Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

913results about How to "Improve defense" patented technology

Method and system for detecting application program behavior legality

A method for detecting the legitimacy of an application program behavior comprises the following steps: monitoring one or more system interfaces of a computer to cause the monitored system interfaces to jump to a monitoring module for execution when the monitoring system interfaces receive a call; blocking the application program of a caller and judging the validity of the caller: permitting the caller to call an interface function and continuously perform the application program of the caller if the caller is legal; and, pausing the behavior of the application program of the caller and issuing an intrusion alarm if the caller is illegal. The detection method finds out whether an executor of the application program behavior is legal or not by monitoring the system interfaces of the computer so as to intercept the program behavior executed by illegal executors and give an alarm. Compared with the existing fuzzier behavioral analysis technology, the detection method has the advantages of low false alarm rate, high recognition rate and the like, especially has good defense effect against the intrusion behavior due to overflow vulnerability, so the detection method is an effective supplement to the existing behavior analysis defense technology.
Owner:厦门市美亚柏科资讯科技有限公司

CAN bus authentication method and system based on broadcasting

The invention relates to a CAN bus authentication method and system based on broadcasting. The method includes the steps that completeness verification is conducted on all ECUs, seed secret keys are distributed for a gateway and the ECUs passing the verification; the gateway generates an encryption sequence, and the encryption sequence is sent to the ECUs passing the verification through broadcasting; the gateway and the ECUs passing the verification generate identical message authentication code (MAC) tables and identical synchronous counters, wherein the initial value of the counters is zero; the sending ECU attaches the MAC corresponding to the value of the counter of the sending ECU to the data field of a sending data frame; the gateway and the receiving ECU judge whether the MAC in the data field is identical with the MAC in the MAC tables corresponding to the counters of the gateway and the receiving ECU or not; if yes, the data frame is judged to be safe, and if not, the data frame is judged to be the illegal frame; the values of the counters of the sending ECU, the gateway and the receiving ECU are added by one, and whether the values of the counters of the sending ECU, the gateway and the receiving ECU exceed the preset threshold value or not is judged; if yes, an MAC table is generated again; if not, the next frame of communication is conducted, and communication of a next data frame is conducted. According to the CAN bus authentication method and system, due to the fact that a message authentication code is added to the data frames in communication, the attack on the CAN bus can be defended.
Owner:TSINGHUA UNIV

Neural network black box aggressive defense method based on knowledge distillation

ActiveCN111027060AGuaranteed successful attackReduce the pitfalls of losing variance between classesPlatform integrity maintainanceNeural architecturesData setSample sequence
The invention discloses a neural network black box aggressive defense method based on knowledge distillation, and the method comprises the steps: selecting a plurality of sub-networks to construct a teacher network, softening the input vectors of softmax layers of all sub-networks, and then reloading the model parameters of the sub-networks for training to obtain a new sub-network; obtaining a prediction label of each sub-network, and taking all prediction labels as soft labels after averaging or weighted averaging; inputting the Image Net data set into a student network, and guiding student network training by adopting a soft label, a data set hard label and a black box model special label to obtain a substitution model; adopting a white box attack algorithm to attack the substitution model to generate an adversarial sample sequence, adopting the adversarial sample sequence to attack the black box model, and selecting an adversarial sample successfully attacked in the adversarial sample sequence; and adding the successfully attacked countermeasure sample into a training set of the black box model, and performing countermeasure training by adopting the updated training set to generate the black box model with attack defense.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Method for preparing corrosion-protection composite coating for the steel metalwork

ActiveCN101116855AImprove anti-corrosion performance and comprehensive performanceEnhanced Physical Isolation and Defense CapabilitiesLiquid surface applicatorsAnti-corrosive paintsFastenerAluminium
The invention relates to an anticorrosion composite coat for steel metal fastener used in the marine environment, the structure of the composite coat consists of a bottom layer and a surface layer, wherein the bottom layer is coated with lamellar metal zinc dust and lamellar metal aluminum powder which are adhered by adhesive and mixed together, the surface layer is coated with metal aluminum power and reshaping epoxy resin which are mixed together. The invention includes the procedures as follows: the lamellar metal zinc dust and the lamellar metal aluminum power are mixed, and then are added into the inorganic aquosity splicing agent to be stirred and mixed uniformly, and then are soaked into and coated on the anticorrosive metal steel pieces, then are processed by baking and sintering and solidifying to achieve the first step for coating the bottom layer, then the coating and solidifying process is repeated to achieve the second step for coating the bottom layer; additionally, the lamellar aluminum power and the reshaping epoxy resin are mixed to be the organism epoxy aluminium rich paint, the formed bottom layer is made into the surface layer by the different parameter and the same step of the first step of the bottom layer, the method of the invention is of high causticity and strong protection, thereby the base body of the steel fastener can be protected, and the invention is of good abradability, beautiful appearance and ideal decoration.
Owner:725TH RES INST OF CHINA SHIPBUILDING INDAL CORP

Smart grid information transmission safety protection device and safety protection method

The invention discloses a smart grid information transmission safety protection device and a safety protection method, which relate to the technical field of smart grid information transmission safety. The device comprises a certificate server, an encryption and decryption module, a compliance check module and an exception handling module, wherein the encryption and decryption module is wholly serially connected between a station level and a bay level for carrying out encryption signature and signature verification decryption functions on original transparently-transmitted data; the compliance check module grabs a plaintext data packet in an offline or online mode and submits the plaintext data packet to the detection module for compliance check, and as for a compliance message, an analysis result is stored to a log database in a log format; and exception information is independently stored in an exception database through the exception handling module, and an administrator is notified. In the case of permissible delay in the smart grid, the encryption and decryption module together protects the internal information of the smart grid, behaviors that the internal data are tampered and destructed in the case of transmission are resisted, and the safety of the grid is further improved.
Owner:BEIJING UNIV OF POSTS & TELECOMM +2

Large filling bag ecological embankment and revetment building method for river lake channel

InactiveCN105178245ALow initial strengthImprove integrityBreakwatersQuaysCut and fillEngineering
The invention provides a large filling bag ecological embankment and revetment building method for a river lake channel. The method comprises the steps that (1), on the basis of cleaning and leveling, an embankment structure is filled with cleaned river lake bottom mud layer by layer through the large filling bag technology until the embankment structure reaches up to a designed elevation of the embankment top and the height of 0.5-1 m beyond the designed elevation is reserved through filling construction; (2), the cleaned river lake bottom mud is filled through a land pump, or special complete equipment and corresponding construction technologies are adopted to directly conduct mechanical paving and filling, and then the filled cleaned river lake bottom mud is sewn into bags; and (3), filling soil materials of the large geotextile filling bag embankment structure are taken from local resources, the bottom mud obtained through river lake regulation and channel excavation and cleaning is used as the filling soil materials, the initial water content of the filling soil materials is controlled within the range from 50%-80%, and the large filling bag embankment structure which is layered appropriately is adopted according to the practical situation. According to the method, the design is reasonable, the process is simple, construction is easy, operation is convenient, cost is low, popularization is easy, the ecological functions are good, and the method is applicable to ecological management and ecological channel construction of river lakes in soft soil areas.
Owner:NANJING HYDRAULIC RES INST

Active defense method based on path and IP address hopping in SDN network

The invention discloses an active defense method based on path and address hopping in an SDN network, and belongs to the field of mobile target defense. The method comprises the following steps: S1, asource host sending a data packet to a first switch; S2, judging whether the data packet is successfully matched with the flow table item or not, if yes, forwarding the data packet to a next hop switch, and entering a step S5; otherwise, the switch sending the Packet-In message to the controller, and executing the step S3; S3, the controller selecting a data packet transmission path and a virtualIP at the same time; S4, the controller generating a flow table rule according to the selected transmission path and the virtual IP, and issuing a flow table and a reverse flow table to each switch;and S5, judging whether the switch is a final switch or not, if yes, sending the data packet to a target host, and otherwise, entering the step S2. By utilizing the separation characteristic of the SDN network data layer and the control layer and the idea of active operation change in the MTD, the IP and the transmission path of the data packet are changed on the premise of not influencing the normal communication of the network, and the difficulty of an attacker in acquiring information is increased, so that the active defense capability of the system is improved.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Thermal power set primary frequency modulation and AGC coordination control method

The invention relates to the technical field of thermal power set coordination control, and discloses a thermal power set primary frequency modulation and AGC coordination control method. The method comprises the following steps: step one, determining whether a power network has a high frequency or a low frequency, and determining whether an AGC system increases a load or decreases the load; step two, when the high frequency and an increased load are simultaneously one, outputting the increased load and holding signals; step three, when the low frequency and a decreased load are simultaneously one, outputting the decreased load and the holding signals; step four, triggering the increased load, locking a load increasing instruction of AGC, and prioritizing a load decreasing instruction of a primary frequency modulation function; step five, triggering the decreased load, locking a load decreasing instruction of the AGC, and prioritizing a load increasing instruction of the primary frequency modulation function; step six, superposing a power compensation amount on the basis of an original AGC instruction; and step seven, after primary frequency modulation is brought into play, and the AGC system recovering a power adjustment function of a positive direction and a negative direction. According to the invention, power network frequency control is better safeguarded, and the risk of worsening a power network frequency accident is reduced.
Owner:ELECTRIC POWER SCI RES INST OF STATE GRID XINJIANG ELECTRIC POWER +1

Low-altitude short-range cluster cooperative defense system and defense method

The invention discloses a low-altitude short-range cluster cooperative defense system and defense method. The system comprises an early-warning monitoring module, an aerial counter-measure module, a ground counter-measure module and a control center. Data acquired by the early-warning monitoring module is transmitted to the control center to form visualization air situation, when an illegal low-slow small flyer invades, the early-warning monitoring module identifies, follows and monitors the illegal flyer and indicates an azimuth and height of the illegal flyer, and the control center drives the aerial counter-measure module or the ground counter-measure module to handle the illegal flyer. The control center transmits a control instruction to the aerial counter-measure module or the ground counter-measure module and can also process information returned by an aerial unmanned counter-measure module or a ground unmanned counter-measure module in real time. The aerial unmanned counter-measure module repels or hits a target by virtue of a carried task load. The ground unmanned counter-measure module repels and hits the target or effectively suppresses the low-altitude flyer by virtue of a carried task load.
Owner:武汉天宇智戎防务科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products