Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

106results about How to "Avoid malicious access" patented technology

Port based network access control method

ActiveCN1567839AAvoid malicious attacks on the network by arrears usersBlock random mobile surfingData switching networksSecuring communicationMessage passingIp address
The invention relates to a network access controlling method based on network access device port: according to message address information, configuring the processing mode of message passing through the network access device; obtaining the address information of the massage and processing the message according to the obtained address information and corresponding configuration information. It binds user-source MAC address and source IP address with the corresponding port and binds exchanger-supported VLAN ID and the member corresponding to the VLAN ID, thus effectively preventing the illegal user which uses counterfeit source MAC address, source IP address and VLAN ID from viciously accessing or attacking the network. It also makes access limitations on the message entering in the network through the network access device port in view of the destination address of the message, including the network access control of broadcast message, unicast message, multicast message, the message transmitted to the server and the message with specific destination MAC address, and effectively prevents legal user from viciously attacking the network by counterfeiting some destination MAC addresses.
Owner:HUAWEI TECH CO LTD

Multi-dimensional personnel and equipment intelligent positioning wearable device

InactiveCN105137465ARealize full positioning trackingCapable of collecting and processing multi-dimensional positioning dataSatellite radio beaconingWireless communicationRadio frequency signalIBeacon
The invention discloses a multi-dimensional personnel and equipment intelligent positioning wearable device, and the device comprises a wireless communication module which is used for collecting related positioning data and enables the related positioning data to be remotely transmitted; a Beidou / GPS positioning module which is used for collecting and analyzing a Beidou / GPS satellite signals, carrying out position calculation, and outputting latitude and longitude information; a BLE data collection module which is used for collecting the MAC, field intensity and TxPower of a Ibeacon Bluetooth signal; a WIFI data collection module which is used for collecting the MAC and radio frequency signal intensity of a WIFI host; an RFID data collection module which is used for collecting the ID and radio frequency signal intensity of an RFID host; a rotating speed and acceleration measurement module which is used for collecting the acceleration and rotating speed of the device; and a CPU module which is used for the management of the whole unit. The device is suitable for the whole-course positioning of the personnel and equipment in different geographic environments, such as an open environment, an indoor environment, commuting ports, and the like.
Owner:CHENGDU ASIONSYS IND CO LTD

Method and device for processing privacy data in mobile equipment

The invention discloses a method and a device for processing privacy data in mobile equipment. The method comprises the steps that when the mobile equipment is connected to a computer, a first identity logged in on a mobile equipment side and a second identity logged in on a computer side are acquired; whether the first identity and the second identity are associated is judged; if so, an entry of a privacy space is displayed on the mobile equipment side; the privacy space is a disk storage space encrypted by a coded lock; when a request accessing the privacy space via the entry is received, the coded lock is displayed on the mobile equipment side; and when decryption information corresponding to the coded lock is received, data in the privacy space is displayed on the mobile equipment side. The method and the device can effectively avoid malicious privacy space access, so that the security of privacy information of a user can be ensured effectively.
Owner:BEIJING QIHOO TECH CO LTD

Isolation method and isolation device for application program

The invention provides an isolation method and an isolation device for an application program. The method comprises steps as follows: when a to-be-isolated application program stored in a storage path in a non-isolation region is detected, the storage path of application data of the to-be-isolated application program is modified to be a storage path in an isolation region; the access right of the application data in the storage path in the isolation region is modified, and only the application program has the access right to the application data. According to the technical scheme, the application data of the application program which needs to be protected are independently stored in the isolation region, so that only the isolated application program in the isolation region has the access right to the application data, and any application program outside the isolation region has no access right to the application data of the isolated application program in the isolation region; the probability that a malicious application program in the non-isolation region has access to private data of a user in the application data of the isolated application program is avoided; the safety of the isolated application program and the data safety and the property safety of a user are protected better.
Owner:BEIJING ANYUNSHIJI TECH CO LTD

Micro-power consumption control method of motion monitoring and tracking equipment

The invention discloses a micro-power consumption control method of motion monitoring and tracking equipment. A hardware energy consumption management and control part and a software energy consumption dynamic strategy part are combined; in the hardware energy consumption management and control part, by adopting control CPU frequency reduction and IO configuration, embedded secondary development of a communication CPU module, and complete isolation between the communication CPU module and a power supply, a dormant current of a whole machine is enabled to be smaller than 5 [mu]A; and in the software energy consumption dynamic strategy part, after a remote background server receives reported data of a terminal, according to parameters of the terminal, a terminal energy consumption managementand control strategy is formulated and sent to the terminal for execution. By controlling the power consumption of the whole machine, during the dormant period, the working current of the whole machine is less than 5 [mu]A; and in the tracking period, the communication CPU module works and performs data interaction with the remote server, the power consumption of the whole machine is less than 80mA, and when the communication CPU module is dormant in the tracking period, the power consumption of the whole machine is less than 1 mA.
Owner:CHENGDU ASIONSYS IND CO LTD

Method for running third-party codes safely in Java virtual computer

The invention discloses a method for running uncontrollable third-party codes safely by using of technologies of a custom classloader provided by a Java virtual computer (JVM). Local modules and classes which are available in third-party codes are controlled, so that access to external resources can be effectively limited, and simultaneously, a plurality of third-party codes which operates at the same time can be isolated. The invention also provides a method for accessing local resources transparently in a controllable mode in third-party codes.
Owner:BEIJING SENSESHIELD TECH

Price competition ranking method for website search result list

The invention discloses a method for ranking the searching results according to the cost per impressions, cost per clicks. The method comprises: sustaining a database, in each account of information releaser having account balance item and at least one searching list; in each searching list having released information, at least one searching keyword and corresponding changeable cost per impressions value; the value of cost per impression can be set by setting cost per one click, and the database ranking with descending order according to searching keyword and cost per impression; after receiving searching request, confirming effective searching list that matches with the searching request; according to the pre-set website format, synthesizing the released information to be searching result page with specific order; reducing corresponding account balance with cost per impression or cost per click, taking a statistic of clicking rate and redirecting to the released website.
Owner:林赞松

Safe data transmission method

The application discloses a safe data transmission method which comprises the following steps: generating a unique identifier corresponding to a mobile client on the mobile client; encrypting the unique identifier using the public key of a server to generate an identifying string; encapsulating the identifying string according to the message format; performing secondary encryption of the encapsulated identifying string and sending the encrypted identifying string to the server; obtaining the identifying string sent by the mobile client by the server, and decrypting the identifying string to obtain the first unique identifier; obtaining the program information of the mobile client by the server to generate unique identifier corresponding to the mobile client; and comparing the first unique identifier with the unique identifier corresponding to the mobile client, wherein if the comparison result indicates consistency, the verification is passed, the server generates a dynamic 3DES encryption key and a dynamic 3DES decryption key, encapsulates in a response message and returns to the mobile client.
Owner:北纬通信科技南京有限责任公司

Parameter sending method of storage chip of imaging box, storage chip and imaging box

The invention provides a parameter sending method of a storage chip of an imaging box, the storage chip and the imaging box. The method comprises the following steps of receiving an instruction sent by printing imaging equipment, and sending a key parameter to the printing imaging equipment when the instruction is judged as the key parameter reading instruction, wherein the key parameter is generated by the storage chip. The parameter needing to be read by the printing imaging equipment is generated by the storage chip, when the printing imaging equipment sends the reading instruction, the parameter generated by the storage chip is sent to the printing imaging equipment, the parameter cannot be directly read by the printing imaging equipment at any time, and therefore certain important parameters in the storage chip can be prevented from being obtained maliciously. Furthermore, a compatible manufacturer or an original manufacturer of the storage chip does not need to store the complete and specific parameter in the storage chip, a competitor can be prevented from directly reading the storage chip and obtaining certain important parameters, and therefore certain important parameters in the storage chip can be protected.
Owner:APEX MICROELECTRONICS CO LTD

Program control flow obfuscation method and system, storage medium, cloud server and application

The invention belongs to the technical field of control flow obfuscation, and discloses a program control flow obfuscation method and system, a storage medium, a cloud server and an application. Branch statement judgment conditions in an original program are hidden, and a control flow query function is used for replacing the branch statement judgment conditions; the control flow is further obfuscated by inserting a pseudo-branch statement into the program; the conversion program is sent to an untrusted public cloud, and a control flow matrix is sent to a trusted private cloud; and the conversion program is run on the public cloud based on the control flow matrix. According to the invention, the variable of each branch statement condition can be hidden, so that application program logic isprevented from being maliciously acquired and utilized by an external attacker; a pseudo branch statement is inserted to increase the difficulty of reconstructing a program control flow by an attacker; and a relation constraint statement is inserted, and data flow consistency check is carried out, so that an attacker is resisted to actively change the running process of a program, and new data ispurposefully added in the program running process to collect effective information.
Owner:XIDIAN UNIV

Novel cross-network data exchange mode and communication method

The invention discloses a novel cross-network data exchange mode and a communication method, the novel cross-network data communication method comprises the following steps: firstly, uploading data bya source data end, then creating a digital package, then carrying out technical auditing, then carrying out manual auditing, then carrying out data local caching and encryption, and then carrying outcross-network ferry; and performing data packet local caching, then performing analysis and verification, and finally performing access control and data receiving. According to the invention, the Ftrans cross-network file security exchange system is adopted to carry out cross-network transmission of the file, compared with the traditional exchange mode, the transmission speed is faster, and in addition, the anti-virus and sensitive information detection functions are realized. According to the invention, the encryption unit is arranged in the communication method, so that the security in thefile transmission process can be further improved; and the novel cross-network data exchange mode and the communication method have a temporary storage function, file exchange does not need to be carried out again in a short time, and when the time from last exchange is too long, only the cloud needs to be logged in to download data.
Owner:杭州奔浪信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products