Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32results about How to "Reduce the probability of being attacked" patented technology

A smart community management system based on the edge computing server of the Internet of Things

The embodiment of the invention discloses a smart community management system for an edge computing server on the Internet of things, The smart community management system comprises: a perceptual layer, an operations layer, a platform layer, and an application layer; the sensing layer is comprised of a plurality of intelligent hardware, the sensing layer uploads the data of the intelligent hardware to the operation layer through the network layer, The edge computing server in the operation layer processes the data, the platform layer is a smart community cloud platform, the operation layer isconnected with the platform layer through the multicast technology, the application layer is an interactive entrance of the smart community cloud platform, and the application layer comprises a plurality of application modules to realize different interactive control. The invention solves the problems of low intelligence degree and low safety coefficient of the existing community management system.
Owner:南京我在智能科技有限公司

Terminal access method and device

The invention belongs to the technical field of communication, and particularly discloses a terminal access method and device. The method comprises the steps: receiving an inquiry request message of amicro base station, wherein the inquiry request message carries a micro base station identifier, a blockchain identifier of a user terminal, a mobile phone number and deadline; querying user information according to the mobile phone number, and verifying the reliability of the user terminal according to the user information; broadcasting a verification broadcast message in the blockchain network,wherein the verification broadcast message carries a blockchain identifier, a mobile phone number and a reliability identifier of the user terminal. According to the terminal access method, the probability that the micro base station alliance is attacked can be reduced, the privacy information of the user terminal is protected, and the development of the micro base station alliance is promoted while the user experience is improved.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Android malicious application detection method based on dual-channelconvolutional neural network

An Android malicious application detection method based on a dual-channel convolutional neural network is provided. The method includes obtaining an installation package file; decompiling the installation package files; constructing an opcode sequence; construct an instruction function sequence; carrying out vectorization processing on the features of the operation code sequence and the instruction function sequence; training a convolutional neural network; testing the convolutional neural network; evaluating the malicious application detection model; detecting an application to be detected, etc. Compared with the traditional detection model, the malicious application detection model generated by the method provided by the invention has higher classification accuracy and recall rate, and reduces the probability of the Android system being attacked due to missing detection.
Owner:CIVIL AVIATION UNIV OF CHINA

Double-layer grouping Byzantine fault-tolerant consensus method and system

The invention discloses a double-layer grouping Byzantine fault-tolerant consensus method and system. The method comprises the following steps: S1, determining node groups; S2, for each group of nodes, selecting a part of nodes from the nodes as committee nodes, forming committee of the group, taking the remaining nodes except the committee nodes as common nodes, and selecting a main node of each group from the committee nodes; S3, building a block chain network; S4, if a certain group of committee receives a proposal request, the main node of the group generating a block according to the proposal request and sending the block to other committee nodes of the group for a first round of consensus, and if the first round of consensus passes, generating an initial block and sending the initial block to the common node of each group; and S5, performing a second round of consensus on the initial block by the common node of each group, and if the second round of consensus is passed, chaining the initial block and storing the initial block in a local account book. According to the method, a double-layer grouping consensus structure is adopted, and the system robustness is improved on the premise that low communication complexity is guaranteed.
Owner:NAT UNIV OF DEFENSE TECH

Information distribution method for mobile terminal

The present invention relates to an information distribution method of mobile terminal; in the process of mutual authentication between a mobile terminal and a network server, the mobile terminal sends the relevant information code of the mobile terminal to an authentication server; after the authentication succeeds, a session key is established; the authentication server sends the relevant information code of the mobile terminal to the network server; according to the relevant information code of the mobile terminal, the network server completes the operation of information distribution and returns operating results to the authentication server; the authentication server informs the mobile terminal of the authentication and the information distribution results. With the method of the present invention, the information distribution is embedded to the AKA process, reduces the communication cost and can reduce omissions and errors of information distribution by the network server as possible; the present invention can use the session key consulted in the authentication process to encrypt distributed information and reduces the probability of being attacked. The key consulted in the AKA process has safe protection on data distribution and improves the safe performance.
Owner:ZTE CORP

Mobile CA node electing method based on MD5 hash information abstract

The invention discloses a mobile CA node electing method based on an MD5 hash information abstract. The method includes the steps that MD5 hash information abstract calculation is performed on certificate demand files generated by applied nodes, and demand data are obtained; each node of all the nodes is elected as a CA node according to integer data and the received demand data, wherein the integer data are obtained after data composed of the generated random number, the IP address and the MAC address are calculated through the MD5 hash information abstract; due to the fact that the key factor for determining the CA node lies in the certificate demand files generated by the applied nodes and the random number generated by the node in the Ad-hoc network, for the same applied node, a CA node electing result obtained each time differs from other results, and for the different applied nodes, the CA node electing results are different. Thus, the CA nodes are effectively prevented from providing a certificate service for a long time and the energy consumption of the CA nodes is reduced. Meanwhile, the probability of attacking the CA nodes is greatly reduced.
Owner:NINGBO UNIV

Data verification method and device based on DAG block chain and computer equipment

The invention relates to a data verification method and device based on a DAG block chain, computer equipment and a storage medium. The method comprises the following steps of: obtaining a resource transfer parameter of each node in the DAG block chain; according to resource transfer parameters, selecting a target node, sending a transaction selection message to the target node, enabling the target node to select two unverified transactions and publish a random character string; and when it is detected that a hash value obtained by continuous hash operation of the target node based on the random character string and a workload proof mechanism is smaller than or equal to a preset threshold, judging that the target node passes verification. According to the method, a target node is used forreplacing a coordinator node in a DAG block chain to realize decentralization; through the competition mode, the verification of the transaction is no longer limited to the coordinator node, the efficiency of transaction verification is improved, the probability that the DAG network is attacked is greatly reduced, and the data security of the network is improved.
Owner:卓尔智联(武汉)研究院有限公司

Method, device and electronic equipment for protecting target application

InactiveCN105893846AImprove securitySolve the problem of vulnerability to attack and low securityPlatform integrity maintainanceFile systemApplication software
The embodiment of the invention discloses a method, device and electronic equipment for protecting target application, and relates to the information security technology, wherein the probability of application attack can be reduced, and the application security is improved. The method comprises the following steps: when the pre-input hook function monitors that a file system opening routine function is called, hooking the file system opening routine function using the hook function; calling a progress path acquisition function, and acquiring the operation progress path name calling the file system opening routine function; and if the acquired operation progress path name is the same as any debugger progress path name in a preset debugger progress path name library, rejecting the calling of the file system opening routine function. The method, device and electronic equipment are applicable to the anti-debugging protection of application.
Owner:ZHUHAI BAOQU TECH CO LTD

DNP3 protocol fuzzy test method based on sequence generative adversarial network

The invention discloses a DNP3 protocol fuzzy test method based on a sequence generative adversarial network. The DNP3 protocol fuzzy test method comprises the following steps: 1, constructing a DNP3protocol sample database; 2, preprocessing DNP3 protocol sample data; 3, carrying out data variation on the preprocessed DNP3 protocol sample; 4, generating a primary test case; 5, comparing the similarity of the test cases to remove redundancy; 6, carrying out seed test case variation; 7, performing a DNP3 protocol fuzzy test; 8, carrying out vulnerability verification; and 9, debugging and monitoring the abnormal test case. According to the method, the sequence generative adversarial network is utilized to generate the high-pass-rate test case; the redundancy of the test cases is reduced through a screening algorithm taking case similarity as an index; a random variation strategy is introduced to perform test case variation, so that the test case diversity and the vulnerability discoveryprobability are improved; by analyzing the stack frame information of the program when the vulnerability occurs, the cause of the vulnerability is found and recorded, so that the attack probability of the industrial control system is reduced, and the security of the industrial control system is improved.
Owner:XIAN UNIV OF SCI & TECH

Attack detection method and device based on attack detection model, medium and equipment

The invention discloses an attack detection method and device based on an attack detection model, a medium and equipment, relates to the field of network security, and mainly aims to solve the problems that when an existing machine learning algorithm is used for attack behavior detection, due to the fact that the number of training samples and the number of feature selection are small, the accuracy of an attack detection result is low, and the efficiency is high. And the false alarm rate is high. Comprising the steps of obtaining operation behavior data of a target user; the operation data are classified based on an attack detection model after model training is completed, a classification result is obtained, the attack detection model is constructed based on a support vector machine algorithm, model training is completed based on training samples and script language features, and the classification result is obtained. The training sample is composed of an attack sample collected based on an attack tool and a normal sample generated based on an automatic test attack, and the script language feature is extracted based on the attack sample; and if the classification result is an attack behavior, outputting an attack warning, and intercepting data generated by all operation behaviors of the target user.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

Honeypot protection system

The invention discloses a honeypot protection system, which uses a simulation node to simulate a real node in a protected network, and the simulation node is configured with all idle IP addresses in the protected network, so that the simulation node can be accessed externally as the real node in the protected network. Under the condition, if an attacker accesses the protected network, the attacker does not only access the real node in the protected network but possibly accesses the simulation node, but the simulation node does not run the actual network service, so that the probability that the protected network is attacked is reduced, and the probability that the real server is attacked is also reduced. Meanwhile, the honeypot group can capture the flow data of the access simulation node and the protected network, so that the attack information can be captured by the honeypot, and the network safety is protected and improved.
Owner:杭州安恒信息安全技术有限公司

Method and system for managing network nodes in Internet of Things environment

According to the method and system for managing network nodes in an Internet of Things environment, specified network resources and system are defined as a first-level node layer, a second-level nodelayer, a network transmission layer, a service layer and a main control node, a two-level network management mode is adopted, multi-level management can be easily expanded, and a large number of nodeaddresses are saved. Not only can the security hierarchy be dynamically adjusted in real time according to the state of the primary node, but also the size of the attribute domain can be dynamically adjusted, the secondary node is prevented from being excessively concentrated, and the attacked probability is reduced. A technical means of attribute encryption is introduced to perform attribute encryption on the transmission data, so that the service data of different users can be better protected.
Owner:武汉思普崚技术有限公司

Industrial internet intrusion detection and defense method and device

The invention provides an industrial internet intrusion detection and defense method and device, and relates to the technical field of network security detection and defense. The industrial internet intrusion detection and defense method comprises the following steps: after a client sends a service request, the service request is detected through a router, the service request is directly rejected when the detection is not passed, and when the detection is passed, a camera authority of the client is requested to identify the face of an operator of the client to verify the identity; and when the verification is not passed, the service request is rejected. By increasing operation frequency verification, the frequency of face verification, iris authentication and IP address can be effectively reduced, the operation frequency of an operator can be well limited, the operator is prevented from carrying out operation without limitation, impact on a network can be relieved to a certain degree, the probability that the network is attacked can be reduced, the intensity that the network is attacked can be relieved, normal operation of the network is further ensured, and meanwhile the defects in the prior art can be overcome.
Owner:泉州和西利科技有限公司

A modular and building block digital array radar system

The present invention provides a modular and building block type digital array radar system. The system comprises a plurality of building block type digital active transceiver sub-modules and a data fusion server. The building block type digital active transceiver sub-modules are respectively mounted on a preset antenna array-plane framework and are respectively connected with the data fusion server. Each building block type digital active transceiver sub-module is composed of an antenna radiation module in card-inserting type connection with a comprehensive backboard, a digital T / R module, a digital beam forming unit, an optical power divider and an array-plane monitoring network module, wherein the antenna radiation module, the digital T / R module, the digital beam forming unit and the optical power splitter are sequentially in communication connection. The optical power splitter is connected with the data fusion server. The array-plane monitoring network module is respectively connected with the digital T / R module and the data fusion server. The modular and building block type digital array radar system has the advantage of multi-angle viewing angle and can effectively resist the main-lobe interference. A distributed arrangement receiving station is passive and can effectively reduce the radar intercepted probability and the radar attacked probability.
Owner:SHANGHAI SPACEFLIGHT INST OF TT&C & TELECOMM

Voting method based on P2P network

ActiveCN111696245ASave bandwidthControl voting concurrencyVoting apparatusTransmissionAttackEngineering
The invention discloses a voting method based on a P2P network. The voting method comprises the following core characteristics: a broadcasting method for saving network bandwidth; controlling the network voting concurrency; a multi-order verification / confirmation method which can reduce the attacked probability to be close to zero; and performing quantitative immunization against attacks. According to the method, several technical difficulties, such as network bandwidth occupation, network voting concurrency control and quantitative immunity of attack defense, which hinder the P2P network voting system from being put into use are solved.
Owner:郭平波

Attack batch division method in complex environment

ActiveCN112650305AShorten reflection area increase timeReduce the number of opening doorsTarget-seeking controlSimulationUncrewed vehicle
The invention belongs to the technical field of unmanned aerial vehicle control, and particularly relates to an attack batch division method in a complex environment. The method comprises the following steps: S1, acquiring each target position numbered according to importance degree; S2, according to the current aerial carrier situation and weapon tail end constraint conditions, calculating a single-target launching area; S3, calculating an attack area corresponding to the current situation downloader; S4, taking the target with the highest current importance level as a basic target, and traversing and moving the attack area in a plane where the target is located; S5, selecting a result containing the most targets, and outputting a target number; S6, performing multi-target release area intersection solution on the release areas corresponding to the solved target numbers to obtain a first multi-target release area; and S7, removing the targets in the step S5, repeating the steps S4 to S6, and obtaining other multi-target delivery areas. According to the invention, the cabin door opening time is shortened, and the radar reflection area increasing time is shortened, so that the attacked probability is reduced.
Owner:SHENYANG AIRCRAFT DESIGN INST AVIATION IND CORP OF CHINA

File security detection method and device and electronic equipment

The invention discloses a file security detection method and device and electronic equipment, and is used for solving the problem that the security of files cannot be rapidly detected in batches in the prior art. The method comprises the steps that a security detection server acquires multiple groups of log data and multiple groups of rule data from a log acquisition database; the security detection server associates the multiple groups of log data with the multiple groups of rule data to obtain multiple groups of to-be-detected data, and one group of to-be-detected data comprises one group oflog data and one group of rule data; and the security detection server performs security detection operation on multiple groups of log data in the multiple groups of to-be-detected data based on multiple groups of rule data in the multiple groups of to-be-detected data, so as to determine the security of multiple files corresponding to the multiple groups of log data.
Owner:新浪技术(中国)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products