Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33results about How to "Address security threats" patented technology

Wireless network connecting method, device and system

The embodiment of the invention discloses a wireless network connecting method, device and system belonging to the network security field. According to the invention, a first access request is sent to a wireless access point; an authentication server sends a second access request; whether the wireless access point belongs to a trust wireless access point is authenticated, when the wireless access point belongs to the trust wireless access point, first identity authentication is carried out with a user terminal, a main secrete key is generated through negotiating with the user terminal; the main secrete key corresponding to a user name is sent to the wireless access point; an encrypted wireless network connection is built by negotiating with the user terminal according to the main secrete key; the problems that the data transmitted to the counterfeit public Wi-Fi by the user terminal and the data in the user terminal are in security threat are solved; only the trust wireless access point can obtain the secrete key corresponding to the user name; therefore, the encrypted wireless network connection is built by negotiating with the user terminal according to the main secrete key; the data security of the data transmitted by the user terminal and the data in the user terminal is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Defense method for configuring weak password vulnerability of internal and external network camera

The invention discloses a defense method for configuring weak password vulnerabilities of internal and external network cameras. A honeypot is arranged at a network end of the camera, and a public network end of the camera is accessed to the rear of a router to configure an access control list for the router. In an internal environment, ports 23 and 80 of the camera are exposed through the honeypot, and a scanned traffic packet is obtained, the source IP address of the scanned traffic packet is analyzed, and an intranet attack host is obtained through the honeypot when a camera vulnerability scan attack occurs. In an external network environment, all traffic accessing the camera is uniformly filtered by the router, and the IP address allowed to be accessed is released, otherwise prohibiting. According to the defense method for configuring weak password vulnerabilities of the internal and external network cameras, illegal requests of the external network are filtered by using a router ACL, and all external networks accesses do not need to be forbidden, thereby guaranteeing the functionality of the camera; and a Cowrie honeypot is used for internal network deployment, so that low false alarm rate is achieved, and intrusion method and flow of an attacker can be more clearly understood.
Owner:NANJING UNIV OF POSTS & TELECOMM

Wireless network connection method, device and system

The invention discloses a wireless network connection method, device and system, belonging to the field of network security. The method comprises the following steps: a user terminal sends an access request to a wireless access point; the wireless access point sends a key query request to an authentication server; the authentication server sends a corresponding key query result to the wireless access point when the wireless access point belongs to a trusted wireless access point; the wireless access point acquires a corresponding authentication key; the user terminal generates an authentication key corresponding to the own MAC address; and the wireless access point and the user terminal negotiate to establish an encrypted wireless network connection according to the separately-owned authentication keys. According to the wireless network connection method, device and system disclosed by the invention, the problem that both the data transmitted to the fake public Wi-Fi by the user terminal and the internal data of the user terminal are subject to security threats can be solved; and only the trusted wireless access point can acquire the authentication key to establish the encrypted wireless network connection with the user terminal, and the effect of improving the security of the data transmitted by the user terminal and the internal data of the user terminal can be achieved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and device for safety judgment based on consistency of expanded name and file format

The invention discloses a method and device for safety judgment based on the consistency of an expanded name and a file format. The method for safety judgment based on the consistency of the expanded name and the file format comprises the following steps that a format of an expanded name of an object file to be detected is obtained; the characteristics of the object file to be detected are extracted, matching is conducted on the characteristics of the object file to be detected and characteristics in a file format base, and if matching is successful, an actual format of the object file to be detected is recorded; comparison is conducted on the actual format of the object file to be detected and executable formats of an overflowing knowledge base, if comparison is successful, whether the actual format and the format of the expanded name are consistent is judged, and if the actual format and the format of the expanded name are not consistent, it is determined that a threat to the object file to be detected exists. By the adoption of the method and device for safety judgment based on the consistency of the expanded name and the file format, the defect that traditional anti-virus software cannot cope with the situation that detection is eluded through change of an expanded name is overcome, the method for safety judgment based on the consistency of the expanded name and the file format is put forward innovatively, the problem of a safety threat caused by change of the expanded name is effectively solved, and the detection rate of the anti-virus software is improved.
Owner:HARBIN ANTIY TECH

Explosion-proof three-phase asynchronous motor

The invention belongs to the technical field of motors, and particularly relates to an explosion-proof three-phase asynchronous motor. The explosion-proof three-phase asynchronous motor comprises a motor casing, wherein the lower part of the motor casing is provided with supporting blocks, one side of the motor casing is provided with a front end cover, the front end cover is internally equipped with a driving shaft, the motor casing is provided with a back end cover at the side away from the driving shaft, the back end cover is provided with a first installation groove, the first installationgroove is internally equipped with an installation plate, the installation plate is equipped with a cooling device, the cooling device includes multiple sets of cooling pipes and a miniature circulating water pump, the installation plate is provided with a second installation groove, the miniature circulating water pump is installed in the second installation groove, and each cooling pipe includes a first cooling part and a second cooling part which are parallel to each other. In the invention, even if the cooling pipes are accidentally broken, the outflow cooling liquid will not flow into the inner part of the motor and much less touch the electric power components inside the motor, so that the normal use of the electric power components is guaranteed.
Owner:徐州亚泰电机有限公司

Distributed power station

The invention discloses a distributed power station. The distributed power station comprises a house body and a photovoltaic assembly. The distributed power station is characterized by comprising a first support device, a second support device and an installation seat for installing the photovoltaic assembly; the bottom ends of the first support device and the second support device are abutted against the ground; the first support device and the second support device are arranged on the left side and the right side of the house body; the installation seat is arranged on the upper side of a roof of the house body, and the left end and the right end of the installation seat are fixedly connected to the first support device and the second support device; on the distributed power station, because the first support device and the second support device are arranged on the left side and the right side of the house body, the load bearing of the roof can be effectively reduced through the support of the first support device and the second support device and the safety of the house body can be guaranteed. Meanwhile, the front side and the back side of the house body can be effectively avoided and lighting inside the house body can be ensured. As a result, the distributed power station can effectively solve the safety threatening problem of the distributed power station house body in the prior art.
Owner:晶科电力科技股份有限公司

Method and system for WMAN (wireless metropolitan area network) entity exiting from network

The invention relates to the technical fields of wireless communication network and network security, in particular to a method and a system for a WMAN (wireless metropolitan area network) entity exiting from a network. The method of the invention comprises the following steps that: a terminal accesses a base station on the network side after passing the identification of an authentication server, and the authentication server records the IDs of the terminal and the base station and corresponding relationship thereof; a service communication is carried out between the base station and the terminal; the authentication server revokes the certificate of the terminal; the authentication server sends a 'notice information for terminal exit' according to the recorded local IDs of the terminal and the connected base station and corresponding relationships thereof; the base station removes the service connection with the terminal to be exited from the network, and interrupts the service communication; and the base station sends a 'response information for terminal exit' to the authentication server. In the invention, when the ID of some terminal of the wireless metropolitan area network fails, or some terminal is set as an illegal user by a manager, the method and the system of the invention can make the terminal timely exit from the communication network so as to ensure the safety ofthe communication network.
Owner:GCI SCI & TECH

Method and system for WMAN (wireless metropolitan area network) entity exiting from network

The invention relates to the technical fields of wireless communication network and network security, in particular to a method and a system for a WMAN (wireless metropolitan area network) entity exiting from a network. The method of the invention comprises the following steps that: a terminal accesses a base station on the network side after passing the identification of an authentication server, and the authentication server records the IDs of the terminal and the base station and corresponding relationship thereof; a service communication is carried out between the base station and the terminal; the authentication server revokes the certificate of the terminal; the authentication server sends a 'notice information for terminal exit' according to the recorded local IDs of the terminal and the connected base station and corresponding relationships thereof; the base station removes the service connection with the terminal to be exited from the network, and interrupts the service communication; and the base station sends a 'response information for terminal exit' to the authentication server. In the invention, when the ID of some terminal of the wireless metropolitan area network fails, or some terminal is set as an illegal user by a manager, the method and the system of the invention can make the terminal timely exit from the communication network so as to ensure the safety ofthe communication network.
Owner:GCI SCI & TECH

Roadway repairing machine for coal mine

ActiveCN113859998ARealize the function of deliveryProblems affecting work efficiencyConveyorsLoading/unloadingTransmission beltElectric machinery
The invention discloses a roadway repairing machine for a coal mine, and relates to the technical field of roadway repair. The roadway repairing machine comprises a roadway repairing machine body, the top of the roadway repairing machine body is provided with a cockpit, the left side of the cockpit is provided with a repair mechanical arm, the bottom of the cockpit is provided with a coal mine conveying mechanism, a top protection mechanism is arranged on the top of the cockpit, and the coal mine conveying mechanism comprises a lifting hopper and a transmission channel. The coal mine can be moved into an inner cavity of the lifting hopper by controlling the roadway repairing machine body to move forwards, the coal mine can be moved to the top of a transmission belt through a through groove through a centrifugal conveying mechanism by controlling a first driving motor to operate, and the function of conveying the coal mine can be achieved by controlling a second driving motor to operate; and the problem that the maintenance work is influenced by accumulation of the coal mine is solved, the problem that the working efficiency of workers is influenced when the workers control external equipment to convey the coal mine is solved, and the convenience of the device is improved.
Owner:赤峰西拉沐沦(集团)公格营子煤业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products