval conditions in the data acquisition request, and the network connection duration is increased by a third time length so that the mobile terminal can retrieve multiple data files in the public content library using the retrieval conditions expanded by the low level within the network connection duration increased by the third time length through the established network connection.

WiMi’s method and system for hierarchically scaling data access requests within the Internet is a crucial invention patent of the company, which serves to make servers more efficient in responding to link requests by issuing classified data through hierarchical scaling, and also establishes better digital encryption and fast matching through hash value digital fingerprinting. In the application of Web 3.0, it solves the demand for more efficient and timely response feedback and data security encryption required by users in the era of the increasing volume of data and more and more invalid and redundant data in Internet applications, and the method of graded expansion of data acquisition requests within the Internet in the future will also be a critical technical implementation path for Web 3.0 for the underlying data acquisition requests.
Volume:
Day Range:
Bid:
Ask:
Last Trade Time:
Total Trades:
  • 1D
  • 1M
  • 3M
  • 6M
  • 1Y
  • 5Y
Recent WIMI News