Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38results about How to "Improve attack defense capability" patented technology

Method and device for verifying integrity of security critical data of program in process of running

ActiveCN102930185AAvoid attackIntegrity verification implementationProgram/content distribution protectionData setData integrity
The invention discloses a method and a device for verifying the integrity of security critical data of a program in the process of running. The method comprises the following steps: 1) indicating a security critical variable in the program, generating a security critical data set in the process of compiling, dividing a virtual address space of the program into a protected area and a non-protected area in the process of loading the program, loading the security critical data set to the protected area, and constructing an integrity verification tree for a virtual page of the protected area of the program; and 2) in the process of writing program data into a memory, updating a root verification value; and in the process of reading program data from the memory, generating a new root verification value, comparing the new root verification value with the original root verification value, if the two are equal, determining that the security critical data set is not tampered, otherwise, determining that the security critical data set is tampered. The device comprises a data integrity verification circuit, a root verification value storage module and a comparator. The method and the device disclosed by the invention have the advantages of high safety performance, strong attack prevention performance, small calculated amount, and less occupied storage space.
Owner:NAT UNIV OF DEFENSE TECH

Satellite mobile communication terminal user identification and authentication method

The invention discloses a satellite mobile communication terminal user identification and authentication method. The mobile communication terminal is based on a Beidou satellite system. The test method comprises the authentication mechanism and the encryption mechanism, wherein the authentication mechanism comprises the following steps: a public key is sent by a sender to a receiver, and a private key is saved by the sender; encryption is performed on data by the sender with the private key, and signed data is added; and verification and authentication are performed on the data by the receiver with the public key of the sender, and decryption is performed after the authentication is successful to obtain the data; and the encryption mechanism comprises the following steps: the public key is sent by the sender to the receiver, and the private key is saved by the sender; encryption is performed on data by the sender with the private key, and complete content is added; and decryption is performed on the data by the receiver with the public key, and after the authentication is successful, the data integrity is verified. The method of the invention can be used to effectively prevent various phenomenons, such as stealing calling, embezzlement, secret divulging, etc., in which mobile communication resources and services are used illegally in satellite mobile communication, and ensure satellite mobile communication network safety and ensure the legitimate rights and interests of satellite mobile communication operators and users.
Owner:CHENGDU LINHAI ELECTRONICS

Satellite mobile communication terminal user identification and authentication function test method

The invention discloses a satellite mobile communication terminal user identification and authentication function test method. The method comprises the following steps: a pulse digital signal is sent to an UIM card by a DSP in a timing manner; the received pulse digital signal is detected by the UIM card, if a pulse digital signal sequence code error occurs, then reset is performed directly, and connection is reestablished at the interval of a set time; the public key of an authorized user is saved by the UIM card, and the private key of the authorized user is saved by the DSP; after the password of the authorized user is received by the DSP, decryption is performed on the private key, and then signing is performed on an opening instruction with the private key and the signed data is sent to the UIM card; and after the data is received by the UIM card, authentication is performed on the opening instruction with the public key, and only after the authentication is successful, the information data can be read and a corresponding operation is entered. The method of the invention can be used to reliably verify and ensure the satellite mobile communication terminal user identification and authentication function and effectively prevent the stealing and damage of illegal users on wireless channels and information thereof so as to ensure the safety of information transmission.
Owner:CHENGDU LINHAI ELECTRONICS

Image processing method and device, image classification method and device, medium and electronic equipment

The invention relates to an image processing method and device, an image classification method and device, a medium and electronic equipment. The image processing method comprises the steps of receiving a to-be-processed image; according to the to-be-processed image and an image processing model, a noise image corresponding to the to-be-processed image is determined, the image processing model comprises an image feature extraction sub-model and a noise information sub-model, and the image feature extraction sub-model is used for obtaining feature vectors of the to-be-processed image; the noise information sub-model is used for determining a noise image of the to-be-processed image according to a feature vector of the to-be-processed image, the image processing model in the training process further comprises a classification sub-model, and the loss of the image processing model is determined based on the noise vector added by the noise information sub-model and classification probability distribution output by the classification sub-model; according to the to-be-processed image and the noise image, a target image corresponding to the to-be-processed image is generated, and the to-be-processed image and the target image are the same in corresponding classification.
Owner:BEIJING BYTEDANCE NETWORK TECH CO LTD

Method and system for secure application of machine learning model

The invention discloses a safe application method and system of a machine learning model. The method includes steps such as front-end service model processing, prior information extraction, verification strategy analysis, back-end verification module processing, and fusion decision-making. The back-end verification and the front-end service machine learning service model of the present invention are relatively independent, and the anti-attack ability can be enhanced through the separation of module functions, and the application security of the machine learning model can be improved; the back-end verification supports the multi-dimensional back-end of inherent attributes and external information Verification, the verification method is more comprehensive and stricter, and is suitable for the definition of verification strategies for various types of machine learning tasks. For the processing results of the front-end service machine learning model, the influence coefficient of the main feature can be defined, and the verification strategy can be flexibly formulated according to the influence coefficient. It is suitable for application scenarios of various machine learning models, and has good flexibility and versatility.
Owner:深圳市乾数科技有限公司

Method for realizing decentralized distributed process guarding based on ad hoc network technology

The invention relates to a method for realizing decentralized distributed process guarding based on an ad hoc network technology, which comprises the following steps of: generating a super-tube identity, authority and guarding strategy file through a creation module, and safely storing the file in each guarding node and system process: 1, perpetual motion guarding without external force intervention, and 2, iteratively updating/newly adding nodes in the process; the super administrator performs external force intervention and redeployment, and perpetual motion guards are started after deployment is completed and the super administrator intervention mode exits; and basic services of mutual monitoring, failover and takeover, message broadcasting and communication are started. The credible decentralized distributed process guarding system is constructed by utilizing an original ad hoc network technology and is used for avoiding the problem of failure of system process guarding capabilitycaused by a single-point fault of a guarder; meanwhile, the protection range can be expanded from a single machine to all hosts in the whole domain, the anti-attack capability of the whole protectionsystem is improved, and the credibility of the protection system is ensured.
Owner:江苏开博科技有限公司 +1

Anti-attack mac address learning method, device and network equipment

The invention provides an anti-attack MAC address learning method and device, and network equipment. The method comprises the following steps: when a forwarding chip of the network equipment receivesa message, analyzing a source MAC address and a target MAC address of the message; using the source MAC address and the target MAC address to search for MAC table items of the forwarding chip, whereinthe MAC table items comprise temporary MAC table items and formal MAC table items, and the aging time of the temporary MAC table items is shorter than the aging time of the formal MAC table items; ifmatching table items for the target MAC address are obtained in the temporary MAC table items through the searching, refreshing the matching table items as the formal MAC table items, and establishing the formal MAC table items for the source MAC address; and if the matching table items for the source MAC address and the target MAC address are not obtained in the temporary MAC table items throughthe searching, establishing the temporary MAC table items for the source MAC address. The method and device and the network equipment provided by the invention have the advantages that table item storage space in the equipment can be rapidly freed up, so that the anti-attack capability of the network equipment is improved.
Owner:XINHUASAN INFORMATION TECH CO LTD

Method for realizing decentralized distributed process guarding based on ad hoc network technology

The invention relates to a method for realizing decentralized distributed process guarding based on ad hoc network technology, including generating supermanagement identity and authority and guarding policy files through the creation module, and safely storing them in each guarding node, system process, and a It is a perpetual guard that does not require external intervention. Second, the process needs to be iteratively updated / added nodes; the super administrator externally intervenes, redeploys, and after the deployment is complete, after the super administrator intervention mode exits, start the perpetual guard; start mutual monitoring, Basic services for failover and takeover, message broadcasting, and communication. The present invention utilizes the original self-organizing network technology to construct a credible decentralized distributed process guardian system, which is used to avoid the problem of system process guardian ability failure caused by the guardian's own single point of failure; at the same time, it can protect the scope of Expand from a single machine to all hosts in the whole domain, and at the same time, improve the anti-attack capability of the entire guard system to ensure the credibility of the guard system itself.
Owner:江苏开博科技有限公司 +1

Integrity verification method and device for runtime program safety-critical data

ActiveCN102930185BAvoid attackIntegrity verification implementationProgram/content distribution protectionData setData integrity
The invention discloses a method and a device for verifying the integrity of security critical data of a program in the process of running. The method comprises the following steps: 1) indicating a security critical variable in the program, generating a security critical data set in the process of compiling, dividing a virtual address space of the program into a protected area and a non-protected area in the process of loading the program, loading the security critical data set to the protected area, and constructing an integrity verification tree for a virtual page of the protected area of the program; and 2) in the process of writing program data into a memory, updating a root verification value; and in the process of reading program data from the memory, generating a new root verification value, comparing the new root verification value with the original root verification value, if the two are equal, determining that the security critical data set is not tampered, otherwise, determining that the security critical data set is tampered. The device comprises a data integrity verification circuit, a root verification value storage module and a comparator. The method and the device disclosed by the invention have the advantages of high safety performance, strong attack prevention performance, small calculated amount, and less occupied storage space.
Owner:NAT UNIV OF DEFENSE TECH

Method and system for enhancing network attack prevention capability of multiple network ports

ActiveCN111464568AImprove attack defense capabilityFacilitate real-time online reconstructionData switching networksComputer networkAttack
The invention discloses a method and a system for enhancing the network attack prevention capability of multiple network ports. The method comprises the following steps that: S1, all line protection devices adopt FPGA-based network ports; S2, each line protection device independently receives different attacks of the simulation attack management system, training is carried out according to the attacks, and an FPGA network port is reconstructed during training; S3, the trained line protection device forms an FPGA network port with the function of filtering the attack; S4, each line protection device uploads the FPGA network port model formed after S3 to a system control center; and S5, the system control center synthesizes the models of the FPGA network ports uploaded by all the line protection devices and then issues the synthesized models to all the line protection devices. According to the reconfigurable multi-network-port anti-network-attack and enhancement mechanism based on the FPGA, each single network port can share attack information with other network ports to enhance the self anti-attack capability, and the FPGA-based network port anti-network-attack capability of each device becomes more and more powerful and complete as time goes on.
Owner:FOSHAN POWER SUPPLY BUREAU GUANGDONG POWER GRID

Chip anti-power consumption attack circuit and method for preventing power consumption attack

The invention relates to a circuit and method for preventing power consumption attack against a chip. The problem of power consumption attack is not solved fundamentally according to an existing method. The circuit comprises an NMOS switch, a charging capacitor, a filter resistor, a filter capacitor, a charging voltage comparator, a switching voltage comparator, a two-input AND gate and four divider resistors. When the chip is electrified, the switch is switched off, and an external power supply charges the capacitors. When the chip starts encryption and decryption operation, the switch is switched on, the inside of the chip is disconnected with the external power supply, and the circuit in the chip relies on the charging capacitor to be powered. After the electric quantity of the capacitor is reduced to a threshold, the chip stops operating temporarily, the switch is switched off, and the external power supply charges the capacitors. When the capacitors are fully charged, the switch is switched on, the inside of the chip is disconnected with the external power supply, and the circuit in the chip relies on the charging capacitor to go on working. According to the circuit and method for preventing power consumption attack against the chip, useful information contained in power consumption information is damaged, the chip protection capability is improved, and the circuit has a self active protection capability.
Owner:HANGZHOU NATCHIP SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products