Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "Solve the problem of attack" patented technology

Safe DNS (Domain Name Resolution) method in internet browser

InactiveCN104104689APrevent further disclosureEnsure safetyTransmissionIp addressWeb page
The invention discloses a safe DNS (Domain Name Resolution) method in an internet browser. The method comprises the steps: 1) preparing N DNS servers; b) transmitting a resolution request; c) performing domain name resolution; d) recording a received return packet, and recording the quantity to be M; e) judging whether the formula M=0 is established, indicating that a browsing behavior is not completed if the formula is established; indicating that there is the return packet if the formula is not established; f) when a user is used for refreshing, executing the step c); if other web pages are changed to browse, executing the step b); g) taking an IP (Internet Protocol) with most repeating times, and taking the times as X at the same time; and h) judging whether the formula that X is more than N / 2 is established, if the formula is established, indicating the IP to be a safe address; if the formula is not established, indicating this browsing to be attacked by the DNS. According to the DNS method in the internet browser provided by the invention, the domain name input by the user can be guaranteed to point to a corresponding web site or a service, therefore, the attacking problem in the DNS process can be solved; furthermore, the forged IP address can be filtrated to retain a correct IP address.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

User location personalized differential privacy protection method for location-based service

The invention discloses a user location personalized differential privacy protection method for location-based service. The method comprises the steps of 1, generating a disturbance location through utilization of an index mechanism; 2, obtaining a posterior probability of an opponent for a location of a user at time t according to a prior probability of the opponent for the location of the user at time t, index mechanism probability distribution and the generated disturbance location; 3, judging whether the posterior probability of the opponent for the location of the user at time t satisfiesa security requirement or not, sending the disturbance location and a query request to a service provider if the posterior probability of the opponent for the location of the user at time t satisfiesthe security requirement, and adding a confusion location if the posterior probability of the opponent for the location of the user at time t does not satisfy the security requirement; 4, adding theconfusion location, and sending a location set composed of the confusion location and the disturbance location to the service provider after the security requirement is satisfied; and 5, screening query results returned by the service provider. According to the method, the problem that user location privacy is leaked due to unreliability of the service provider can be solved, and moreover, a Bayesian attack can be effectively coped with, so security of the user location privacy in the location-based service can be improved.
Owner:ANHUI UNIVERSITY

Unified identity authentication platform based on zero trust and confidential calculation

The invention relates to a unified identity authentication platform based on zero trust and confidential calculation, which comprises four stages, namely a communication establishment stage, a user registration stage, a function platform registration stage and a login and key negotiation stage, wherein the communication establishment stage is used for negotiating a symmetric key SK and establishing reliable communication between a user and a unified identity authentication platform; in the user registration stage and the function platform registration stage, a registration function verified by a unified identity authentication platform and a confidential calculation safety area and a function of constructing an anonymous authentication relation table are realized, and a legal user and a legal function platform are obtained; in the login and key negotiation stage, a function of negotiating a symmetric session key between a legal user and a legal function platform is realized, and the symmetric session key is used for encrypting subsequently transmitted privacy data. The method has the beneficial effects that the integrity and confidentiality of data in a running state are ensured; the low overhead and low time delay of the authentication process are ensured, and quick authentication is realized.
Owner:LANZHOU UNIVERSITY

Big data storage method

The invention provides a big data storage method. The method includes: a cloud server distributes an identification for a user based on a network logic address of the user, exports a public key of the user from the identification of the user, calculates and generates a private key of the user via a pre-generated secret key parameter, generates and distributes a key pair corresponding to the identification for the private key, and sets the legal user as the system middle node; during the login of the user, user verification is realized via the manner of callback, and when the current user can receive a connection of the network logic address, the user is determined to be the legal owner of the address. According to the method, the problem that illegal users carry out attacks via the network logic addresses can be effectively solved, the system security is guaranteed, and the method is applicable to cloud storage systems.
Owner:成都华西公用医疗信息服务有限公司

Access authentication method of wireless local area network, server and authentication system

The invention discloses an access authentication method of a wireless local area network. The method comprises the steps that: a server receives access information sent by first user equipment, and the access information carries the identity information of the first user equipment; the server sends an access request to the second user equipment according to the access information; if the server receives a confirmation instruction sent by the second user equipment for the access request, the server generates a challenge code and generates a first access password according to the challenge code; the server sends the challenge code to the first user equipment such that the first user equipment generates a second access password according to the challenge code; and the server completes EAP certification through the first access password and the first user equipment. Correspondingly, the invention discloses the server and an authentication system. By using the access authentication method, the server and the authentication system, a problem of dictionary attack can be solved.
Owner:HONOR DEVICE CO LTD

Communication verification method, electronic equipment and storage medium

ActiveCN112087427AReal-time managementOvercome the disadvantages of only after-the-fact managementTransmissionAttackEngineering
The invention provides a communication verification method, electronic equipment and a storage medium, and aims to solve the problems that a network security scheme needs a large amount of boundary equipment and DDOS attacks and APT attacks are difficult to thoroughly prevent. The communication verification method comprises the steps that: a node server receives a service application instruction sent by user equipment; the node server inquires a service type from target equipment according to a target equipment address in the service application instruction; the node server inquires the user equipment whether to receive the service type provided by the target equipment or not according to the inquired service type; after the user equipment selects receiving, the node server generates a pass, wherein the pass is obtained through negotiation between the user equipment and the node server; the user equipment and the target equipment establish indirect connection according to the pass; andthe node server examines communication between the user equipment and the target equipment according to the pass. According to the communication verification method, the security of communication between the user equipment and the target equipment is improved.
Owner:NOVNET COMPUTING SYST TECH CO LTD

Single sign-on method and device, electronic equipment and storage medium

PendingCN114218550ASolve writing cookies (data stored on the user's local terminal)Work around the limitation of having to share the same client systemDigital data protectionDigital data authenticationTheoretical computer scienceEngineering
The invention provides a single sign-on method and device, electronic equipment and a storage medium, and belongs to the technical field of artificial intelligence recognition and classification. The method comprises the steps that a first user authentication request is received, and the first user authentication request comprises user authentication information of a first application system; a first token is generated according to the user authentication information of the first application system, and the first token comprises a first user number of the first application system; sending the first token to the first application system; receiving a second user authentication request, wherein the second user authentication request comprises the first token; acquiring a second user number of the first target jump system according to the first user number; the second user number is sent to the first target jump system, and the first target jump system completes login authentication according to the second user number. Therefore, the cross-domain single sign-on function can be realized, all application systems do not need to use the same user system, and meanwhile, the security and credibility of identity authentication can be effectively ensured.
Owner:CHINA CONSTRUCTION BANK

Establishing method and application of system for packing adenoviruses with mesenchymal stem cells

The invention relates to an establishing method and application of a system for packing adenoviruses with mesenchymal stem cells, and belongs to the field of gene therapy. The method comprises the steps of reforming MSC cells as a carrier to obtain an MSC-E1 cell line for stable expression of E1 genes, enabling replication-defective adenoviruses having the effect of killing and damaging tumor cells to be infected with the cell line, and through intra-cellular assembling, preparing a cell system which can be packed and reproduce adenoviruses, wherein the cell system is used for performing caudal vein injection on a tumor model mouse, and the purpose of well killing and damaging tumor masses of the mouse is achieved. The established system can solve the three bottlenecks in tumor gene therapy, so that a bioremediation preparation is not attacked by a host defense mechanism, the bioremediation preparation can specially achieve the tumor parts, and therapeutic genes are in high-efficient expression in tumor tissues.
Owner:黄映辉

Network security protection method, system and device, security switch and storage medium

PendingCN114374543AThe solution cannot be formulated uniformlyFix security issuesSecuring communicationInternet privacyIp address
The invention relates to a network security protection method, system and device, a security switch and a storage medium, and the method comprises the steps: obtaining a first identity label of an access terminal from management platform equipment according to the MAC address of the access terminal when the access of the terminal is monitored, and carrying out the identity authentication of the access terminal, and under the condition that authentication of the access terminal succeeds, a security policy request is sent to the management platform equipment, and the security policy request carries the IP address and the first identity identifier of the access terminal, so that the management platform equipment sends the security policy to the access terminal when determining that a security policy issued for the access terminal exists according to the first identity identifier. And replacing a preset placeholder in the security policy with the IP address to obtain a target security policy, and issuing the target security policy to the security switch accessed by the access terminal, so that the security switch executes the target security policy after receiving the target security policy. According to the invention, unified formulation of security policies can be realized, and the efficiency and effect of security protection are improved.
Owner:BEIJING VRV SOFTWARE CO LTD

Method for accessing big data of cloud platform

The present invention provides a method for accessing big data of a cloud platform. The method comprises the steps as follows: a cloud platform server generates a secret key parameter and selects a security node, a user joins a system through the security node; the security node executes secret key exchange with the user, the security node generates a corresponding private key and a token for the user; the user verifies a message, decryption is performed to obtain the private key, and other nodes in the cloud platform determine whether the user has a legal identity. The method of the present invention can effectively solve the problem that an illegal user makes an attack through a network logical address, can ensure security of the system, and is suitable for a cloud storage system.
Owner:成都华西公用医疗信息服务有限公司

A Unified Identity Authentication Platform Based on Zero Trust and Confidential Computing

The invention relates to a unified identity authentication platform based on zero trust and confidential computing, which includes four stages, namely: communication establishment stage, user registration stage, function platform registration stage and login and key negotiation stage; wherein, the communication establishment stage It is used for the negotiation of the symmetric key SK to establish reliable communication between the user and the unified identity authentication platform; the user registration stage and the function platform registration stage realize the registration function verified by the unified identity authentication platform and the confidential computing security area, and build an anonymous authentication relationship table The function of obtaining the legal user and the legal function platform; the login and key negotiation stage realizes the function of negotiating the symmetric session key between the legal user and the legal function platform, and the symmetric session key will be used for the encryption of the subsequent transmission of private data . The invention has the beneficial effects of: ensuring the integrity and confidentiality of data in the "running state"; ensuring low overhead and low time delay in the authentication process, and realizing fast authentication.
Owner:LANZHOU UNIVERSITY

Dynamic password authentication method for resisting man-in-the-middle attack

The invention discloses a dynamic password authentication method for resisting man-in-the-middle attack. The method mainly comprises a registration stage and a login stage, is designed on the basis ofRSA difficulty, and can effectively resist man-in-the-middle attack and offline password guessing attack, and compared with a conventional password authentication scheme, the method has the advantages that in the authentication process, the times of executing encryption and decryption operations by a user and a server are reduced, and the authentication efficiency is improved; the remote login problem of a user can be conveniently solved, login information does not need to be stored in a public computer, and the login process is safer; violent cracking attack and man-in-the-middle attack on apassword can be effectively resisted, and meanwhile, bidirectional authentication is added, so that the problem of pseudo server attack is solved.
Owner:NANJING UNIV OF POSTS & TELECOMM

Intranet penetration security management and control method, management and control system and intranet penetration system

PendingCN114039757ASolving the vulnerability to sniffingSolve the disadvantages of brute force loginSecuring communicationControl systemEngineering
The invention discloses an intranet penetration security control method, a control system and an intranet penetration system, and the control method comprises the following steps: S1, identifying an external service port number of a to-be-connected internal node, and determining an external port bound with a to-be-connected intranet penetration client; S2, logging in an intranet penetration server; s3, opening an external port; s4, establishing communication with an intranet penetrating client through an external port; s5, after the preset time of successfully establishing the communication, closing the external port and keeping the current communication connection. The control system comprises a port number identification module, a login access module, an action module and a communication module. The intranet penetration system comprises an intranet, an external network and a security policy implementation system. The external port is opened and other ports are closed in a targeted manner by setting a firewall, and the defects that the intranet is exposed to the external network for a long time, and consequently the intranet is likely to be sniffed and cracked violently to log in are overcome.
Owner:上海承蓝数据科技有限公司

A location-based personalized differential privacy protection method for users

The invention discloses a user location personalized differential privacy protection method for location-based service. The method comprises the steps of 1, generating a disturbance location through utilization of an index mechanism; 2, obtaining a posterior probability of an opponent for a location of a user at time t according to a prior probability of the opponent for the location of the user at time t, index mechanism probability distribution and the generated disturbance location; 3, judging whether the posterior probability of the opponent for the location of the user at time t satisfiesa security requirement or not, sending the disturbance location and a query request to a service provider if the posterior probability of the opponent for the location of the user at time t satisfiesthe security requirement, and adding a confusion location if the posterior probability of the opponent for the location of the user at time t does not satisfy the security requirement; 4, adding theconfusion location, and sending a location set composed of the confusion location and the disturbance location to the service provider after the security requirement is satisfied; and 5, screening query results returned by the service provider. According to the method, the problem that user location privacy is leaked due to unreliability of the service provider can be solved, and moreover, a Bayesian attack can be effectively coped with, so security of the user location privacy in the location-based service can be improved.
Owner:ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products