Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

272results about How to "Avoid security threats" patented technology

Trusted power grid transaction platform based on block chain technology

The invention provides a trusted power grid transaction platform based on block chain technology. The trusted power grid transaction platform comprises the components of (1), a power chain database node module which stores electric power transaction database copies at a plurality of nodes; (2), a block module, wherein the block chain database is divided into a plurality of blocks which are related with electric power transaction, wherein each block comprises detailed information of transaction; (3) an encryption authentication module which acquires whole-network authentication through combining and encrypting transaction details and signatures of two parties or signature of one party; (4), a trust approval module which is connected with the encryption authentication module and is used for establishing a trusted power grid transaction system of the block chain; and (5), a determining module which determines a fact that the transaction is effect on the condition that encryption records that correspond with all nodes are consistent, and adds the transaction into a historical transaction chain; and if the block is ineffective, the information of a role breaking node is modified through consistent option of the nodes. The trusted power grid transaction platform safely and reliably perform various kinds of power grid transactions and furthermore improves credibility of the block chain technology.
Owner:SHENZHEN FANXI ELECTRONICS CO LTD

Performance test platform and method for multi-rotor unmanned aerial vehicle

ActiveCN105083588AFlexible swingAccurate and reliable performance indicatorsAircraft components testingFlight vehicleEngineering
The invention discloses a performance test platform and method for a multi-rotor unmanned aerial vehicle. The test platform comprises a base, a stand column, a top frame, a performance test instrument and a calculation processing center; the bottom of the stand column is connected to the base through a ball-head universal bearing, and the top of the stand column is connected to the top frame through a ball-head universal bearing; the top frame is hung on an external rigid body through an elastic inhaul cable; a rack of the multi-rotor unmanned aerial vehicle is provided with a sleeving ring arranged on the stand column in a sleeving mode; the performance test instrument comprises an on-vehicle test instrument body which is arranged on the multi-rotor unmanned aerial vehicle and used for testing flight attitude information and work condition information of the multi-rotor unmanned aerial vehicle and a ground test instrument body which is arranged on the test platform and used for testing external response information of the multi-rotor unmanned aerial vehicle; the calculation processing center comprises a data collecting unit and a data analyzing unit. The test platform is simple in structure, good in flexibility and capable of accurately testing multiple performance indexes of the aerial vehicle.
Owner:SOUTH CHINA AGRI UNIV

Network security monitoring method for industrial control system

The invention discloses a network security monitoring method for an industrial control system. The method comprises the following steps: collecting relevant information of an internal monitoring object of the industrial control system; performing security analysis on the collected relevant information; and when potential abnormal behavior is found through analysis, generating a relevant safety control order, and issuing the order to the relevant monitoring object for execution so as to block the abnormal behavior. According to the invention, real-time monitoring on major hidden security dangers of the industrial control system such as peripheral access, personnel operation, network external connection and the like is realized through abundant data acquisition of core networking equipment of the industrial control system. At the same time, through analysis processing on various behavior, the abnormal behavior is found and blocked timely, and thus real active defense of the industrial system is realized. For the current difficulty of effectively applying traditional security protection measures to the industrial control system, the major security threats to the industrial control system at present are well solved from the perspective of monitoring early warning.
Owner:NANJING NARI GROUP CORP +2

Warm knitted fabrics with one-way moisture conduction and rapid drying function and production process thereof

InactiveCN104746222AReduce contact areaGood anti-adhesive effectWeft knittingYarnEngineering
The invention discloses warm knitted fabrics with the one-way moisture conduction and rapid drying function and the production process thereof and belongs to the field of functional knitted fabrics. The warm knitted fabrics and the production process aim at solving the problems of the poor one-way moisture conduction function and the like of the existing fabrics. The warm knitted fabrics comprise a basic layer; the front side of the basic layer is a plain surface and a plurality of projections are distributed on the back side of the basic layer; a concaved sweat-absorbing groove is formed between every two adjacent projections; every projection is formed by polypropylene materials. According to the production process, a group of polypropylene yarns and a group of plain surface yarns are looped in order, circulated and alternated and intermeshed with each other along the weft direction of the fabrics to form a double-layer manufacturing structure; the front side of the basic layer of the obtained fabrics is the plain surface and the plurality of projections are distributed on the back side of the basic layer; every concaved sweat-absorbing groove is formed between the corresponding two adjacent projections; every projection is formed by the polypropylene materials. According to the warm knitted fabrics with the one-way moisture conduction and rapid drying function and the production process thereof, the one-way moisture conduction property of the fabrics is implemented.
Owner:TOREAD HOLDING GROUP CO LTD +1

Desynchronization resistant lightweight RFID bidirectional authentication protocol

The invention relates to a lightweight bidirectional authentication protocol which can be used in an RFID system of the Internet of Things. The bidirectional challenging response of a backstage and an RFID label is achieved based on a dual authentication mechanism of 'bidirectional random number-new and old key pair, the pseudo random number and the clock parameter are bound through the time attachment encryption, and the trust worthiness of the freshness amount of the protocol can be improved. The protocol participates in authentication through the new and old key pair preset by a backstage database to resist the desynchronizatio excluding the RFID system, and the unbalance between the backstage and a label key is avoided. A reader and the backstage resist the desynchronization from the interior of a system through the time attachment encryption / decryption, and the occurrence that the backstage refuses an authentication label perpetually due to the fact that a malicious reader releases information again is avoided. In addition, the key is updated through the Hash operation, the parameter is corrected by alternately adopting the ultra-lightweight Mixbits function, and the tracking prevention and forward direction safety of the protocol are guaranteed on the basis of reducing the protocol calculating expenditure. The protocol has the advantages of being safe, efficient, flexible and suitable for the fields of identifying the low-cost RFID system, updating the key and the like.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Intelligent home Internet of Things safety protection method and system

The embodiment of the invention discloses an intelligent home Internet of Things safety protection method which includes the following steps that, a remote control terminal generates a control instruction code and generates a corresponding encryption random sequence to encrypt the control instruction code; an encrypt control instruction is sent to a home central controller through the Internet; the identity authentication information of the remote control terminal and the encryption random sequence are sent to the home central controller through a mobile communication network; the home central controller is used for conducting identity recognition on the remote control terminal, and the received encryption random sequence is used for decrypting the encrypted control instruction and obtaining the control instruction code; the control instruction code is sent to an intelligent appliance to be executed. The embodiment of the invention further discloses an intelligent home Internet of Things safety protection system. By means of the intelligent home Internet of Things safety protection method and the intelligent home Internet of Things safety protection system, safety protection outside the route is added after the safety protection in the existing route is achieved, a hacker is prevented from invading a home gateway to generate safety threats to the intelligent appliance, even if the hacker invades into the home gateway, the hacker can be prevented from controlling the central controller, and the safety protection capability of the intelligent home is further improved.
Owner:SHANTOU UNIV

Zero-trust network architecture and construction method

The invention provides a zero-trust network architecture and a construction method. The zero-trust network architecture comprises a controller, a cloud gateway, an edge gateway and a terminal agent, the edge gateway is in communication connection with the cloud gateway, the cloud gateway, the edge gateway and the terminal agent are respectively in communication connection with the controller, and the cloud gateway and the edge gateway are respectively in communication connection with the client; the controller is used for controlling registration and login processes of the client, the cloud gateway and the edge gateway and issuing a routing strategy and an authorized access control strategy; the edge gateway is used for controlling resource security access, and the cloud gateway is used for routing when a client accesses resources across regions; the terminal agent is deployed at a client, establishes a tunnel with the cloud gateway and the edge gateway, and performs secure access on authorized resources; the network position boundary no longer determines the access authority, all access subjects need to be subjected to identity authentication and authorization before access is allowed, and the security threat brought by the enterprise network architecture with the fuzzy boundary at present is solved.
Owner:中孚安全技术有限公司

Authenticated encryption method and encryption system based on symmetric encryption

The invention discloses an authenticated encryption method and a system, relating to the field of communication security. The restorable signature of a message and the symmetric encryption technologyare combined; a commitment value which only can be calculated by a designated message receiving end is used as a session key encryption message; and the message receiving end validates the validity ofthe message by the restorable signature, thus realizing encryption and authentication in one logical step. A key generation unit of a sending end generates a session key of the sending end; an encryption unit encrypts a message to be sent; the receiving end generates a session key of the receiving end; a decryption unit utilizes the session key of the receiving end to decrypts the encrypted message; and the authentication and confirmation message is generated according to the decrypted message, thus validating the validity of the message. When disputes occur, the message receiving end transforms the authenticated and encrypted message signature into a common signature so as to lead a third party to validate the validity of the signature. The invention has the advantages of high security,low calculated amount and transmission cost, and the like.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Suspension bridge steel wire rope damage patrolling robot

The invention discloses a suspension bridge steel wire rope damage patrolling robot. The suspension bridge steel wire rope damage patrolling robot comprises a base, a patrolling device arranged on the base and conducting patrolling on suspension bridge steel wire rope damage, and a control device controlling the patrolling device. The process for patrolling a steel wire rope includes the steps that firstly, the patrolling device is installed; secondly, the patrolling robot conducts patrolling on the suspension bridge steel wire rope; thirdly, after the robot finish patrolling, the robot returns to the initial end of the suspension bridge steel wire rope; fourthly, the first step, the second step and the third step are repeatedly conducted many times; and fifthly, damage state data are obtained. The suspension bridge steel wire rope damage patrolling robot is novel and reasonable in design, low in using cost, easy to operate, good in safety and capable of conveniently and rapidly finishing the suspension bridge steel wire rope damage patrolling operation; through the arrangement of the control device, a user remotely controls the patrolling robot to conduct high-altitude detection through a wireless remote control transmitter, and safety hidden danger of workers during high-altitude operation is avoided; and design is ingenious and reasonable, reliability and stability are achieved, the size is small, and practicability is high.
Owner:XIAN UNIV OF SCI & TECH

Security protection performance evaluation method applicable to core network of wireless power private network

The invention discloses a security protection performance evaluation method applicable to a core network of a wireless power private network. The security protection performance evaluation method comprises the steps of firstly building a core network security protection performance evaluation system which comprises a terminal, multiple base stations, a switch, a secure encryption gateway, a core network, a network management server, a network management client and a secure access platform; then carrying out a data transmission security protection test of an S1 interface; carrying out a test for an HSS authorization server to refuse a service attack; carrying out a security controllability test for the core network; and carrying out a security test for the network management system of the wireless private network. By adopting the method, the security risk of the core network of the wireless power private network can be evaluated comprehensively, attack behaviors from malicious hosts to the core network of the wireless private network can be prevented efficiently, and the security robustness of the core network of the wireless power private network can be enhanced.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +2

Security protection performance evaluation method applicable to power wireless private network base stations

The invention discloses a security protection performance evaluation method applicable to power wireless private network base stations. The method comprises the steps of establishing a base station security protection performance evaluation system which comprises a terminal, a plurality of base stations, a switch, a security encryption gateway, a core network, a network management server, a network management client and a security access platform; performing a base station remote or local malicious control security test and checking device remote connection condition, manager information, user lists and sensitive operation records; performing a base station physical security protection security test, testing whether a plurality of terminals with the same USIM card are connected with the same base station or not, and testing whether the terminals access each other or not; performing an illegal base station interference test; and performing a pseudo base station attack test and testing whether the terminals are hijacked by a pseudo base station or not. According to the method, the information security threat for the base stations can be reduced, and the base station security protection control capability can be improved.
Owner:STATE GRID JIANGSU ELECTRIC POWER CO ELECTRIC POWER RES INST +2

Online earth fault positioning system for power distribution network

The invention discloses an online earth fault positioning system for a power distribution network. The online earth fault positioning system comprises a monitoring center, a transformer substation signal injection unit, a feeder line branch positioning unit and a distribution transformation monitoring terminal, wherein the monitoring center conducts data exchange with the transformer substation signal injection unit and the feeder line branch positioning unit to achieve the functions of operating data management, logical judgment and fault removal control; the transformer substation signal injection unit achieves the functions of earth fault detection, fault phase distinguishing, special signal injection, fed-out line signal detection and line selection; the feeder line branch positioning unit and the distribution transformation monitoring terminal achieve the functions of branch data acquisition, data exchange with the monitoring center, branch earth fault removal and accurate positioning of an earth point. By means of the online earth fault positioning system for the power distribution network, accurate positioning of an online single-phase earth fault can be realized, a fault section can be removed an isolated as quickly as possible after the earth fault occurs, as a result, security threats to electrical equipment and personnel due to the earth fault are avoided, and power supply reliability is improved.
Owner:STATE GRID CORP OF CHINA +1

Lightweight class RFID safety certification method based on Present algorithm

The invention discloses a lightweight class RFID safety certification method based on a Present algorithm. The lightweight class RFID safety certification method based on a Present algorithm comprises steps of realizing identity mutual certification between a label and a database through sharing an old cipher key and new cipher key and secretes information between the back end database and the label, adopting a two-way random number as a fresh quantity during a protocol execution process and performing encryption calculation, wherein certification information of a label end on the database is encrypted by producing the random number from a database end and the certification information of database end on the label is encrypted by the random number generated by the label end, and executing a Present encryption algorithm to verify identities of two parties in each verification process. The lightweight class RFID safety certification method based on the Present algorithm has characteristics of safety and privacy protection, can better resist various attacks coming from the outside of the RFID system, can protect content privacy, position privacy and front and back safety and resists replay attacks, eavesdropping attacks, etc.
Owner:BEIJING UNIV OF POSTS & TELECOMM +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products