Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

34results about How to "Implement security assessment" patented technology

AADL (architecture analysis and design language) model extension based software system security verification and assessment method

The invention relates to an AADL (architecture analysis and design language) model extension based software system security verification and assessment method, which is provided in order to overcome defect of difficulty in direct processing of system models, high computation cost and high redundancy in computation in existing AADL model based verification and assessment. The method includes: establishing relationship between risk factors and an AADL architecture model to form a mechanism generating model; extracting model elements, generating a time state fault tree, a hardware software impactanalysis tree and a common cause time-dependent analysis tree according to the model elements, and backstepping a risk generation route according to the tree structure from bottom to top; setting physical resource properties and capacity of each physical device; calculating the failure probability of each physical device according to labeled risk factor probability of each physical device; converting an AADL security model into a timed automata; calling a formal verification tool UPPAAL for analysis and verification of the timed automata. The method is applicable to security assessment of software and hardware systems.
Owner:HARBIN INST OF TECH

Deficiency ultrasonic detecting equipment of mechanical equipment based on wavelet theory

The invention discloses deficiency ultrasonic detecting equipment of mechanical equipment based on wavelet theory, the whole equipment is composed of an ultrasonic flaw detector, a high-speed data acquisition system, a minitype computer, a wavelet analysis software, an equivalent quantitative model for detecting signals and an equipment safety performance evaluation system. The ultrasonic flaw detector comprises a synchronous circuit, a transmission circuit, an ultrasonic detecting energy converter, a signal receiving circuit which are connected, the high-speed data acquisition system adopts a high-performance digital storage oscilloscope and comprises a synchronous trigger, a gain position adjustment part, a data acquisition mode and time base part, a waveform recording part and a display part and the other parts, the computer is allocated with a wavelet analysis integration software which is self-developed, the equivalent quantitative model for detecting signals and a safety evaluation theoretical model. The invention breaks through the application limits of the traditional ultrasonic flaw detector, effectively improves the sensibility and measuring accuracy of flaw detection and provides novel equipment and a new method for the ultrasonic detecting problems with complex structure. The equipment has convenient usage and high engineering application value.
Owner:NANTONG ENTRY EXIT INSPECTION & QUARANTINE BUREAU OF THE PEOPLES REPUBLIC OF CHINA

Security operation method of wireless local area network

InactiveCN104410971ARealize scan detectionImplement key analysisNetwork topologiesSecurity arrangementPasswordFile area network
The invention discloses a security operation method of a wireless local area network. The security operation method comprises the following steps of firstly, obtaining an AP (Access Point) for visiting the local area network as well as a user name and an MAC (Media Access Control) address of a client; secondly, monitoring the running state of the client in the wireless local area network, managing the AP and the client and monitoring the network configuration and the use state; thirdly, carrying out cryptanalysis on the illegal AP and the client and cracking a password through capturing WEB datagrams of the illegal AP and the client; fourthly, carrying out vulnerability scanning and testing on the client in the wireless local area network; and lastly, arranging a security operation project of the wireless local area network. According to the security operation method, the running state of the 802.11b wireless local area network is automatically detected and monitored, the existing security vulnerabilities are searched and analyzed, a security evaluation report and an aid decision making report of the wireless local area network are given, and the functions of scanning detection, key analysis, vulnerability correlation, security evaluation and the like of the wireless local area network based on a 802.11 protocol are achieved.
Owner:SUZHOU DELUSEN AUTOMATION SYST

Wireless local area network safety assessment system

InactiveCN104363595ARealize scan detectionImplement key analysisTransmissionSecurity arrangementClient-sideVulnerability scanning
The invention discloses a wireless local area network safety assessment system. The wireless local area network safety assessment system comprises a wireless local area network scanning module, a network monitoring module, a password analyzing module, a vulnerability scanning module and a data processing module, wherein the wireless local area network scanning module is used for performing global scanning on a wireless local area network; the network monitoring module is used for monitoring the running state of a client side in the wireless local area network; the password analyzing module is used for performing password analysis on an illegal AP (access point) and a client end and acquiring a secret key of an illegal user; the vulnerability scanning module is used for scanning and testing vulnerabilities of the client side in the wireless local area network; a wireless local area network safe operation scheme is set by the data processing module; and intermediate data and the safe operation scheme are displayed through a display module. The operation state of the 802.11b wireless local area network is automatically detected and monitored by the system; security vulnerabilities are found out and analyzed; a safety assessment report and an aid decision making report of the wireless local area network are given; and functions of scanning detection, secret key analysis, vulnerability association and safety assessment on the basis of the 802.11 protocol wireless local area network are fulfilled.
Owner:SUZHOU DELUSEN AUTOMATION SYST

Liquid hydrogen filling system safety assessment method based on evolutionary clustering learning

The invention discloses a liquid hydrogen filling system safety assessment method based on evolutionary clustering learning, and belongs to the technical field of space launch safety assessment. The method includes the following steps that 1, a training sample is selected from historical perception data; 2, segmentation processing is carried out on the training sample; 3, similarity measurement is carried out with the l2-norm distance measure; 4, the group sparsity coefficient is solved with the segment coordinate relaxation algorithm; 5, a support vector machine is trained, and an evolutionary clustering segment dictionary is updated in real time; 6, the liquid hydrogen filling system safety measurement standard is quantitatively analyzed in combination with the system and state motion rule; 7, liquid hydrogen filling system safety assessment indexes are constructed, and the system safety level is described; 8, in online running, the steps 2-7 are repeated to achieve real-time assessment. According to the method, evolutionary clustering learning is introduced into a safety assessment theoretical framework, a dictionary learning and updating mechanism under data driving is described, the safety assessment indexes are constructed, and liquid hydrogen filling system safety assessment is achieved.
Owner:CHONGQING UNIV

Safety assessment method and system for nuclear power station workshop process system

The invention provides a safety assessment method for a nuclear power station workshop process system; the method comprises the following steps: monitoring the foundation deformation condition of a nuclear power station workshop, and acquiring the deformation data of the nuclear power station workshop; calculating a pipeline settlement difference according to the deformation data; when the pipeline settlement difference is greater than or equal to a preset design value, acquiring a deformation difference limit value of the pipeline according to the current working condition; and when the pipeline settlement difference is greater than or equal to the deformation difference limit value of the pipeline, controlling a support hanger of the pipeline to adjust. The invention further provides a safety evaluation system of the nuclear power station workshop process system. According to the safety assessment method and system for the nuclear power station workshop process system, safety assessment of the process system caused by the settlement difference of the nuclear power station workshop on the soft rock foundation can be achieved, the applicability is high, and the safety and reliability of pipelines of the workshop process system can be guaranteed.
Owner:CHINA NUCLEAR POWER DESIGN COMPANY +3

Deficiency ultrasonic detecting equipment of mechanical equipment based on wavelet theory

InactiveCN101620203BImplement security assessmentEmbodies the application idea of ​​quantitative non-destructive evaluationAnalysing solids using sonic/ultrasonic/infrasonic wavesSonificationData acquisition
The invention discloses deficiency ultrasonic detecting equipment of mechanical equipment based on wavelet theory, the whole equipment is composed of an ultrasonic flaw detector, a high-speed data acquisition system, a minitype computer, a wavelet analysis software, an equivalent quantitative model for detecting signals and an equipment safety performance evaluation system. The ultrasonic flaw detector comprises a synchronous circuit, a transmission circuit, an ultrasonic detecting energy converter, a signal receiving circuit which are connected, the high-speed data acquisition system adopts a high-performance digital storage oscilloscope and comprises a synchronous trigger, a gain position adjustment part, a data acquisition mode and time base part, a waveform recording part and a display part and the other parts, the computer is allocated with a wavelet analysis integration software which is self-developed, the equivalent quantitative model for detecting signals and a safety evaluation theoretical model. The invention breaks through the application limits of the traditional ultrasonic flaw detector, effectively improves the sensibility and measuring accuracy of flaw detection and provides novel equipment and a new method for the ultrasonic detecting problems with complex structure. The equipment has convenient usage and high engineering application value.
Owner:NANTONG ENTRY EXIT INSPECTION & QUARANTINE BUREAU OF THE PEOPLES REPUBLIC OF CHINA

Power transmission line adaptive overload protection method considering dynamic thermal characteristics

The invention discloses a power transmission line adaptive overload protection method considering dynamic thermal characteristics. The method comprises the steps of starting protection when the current amplitude of a line is greater than the maximum allowable current of the line, and measuring the power of the line every delta t; comparing the sampling power with the allowable long-term operation power of the line, and if the sampling power is greater than the allowable long-term operation power of the line, calculating the estimated allowable overload time of the current sampling; and then comparing the estimated allowable overload time of the current sampling with the next sampling time, if the estimated allowable overload time of the current sampling is less than or equal to the next sampling time, setting the protection action time, and when the overload duration meets the protection action time, cutting off the overload line. According to the method, protection measures can be delayed as much as possible on the overload line under the condition of line safety, line safety and cascading failure risks are taken into consideration. The method is independent of communication, simple in principle, easy to implement and high in reliability and sensitivity.
Owner:CHONGQING UNIV

Safety assessment method, system and power flow calculation method and system for power dispatching order

The invention discloses a method, system, and power flow calculation method and system for evaluating the safety of power dispatching instructions. Aiming at the problem that the current substation system lacks the safety evaluation of power dispatching instructions, the invention proposes the safety evaluation of power dispatching instructions that integrates real-time operating condition data. method. According to the local communication network between substations, the local power flow calculation model of the power grid is established; using the phase angle difference between the boundary nodes of the communication circle and the equivalent technology of injected power at the boundary nodes, the accurate calculation of the power grid flow based on local operating condition data is realized. The severity of physical consequences is integrated into the security risk assessment of the deployment command, so as to realize the security assessment of the remote command by the substation, and avoid the hidden risks caused by malicious commands. The invention realizes the fusion of the vulnerability of the information system and the physical security consequences, and overcomes the serious deficiency that the existing evaluation methods lack physical consequences analysis.
Owner:HUNAN UNIV

A software system security verification and evaluation method based on aadl model extension

The invention relates to a software system security verification and evaluation method based on AADL model extension, which aims to solve the problem that the existing verification and evaluation based on the AADL model is difficult to directly process the system model, and a huge calculation cost is required, and the calculation contains It is proposed due to the shortcomings of a large number of redundancy, including: linking risk factors with the AADL architecture model to form a mechanism generation model; extracting model elements and generating time state fault trees, hardware and software impact analysis trees, and common cause and time-effect analysis trees based on model elements , and invert the risk generation path from bottom to top according to the tree structure; set the performance and capacity of the physical resources of each physical device; and calculate the failure probability of the physical device according to the probability of the marked risk factor of the physical device; The AADL security model is converted into a time automaton model; the formal verification tool UPPAAL is called to analyze and verify the time automata model; the invention is applicable to the security assessment of software and hardware systems.
Owner:HARBIN INST OF TECH

Escalator step loading test device

PendingCN113321106ADeformation Accurate AcquisitionImplement security assessmentEscalatorsClassical mechanicsEngineering
The invention provides an escalator step loading test device, which comprises a loading base, a loading pressing block, a loading connecting rod, a loading execution part and a proportional loading unit, wherein the loading base is fixedly connected to step teeth of a step; the loading pressing block is located on the step, and the loading pressing block and the loading base are arranged in parallel; the loading connecting rod comprises a transverse rod and a vertical rod which are perpendicular to each other; the lower end of the vertical rod is connected with the upper end face of the loading pressing block; the upper end of the vertical rod is fixedly connected with one end of the transverse rod; the transverse rod is located above the step; the loading execution part and the vertical rod are arranged in parallel; the loading execution part comprises a fixed part and a telescopic part; the upper end of the telescopic part is fixedly connected to the other end of the transverse rod; the lower end of the telescopic part is in telescopic connection with the upper end of the fixed part; the lower end of the fixed part is fixedly connected to the upper end face of the loading base; the proportional loading unit is used for providing a variable load for the loading execution part; the vertical rod is provided with a force sensor; and the loading pressing block is provided with a displacement sensor.
Owner:GUANGZHOU SPECIAL MECHANICAL & ELECTRICAL EQUIP INSPECTION & RES INST

A Safety Assessment Method for Liquid Hydrogen Filling System Based on Evolutionary Cluster Learning

The invention discloses a liquid hydrogen filling system safety assessment method based on evolutionary clustering learning, and belongs to the technical field of space launch safety assessment. The method includes the following steps that 1, a training sample is selected from historical perception data; 2, segmentation processing is carried out on the training sample; 3, similarity measurement is carried out with the l2-norm distance measure; 4, the group sparsity coefficient is solved with the segment coordinate relaxation algorithm; 5, a support vector machine is trained, and an evolutionary clustering segment dictionary is updated in real time; 6, the liquid hydrogen filling system safety measurement standard is quantitatively analyzed in combination with the system and state motion rule; 7, liquid hydrogen filling system safety assessment indexes are constructed, and the system safety level is described; 8, in online running, the steps 2-7 are repeated to achieve real-time assessment. According to the method, evolutionary clustering learning is introduced into a safety assessment theoretical framework, a dictionary learning and updating mechanism under data driving is described, the safety assessment indexes are constructed, and liquid hydrogen filling system safety assessment is achieved.
Owner:CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products