Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

696results about How to "Improve information security" patented technology

Determination method of pseudo base station and mobile terminal

The invention provides a determination method of a pseudo base station and a mobile terminal. The method comprises the steps of sending a base station parameter acquiring request to a base station of the local community through the mobile terminal; receiving the base station parameters from the base station through the mobile terminal; comparing the base station parameters with the preset base station parameters of an operator; if the base station parameters are the same as the base station parameters of the operator, acquiring electric signal strength of the base station; comparing the variable of the electric signal strength of the base station within the preset time quantum with the preset strength variation value; if the variable of the electric signal strength of the base station within the preset time quantum is less than the preset strength variation value, comparing the electric signal strength of the base station with the preset electric signal strength; if the electric signal strength of the base station is more than the preset electric signal strength, determining that the base station is the pseudo base station. With the adoption of the determination method of the pseudo base station and the mobile terminal, the pseudo base station can be quickly and conveniently recognized, and meanwhile, the signaling load of the base station can be reduced; the privacy can be prevented from disclosing; in addition, the pseudo base station can be timely positioned.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

A method and device for defending against ddos ​​attacks directed at multi-service systems

The invention aims to provide a method and equipment for defending against a distributed denial of service (DDoS) attack to a multi-service system. The method comprises the following steps of: detecting whether the DDoS attack exists in network access traffic corresponding to the multi-service system according to preset DDoS attack triggering conditions by using network security equipment; when the DDoS attack exists, determining a target service aimed by the DDoS attack according to the DDoS attack triggering conditions corresponding to the DDoS attack; and protecting the network access traffic, corresponding to the target service, in the network access traffic corresponding to the multi-service system according to the service related information of the target service. Compared with the prior art, the invention not only limits the undesirable impact of the DDoS attack on the whole multi-service system, but also effectively supports access requests for other services in the multi-service system by detecting the target service aimed by the DDoS attack and performing corresponding defense processing according to the service related information of the target service, thereby effectively improving the information security capability of the whole multi-service system in defending against the DDoS attack.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Method and system for detecting rogue wireless access point in local area network

The invention discloses a system and a method for detecting a rogue wireless access point in a local area network. The system comprises a database, a wireless monitoring module and a central processing unit, wherein the database is used for storing the corresponding information of a legal wireless access point in the local area network in a legal list; the wireless monitoring module is used for periodically scanning each channel in the local area network to acquire identification information from the channel, and used for testing a suspected wireless access point determined by the central processing unit, trying connecting the suspected wireless access point in a management mode, and further trying connecting a plurality of legal nodes in the local area network by the suspected wireless access point if the connection is successful; and the central processing unit is used for comparing the identification information of an existed access point acquired by the scanning with the corresponding information in the legal list, and listing the wireless access point not occurring in the legal list as the suspected wireless access point and judging that the suspected wireless access point is the rogue wireless access point if successfully receiving the feedback information that the suspected wireless access point is successfully connected with the legal nodes from the wireless monitoring module.
Owner:AEROSPACE INFORMATION

Login method, maintenance terminal, data management service equipment and login system

InactiveCN103916366ABlock illegal loginReduce search workloadTransmissionData centerData management
The invention provides a login method, a maintenance terminal, data management service equipment and a login system. In the method, the maintenance terminal receives a login request and transmits user authentication information contained in the login request to the data management service equipment; after the data management service equipment returns a verification result that the user identity is legitimate, the maintenance terminal obtains identification information of a server to be logged and transmits the identification information to the data management service equipment which determines whether a user has the authority to manage the server to be logged; and according to a determination result which shows that the user has the authority, the maintenance terminal requests login information for logging on to the server from the data management service equipment and transmits the received login information to the server to be logged, and the user is logged in when the login information is verified by the server to be logged server. The technical scheme of the invention can effectively improve the information security of a data center, reduce the workload to find out login information and improve the information maintenance efficiency of the data center.
Owner:CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products