Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

156results about How to "Effective attack" patented technology

Living body detection method, device and equipment and storage medium

The invention discloses a living body detection method, device and equipment and a storage medium, and belongs to the technical field of computers. According to the embodiment of the invention, the face areas in the color image and the infrared image of the target are respectively detected through the two cascaded branches in the detection model; whether the target is a living body or not is determined by integrating the detection results of the two images; on one hand, a face region in a color image is detected; according to the method, black-and-white printing and infrared printing images can be effectively defended, detection of a face area in the infrared image is combined, attacks of screen images and color printing images can be effectively defended, and therefore the comprehensive defense effect is achieved, the defense effect is good, practicability is good, and the accuracy of the detection result is good. And on the other hand, different requirements of the two images on theenvironment information are considered in the comprehensive process, and the weight of the two images during combination is determined according to the environment information of the target, so that the accuracy of the detection result obtained by weighting is better, and the defense effect is better.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Attack studying and judging method and system for network attack and defense test platform and medium

The invention provides an attack studying and judging method and system for a network attack and defense test platform and a medium, which can effectively improve the accuracy of studying and judgingcomposite attacks, and the method comprises the following steps: constructing a security ontology model of a security knowledge graph, and constructing and expanding the security knowledge graph basedon a rule reasoning method; simulating network attacks on the network attack and defense test platform, and constructing a scene knowledge graph according to information of the simulated network attacks; constructing an attack rule base according to the general rule of the composite attack; performing data acquisition and detection on the simulated network attack, extracting corresponding a threat element, matching the threat element with the security knowledge graph, and returning the corresponding single-step attack if the matching succeeds; filtering single-step attacks through the scene knowledge graph, removing invalid single-step attacks, and reserving effective single-step attacks; and matching the effective single-step attack with an attack rule base, and outputting an attack chain of the corresponding network attack through the constraint of the space-time attribute.
Owner:NAT UNIV OF DEFENSE TECH

Image encryption method based on chaotic sequence and DNA coding

The invention provides an image encryption method based on a chaotic sequence and DNA coding. The method comprises the following steps: calculating a hash value of an image matrix converted from a grayscale image, and updating an initial value of a chaotic system; generating a sequence according to a control parameter of the Bernoulli shift mapping and the updated initial value, wherein the sequence is used as a random value of a Knuth-Durstenfeld shuffling method, and scrambling is carried out on the random value of the Knuth-Durstenfeld shuffling method; carrying out iteration on the Lorenz chaotic system to obtain three sequences; intercepting elements as bits of cyclic shift to perform bit-level scrambling, wherein elements in the sequence are used for selecting codes as a DNA sequence according to a DNA coding rule; performing state conversion by using a Mealy state machine to obtain a new DNA sequence, wherein elements in the sequence are used for DNA coding rule selection for DNA decoding, and a ciphertext image is obtained. According to the method, the randomness of chaos and the nonlinearity of DNA coding and Mealy state conversion are fully utilized, the correlation of adjacent pixels of the image is effectively eliminated, and the security of the ciphertext image is improved.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping

ActiveCN109756893ADefense against stealing attacksSecurity requirements haveUser identity/authority verificationSecurity arrangementUser needsPassword
The invention discloses an anonymous user authentication method for a crowd sensing Internet of Things based on chaotic mapping, and relates to an anonymous user authentication method for the crowd sensing Internet of Things. The invention aims to solve the problems that the existing user authentication method is difficult to realize the resistance of various typical attacks and the calculation cost or the communication cost is relatively high. The method comprises the following steps: 1, a user is registered; 2, after the user is registered, the user logs in; When the user logs in, if the network is found to have an attack of stealing the smart card, the step 5 is executed; When the user logs in, if the network is not found to have the attack of stealing the smart card, executing the step3; 3, after the user logs in, the user and the server carry out bidirectional authentication, a secret key between the user and the server is established, and after the secret key is established, ifthe user needs to change the password, the step 4 is executed; If the user does not need to change the password, ending; 4, the user changes the password; And 5, the stolen smart card is removed. Themethod is applied to the field of crowd sensing internet of things anonymous user authentication.
Owner:HEILONGJIANG UNIV

A flood request attaching filtering method based on the stateless of open source core

The invention relates to an open source kernel based filtration method of stateless flooding request attacks, which comprises the following steps: the rule list of the filtration of an open source firewall is initialized to generate a white list and a blacklist; a main control module distinguishes and processes the request message and the reset message respectively; the Cookie value of the request message is calculated and is added to a text document library, and a confirmation message is sent back to the message origin; as for the reset message, the confirmation number value thereof is extracted and searched in the text document library after being subtracted by one; a text document library maintenance module deletes the expired information record in every interval t, and informs a firewall operation module to add the address of the origin to the blacklist; the firewall operation module gathers list items when the number of the list items in the white list or the blacklist are very large; after giving the command of filtration stopping, the firewall module needs to empty all the lists and stop the function of a kernel filtration module, and the filtration method is ended. The adoption of the method of the invention can achieve the goal of defending DDoS attacks.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products