Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

123 results about "Defence system" patented technology

Specific Defence System. This defence system is called the specific defence system because the system attacks specific invaders. This can happen by the production of antibodies or by white blood cells engulfing a particular pathogen.

Cloud-based intelligent security defense system and defense method

InactiveCN103905459AImprove recognitionImproving the performance of blocking defensesTransmissionCore functionRecovery function
The invention provides a cloud-based intelligent security defense system and defense method. Intelligent processing platforms are mutually dispatched through a system core function dispatching module according to a cloud-based intelligent processing assembly, the network security defense system capable of detecting, monitoring, checking, killing, blocking, auditing and recovering abnormal information is formed, the dynamic intelligent detection, identification and blocking and defense performance of the whole network is effectively improved, and the overall intelligent defense performance is improved.
Owner:SHANGHAI DIANJI UNIV

Projectile for radially deploying sub-projectiles

A projectile (10) for firing from a barrel, said projectile including a multiplicity of barrel assemblies (12, 13, 14) radially disposed from the centre of mass of the projectile, wherein each of said multiplicity of barrel assemblies includes a plurality of sub-projectiles (16) axially disposed within a barrel; each of said sub-projectiles associated with a discrete propellent charge (17) for propelling a respective sub-projectile from the barrel, wherein said projectile is capable of selectively firing sub-projectiles (16), suitably with the aid of primers (18) each coupled to an electronic controller (15). to provide a predetermined pattern of deployed sub-projectiles. A defence system employing projectiles of the type described is also disclosed, together with a method for disguising the launch location of a projectile utilising divert propulsion.
Owner:METAL STORM LTD

Defense system and method for solving network threats in self-adaptive closed-loop mode

The invention relates to a defense system and method for solving network threats in a self-adaptive closed-loop mode, and the system comprises a prediction module which is used for the recognition andclassification of asset conditions in a network on one hand, and is also used for the vulnerability scanning and weak password scanning of the network on the other hand; a prevention module which isused for repairing and perfecting vulnerability such as vulnerability risks and weak passwords detected by the prediction module in network asset management; a monitoring module which is used for simulating the key assets in the prediction module, utilizing and confusing the sight of an attacker, and monitoring the attack technology and tool of the attacker on honeypots simulating the key assets in time; an analysis module which is used for analyzing the data output by the monitoring module, and a response module which is used for automatically generating a response command for an analysis result of the analysis module. The defense system and method for solving the network threats in the self-adaptive closed-loop manner are specifically adapted to environments with different network resources and can effectively solve the threats in a network.
Owner:南京经纬信安科技有限公司

Large-scale DDoS attack detection and defense system based on cloud + end device on-demand linkage mode, and defense method

ActiveCN109450841ABreak through the bottleneck of anti-D defenseComprehensive defense against DDoS attacksTransmissionGranularitySystem protection
The invention relates to the technical field of network cloud security protection, and specifically relates to a large-scale DDoS attack detection and defense system based on a cloud + end device on-demand linkage mode. The system comprises a cloud platform defense system and a local end defense system, the cloud defense system comprises a cloud scheduling center, a cloud cleaning node device anda DNS near-source resolution server, and the local end defense system is used for performing fine-granularity cleaning protection for access service server traffic, performing cooperative processing with the cloud cleaning node device and performing message forwarding. Relative to single local end defense system protection, the large-scale DDoS attack detection and defense system provided by the invention can take advantages of high-capacity cleaning capability of cloud distributed cleaning nodes, and can break anti-D defense bottleneck of local bandwidth limit; and relatively to single continuous access cloud protection, the large-scale DDoS attack detection and defense system provided by the invention can realize more comprehensive defense to DDoS attacks and better cleaning effects through cloud node distributed cleaning and secondary fine filtering of the local end defense system.
Owner:ANHUI ZHONGXIN SOFTWARE

Security analysis method for mimicry defense architecture

The invention discloses a security analysis method for a mimicry defense architecture. The method comprises the following steps: defining the dynamic transformation period of an executor in a securityanalysis model, the time required for successful attack implementation, the probability that the executor shows difference after being attacked, and the probability that an attacker successfully transfers the attack; analyzing the security of the single redundancy defense architecture; obtaining the probability of invading the input proxy component, the probability that the attack continues to stay in the input agent component, the probability that the attack invades into the heterogeneous execution body set from the input agent component, the probability that the attack continues to stay inthe heterogeneous execution body set, the probability that the attack invades into the voter component from the heterogeneous execution body set and the probability that an attacker successfully invades into the voter component from the input agent component are set; and analyzing the security of the n redundancy defense architecture to obtain general values corresponding to the six probability values. According to the method, different parameters are used for analyzing the security defense effectiveness of the mimicry defense system, and a theoretical analysis basis is provided for the security of the mimicry defense model.
Owner:NANJING UNIV OF SCI & TECH

Multi-weapons system

A multi-weapons system comprising: an active defence system (ADS) comprising a mortar launch tube mounted on a support base-plate rotatable 360 degrees; a weapons system comprising a machine gun mounted alongside the active defence system (ADS) on the support base, a motor with mechanism to rotate the support base-plate with the active defence system (ADS) 360 degrees, drive means to adjust the power capacity of the motor between that required for the active defence system and that required for the machine gun, control means to rotate and adjust the elevation of the launch tube and adjust the directional movement of the machine gun, computer and electronic means to automatically rotate and fire the active defence system display and control means to manually operate the machine gun, control means to override the manual operation of the machine gun and prevent its firing when the active defence system is automatically activated.
Owner:IMI SYST LTD

Plant growth nutrient solution and its preparation method

The present invention discloses one kind of plant growth nutrient liquid and its preparation process. During growth of plant, cell and tissue will produce active oxygen and the active oxygen should be eliminated timely to avoid plant presenility, slow growth or death. The enzymatic defense system protecting enzyme can eliminating active oxygen to promote plant growth, and the present invention compounds the plant growth nutrient liquid with SOD and other nutritious matters. The plant growth nutrient liquid has powerful antioxidant capacity and can lower active oxygen content in crop to reduce harm of active oxygen on crop. The present invention is used in tobacco, cotton, fruit tree, vegetable, etc. to reach the effects of raising yield and quality.
Owner:庄义达

Malicious identifier defense method and system based on Handle system

ActiveCN111200605AImprove the quality of analysis servicesTransmissionQuality of serviceInternet privacy
The invention discloses a malicious identifier defense method and system based on a Handle system, and aims at solving the problem that an existing Handle native system of a recursive node cannot normally respond to a user request under the condition of facing a large-scale sub-deployment denial of service attack. The identifier defense system is added at the entrance of the native Handle system,and malicious access identifiers are identified in advance, so that the aims of defending malicious identifier attacks, normally responding to a request of a user and improving the analysis service quality are fulfilled.
Owner:PURPLE MOUNTAIN LAB

Industrial control security defense system

The invention discloses an industrial control security defense system which comprises a potential threat exclusion layer, an industrial control security audit system, a monitoring center, a field monitoring layer, a control layer and a physical layer. The potential threat elimination layer comprises a deep protocol analysis mechanism and a white list mechanism; the field monitoring layer performs data exchange and behavior control on the control layer and the physical layer through an industrial Ethernet; the industrial control security auditing system can analyze and identify illegal operation, abnormal events and external attacks in an industrial control network from multiple angles and give an alarm in real time; identity recognition is carried out through multiple means, system operation authority can be limited, override operation and malicious operation are avoided, it is avoided that external equipment carries viruses to affect system safety, meanwhile, exclusive detection can be carried out on common attack means, and the operation resource occupancy is small. The alarm response time of the whole system can be prolonged through unified monitoring management of the monitoring center, and the accident handling speed is increased.
Owner:上海磐御网络科技有限公司

Hardware-assisted code-reuse-attack-resistant defence system and method

The invention discloses a hardware-assisted code-reuse-attack-resistant defence system and method, wherein the defence system comprises a pre-processing module, a cache, a memory, a CPU and an encryption and decryption architecture; and the encryption and decryption architecture comprises a PUF module, a first key register, a first length register, a second key register, a second length register,a PUF encryption module, a Hamming distance coding module, a Hamming distance decoding module, a decompression module and a judgment module. According to the hardware-assisted code-reuse-attack-resistant defence system and method disclosed by the invention, the ROP attack is resisted by utilizing and matching the Hamming distance between the return address of a program and a key; because the Hamming distance is coded, the security problem that an attacker can guess a key generated by the PUF module in a plaintext attack manner in the past work can be eliminated; therefore, the security is high; simultaneously, an instruction-level data hiding technology is applied to JOP attack defence; therefore, the performance cost is low; an instruction set does not need to be changed; the universalityis good; and the security is high.
Owner:HUNAN UNIV

Virus attack defense method based on time probability attack graph

The invention relates to a virus attack defense method based on a time probability attack graph. The method comprises the following steps: constructing a time probability attack model; obtaining potential attack paths according to the time probability attack graph, and calculating the maximum attack success probability of each attack path; calculating a defense income result of each attack path; and in combination with the maximum attack success probability of each attack path and the defense income result, analyzing and evaluating a network security situation, and deploying a defense system to regularly scan and detect attack behaviors. According to the virus attack defense method provided by the invention, the network security situation is analyzed and evaluated, so that the deployment position of the defense system can be deployed in a targeted manner according to the path and the node which need to be protected, and the deployment accuracy of the defense system is further improved.
Owner:AIR FORCE UNIV PLA

Farm gate guard defense system

PendingCN110771516AAvoid harmGuaranteed to be absolutely cleanAnimal housingOther apparatusFisheryEngineering
The invention discloses a farm gate guard defense system, which comprises a vehicle passage and a personnel passage; the outside of a farm is communicated with a farm raising area through the vehiclepassage; the personnel passage leads to a disinfection area; the disinfection area comprises a personnel entry disinfection one-way passage and a material disinfection passage; an exit of the personnel entry disinfection one-way passage and an exit of the material disinfection channel face a quarantine region; the quarantine region is a closed region surrounded by a plurality of houses and enclosing walls; the quarantine area is internally provided with an entry disinfection passage for entry of the farm raising area and a personnel departure one-way passage leading to the personnel passage; the farm gate guard defense system also comprises a kitchen with an access door, and the access door of the kitchen faces the outside of the farm; the wall of the kitchen is provided with at least three meal pick-up ports which are isolated from one another; and the three meal pick-up ports are respectively opened to the raising area, the quarantine region and the outside of the farm. The farm allows the quarantine region and the raising area to be clearly divided, personnel in the areas are isolated from each other without crossing, one-way flow leads to the raising area, dirty and clean areashave a clear boundary, and the biological safety of the whole gate guard defense system is improved and guaranteed.
Owner:宿迁市立华牧业有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products