Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

31results about How to "Avoid bypassing" patented technology

Application usage policy enforcement

Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.
Owner:APPLE INC

Application program anti-attack method and system based on code injection and behavior analysis

The invention provides an application program anti-attack method and system based on code injection and behavior analysis. The method is characterized in that a protection code is injected into an application program needing to be protected, and attack behaviors in the application program are recognized. The method comprises the steps of injecting the protection code into the application program needing to be protected, and mounting a hook point at a preset key calling position, wherein the protection code monitors marked parameters and operation behaviors of calling a key function in the application program; running a unified protection plug-in, performing security risk analysis based on the operation behavior, the marked parameters and the context information, and identifying whether a suspicious webshell exists in a monitored code in the application or not; and sending out corresponding alarm prompt information according to the security risk analysis result, or directly blocking theoperation of the application program. According to the method, through reasonable deployment of the protection codes, attacks can be detected and self-protection can be carried out during operation,so that less missing report and false report, more comprehensive and accurate protection and faster vulnerability response are realized.
Owner:NAT UNIV OF DEFENSE TECH

Java security protection method and device based on JVM sandbox and black and white lists and medium

PendingCN113672907ARealize automatic customizationComprehensive Security HardeningPlatform integrity maintainancePathPingJava
The invention relates to a Java security protection method and device based on a JVM sandbox and black and white lists and a medium. The method comprises the following steps: automatically and repeatedly starting a Java application in a JVM sandbox so as to determine a first strategy according to an exception encountered in each starting, and adding the first strategy into a strategy file until the Java application is successfully started; configuring a white list according to the strategy file; configuring a second strategy through the strategy management interface according to the known path with the security hole to form a blacklist, and limiting the API under the path with the security hole to execute Java reflection through the blacklist; and running the Java application according to the white list and the black list, and managing hardware and network resources which can be accessed by the Java application. The operation boundary of the unknown Java application is limited through cooperation of the white list and the blacklist, potential safety hazards caused by the fact that the Java application bypasses the white list through reflection are avoided through the blacklist, the defects in the prior art are overcome, and safety protection of the Java application is enhanced.
Owner:济南浪潮数据技术有限公司

Method and system for identifying web crawler, storage medium and electronic apparatus

The invention discloses a method and a system for identifying a web crawler, a storage medium and an electronic apparatus, which relate to the information processing field. The method for identifyingthe web crawler comprises the following steps: creating a plurality of invalid links for detecting the web crawler behavior; using the link address provided by the invalid link to create a first linkthat hides link attribute information, and creating a second link that is invisible to the naked eye with the same background color as the HTML page. The first link and the second link are inserted into the HTML page. The operation information recorded on the HTML page is reported to the server. The server judges whether the operation information is received, and if not, the web crawler is determined; if yes, the server further judges whether there is access to the first link and the second link, and if yes, the web crawler is determined; if not, it is determined that the access is normal access. The invention can better avoid the crawler from bypassing the crawler detection strategy and more effectively identify the web crawler.
Owner:WUHAN DOUYU NETWORK TECH CO LTD

Air-conditioning system, method and device for controlling the air-conditioning system

The invention discloses an air-conditioning system, a control method and a device for the air-conditioning system. The air conditioning system includes an outdoor heat exchanger, a first throttling device, and a refrigerant tank. All branches in the outdoor heat exchanger are divided into the first group of circuits and the second group of circuits; the refrigerant tank is located between the first throttling device and the outdoor Between the heat exchangers; the refrigerant tank includes: the first port is connected to the first throttling device for allowing the throttled refrigerant to enter the refrigerant tank for gas-liquid separation; the second port is connected to the first group of circuits for The separated gaseous refrigerant is transmitted to the first group of circuits; the third port is connected to the second group of circuits through a flow distribution component, and is used to transmit the separated liquid refrigerant to the second group of circuits. The present invention is provided with a refrigerant tank, and the throttled refrigerant in the heating mode enters the refrigerant tank to realize gas-liquid separation, and the separated gas refrigerant and liquid refrigerant are respectively transported to different branches of the outdoor heat exchanger to ensure that the outdoor heat exchanger The amount of refrigerant circulation in the medium ensures uniform liquid separation and improves heat exchange capacity.
Owner:GREE ELECTRIC APPLIANCES INC

Artificial intelligence-based black production account detection method and related device

This application relates to an artificial intelligence-based method for detecting illegal accounts and related devices, belonging to the field of artificial intelligence technology. The method includes: obtaining the account attribute data set of the user account associated with the target subject; from the first data set and the second Obtain the first average number and the second average number of the mobile phone number corresponding to the field data of the field to be detected in the data set, and determine the field to be detected with the first average number less than the second average number as the detection field; The field data of the detection field is used as a connection edge, and the mobile phone number is used as a vertex to construct an account detection graph; based on the field data of the first type of field in the account detection graph, the account detection graph is graph-clustered to obtain account clusters, said The first type of field indicates the field related to the account login address; based on the field data of the second type of field, it is verified whether the account cluster is abnormal. This application effectively improves the detection accuracy and reliability of illegal accounts.
Owner:CHINA PING AN LIFE INSURANCE CO LTD

Firewall

The invention belongs to the technical field of fire-fighting equipment, and particularly discloses a firewall. The firewall comprises a wallboard, an elastic piece and a flow guide plate. The wallboard is vertically arranged between an oil-gas cabin and a living cabin of an oil tanker and is connected to a deck of the oil tanker in a sliding manner; one end of the elastic piece is fixedly arranged, and the other end of the elastic piece is connected to the upper middle part of the firewall; and the flow guide plate is connected to the end, in the width direction, of the wallboard in an included-angle manner and extends in the direction away from the oil-gas cabin. The wallboard is vertically arranged and slidably connected to the deck, and the elastic piece is connected to the upper middle portion of the firewall, so that the wallboard is prevented from forming a cantilever structure on the deck, and the structural strength of the wallboard is improved. The elastic piece can absorb part of energy of shock waves, and the protection capacity of the firewall is improved. The end part of the wallboard is connected with the flow guide plate, so that flames and / or the shock waves are prevented from bypassing the firewall to enter the living cabin, and the protection capability of the firewall is further improved.
Owner:GUANGZHOU SHIPYARD INTERNATIONAL LTD

Engine lubrication system and engine

The invention belongs to the field of engines, and discloses an engine lubrication system and an engine. According to a method, a crankcase, a side cover and a bridge connection mechanism are included, a crankshaft is arranged in the crankcase, and a main oil passage of the crankshaft is arranged in the crankshaft; the side cover is arranged on one side of the crankcase, and a dark oil passage isarranged in the side cover; the bridge connection mechanism includes a casing and a sealing portion, the sealing portion is fixedly arranged on the outer side wall of the casing, one end of the casingis inserted into an outlet of the dark oil passage, and the sealing portion is located on the outer side of the outlet of the dark oil passage; and when the engine works, the casing moves towards aninlet of the main oil passage of the crankshaft under the pressure effect of the high pressure oil in the dark oil passage, so that the sealing portion is pressed against the inlet end face of the main oil passage of the crankshaft, the outlet of the dark oil passage and the inlet of the main oil passage of the crankshaft are connected in a sealed manner, and the high-pressure oil in the dark oilpassage enters the main oil passage of the crankshaft through the casing. The lubricating system can shorten the lubricating oil passage line, it is not necessary to increase the oil pump flow rate and oil pressure, and the probability of tube burst is reduced.
Owner:JIANGSU CHANGFA AGRI EQUIP

Composite alarm detector and anti-theft alarm method for museum showcase

The invention relates to a composite alarm detector for a museum showcase. The composite alarm detector comprises a power supply module, an ultrasonic generation module, an ultrasonic receiving module, a mobile detection module, a main control module, a wireless communication module and an alarm host, wherein the power supply module is used for supplying power to each component and is internally provided with a rechargeable battery. The invention further provides an anti-theft alarm method for the museum showcase. The anti-theft alarm method comprises the steps of periodically transmitting ultrasonic waves into a closed space of the showcase; collecting reflected ultrasonic waves in real time; detecting the spatial change of the showcase, specifically, demodulating the ultrasonic wave collected each time, and if the attribute of the demodulated ultrasonic wave is inconsistent with the attribute of the initial ultrasonic wave, triggering an alarm; and detecting the movement change of the showcase and triggering an alarm. According to the invention, any change of the showcase cavity and the cavity space form is monitored by using ultrasonic waves to generate an alarm, the acceleration is synchronously detected, the moving state of the showcase is monitored, the situation that the showcase is directly moved away under the condition that the space in the showcase is not touched is prevented, the functions are practical, and the comprehensive monitoring of the showcase condition is realized.
Owner:郑州丰嘉科技有限公司

Adjustable cable rapid laying device

The invention relates to an adjustable cable rapid laying device, and relates to the technical field of cable laying, the adjustable cable rapid laying device comprises a mounting mechanism, the mounting mechanism comprises a base and a supporting assembly, and the base is horizontally arranged; the supporting assembly is located above the base and comprises supports, the supports are vertically arranged, the two supports are arranged in the length direction of the base, the lowermost support is fixedly connected with the base, and the adjacent supports in the vertical direction are fixedly connected; a mounting rod is fixedly arranged between every two adjacent supports, and the length direction of each mounting rod is the same as that of the base. A rotating rod is horizontally arranged on the mounting rod, the length direction of the rotating rod is perpendicular to that of the mounting rod, and the rotating rod is rotationally connected with the mounting rod around the axis of the rotating rod; the rotating rod is coaxially sleeved with a mounting box, and the mounting box is connected with the rotating rod; an electric wire is wound on the mounting box; a transmission mechanism is arranged on the base and used for enabling the rotating rod to rotate around the axis of the rotating rod. The working efficiency of cable laying can be improved.
Owner:力景(北京)系统技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products