Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

76results about How to "Avoid Malicious Operations" patented technology

User behavior clustering analysis method and terminal, and computer readable storage medium

The invention provides a user behavior clustering analysis method and terminal, and a computer readable storage medium. The method includes: obtaining user data operated by all users on a website, extracting effective user behavior operations from the user data to form a characteristic item set, converting the characteristic item set of all the users to vector space model data, performing clustering operation on characteristic items in the vector space model data according to a clustering analysis algorithm, obtaining clustering analysis results, and determining the legality of each user behavior operation according to the clustering analysis results. According to the user behavior clustering analysis method and terminal, and the computer readable storage medium, the legality of the user behaviors operated by the users on the website is analyzed according to the clustering analysis algorithm, whether the user behaviors are legal is determined according to the analysis results, classified display of illegal user behaviors and the corresponding users is realized, the performance of the website is enhanced, interception processing of malicious operations of a certain kind of users is performed, and malicious operations of the website by the users can be solved from the operation source.
Owner:NUBIA TECHNOLOGY CO LTD

Realizing method of synchronous management of DAS (Distributed Antenna System) WEB (World Wide Web) account information of multiple systems

The invention provides a realizing method of synchronous management of DAS (Distributed Antenna System) WEB (World Wide Web) interface account information of multiple systems. The method comprises security verification initialization of WEB interfaces during starting of single system equipment in DASs of the multiple systems, synchronization of current inter-system user information of the WEB interfaces in the DASs of the multiple systems and synchronization of key books of inter-system WEB account information in the DASs of the multiple systems. By the method, the synchronous management of DAS WEB interface account information of the multiple systems can be realized, the management mode is simplified, and the management efficiency is improved; the synchronization of the current WEB user information realizes integration and automatic login of WEB user states of the multiple systems, and tedious repeated processes are eliminated; the key books are automatically updated and synchronized,so that the multiple systems use the same account information key book, and a main unit system adds, deletes and alters the key book in a unified way; and therefore, the security, the unicity and thedefiniteness are improved to a certain extent, and overall consideration is realized.
Owner:SUNWAVE COMM

Industrial control security defense system

The invention discloses an industrial control security defense system which comprises a potential threat exclusion layer, an industrial control security audit system, a monitoring center, a field monitoring layer, a control layer and a physical layer. The potential threat elimination layer comprises a deep protocol analysis mechanism and a white list mechanism; the field monitoring layer performs data exchange and behavior control on the control layer and the physical layer through an industrial Ethernet; the industrial control security auditing system can analyze and identify illegal operation, abnormal events and external attacks in an industrial control network from multiple angles and give an alarm in real time; identity recognition is carried out through multiple means, system operation authority can be limited, override operation and malicious operation are avoided, it is avoided that external equipment carries viruses to affect system safety, meanwhile, exclusive detection can be carried out on common attack means, and the operation resource occupancy is small. The alarm response time of the whole system can be prolonged through unified monitoring management of the monitoring center, and the accident handling speed is increased.
Owner:上海磐御网络科技有限公司

Mobile device secure binding method based on quick response code identification and application system

The invention provides a mobile device secure binding method based on quick response code identification. The method is applied to binding of a mobile device and an identity account of an applicationsystem. The method comprises the following steps that an uploading quick response code generated by the application system is identified by the mobile device and the mobile device uploads a device public key to the application system according to an identification result; and a verification quick response code generated by the application system is identified by the mobile device, whether the mobile device holds a private key corresponding to the public key or not is verified according to the identification result, and the application system binds the identity account with the mobile device ifthe mobile device holds the private key corresponding to the public key. The method is applied to various mobile devices in support of public and private key pair storage; and through repeated quickresponse code identification, the mobile device and a user account identity of the application system providing service are bound, so the limitation and inconvenience of identifying the user identitythrough utilization of a U-key (USB Key) are solved, and the security is ensured. The invention also provides the application system applicable to the method.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Resource public key infrastructure bidirectional authorization method based on block chain

The invention discloses a resource public key infrastructure bidirectional authorization method based on a block chain, and aims to solve the security threat problems that a legal BGP route is illegal, a legal IP address is blocked and the like caused by malicious operation. The method comprises the following steps: constructing a resource public key infrastructure system RPKIB based on a block chain, wherein the resource public key infrastructure system RPKIB is composed of a resource issuer, a resource transaction application client, a resource receiver and a block chain network; changing any operation of issuing, cancelling, updating and modifying of a resource certificate by the resource issuer into a bidirectional authorization mode, and implementing the operation of the resource certificate only when the issuer and the receiver agree; and carrying out the operations of the resource certificate RC and the route origin authorization ROA as transactions by the issuer through a blockchain network, and distinguishing whether the operations are malicious behaviors or normal operations through bidirectional authorization. The method is adopted to overcome malicious operation facedby the current RPKI, and security threats such as illegal legal BGP routing and legal IP address blocking are effectively avoided.
Owner:GUANGZHOU UNIVERSITY

Electronic device control method and electronic device

ActiveCN103873658ASolve the technical problem of not being able to control the other party's mobile phone to store the call contentSolve the technical problem that the other party's mobile phone cannot control the local mobile phone to store the call contentSubstation equipmentControl electronicsReal-time computing
The invention discloses an electronic device control method and an electronic device, solving the technical problem of prior art that a handset can not control the handset of the opposite side to store conversation content. The method is applied to a first electronic device and comprises the steps of: obtaining the second information of a second user corresponding with a second electronic device when a first electronic device and the second electronic device are communicating; determining whether the second information meets a predetermined condition to obtain a first determination result; generating a first control instruction when the first determination result shows that the second information meets the predetermined condition, wherein the first control instruction is concretely an instruction used for the execution of the second electronic device so that the first user corresponding with the first electronic device can control the actions of the second electronic device; and sending the first control instruction to the second electronic device for the execution of the second electronic device.
Owner:LENOVO (BEIJING) LTD

System lock screen protection method and system

The invention discloses a system lock screen protection method and system. The method comprises the following steps of when a third-party application calls a lock screen interface, reminding a user of inputting a lock screen password; performing screen unlocking on an operating system according to the screen locking password; and then, telling the user that the third-party application executing the system lock screen function closing operation exists at present through reminding the user of whether to forbid the system lock screen or not at present. The reminding information includes identification information of the third-party application, so that the user can judge whether the third-party application is a rogue program or not according to the identification information, and effective measures can be adopted. The method and the system have the advantages that the lock-screen interface is subjected to real-time monitoring; reminding information is output when the lock screen interface is called; and the system lock screen protection is realized. Meanwhile, the right of an operator is set through enabling the user to input the lock screen password, so that only the user knowing the lock screen password has the right to decide whether to forbid the system lock screen or not; the malicious operation of others can be prevented; and the further protection on the system lock screen is realized.
Owner:THUNDER SOFTWARE TECH

Management and control method for Docker container creation and destruction

The invention provides a management and control method for creating and destroying a Docker container, which comprises the following steps that: a management end initiates a strategy request for acquiring the state of the Docker container to a terminal, and the terminal receives the strategy request, and after the terminal processes the strategy request, information for analyzing the strategy request is analyzed and sent to the management end; when the management end configures whether the docker container can be started or not, the management end sets and issues a starting management and control strategy to the terminal, after the terminal receives the starting management and control strategy, corresponding object information is found out according to subject information of the docker container, and a corresponding access control permission strategy is configured for an object; and when the management end closes the management and control of the docker container, the management end triggers and sends a closing management and control strategy for closing the docker container to the terminal, and after the terminal receives the closing management and control strategy, all docker strategies including the starting management and control strategy are eliminated, and a security mechanism is notified to update the strategy. According to the method and the system, the business service can be effectively prevented from being interfered and damaged, and the safety management and control of Docker container creation and recovery are solved.
Owner:北京旋极安辰计算科技有限公司

Server serial port disabling protection circuit and method

The invention discloses a server serial port forbidding protection circuit which comprises a logic circuit module, the input end of the logic circuit module is connected with a first serial port interface module, the output end of the logic circuit module is connected with a second serial port interface module, and the control end of the logic circuit module is connected with an upper control module. The logic circuit module comprises a serial port sending end control circuit and a serial port receiving end control circuit, the control end of the serial port sending end control circuit is at ahigh level, the input end of the serial port sending end control circuit is connected with the output end path, the control end is at a low level, and the input end of the serial port sending end control circuit is disconnected with the output end path; the control end of the serial port receiving end control circuit is at a high level, and the input end of the serial port receiving end control circuit is communicated with the output end path; the control end is at a low level, and the serial port receiving end controls the input end and the output end of the circuit to be disconnected. The invention further discloses a serial port protection method, a hardware circuit of the server mainboard does not need to be additionally added, and the design flexibility is improved.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products