Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

254 results about "Spoofing attack" patented technology

In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage.

Method and apparatus for analyzing one or more firewalls

A method and apparatus are disclosed for analyzing the operation of one or more network gateways, such as firewalls or routers, that perform a packet filtering function in a network environment. Given a user query, the disclosed firewall analysis tool simulates the behavior of the various firewalls, taking into account the topology of the network environment, and determines which portions of the services or machines specified in the original query would manage to reach from the source to the destination. The relevant packet-filtering configuration files are collected and an internal representation of the implied security policy is derived. A graph data structure is used to represent the network topology. A gateway-zone graph permits the firewall analysis tool to determine where given packets will travel in the network, and which gateways will be encountered along those paths. In this manner, the firewall analysis tool can evaluate a query object against each rule-base object, for each gateway node in the gateway-zone graph that is encountered along each path between the source and destination. A graphical user interface is provided for receiving queries, such as whether one or more given services are permitted between one or more given machines, and providing results. A spoofing attack can be simulated by allowing the user to specify where packets are to be injected into the network, which may not be the true location of the source host-group.
Owner:ALCATEL-LUCENT USA INC

Biometric authentication system, communication terminal device, biometric authentication device, and biometric authentication method

Provided is a biometric authentication system capable of preventing spoofing attacks even if leakage of key information and a registration conversion template occurs. A communication terminal device (300) calculates secret key information k′ which is exclusive OR of key information k of the registration biological information and masked value c′ which is randomly selected from a predetermined error correction code group, and calculates verified information c′″ which is exclusive OR of sent information c″ and value c′. A biometric authentication device (500) calculates exclusive OR of authentication biological information, information k′, and registration conversion template w, as information c″, wherein the template w is exclusive OR of information x, information k, and authentication parameter c randomly selected from the code group; and performs biometric authentication on the basis of a degree of matching between information c′″ corresponding to information c″, and the parameter c.
Owner:PANASONIC CORP

Apparatus and method for implementing spoofing-and replay-attack-resistant virtual zones on storage area networks

A storage area network resistant to spoofing attack has several nodes each having a port, and storage area network interconnect interconnecting the ports. Each port is provided with a hash function generator for providing and verifying an authentication code for frames transmitted over the storage area network, and a key table for providing a key to the hash function generator. The authentication code is generated by applying a hash function to the key and to at least an address portion of each frame. In each node, the key is selected from that node's key table according to address information of the frame.
Owner:GOOGLE LLC

Living person detection method applied to face recognition

ActiveCN104915649ASolve the problem of spoofing facial recognition systemsIncrease success rateCharacter and pattern recognitionPattern recognitionFace detection
This invention discloses a living person detection method applied to face recognition. The method includes the following steps that: modeling is performed on the background of a current recognition environment; face detection is performed: the locations and sizes of faces are obtained and are adopted as the initial position of next face detection; the similarity between the background of inputted face images and a modeling background image is calculated through adopting an SSIM method; when the faces are detected, ultrasonic waves are utilized to measure the distance between a camera and an obstacle, and a classification probability value f is obtained through utilizing a logistic regression model; and an SSIM value and the value f are combined linearly, so that a final result R can be obtained, and when R is smaller than a certain threshold value, a spoofing attack is determined. The living person detection method applied to face recognition of the invention has the advantages of high success rate and excellent stability.
Owner:南京理工科技园股份有限公司

Liveness detection method and system for face recognition on mobile platform

The invention provides a liveness detection method and system for face recognition on a mobile platform. The method includes the following steps that: a facial video containing of user photos at different angles as well as motion acceleration and rotation data of a mobile device in video recording are captured; the feature information of the correlation of head pose vector data and device movement vector data in the video are calculated and extracted; and whether the detected video is a real face or a face counterfeited from photos / videos is distinguished through a classifier. With the liveness detection method and system of the invention adopted, a face recognition-based identity recognition application on the mobile platform can resist photo and video-based spoofing attacks, and hardware devices which most mobile devices are not provided with are not needed to be adopted. The method and system have robustness for complex light conditions and can tolerate head rotation of the user in a use process.
Owner:李岩 +3

Techniques for protecting telephone users from caller ID spoofing attacks

A caller ID verifier may be employed to protect telephone users against caller ID spoofing. The caller ID verifier may be implemented in a telephony apparatus, such as a smart phone, stand alone caller ID device, or telephone network infrastructure, for example. Telephone numbers of related callers may be grouped into caller groups. The caller ID verifier may be configured to play one of several audio messages depending on the caller group of the telephone number corresponding to the caller ID of the telephone call. An audio message may include a question. The caller ID verifier may forward the telephone call to the telephone user when the caller answers the question correctly. Otherwise, the caller ID verifier may terminate the telephone call and give the telephone user the option to return the telephone call using the caller ID.
Owner:TREND MICRO INC

Method and device for detecting a spoofing attack in a wireless communication network

A method and device enables detecting a spoofing attack in a wireless communication network (100). The method includes receiving at the primary access point (105) a beacon signal transmitted from an alternative access point (115), where the beacon signal includes an alternative access point identification. The primary access point (105) then compares the alternative access point identification with an actual identification of the primary access point (105). It is then determined at the primary access point that the alternative access point (115) is conducting a spoofing attack if the alternative access point identification matches the actual identification of the primary access point (105).
Owner:SYMBOL TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products