Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

51results about How to "Ensure access security" patented technology

A vehicle authentication and message verification method in a vehicle-mounted network environment

The invention provides a vehicle authentication and message verification method in a vehicle-mounted network environment. The vehicle authentication and message verification method comprises the stepsthat a trust mechanism initializes a system; the vehicle-mounted unit is registered, and the roadside unit is registered; a temporary key of the roadside unit is released; a vehicle authentication stage; the trust mechanism verifies the legality of the roadside unit through the digital signature, extracts the message and verifies the legality of the automobile, the trust mechanism sends the identity identifier of the automobile to the roadside unit, the roadside unit sends the private key and the temporary main key to the automobile, and the automobile extracts the temporary main key; the automobile calculates a temporary identifier and a temporary private key, generates a traffic message and signs and broadcasts the traffic message; and when other automobiles receive the automobile broadcast message, verifying the effectiveness of the broadcast message through bilinear mapping. According to the method, the vehicle access safety in the Internet of Vehicles environment can be ensured,the safety of traffic information sent by legal vehicles is also ensured, and the method has a relatively high application value in an application environment in the mobile vehicular network environment.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

Method for importing multi-source heterogeneous data into data lake

The invention discloses a method for importing multi-source heterogeneous data into a data lake, which comprises the following steps of: obtaining an access interface address of external file type data, importing the file type data and storing the file type data into a distributed file system of a local data lake server; or obtaining access interface information of an external data source, connecting the access interface information with a local data lake server; importing data of an external data source and storing the data in a distributed file system in a data file form; or converting the non-relational data of the external data source into relational data and then storing the relational data in a relational database, or directly importing the relational data of the external data sourceand storing the relational data in the relational database, or importing the non-relational data of the external data source and storing the non-relational data in a document database. According to the method, the problem of multivariate isomerism of the to-be-stored data can be solved, collection, management, application and expansion of the multi-source isomerism data are facilitated, various requirements of an organizational structure are met, and the data access security and the data import flexibility are ensured.
Owner:中云开源数据技术(上海)有限公司

Video monitoring security access method based on equipment feature recognition

InactiveCN108494737ARealize illegal accessAutomatic quick identificationClosed circuit television systemsTransmissionVideo monitoringDevice type
The invention discloses a video monitoring security access method based on equipment feature recognition. The method is based on front-end management hosts connected with access equipment; the front-end management hosts, like common switches, are connected with the server via a central switch; a CPU with illegal access and illegal access detection and control functions is arranged in each front-end management host, a plurality of external ports connected with the access equipment are arranged on the front-end management host, and each external port is connected with the CPU of the front-end management host; and the server can distribute an equipment type recognition feature library to each front-end management host via the central switch. According to the method provided by the invention,the front-end management host is used for performing port mirroring, message analysis, equipment feature recognition and other functions on the access equipment to achieve illegal access, equipment counterfeit and detection and control of the illegal access; and the communication of the access equipment is automatically blocked and / or the treatment of only sending warning information is performedaccording to user configuration.
Owner:浙江远望通信技术有限公司

Security access control framework under distributed cloud environment and access method thereof

InactiveCN105049409AEnsure interoperabilitySuitable for access management needsTransmissionPolicy decisionApplication server
The invention relates to a security access control framework under a distributed cloud environment and an access method thereof, which solves a defect of unavailability in allusion to a distributed multi-cloud system access control framework. The security access control framework under the distributed cloud environment comprises virtual resource manager A and a distributed access control module A, wherein the virtual resource manager A is used for providing and configuring virtual resources and maintaining a virtual demand resource table associated with the configuration thereof, and the virtual demand resource table comprises local and remote resources in the whole virtual global catalog service library; the distributed access control module A is used for strengthening an access control policy, and comprises a policy decision point, a policy strengthening point and a policy library; and a cloud application server A, a cloud platform server A and a virtual infrastructure server A are all provided with the virtual resource manager A and the distributed access control module A. Provided by the invention is a method for preventing channel attack and no interference in a multi-tenant or resource virtual environment, and a safe and reliable distributed cloud computing infrastructure is established.
Owner:HEFEI CITY COULD DATA CENT

New energy plant station power generation unit acquisition terminal data safety guarantee method and system

The invention provides a new energy plant station power generation unit acquisition terminal data safety guarantee method and system. Mainly from the three aspects of acquisition terminal access safety, acquisition data safety transmission and station control layer data safety use, safety protection measures are added for the three links of data acquisition, transmission and use, data safety is guaranteed, and a complete set of method and system is formed. According to the invention, software and hardware security reinforcement is carried out on an acquisition terminal to ensure terminal security access; the two-way identity authentication technology based on the digital certificate technology and the ECDH security key exchange protocol based on SM2 are reasonably utilized to ensure the security transmission of data. And meanwhile, the data security of a station control layer is realized by utilizing a data filtering technology and a network isolation technology, so that a set of complete method and system for realizing the data acquisition security of the power generation unit of the new energy plant station are formed, and the method and system have universality for the protection of the data security of the new energy plant station and have wide application prospects.
Owner:CHINA ELECTRIC POWER RES INST +1

Information processing method and device, and server

Embodiments of the invention provide an information processing method and device, and a server. The method comprises the steps of detecting an access request sent by a user terminal for an intranet; wherein the access request is triggered by a target user; judging whether the access request carries authentication information; if not, obtaining target identity information provided by the target user through the user terminal; if the target identity information is successfully verified, generating authentication information for the user terminal; sending the authentication information to the user terminal so that the user side can store the authentication information; wherein the authentication information and the re-initiated access request are provided at the same time; if yes, performing access permission verification on the user terminal based on authentication information carried by the access request, and obtaining a verification result; and if the verification result is successful verification, responding to the access request of the user terminal, and providing feedback information for the target user through the user terminal. According to the method of the invention, the intranet access efficiency is improved.
Owner:长沙市到家悠享网络科技有限公司

IMS-based intelligent operation and maintenance fault diagnosis management method

The invention discloses an IMS-based intelligent operation and maintenance fault diagnosis management method, which comprises the following steps: S1, collecting working environment data and network environment data for fault analysis; S2, displaying the collected environment data and network data to a client; S3, performing analysis through big data, and positioning a fault point accurately; S4, analyzing the cause of the fault, and judging whether an automatic solution mode or a manual solution mode is adopted or not; S5, fault solving: solving fault points solved by adopting automatic processing, automatically sending an order, and giving responsibilities to people; and S6, automatically counting a data report through IMS intelligent operation and maintenance faults for a manager to examine. By adopting the IMS intelligent operation and maintenance fault diagnosis management system, on one hand, the equipment state can be effectively monitored, the fault reason can be analyzed, the fault problem can be remotely solved, and one-key data statistics can be realized; and on the other hand, network access security and transmission security can be improved, the intelligent management level of security and protection equipment is improved, industrial upgrading is promoted, and smart city and smart traffic construction is improved.
Owner:辽宁科电交通科技有限公司

Bidirectional anonymous authentication system and method based on mimicry defense principle

The invention discloses a bidirectional anonymous authentication system and method based on a mimicry defense principle, and is applied to the technical field of information security. The method comprises the steps that a certificate issuer is initialized; a Join sub-protocol runs between a platform and the certificate publisher; the platform operates a Sign sub-protocol between the TPM and the Host; and a signature detection party operates the Verify sub-protocol through a heterogeneous executive body. According to the invention, a DAA bidirectional anonymous authentication technology is adopted; a mimicry module is added in the signature detection party; while remote anonymous authentication of the underlying equipment accessing the Internet of Things network is realized, the endogenoussecurity function of the mimicry module can effectively resist any security threat implemented by using a known and unknown software and hardware vulnerability back door in a target system, so that the access security of the Internet of Things equipment is ensured at the technical architecture level, the three-in-one attribute of high reliability, high credibility and high availability is achieved, and the security of the Internet of Things system is ensured.
Owner:NANJING REDMATRIX NETWORK SECURITY TECH R & D INST

Data management method and device, electronic equipment and storage medium

The invention discloses a data management method and device, electronic equipment and a storage medium. The method comprises: receiving a data access request sent by a user side, querying an access database based on the data access request to determine to-be-returned data, and determining a first security policy implemented to the to-be-returned data; determining an access label of the to-be-returned data and an access standard security policy corresponding to the access label according to the field information of the to-be-returned data; determining whether the first security policy is consistent with an access standard security policy; and when the first security policy is inconsistent with the access standard security policy, blocking the current data access, and recording the current abnormal access. According to the embodiment of the invention, the access label of the data is automatically identified by utilizing the enterprise classification and grading rule, the standard security policy required to be implemented by the to-be-returned data is determined by utilizing the access label, and whether the security policy of the to-be-returned data is completely implemented or not is determined according to the standard security policy, so that the security of the data access is ensured, and the integrity of the database is reserved.
Owner:SHENZHEN LEXIN SOFTWARE TECH CO LTD

Network access control method with system health detection prior to access

InactiveCN107770003AImprove access authentication performanceEnsure access securitySecurity arrangementWide area networksNetwork terminationPassword
The present invention discloses a network access control method with system health detection prior to access. The method comprises the steps of: S1: registering a user name, passwords and a handheld device identification code of a user of network terminal; S2: filling the user name of the terminal on a login interface of the network terminal, and emitting a connection request for obtaining dynamicverification codes to an authentication server; S3: sending one dynamic verification code to the handheld device of the terminal user by the authentication server; and S4: performing login authentication by employing the user name and the passwords of the terminal and the dynamic verification codes, and issuing corresponding access control policies to an access device by a policy server accordingto a system health report of the terminal. The network terminal requests one dynamic verification code to the authentication server, the dynamic verification code is employed to determine a legal identity of a user, a system health report is submitted to the policy server prior to access of a terminal, and therefore virus or hacker attack from the network terminal is effectively avoided and network access safety is comprehensively guaranteed.
Owner:台山市金讯互联网络科技有限公司

Power grid mobile office system based on virtualization

InactiveCN105227641ABreaking the limitations of "scheduled and fixed-point" officeRealize 3A office requirementsTransmissionAuthenticationVirtual desktop
The invention discloses a power grid mobile office system based on virtualization. The system comprises a shared storage layer, a transport layer, a control layer and a user layer; the shared storage layer virtualizes a Windows server through a Citrix server virtualization technology, and forms a file share server to store files and data shared by users in a virtual desktop and a virtual application through a mount FC storage device; the transport layer respectively controls individual virtual channels through the data compression, encryption and join optimization technologies based on a specific ICA (Independent Computing Architecture) protocol of a Citrix virtualization technology; the control layer links a Microsoft file shared service with an AD domain; the user layer makes a subscriber access the virtual desktop and the virtual application via C/S (Client/Server) or B/S (Browser/Server) after AD domain authentication by terminal equipment, and acquires corresponding files and data of the shared storage layer through the file shared service. The power grid mobile office system based on virtualization provided by the invention has the characteristics of being stable in performance, high in efficiency and safe.
Owner:GUIYANG POWER SUPPLY BUREAU OF GUIZHOU POWER GRID CO LTD

Safety verification method and device, server and terminal

The invention discloses a safety verification method and device, a server and a terminal. The method comprises the following steps: receiving a safety verification request sent by the terminal; returning original verification information to the terminal according to the safety verification request; receiving first conversion verification information returned by the terminal, wherein the first conversion verification information is the verification information input to the terminal by a user after the original verification information is converted based on preset verification rules; and when the first conversion verification information is identical to second conversion verification information, determining that the user passes safety verification. According to the safety verification method and device, the server and the terminal, the terminal carries out safety verification through the verification rules obtained through negotiation with the server; since a malicious third party cannot obtain the verification rules, the malicious third party cannot finish the safety verification even thought the third party obtains the original verification codes; and therefore, reliability of safety verification can be improved, and network application access safety is ensured.
Owner:ALIBABA GRP HLDG LTD

A two-way anonymous authentication system and method based on the principle of mimic defense

The invention discloses a bidirectional anonymous authentication system and method based on a mimicry defense principle, and is applied to the technical field of information security. The method comprises the steps that a certificate issuer is initialized; a Join sub-protocol runs between a platform and the certificate publisher; the platform operates a Sign sub-protocol between the TPM and the Host; and a signature detection party operates the Verify sub-protocol through a heterogeneous executive body. According to the invention, a DAA bidirectional anonymous authentication technology is adopted; a mimicry module is added in the signature detection party; while remote anonymous authentication of the underlying equipment accessing the Internet of Things network is realized, the endogenoussecurity function of the mimicry module can effectively resist any security threat implemented by using a known and unknown software and hardware vulnerability back door in a target system, so that the access security of the Internet of Things equipment is ensured at the technical architecture level, the three-in-one attribute of high reliability, high credibility and high availability is achieved, and the security of the Internet of Things system is ensured.
Owner:NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products