Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

99results about How to "Addressing Vulnerability" patented technology

Brittleness evaluation method for cluster system based on complex network

ActiveCN108768745AAddressing VulnerabilitySolve the problem that cannot be analyzed quantitatively wellData switching networksComplex networkNetwork model
The invention provides a brittleness evaluation method for a cluster system based on a complex network. The method mainly includes the following steps: step A, analyzing an evaluation object to builda system network model, and exploring vulnerable nodes; step B, setting a brittleness index; step C, setting an intentional attack strategy; step D, implementing attacks, and monitoring and recordingsystem performance indexes; and step E, summarizing the variation trend of the performance indexes, and analyzing the brittleness performance of cluster system. According to the scheme of the invention, on the premise of considering various complex characteristics of the cluster system, the evaluation method provided by the invention is adopted to search the vulnerable nodes for the cluster system, and then the intentional attacks are carried out for the vulnerable nodes, the brittleness index provided by the invention is adopted to perform brittleness quantitative analysis and brittleness trend analysis on the attacked cluster system, so that system designers can be facilitated to discover the vulnerable nodes of the system and can perform optimization and improvement for the vulnerable nodes and a network structure according to an evaluation result, and thus the brittleness performance of the system can be improved.
Owner:BEIHANG UNIV

Wearable scissor-fork type pineapple one-step picking auxiliary arm

The invention discloses a wearable scissor-fork type pineapple one-step picking auxiliary arm. The auxiliary arm comprises a bottom plate, a hand-held column, a hand-pulled column, two scissor-fork oscillating bars, a scissor-fork mechanism and two mechanical claws, wherein the hand-pulled column is arranged on the bottom plate through a guiding rail-sliding block structure, one end of each scissor-fork oscillating bar is arranged on the bottom plate through a pin shaft, the other end of the corresponding scissor-fork oscillating bar is connected to the hand-pulled column through a link mechanism, a first-stage intermediate pin shaft of the scissor-fork mechanism is fixedly arranged on the bottom plate, end portions of first-stage two scissor-fork rods of the scissor-fork mechanism are respectively hinged with the middle portions of the scissor-fork oscillating bars through first connecting rods, and the mechanical claws are respectively fixedly arranged at the last-stage end portion of the scissor-fork mechanism; when a user pulls the hand-pulled column backward, the hand-pulled column drives the scissor-fork oscillating bars to rotate around end portion pin shafts of the scissor-fork oscillating bars inward through the link mechanism, the rotation of the scissor-fork oscillating bars drives the scissor-fork mechanism to elongate through the first connecting rods and simultaneously drives the mechanical claws to stretch forward and clamp the pineapple. The wearable scissor-fork type pineapple one-step picking auxiliary arm has the advantages that the structure is simple, manual pineapple picking can be assisted, and the labor intensity is reduced.
Owner:WUHAN UNIV OF TECH

Mimicry routing decision method of multi-instance routing unit

The invention discloses a mimicry routing decision method of a multi-instance routing unit, and overcomes the problem that a safety demand of a network space is very rigorous in the prior art. The mimicry routing decision method comprises the a step (1) that a routing decision module maintains routing table items, which are issued by routing instances, for the routing instances, a step (2) that, for each routing table item, credibility of each routing table item is calculated according to the number of the same table items and credibility of the routing instances to which the same table items belong, a step (3) that the routing table item having the same destination address and highest credibility is taken as a final routing table item obtained through a decision, and the final routing table item is converted into a forwarding table item and then is issued to a forwarding unit, a step (4) for operation which is used to delete the routing table items and which is issued by the routing instances, the routing decision module executes corresponding deleting operation firstly, and a step (5) that, if a problem occurs in a certain path of routing instance, the step (5) is turned to the step (4), and all the routing table items issued by the routing instance are correspondingly deleted. The technology has the high ability to resist a network risk.
Owner:SHANGHAI REDNEURONS +1

Extensible CAN bus safety communication method and device for large-scale in-vehicle network

The invention discloses an extensible CAN (Controller Area Network) bus safety communication method and device for a large-scale in-vehicle network, and the method covers the safety scenes of initial key distribution, key updating, data confidentiality and integrity protection, external equipment access and the like in a bus. A broadcasting mechanism and a cryptographic group authentication mechanism of the bus are properly utilized, so that the communication process in the initial key distribution stage is effectively simplified, the lightweight design of key initialization is realized, and good expandability is achieved for the increasing number of equipment on the CAN bus; the vulnerability of a data encryption communication face to a delay attack is solved by using a global counter; a cross-subnet data transmission module is introduced to solve the defect that the encrypted message cannot be transmitted in a cross-network manner; in addition, an authentication process for external equipment access is designed based on a certificateless signature mechanism without bilinear pairing, dependence on a public key infrastructure mechanism is eliminated, communication overhead is reduced, complex bilinear pairing operation is avoided, and the real-time requirement is met.
Owner:BEIHANG UNIV

Pure-gold watchcase and manufacturing method thereof, and dial plate comprising same

The invention relates to a pure-gold watchcase manufacturing method, comprising raw material melting, rough blank forming, stamping treatment and cutting treatment. The invention also relates to a pure-gold watchcase obtained by the above method, and a dial plate comprising the pure-gold watchcase. The dial plate also comprises an inner container, a movement, a graduated disk, a watch glass, a watch crown and an ear part. The inner container comprises an inner container body and a fixed part. The pure-gold watchcase is wrapped at the outer wall of the inner container. The movement is arranged inside the inner container. The graduated disk is arranged on the top surface of the movement in a covering manner. The watch glass is disposed at an opening of the inner container in a covering manner. With the gold content higher than nine hundred and ninety per one thousand, the pure-gold watchcase achieves good machining performance, allows surface treatment, has high strength and hardness and is adapted to normal knock and collision when used. The rejection rate in the pure-gold watchcase manufacturing process is low, and the production efficiency is high. The dial plate comprising the pure-gold watchcase has good waterproofness, and the strength of an outer shell of the dial plate is further enhanced, so the service lifetime of the dial plate is prolonged.
Owner:JUNSON SHENZHEN CHUANJINDAIYIN TECH CO LTD

Control method and control system for intelligent lamp

The invention provides a control method of an intelligent lamp, which comprises the following steps: S1, dividing a control mode of the intelligent lamp into two modes according to ambient light intensity, working in a first mode when sufficient light is detected, working in a second mode when insufficient light is detected, and executing a step S2 when the intelligent lamp is in the first mode; in the second mode, executing the step S2, monitoring the indoor sound in real time, and turning on the intelligent lamp when the indoor sound meets a preset characteristic condition; S2, an AI sensoris used for sensing whether a person exists in a room or not in real time, and when it is scanned that the person exists in the room, the step S3 is executed; S3, sensing the number, the positions andthe states of the persons through an AI sensor, judging whether the number, the positions and the states of the persons meet gesture collection conditions or not, and obtaining gesture postures whenthe gesture collection conditions are met; S4, recognizing the acquired gesture and posture, and acquiring corresponding instruction information when the gesture and posture are judged to be effective; and S5, controlling the intelligent lamp according to the instruction information.
Owner:GREE ELECTRIC APPLIANCES INC +1

Digital certificate processing method and device

The invention provides a digital certificate processing method and device. After a domain name application request carrying a to-be-applied domain name is acquired, the to-be-applied domain name carried in the domain name application request is authorized if the to-be-applied domain name carried in the domain name application request is allowed to be registered, a digital certificate correspondingto the authorized to-be-applied domain name is singed and issued, and therefore an N-stage domain name server can be not only be a domain name administrator but also be a novel CA mechanism for signing and issuing the digital certificate corresponding to the domain name. That is to say, for any stage of domain name server, the domain name server only can sign and issue the digital certificate corresponding to the next-stage domain name administrated by the domain name server, therefore, the power that various stages of domain name servers sign and issue the digital certificates is limited, and the problem that the domain name serves are prone to be attacked due to the fact that the power is too large is solved; and in addition, the digital certificate corresponding to the domain name under each stage of domain name server is related to the root domain name server, trust anchors corresponding to the various stages of domain name servers are all root domain name digital certificates ofthe root domain name servers, and then the uniqueness of the trust anchors is achieved.
Owner:CHINA INTERNET NETWORK INFORMATION CENTER

Offline ticket anti-counterfeiting method based on distributed account book principle

PendingCN112926974ALow transaction data and communication loadFast transactionTicket-issuing apparatusPayment protocolsKey leakageTamper resistance
The invention discloses an offline ticket anti-counterfeiting method based on a distributed account book principle. The offline ticket anti-counterfeiting method comprises the following steps that ticket system nodes are divided into a ticket (ticket number) generation node, an issuing node, a transfer node, a user node and a ticket checking node; ticket system transactions are divided into ticket generation transactions, issuing transactions, circulation transactions, pre-check transactions, ticket checking transactions, pre-refunding transactions and ticket refunding transactions, wherein each node has own secret keys (including a public key and a private key), and each transaction of the system needs to be encrypted by multiple nodes; when a ticket selling system sells a ticket, multiple parties are taken from transaction nodes for encryption and common certification, each node encrypts data by using a private key according to a specified sequence, and finally a ciphertext is formed and stored. When a ticket checking system checks the ticket, decryption is carried out by utilizing the public key of the corresponding node in the transaction of the ticketing system according to an opposite sequence. A multi-party authentication mechanism is provided, so that a decentralized mutual trust effect is achieved, tampering resistance is improved, and secret key leakage of any party is insufficient to cause counterfeiting of transaction data.
Owner:GLOBALTOUR GROUP LTD

Information fraud prevention method based on user historical data

The invention relates to an information fraud prevention method based on user historical data, and belongs to the technical field of computer. The method comprises the steps: session information sent by a target account is acquired; when the session information comprising a preset keyword is detected, a historical session record of a user account and the target account is acquired; verification information is generated according to the historical session record, and the verification information is sent to the target account; if a reply message returned by the target account is received, the reply message and the verification information are displayed on a mobile terminal; and if a confirmation instruction is sent by the user account according to the verification information and reply message, exchanging resources indicated by numbers of the confirmation instruction are moved from the user account to the target account. According to the invention, the session information including sensitive keywords is detected, the verification information randomly is generated according to the historical session record of the user account and the target account, so as to prevent the user from fraud, the user property security is not easy to be infringed, and the user property security can be guaranteed.
Owner:徐亚萍

High-water-head bulkhead gate vibration monitoring system, cable protective device and arrangement method

PendingCN110086138ARealize reliable protectionGuaranteed to be intactVibration measurement in solidsCable arrangements between relatively-moving partsWire ropeFlat panel
The invention provides a high-water-head bulkhead gate vibration monitoring system, a cable protective device and an arrangement method. The cable protective device comprises a gate body vibration monitoring cable protective assembly and a gate well monitoring cable protective assembly; the gate body vibration monitoring cable protective assembly comprises a first fixation part and a protective plate, the first fixation part fixes a monitoring cable to a measured gate, and the protective plate covers the monitoring cable, and is fixed to the measured gate; and the gate well monitoring cable protective assembly comprises a support member, a wire rope and an elevating member, and the support member is arranged in the top of the measured gate. The wire rope is connected with the support member and the elevating member. The elevating member is arranged in the top of the gate well, and is used to drive the wire rope and monitoring cable on the measured gate to rise and fall synchronous withthe measured gate. Thus, gate vibration monitoring cable is protected reliably, the monitoring cable is kept in good condition in the process that the measured gate is opened / closed in dynamic water,and safe reliable operation of the high-water-head bulkhead gate system and a sluicing building is ensured.
Owner:CHINA INST OF WATER RESOURCES & HYDROPOWER RES

Unit commitment optimization method considering new energy consumption

The invention relates to a unit commitment optimization method considering new energy consumption. The method comprises the following steps: step 1, constructing a day-ahead new energy consumption dynamic evaluation model; step 2, predicting the short-term generating capacity of the new energy unit based on an LSTM neural network, including preprocessing historical data and completing prediction of the generating capacity of the new energy unit by using the LSTM neural network; step 3, converting a unit commitment problem into a Markov decision process, including design of a power grid state st, an action at, a reward value Rt and a transfer function; and step 4, according to the historical operation data characteristics of the power grid, intelligent agent construction is completed based on a parameter adaptive neural network, an intelligent agent is trained, and a unit output plan meeting a new energy consumption target is obtained. According to the invention, the stability of a novel power system taking new energy as a main body can be improved, efficient utilization of clean energy is realized, and consumption of the new energy is completed on the premise of reliable operation of a power grid.
Owner:ELECTRIC POWER SCI & RES INST OF STATE GRID TIANJIN ELECTRIC POWER CO +2

Password authentication method and system, electronic device and storage medium

The invention relates to a password authentication method and system, an electronic device and a storage medium, and the method comprises the steps: generating a first random number in response to a login request of a user; receiving a second random number, a salt value and a cycle number returned by the server, and generating a client authentication certificate; obtaining a signature abstract and a client signature based on the client authentication credential, and sending the client signature and the client authentication credential to a server for signature verification; and receiving a first server authentication certificate returned by the server, performing HMAC-SM3 calculation on a first key generated by the server in a registration stage, generating a second server authentication certificate, and authenticating the server successfully under the condition that the first server authentication certificate is consistent with the second server authentication certificate. Through the password authentication method and device, the problem that the password is easily attacked and leaked in a password authentication process in the prior art is solved, and password security authentication is realized.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Intelligent industrial decentralized information storage node communication network system and method

PendingCN111404994AAddressing Vulnerability to AttacksSolve high cost problemsUser identity/authority verificationIndustrial InternetIndustrial communication
The invention discloses an intelligent industrial decentralized information storage node communication network system and method, and relates to the technical field of intelligent industrial systems.The system comprises an administrator terminal, an industrial equipment terminal, a general control computer, an industrial network platform, an industrial data collection module and a communication interaction module. According to the invention, the decentralization technology is applied to the field of intelligent industry, a strict identity verification mechanism is established without depending on a central verification server, more reliable identity verification support is provided for intelligent industrial equipment, and the problem of high cost consumption of industrial Internet of Things equipment caused by a centralization server in the prior art is effectively solved. According to the invention, based on the decentralization technology, equipment in the field of intelligent industry is enabled to carry out security interaction, tamper resistance is realized, each distributed industrial communication node has public key information of all nodes with the same content, and theproblem that a centralized server is easily attacked in the traditional technology is effectively solved.
Owner:北斗(天津)科学技术应用研究院(有限合伙)

Intelligent household electrical appliance configuration network access method, device and system

The embodiment of the invention provides an intelligent household electrical appliance configuration network access method, device and system, and the method comprises the steps that an intelligent household electrical appliance of a first side enters a configuration network access mode, builds a connection with an application of a second side, and encrypts the information of the first side and the information of the second side to obtain first encryption information; the intelligent household electrical appliance of the first party forwards the first encrypted information to the cloud platform of the first party through the application of the second party and the cloud platform of the second party; the intelligent household electrical appliance of the first party receives second encryption information forwarded by the cloud platform of the second party and the application of the second party from the cloud platform of the first party; and the intelligent household electrical applianceof the first party determines whether to perform configuration network access with the application of the second party according to the check result. According to the invention, the problem that thehousehold electrical appliance is easy to be attacked when being configured to access the wireless local area network in the intelligent household electrical appliance interconnection and intercommunication technology is solved, and the effect of ensuring the security of the household electrical appliance and the household electrical appliance manufacturer cloud platform in the network configuration process is achieved.
Owner:HAIER YOUJIA INTELLIGENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products