Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

87results about How to "Improve attack ability" patented technology

Smart power grid aggregation method and system for differential privacy security and fault tolerance

ActiveCN104579781AEfficient and flexible fault toleranceResistance to Differential Privacy AttacksPower network operation systems integrationCircuit arrangementsFault toleranceTelecommunications link
The invention discloses a smart power grid aggregation method and system for differential privacy security and fault tolerance. The method comprises the steps that a smart electric meter records and reports the electricity consumption of users in real time; a control center is responsible for collecting, processing and analyzing real-time electricity consumption data; a gateway is responsible for instruction delivery, data aggregation and security transmission between the control center and the users; a credible center is responsible for managing the whole system, and main function modules include a system initialization function module, a data aggregation request function module, a data aggregation request relay function module, a user data report function module, a security data aggregation function module and an aggregated data recovery module. According to the smart power grid aggregation method and system, the common fault tolerant function is supported, a difference privacy attack can be resisted, and the phenomenon that a hostile attacker exposes and obtains privacy information of the users by eavesdropping user communication links can be resisted; when some user data are not reported successfully, the electricity consumption of all the users with normal data reporting can still be aggregated; the smart power grid aggregation method and system have the high elastic expandability and can support efficient million-scale smart power grid electricity consumption data aggregation.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Generating method of variable-parameter multistage chaotic pseudorandom sequence

ActiveCN102708534AThe generation method is flexible and convenientImprove securityImage data processing detailsPseudorandom sequenceEncryption
The invention provides a generating method of a variable-parameter multistage chaotic pseudorandom sequence, comprising the following steps of: selecting chaotic mapping 1, setting an initial value z0and iterating for N times according to the operation relationship of the mapping 1 to output ZN; selecting chaotic mapping 2, setting an initial value (x0, y0), and iterating for N times according to the operation relationship of the mapping 2 to output (xn, yn); selecting chaotic mapping 3, setting an initial value of the mapping 3 w0 to be equal to ZN, dynamically controlling the order of the mapping 3 by the output of the mapping 2, wherein when the iteration is carried out for even times, the order is controlled by xn, and when the iteration is carried out for odd times, the order is controlled by yn; iterating and outputting wn by virtue of the initial value and the order according to the operation relationship of the mapping 3; forming a variable-parameter multistage chaotic model by the mapping 1, 2, 3, and iterating for N times to generate a decimal chaotic pseudorandom sequence wN with the length of N; and outputting a binary chaotic pseudorandom sequence through a threshold comparison. By adopting the generating method of the variable-parameter multistage chaotic pseudorandom sequence, the chaotic pseudorandom sequence of which the related function is approximate to impact, the mutual related function is approximate to 0 and the power spectrum is approximate to a constant can be generated flexibly and conveniently; and the requirement of users on the image encryption can be satisfied.
Owner:JIANGSU XINGHUA RUBBER BELT

Roselle beverage

The invention relates to roselle beverage which comprises the following components in percentage by weight: 50-55% of roselle juice, 0.4-0.5% of fructo-oligosaccharide, 5-6% of high fructose corn syrup, 0.7-0.8% of xylitol, 0.2-0.3% of citric acid, 0.01-0.05% of stevia rebaudiana, 0.02% of nisin and the balance of water, wherein the roselle juice is prepared by extracting a roselle mixture composed of dried roselle, dried smoked plum, dried hawthorn and dried liquorice; the roselle mixture comprises the components in percentage by weight: 96-99% of dried roselle, 0.4-1% of dried smoked plum, 0.05-0.5% of dried hawthorn and 0.05-0.5% of dried liquorice. The roselle beverage is prepared through the following processes of: mixing, boiling, filtering, sterilizing, canning and sealing. The roselle of the invention contains more hibiscus acid and roselle saponins which not only have antioxidant and health care effects for eliminating free radicals and keeping youth, but also have physiological functions of lipid-lowering and anti-aging or the like. By utilizingthe roselle beverage disclosed by the invention, the medicinal effects of roselle are given into full play, and the effects of the roselle for removing radicals, skin care and keeping youth are enhanced. The roselle beverage has the advantages of easily available raw materials, simple process, convenience in drinking, no toxic or side effect, and the like.
Owner:NANCHANG UNIV

Digital certificate issuing management method for industrial control system and encryption communication method for industrial control system

The invention provides a digital certificate issuing management method for an industrial control system, which realizes digital certificate issuing and management of an engineer station, a controllerand an operator station in the industrial control system on the basis of a certificate management system of public key infrastructure (PKI) in combination with network environment characteristics of the industrial control system. The invention also provides an encryption communication method for the industrial control system and the method comprises the steps: carrying out identity authenticationand dynamic secret key negotiation between first client equipment and second client equipment based on the digital certificates of the two communication sides, a root certificate of a CA server and acryptographic algorithm when each communication between first client equipment and second client equipment starts; and if identity authentication is passed, performing encrypted communication betweenthe first client equipment and the second client equipment according to the session key obtained after the national cryptographic algorithm and the key negotiation. The communication security of the whole industrial control system is improved, and the risk that the communication is hijacked or maliciously tampered is effectively reduced.
Owner:ZHEJIANG SUPCON TECH

Image encryption method for hyper-chaotic pseudo-random sequence

The invention discloses an image encryption method for a hyper-chaotic pseudo-random sequence, and the method comprises the steps: firstly selecting a fourth-order hyper-chaotic Chen system, generating the hyper-chaotic pseudo-random sequence, and enabling an initial value of the hyper-chaotic pseudo-random sequence to serve as a secret key; secondly, preprocessing the image, defining the row-column transformation relation of the image, further disturbing the row and column of the image, and determining parameters of the row-column transformation relation dynamically by a hyperchaotic pseudo-random sequence; defining the transformation relation of the image pixel values again, wherein the parameters of the transformation relation are dynamically determined by the hyper-chaotic pseudo-random sequence; and finally, encrypting the transformed image to obtain an encrypted image. According to the invention, a pseudorandom sequence with better initial sensitivity, randomness, stability, autocorrelation and other characteristics can be flexibly and conveniently generated, so that a better secret key is obtained; and the positions and pixel values of the image pixels are dynamically disturbed, so that the correlation of the image is further reduced, the secrecy effect is further improved, the higher requirement of a user on image encryption can be met, and the practicability is higher.
Owner:JIANGSU UNIV OF TECH

Intelligent confrontation sample generation method and system based on optimization algorithm and invariance

The invention belongs to the technical field of image recognition data processing, and particularly relates to an intelligent adversarial sample generation method and system based on an optimization algorithm and invariance. The method comprises the steps: collecting original image data with a correct label; constructing a neural network model for adversarial sample generation and a model loss function, and optimizing adversarial disturbance between an original input image and a corresponding output adversarial sample by maximizing the model loss function; based on original image data and a neural network model, an Adazief iterative quick gradient method and a cutting invariance method are used for iterative solution, and a finally generated adversarial sample is obtained according to an iteration termination condition. From the perspective that the generation process of the adversarial sample is similar to the neural network training process, the convergence process is optimized through the Adazief iteration quick gradient method, the over-fitting phenomenon in the adversarial attack is avoided by using the cutting invariance, the adversarial sample with better mobility can be generated, the robustness of the network model is improved, and the practical scene application is facilitated.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Fighting type top

The invention discloses a fighting type top. The fighting type top is characterized by comprising a top body, a motor and rolling wheels, wherein a rotating shaft of the motor and the rolling wheels are connected through a clutch transmission set; when the motor rotates in the first direction, the rolling wheels synchronously rotate in the opposite directions, so that rotation of the fighting type top is achieved; when the motor rotates in the second direction, the rolling wheels synchronously rotate in the same direction, so that movement of the fighting type top is achieved. Movement of the electric top can be achieved through control over rotation of the motor in the first direction or the second direction, a player can autonomously select to attack or avoid the opposite side in a fighting game, the interaction between the electric top and the player is effectively improved, and the technical level of the player can also be reflected; friction between the rolling wheels and the contact surface is rolling friction, the energy consumption of friction is lower, and therefore the persistence of rotation of the top is improved; in addition, due to the contact between the two rolling wheels and the contact surface, the stability of the top can be higher, the top can be more flexible, and the top cannot easily be inclined in a collision fighting process in the fighting game, and the fighting winning percentage is increased.
Owner:ALPHA GRP CO LTD +2

Composite PDC milling shoe of drilling and milling bridge plug

The invention discloses a composite PDC milling shoe of a drilling and milling bridge plug. The milling shoe comprises a milling shoe body 1. PDC composite sheet cutting elements 2 and hard alloy cutting elements 3 are arranged on the milling shoe body. A plurality of PDC composite sheets 2 are distributed on the front sides of cutting blades of the milling shoe. The irregular hard alloy cutting elements 3 with the normal height along the faces of blade bodies not higher than that of the PCD composite sheets are overlaid on the rear side of each PDC composite sheet 2. Fluid cools the working milling shoe and brings drilling and milling chippings out of a well bottom through water holes 4 between every two blades. Gauge protection teeth 5 of the PDC composite sheets take responsibility forthe gauge protection function of the milling shoe, and it is ensured that the milling shoe has strong gauge protection capacity. The composite PDC milling shoe has the advantages that by means of thecutting elements, the adaptability of the milling shoe for drilling and milling various bridge plugs can be improved, the service life of the milling shoe is prolonged, the size of drilling and milling chipping particles is reduced, and the drilling and milling speed and efficiency of well drilling are improved.
Owner:四川安苏能源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products