Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

325results about How to "Improve resistance to attack" patented technology

Industrial control network security protection method and system

The invention discloses an industrial control network security protection method and an industrial control network security protection system. The method comprises the following steps that: aiming at an external network attack, a front host performs first layer data filter and access control on external network data; a security control host caches data through a common storage region, performs intrusion detection on the data, timely alarms illegal data and informs hosts on two sides; a rear host performs deep filter and access control on the data and causes the legal data to enter an internal network; aiming at an internal network attack, the rear host performs the first data filter and access control on internal network data; the security control host caches the data through the common storage region, performs the intrusion detection on the data, timely alarms the illegal data and informs the hosts on the two sides; and the front host performs the deep filter and access control on the data and causes the legal data to enter an external network. By the method and the system, the network security level of an industrial control system is increased, and the cost on investment, system transformation and management is reduced.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Method, equipment and system for authenticating identities

An embodiment of the invention provides a method, equipment and a system for authenticating identities. The method includes enabling a cloud terminal to transmit first secret key K1 to a host; enabling the host to acquire second secret keys K2 corresponding to virtual machines, acquiring first combined secret keys according to the secret keys K2 and the secret keys K1, generating first random numbers N1, encrypting the first random numbers N1 by the aid of the first combined secret keys and then transmitting the encrypted first random numbers N1 to the cloud terminal; enabling the cloud terminal to acquire second combined secret keys according to the secret keys K2 transmitted by the host and the secret keys K1 stored in the cloud terminal, decrypting the first random numbers N1 by the aid of the second combined secret keys, then encrypting the first random numbers N1 again, generating second random numbers N2, encrypting the second random numbers N2 by the aid of the second combined secret keys and transmitting the second random numbers N2 and the first random numbers N1 to the host; enabling the host to decrypt the first random numbers N1 by the aid of the first combined secret keys, and determining whether the cloud terminal is successfully authenticated or not according to the correctness of the first random numbers N1; enabling the host to decrypt the second random numbers N2 by the aid of the first combined secret keys again, decrypting the second random numbers N2 again and then transmitting the second random numbers N2 to the cloud terminal; enabling the cloud terminal to decrypt the second random numbers N2 by the aid of the second combined secret keys and determining whether the virtual machines are successfully authenticated or not according to the correctness of the second random numbers N2.
Owner:HUAWEI CLOUD COMPUTING TECH CO LTD

Method and system for fusion of multi-source monitoring data based on heterogeneous clustering wireless sensor network

The invention provides a method and a system for the fusion of multi-source monitoring data based on a heterogeneous clustering wireless sensor network. The system comprises a plurality of monitoring nodes, a plurality of cluster head nodes, a plurality of trunk nodes, a gateway node and an upper computer. The method comprises the following steps: after the gateway node switches on the upper computer, a PAN network in conformity with the ZigBee protocol is established; after the cluster head nodes and the trunk nodes are electrified, the cluster head nodes and the trunk nodes search for and join in the PAN network to form a wireless meshed network; the cluster head nodes receive broadcast packets of the monitoring nodes to carry out correlation calculation, and provide the calculation result to the upper computer through the wireless meshed network to carry out clustering processing; and then, the monitoring nodes in the cluster acquire environmental data according to the clustering result and send the data to the cluster head nodes in the cluster, and the cluster head nodes send the acquired environmental data to the upper computer through the wireless meshed network to be subjected to corresponding processing based on different sources of the environmental data. Thus, the heterogeneous clustering wireless sensor network and the wireless meshed network are combined, and the advantages of the both can be fully used for data acquisition.
Owner:BEIJING LOIT TECH

Multiple-factor authentication method for online payment and authentication system

The invention discloses a multiple-factor authentication method; wherein an authentication USB key digital certificate comprises a client side and a server two-way verification digital certificate; the USB key is inserted and hardware PIN code is input, transaction data information is transferred to the USB key to carry out encryption processing; the transaction ciphertext of an authentication bank IC card comprises the following steps: part source data is input; ARQC is generated by the bank IC card and is transferred to the server for verification; the ARQC is decrypted by the server; the contents of first cleartest transaction data and second cleartest transaction data are compared and authorized transaction can be carried out under the condition that the first cleartest transaction data and second cleartest transaction data are completely consistent. The invention further discloses a multiple-factor authentication system, comprising a device for authenticating the USB key digital certificate, a device for authenticating the transaction ciphertext of the authentication bank IC card, a comparison unit for comparing the first cleartest transaction data and second cleartest transaction data, and an authorization unit; in the authentication method and the system, communication safety between the client side and the server can be not only ensured, and the transaction data source safety can be ensured.
Owner:CHINA UNIONPAY

Credible virtual machine platform

The invention discloses a credible virtual machine platform, which comprises a hard disk (11), a USB Key (10) and a nonprivileged virtual machine (6), and also comprises credible hardware (1), a security enhancement virtual machine monitor (2), a management virtual machine (3), a communication virtual machine (4) and a driving virtual machine (5). The security enhancement virtual machine monitor (2) is bidirectionally connected with the credible hardware (1) and the management virtual machine (3) respectively; the management virtual machine (3), the driving virtual machine (5) and the communication virtual machine (4) are privileged virtual machines; the management virtual machine (3) creates, manages, destroys and transfers other virtual machines; the driving virtual machine (5) provides driving needed by the operation of the virtual machine and management of a virtual credible password module; and the communication virtual machine (4) takes charge of communication between inner virtual machines and a virtual machine platform. The credible virtual machine platform has the advantages of effectively guaranteeing the safety and credibility of an operating environment of the virtual machine platform and realizing effective management and control of communication between virtual domains.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Safe positioning method for wireless sensor

The invention discloses a safe positioning method for a wireless sensor; the safe positioning method adopts two safe positioning methods which are the malicious beacon detection based on the checkpoint and the malicious beacon detection algorithm based on the regional voting mechanism to solve the positioning safety problem of the sensor network nodes. The positioning method improves the anti-attack capability of the system through filtering the malicious beacons directly so that not only the known attacks can be defended, but also the unknown attacks can be defended; the corresponding defending measurement for every possible specific attack is avoided; the implementation of the safety strategy of the positioning system is simplified; the two detection methods are combined effectively to adjust the defending strategy automatically according to the attack types; the safe positioning is guaranteed and the computation cost is reduced effectively; the neighbor communication authentication technique based on the unidirectional key chain is adopted to avoid the support of other network safety protocols so that the storage cost of the sensor nodes is reduced; the neighbor communication authentication technique can be compatible and used together with the present wireless sensor network protocol; the safety target of the positioning system of the sensor network nodes is realized.
Owner:XIDIAN UNIV

Dynamic generation and maintenance method of heterogeneous cloud host

The invention relates to the technical field of network security, and especially relates to a dynamic generation and maintenance method of a heterogeneous cloud host. The method comprises the following steps: 1) a heterogeneous cloud host node whose isomerism is embodied by the diversified physical facilities, virtual machines and software; 2) a mirror image library management system comprising creating diversified virtual machines and software mirror images; 3) dynamic deployment of a heterogeneous virtual machines and software: when the virtual machine or the software is instantiated, generating virtual machines or software of different versions according to physical nodes and application attributes, and deploying the virtual machines or software on the physical nodes; 4) dynamic virtual machine migration mechanism: a development operation and maintenance unit performs security posture estimation on the current virtual machine and its operation environment, and performs initiative migration on the virtual machine according to a strategy; and 5) a dynamic virtual machine and software cleaning mechanism: cleaning the online virtual machines according to the security posture or periodically. By adoption of the method, the anti-attack ability of a cloud data center is improved, and higher security requirements of users and providers for cloud services and infrastructure are satisfied.
Owner:THE PLA INFORMATION ENG UNIV

Compressive sensing-based adaptive video information hiding method

The invention discloses a compressive sensing-based adaptive video information hiding method, which is characterized by comprising the following steps of: a, framing a video file by using shot as a unit; b, taking the first frame of each shot as a key frame; c, establishing an image texture classification model to obtain a texture classification model mark of each key frame; d, determining a texture category of each key frame and determining whether the key frame is a texture region, or a smooth region or between the texture region and the smooth region; e, selecting an algorithm and determining insert depth; f, inserting secret information, i.e., inserting the secret information in a coefficient matrix; and g, synthesizing a video file. According to the video information hiding method, the secret information can be adaptively inserted under the condition that the entire video file is not required to be decompressed, so that the ornamental value of the video is not affected, and the method has the advantages of small amount of calculation, high information steganography efficiency, small influence on the video and good secret information safety. The method can be widely applied to various fields such as copyright authentication, pirate tracking and secure communication.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Mimetic mail server information processing device and mail service processing method, device and mail system

ActiveCN108833417AMeet security needsSolve the problem of building homogeneityData switching networksResource poolInformation processing
The invention relates to a mimetic mail server information processing device and a mail service processing method, device and a mail system. The information processing device comprises a resource poolcomposed of a user transfer proxy component and a server mailbox component, multiple parallel heterogeneous mail service chains composed of various components randomly selected from the resource pool, and a dynamic feedback control module, wherein the user transfer proxy component includes a number of heterogeneous user transfer proxy executors, and the server mailbox component includes a numberof server mailbox executors; and the dynamic feedback control module is used to monitor the operation of each executor and perform dynamic scheduling on various components. According to the scheme ofthe invention, the diversified executors are created, multiple processing results are subjected to mimetic decision output, the security performance of the mail system services can be improved, the initiative, variability and randomness of the mail system defense capability can be improved, the problem of privacy protection can be effectively solved, a more secure mail server solution can be provided, and the important guiding significance can be provided for the mail system security technologies.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Image digital copyright protecting method and image digital copyright protecting system based on frequency domain digital watermarking algorithm

The invention provides an image digital copyright protecting method based on a frequency domain digital watermarking algorithm. The method comprises the steps of performing coding of character information which comprises copyright information for obtaining an image sequence that is obtained through combining definite-number binary-value image templates, and embedding the binary-value image sequence into an image according to image characteristic points and a wavelet transform technique; calculating the size of the image sequence for keeping robustness of the algorithm, and generating an alarm when the size of the image sequence is overlarge; and for resisting rotation and scaling attacks, embedding pre-arranged template linear points in an annular Fourier transform area of SIFT characteristic points of the image. In extraction, a rotation and scaling deformation parameter which is bear by the image is estimated through analyzing distribution of the template linear points; the parameter is used for restoring the image and then extraction is performed; a extracted watermarking binary-value image is restored to a watermarking character sequence through matching with a preset template image according to an encoding algorithm; and whether the watermarking sequence is totally extracted is checked by means of a CRC32 algorithm. The image digital copyright protecting method has high robustness and settles a problem of incapability of simultaneously resisting multiple kinds of attacks in an existing image algorithm, particularly cutting and rotation scaling geometric attacks.
Owner:武汉圆周率软件科技有限公司

Finger print structure in digital products, its authentication and digital products issue system

InactiveCN1834973AEnhanced construction flexibility and fingerprint security and robustnessImprove reliabilityProgram/content distribution protectionMarketingSystem safetyFingerprint
The invention relates to an in-digital product fingerprint constructing and verifying method, and the constructing method obtains purchase secret information from a purchaser, and uses a copyright server to construct an evidence fingerprint unable to be forged, and then uses a copyright issuing server to construct an ID fingerprint with license issued by the copyright server and sale information, and finally adopts fusion technique to construct a fingerprint-containing copy. And the verifying method extracts the ID fingerprint stored in the digital product to check the product license and identify the ID of the purchaser, and then checks and confirms the belonging relation by comparability of the evidence fingerprint. Correspondingly, the invention provides a digital product issuing system, comprising purchasing device, copyright issuing server and copyright server. And it provides a user-friendly and simple-to-apply method, largely improving safety and extendibility of the existing system.
Owner:PEKING UNIV

Method and device for generating three-dimensional dynamic verification code

The invention provides a method and a device for generating a three-dimensional dynamic verification code. The invention adopts a technical scheme which comprises the following steps: randomly generating the verification code and determining the position at which the verification code is displayed in a screen; generating a three-dimensional geometric primitive and judging whether the positions of the three-dimensional geometric primitive and the verification code information displayed in the screen are the same or not; if so, changing a designated changed attribute of the three-dimensional geometric primitive; otherwise not changing the designated changed attribute of the three-dimensional geometric primitive; and moving the designated changed attribute of the three-dimensional geometric primitive according to a motion trail to realize the three-dimensional dynamic verification code. In the invention, the content of the verification code is displayed by changing the attribute of the geometric primitive and each frame does not reveal the verification code information out, so that the traditional two-dimensional image verification code attack means cannot separate the content of the verification code from a single-frame image; and at the same time, because different motion trail of each geometric primitive is set by a special method, the identification and attack difficulties of the traditional technology tracing a moving object in a video are increased and anti-attack capability of the verification code finally is improved effectively.
Owner:WUHAN UNIV

Color digital image encryption method based on 2D-VMD and eight-dimensional hyperchaotic system

The invention provides a color digital image encryption method based on 2D-VMD and an eight-dimensional hyperchaotic system, and belongs to the technical field of information security. The problems ofpoor security, small key space and breaking easiness of the existing color digital image encryption methods are solved. The technical points are as follows: separating red, green and blue componentsof a color plaintext image; randomly selecting an initial value of the system, updating and calculating parameters and the initial value of the eight-dimensional hyperchaotic system by using the colorplaintext image, performing iteration on the hyperchaotic system to generate two key sequences with high randomness; separately decomposing the red, green and blue components by using a 2D-VMD method, separately performing pixel position scrambling and pixel value diffusion encryption on sub-images obtained by decompression, finally obtaining color ciphertext images of corresponding decompositionlayers, and decrypting the color ciphertext images. Compared with the existing encryption methods, the color image encryption algorithm provided by the invention has a significant increase in key space and can effectively resist multiple attacks.
Owner:HARBIN UNIV OF SCI & TECH

Color image encryption method based on Latin square scrambling

The invention relates to a color image encryption method based on Latin square scrambling. Plaintext keys r1, g1 and b1 are calculated through utilization of R, G and B components of a color plaintextimage, an initial value and a parameter obtained through calculation based on the keys are substituted into a chaotic system, and three groups of chaotic sequences are generated; the chaotic sequences for scrambling and diffusion are selected through utilization of a chaotic sequence selection mechanism based on the plaintext and digital arrangement; and a final ciphertext image is obtained through adoption of a block scrambling policy based on a Latin square and the chaotic sequences, and diffusion operation based on the plaintext and a scrambled image. The encryption method is closely related to the plaintext, so the plaintext attack resistance is improved. The employed chaotic system is an improved chaotic system, a chaotic characteristic is good, the randomness is high and a key spaceis great, so a security level is further improved. A simulation result and safety analysis show that according to the encryption provided by the invention, an image complete encryption demand can besatisfied, the encryption efficiency is high, and the robustness is high.
Owner:HENAN UNIVERSITY

Block chain distributed dynamic network key generation and encryption method

The invention discloses a block chain distributed dynamic network key generation, encryption and decryption method, which comprises the following steps of: (1) generating and encrypting a key, initializing a network, and starting a key management protocol of a distributed dynamic self-organizing network; (2) after the key management protocol is started, counting the key encryption times, startingto accumulate the key generation and encryption times, updating a key encryption algorithm after the specified times are reached, and waiting for a new round of key generation and encryption operation; and (3) after the secret key is generated and encrypted, broadcasting a message generated by the secret key to the whole network for verification. In order to solve the problem that potential safetyhazards exist due to dynamic changes of a blockchain distributed network, a secret key management protocol is designed, generation and encryption of a secret key are managed, the efficiency of secretkey generation and encryption and decryption processes is guaranteed, an encryption method of an iterative encryption algorithm is designed for attackers to forcibly crack the secret key or launch replay attacks, secret key loss is reduced, and transaction information transmission safety is guaranteed.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Quantum image encryption method based on image association dissection

Disclosed is a quantum image encryption method based on image association dissection. A quantum-state superposition and measurement principle is used to establish correlation between image pixels. An image is dissected into superposition of a series of characteristic sub-images. Conversion operations are performed on the characteristic sub-images stored in a complete binary-tree digit group through use of a random phase door and a quantum rotating door and then a plurality of superpositions are performed on all the images through quantum-state superposition so as to obtain a cipher image. Schmidt orthogonal dissection is performed on the quantum random phase door, the quantum rotating door, a coefficient matrix and the cipher image so as to obtain a standard orthogonal ground state which is then used as a key. The quantum image encryption method based on the image association dissection has a larger key space so that strong attacks can be resisted and combination of a quantum-mechanical theory and an image encryption technology is realized. The method has classical information theory security and quantum information theory security so that quantum image encryption surpasses restriction of classical image encryption and compared with classical images, quantum images are higher in security.
Owner:NANCHANG UNIV

Method for generating verification codes as well as method and detection for verification

The invention provides a method for generating verification codes as well as a method and device for verification, wherein the method for generating the verification codes comprises the following steps of: selecting specific geographic elements; generating a verification map containing specific geographic elements and a verification condition taking the positions of the geographic elements on the verification map as an object; and obtaining the verification codes sent to a user by labeling the verification condition on the verification map. By virtue of the mode, the attack resistance of the verification codes can be effectively enhanced.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

Wavelet domain-based method for weighting fractional differential image digital watermark

The invention provides a wavelet domain-based method for weighting a fractional differential image digital watermark, which mainly solves the problem that the high-frequency coefficient of an image undergoing wavelet decomposition is susceptible to extraneous noises and conventional image processing. The method comprises the implementation steps of: doing two different orders of differentials for a sinusoidal signal by utilizing a fractional order Cauchy formula; respectively carrying out discrete sampling and superposing by utilizing a given weight to generate a pseudorandom sequence and adding the pseudorandom sequence with a watermark pixel value to realize watermark scrambling; carrying out two-stage decomposition on a carrier image by utilizing a Haar wavelet and embedding the scrambled watermark information in the carrier image through the exchanged and decomposed high-frequency coefficient; and through comparing the high-frequency coefficient undergoing the two-stage decomposition by utilizing the Haar wavelet, extracting the scrambled watermark and subtracting the pseudorandom sequence to realize watermark recovery. The method provided by the invention has the advantages of strong anti-attack ability and good safety of the image, and can be applied to copyright protection, restriction of illegally spreading audiovisual products, individual privacy protection, identification hiding and high-tech crime prevention.
Owner:XIDIAN UNIV

Intelligent control water meter

The invention relates to an intelligent quantitative control water meter. When a valve in the water meter is opened by separating magnets which attract with each other, energy required by closing a valve is registered in the displacement of the magnets generated when the valve is opened; magnetic force is used for quantitative control when the magnets are far away from each other and magnetic attraction force is weak, and the magnetic attraction force is used as power for closing the valve when the magnets are close to each other and the magnetic force is strong; the water meter has a unified measurement reading which conforms to the purpose of legislation of the metrology law; water supply and power supply are alternately performed, normal water supply is performed without the power supply, and the valve is automatically closed without electric energy when a quota is finished; a circuit is electrified for short time to intelligently judge, a motor in the meter is conditionally started and the valve is opened to recover the water supply; and the water meter is provided with an internal locking device for preventing the water meter from being illegally and nondestructively opened or disassembled. The intelligent quantitative control water meter has the advantages of simpleness, stability and reliability. The problems of the measurement, charging, management and measurement law of the intelligent water meter and a remote water meter caused by the conventional non-electrical quantity electrical testing technology are radically solved in a mechanical quantization and electronic equipment power-off working mode.
Owner:杨启梁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products