Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

325results about How to "Improve resistance to attack" patented technology

Industrial control network security protection method and system

The invention discloses an industrial control network security protection method and an industrial control network security protection system. The method comprises the following steps that: aiming at an external network attack, a front host performs first layer data filter and access control on external network data; a security control host caches data through a common storage region, performs intrusion detection on the data, timely alarms illegal data and informs hosts on two sides; a rear host performs deep filter and access control on the data and causes the legal data to enter an internal network; aiming at an internal network attack, the rear host performs the first data filter and access control on internal network data; the security control host caches the data through the common storage region, performs the intrusion detection on the data, timely alarms the illegal data and informs the hosts on the two sides; and the front host performs the deep filter and access control on the data and causes the legal data to enter an external network. By the method and the system, the network security level of an industrial control system is increased, and the cost on investment, system transformation and management is reduced.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Method, equipment and system for authenticating identities

An embodiment of the invention provides a method, equipment and a system for authenticating identities. The method includes enabling a cloud terminal to transmit first secret key K1 to a host; enabling the host to acquire second secret keys K2 corresponding to virtual machines, acquiring first combined secret keys according to the secret keys K2 and the secret keys K1, generating first random numbers N1, encrypting the first random numbers N1 by the aid of the first combined secret keys and then transmitting the encrypted first random numbers N1 to the cloud terminal; enabling the cloud terminal to acquire second combined secret keys according to the secret keys K2 transmitted by the host and the secret keys K1 stored in the cloud terminal, decrypting the first random numbers N1 by the aid of the second combined secret keys, then encrypting the first random numbers N1 again, generating second random numbers N2, encrypting the second random numbers N2 by the aid of the second combined secret keys and transmitting the second random numbers N2 and the first random numbers N1 to the host; enabling the host to decrypt the first random numbers N1 by the aid of the first combined secret keys, and determining whether the cloud terminal is successfully authenticated or not according to the correctness of the first random numbers N1; enabling the host to decrypt the second random numbers N2 by the aid of the first combined secret keys again, decrypting the second random numbers N2 again and then transmitting the second random numbers N2 to the cloud terminal; enabling the cloud terminal to decrypt the second random numbers N2 by the aid of the second combined secret keys and determining whether the virtual machines are successfully authenticated or not according to the correctness of the second random numbers N2.
Owner:HUAWEI CLOUD COMPUTING TECH CO LTD

Method and system for fusion of multi-source monitoring data based on heterogeneous clustering wireless sensor network

The invention provides a method and a system for the fusion of multi-source monitoring data based on a heterogeneous clustering wireless sensor network. The system comprises a plurality of monitoring nodes, a plurality of cluster head nodes, a plurality of trunk nodes, a gateway node and an upper computer. The method comprises the following steps: after the gateway node switches on the upper computer, a PAN network in conformity with the ZigBee protocol is established; after the cluster head nodes and the trunk nodes are electrified, the cluster head nodes and the trunk nodes search for and join in the PAN network to form a wireless meshed network; the cluster head nodes receive broadcast packets of the monitoring nodes to carry out correlation calculation, and provide the calculation result to the upper computer through the wireless meshed network to carry out clustering processing; and then, the monitoring nodes in the cluster acquire environmental data according to the clustering result and send the data to the cluster head nodes in the cluster, and the cluster head nodes send the acquired environmental data to the upper computer through the wireless meshed network to be subjected to corresponding processing based on different sources of the environmental data. Thus, the heterogeneous clustering wireless sensor network and the wireless meshed network are combined, and the advantages of the both can be fully used for data acquisition.
Owner:BEIJING LOIT TECH

Multiple-factor authentication method for online payment and authentication system

The invention discloses a multiple-factor authentication method; wherein an authentication USB key digital certificate comprises a client side and a server two-way verification digital certificate; the USB key is inserted and hardware PIN code is input, transaction data information is transferred to the USB key to carry out encryption processing; the transaction ciphertext of an authentication bank IC card comprises the following steps: part source data is input; ARQC is generated by the bank IC card and is transferred to the server for verification; the ARQC is decrypted by the server; the contents of first cleartest transaction data and second cleartest transaction data are compared and authorized transaction can be carried out under the condition that the first cleartest transaction data and second cleartest transaction data are completely consistent. The invention further discloses a multiple-factor authentication system, comprising a device for authenticating the USB key digital certificate, a device for authenticating the transaction ciphertext of the authentication bank IC card, a comparison unit for comparing the first cleartest transaction data and second cleartest transaction data, and an authorization unit; in the authentication method and the system, communication safety between the client side and the server can be not only ensured, and the transaction data source safety can be ensured.
Owner:CHINA UNIONPAY

Credible virtual machine platform

The invention discloses a credible virtual machine platform, which comprises a hard disk (11), a USB Key (10) and a nonprivileged virtual machine (6), and also comprises credible hardware (1), a security enhancement virtual machine monitor (2), a management virtual machine (3), a communication virtual machine (4) and a driving virtual machine (5). The security enhancement virtual machine monitor (2) is bidirectionally connected with the credible hardware (1) and the management virtual machine (3) respectively; the management virtual machine (3), the driving virtual machine (5) and the communication virtual machine (4) are privileged virtual machines; the management virtual machine (3) creates, manages, destroys and transfers other virtual machines; the driving virtual machine (5) provides driving needed by the operation of the virtual machine and management of a virtual credible password module; and the communication virtual machine (4) takes charge of communication between inner virtual machines and a virtual machine platform. The credible virtual machine platform has the advantages of effectively guaranteeing the safety and credibility of an operating environment of the virtual machine platform and realizing effective management and control of communication between virtual domains.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Safe positioning method for wireless sensor

The invention discloses a safe positioning method for a wireless sensor; the safe positioning method adopts two safe positioning methods which are the malicious beacon detection based on the checkpoint and the malicious beacon detection algorithm based on the regional voting mechanism to solve the positioning safety problem of the sensor network nodes. The positioning method improves the anti-attack capability of the system through filtering the malicious beacons directly so that not only the known attacks can be defended, but also the unknown attacks can be defended; the corresponding defending measurement for every possible specific attack is avoided; the implementation of the safety strategy of the positioning system is simplified; the two detection methods are combined effectively to adjust the defending strategy automatically according to the attack types; the safe positioning is guaranteed and the computation cost is reduced effectively; the neighbor communication authentication technique based on the unidirectional key chain is adopted to avoid the support of other network safety protocols so that the storage cost of the sensor nodes is reduced; the neighbor communication authentication technique can be compatible and used together with the present wireless sensor network protocol; the safety target of the positioning system of the sensor network nodes is realized.
Owner:XIDIAN UNIV

Dynamic generation and maintenance method of heterogeneous cloud host

The invention relates to the technical field of network security, and especially relates to a dynamic generation and maintenance method of a heterogeneous cloud host. The method comprises the following steps: 1) a heterogeneous cloud host node whose isomerism is embodied by the diversified physical facilities, virtual machines and software; 2) a mirror image library management system comprising creating diversified virtual machines and software mirror images; 3) dynamic deployment of a heterogeneous virtual machines and software: when the virtual machine or the software is instantiated, generating virtual machines or software of different versions according to physical nodes and application attributes, and deploying the virtual machines or software on the physical nodes; 4) dynamic virtual machine migration mechanism: a development operation and maintenance unit performs security posture estimation on the current virtual machine and its operation environment, and performs initiative migration on the virtual machine according to a strategy; and 5) a dynamic virtual machine and software cleaning mechanism: cleaning the online virtual machines according to the security posture or periodically. By adoption of the method, the anti-attack ability of a cloud data center is improved, and higher security requirements of users and providers for cloud services and infrastructure are satisfied.
Owner:THE PLA INFORMATION ENG UNIV

Compressive sensing-based adaptive video information hiding method

The invention discloses a compressive sensing-based adaptive video information hiding method, which is characterized by comprising the following steps of: a, framing a video file by using shot as a unit; b, taking the first frame of each shot as a key frame; c, establishing an image texture classification model to obtain a texture classification model mark of each key frame; d, determining a texture category of each key frame and determining whether the key frame is a texture region, or a smooth region or between the texture region and the smooth region; e, selecting an algorithm and determining insert depth; f, inserting secret information, i.e., inserting the secret information in a coefficient matrix; and g, synthesizing a video file. According to the video information hiding method, the secret information can be adaptively inserted under the condition that the entire video file is not required to be decompressed, so that the ornamental value of the video is not affected, and the method has the advantages of small amount of calculation, high information steganography efficiency, small influence on the video and good secret information safety. The method can be widely applied to various fields such as copyright authentication, pirate tracking and secure communication.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Mimetic mail server information processing device and mail service processing method, device and mail system

ActiveCN108833417AMeet security needsSolve the problem of building homogeneityData switching networksResource poolInformation processing
The invention relates to a mimetic mail server information processing device and a mail service processing method, device and a mail system. The information processing device comprises a resource poolcomposed of a user transfer proxy component and a server mailbox component, multiple parallel heterogeneous mail service chains composed of various components randomly selected from the resource pool, and a dynamic feedback control module, wherein the user transfer proxy component includes a number of heterogeneous user transfer proxy executors, and the server mailbox component includes a numberof server mailbox executors; and the dynamic feedback control module is used to monitor the operation of each executor and perform dynamic scheduling on various components. According to the scheme ofthe invention, the diversified executors are created, multiple processing results are subjected to mimetic decision output, the security performance of the mail system services can be improved, the initiative, variability and randomness of the mail system defense capability can be improved, the problem of privacy protection can be effectively solved, a more secure mail server solution can be provided, and the important guiding significance can be provided for the mail system security technologies.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Image digital copyright protecting method and image digital copyright protecting system based on frequency domain digital watermarking algorithm

The invention provides an image digital copyright protecting method based on a frequency domain digital watermarking algorithm. The method comprises the steps of performing coding of character information which comprises copyright information for obtaining an image sequence that is obtained through combining definite-number binary-value image templates, and embedding the binary-value image sequence into an image according to image characteristic points and a wavelet transform technique; calculating the size of the image sequence for keeping robustness of the algorithm, and generating an alarm when the size of the image sequence is overlarge; and for resisting rotation and scaling attacks, embedding pre-arranged template linear points in an annular Fourier transform area of SIFT characteristic points of the image. In extraction, a rotation and scaling deformation parameter which is bear by the image is estimated through analyzing distribution of the template linear points; the parameter is used for restoring the image and then extraction is performed; a extracted watermarking binary-value image is restored to a watermarking character sequence through matching with a preset template image according to an encoding algorithm; and whether the watermarking sequence is totally extracted is checked by means of a CRC32 algorithm. The image digital copyright protecting method has high robustness and settles a problem of incapability of simultaneously resisting multiple kinds of attacks in an existing image algorithm, particularly cutting and rotation scaling geometric attacks.
Owner:武汉圆周率软件科技有限公司

Method and device for generating three-dimensional dynamic verification code

The invention provides a method and a device for generating a three-dimensional dynamic verification code. The invention adopts a technical scheme which comprises the following steps: randomly generating the verification code and determining the position at which the verification code is displayed in a screen; generating a three-dimensional geometric primitive and judging whether the positions of the three-dimensional geometric primitive and the verification code information displayed in the screen are the same or not; if so, changing a designated changed attribute of the three-dimensional geometric primitive; otherwise not changing the designated changed attribute of the three-dimensional geometric primitive; and moving the designated changed attribute of the three-dimensional geometric primitive according to a motion trail to realize the three-dimensional dynamic verification code. In the invention, the content of the verification code is displayed by changing the attribute of the geometric primitive and each frame does not reveal the verification code information out, so that the traditional two-dimensional image verification code attack means cannot separate the content of the verification code from a single-frame image; and at the same time, because different motion trail of each geometric primitive is set by a special method, the identification and attack difficulties of the traditional technology tracing a moving object in a video are increased and anti-attack capability of the verification code finally is improved effectively.
Owner:WUHAN UNIV

Color image encryption method based on Latin square scrambling

The invention relates to a color image encryption method based on Latin square scrambling. Plaintext keys r1, g1 and b1 are calculated through utilization of R, G and B components of a color plaintextimage, an initial value and a parameter obtained through calculation based on the keys are substituted into a chaotic system, and three groups of chaotic sequences are generated; the chaotic sequences for scrambling and diffusion are selected through utilization of a chaotic sequence selection mechanism based on the plaintext and digital arrangement; and a final ciphertext image is obtained through adoption of a block scrambling policy based on a Latin square and the chaotic sequences, and diffusion operation based on the plaintext and a scrambled image. The encryption method is closely related to the plaintext, so the plaintext attack resistance is improved. The employed chaotic system is an improved chaotic system, a chaotic characteristic is good, the randomness is high and a key spaceis great, so a security level is further improved. A simulation result and safety analysis show that according to the encryption provided by the invention, an image complete encryption demand can besatisfied, the encryption efficiency is high, and the robustness is high.
Owner:HENAN UNIVERSITY

Block chain distributed dynamic network key generation and encryption method

The invention discloses a block chain distributed dynamic network key generation, encryption and decryption method, which comprises the following steps of: (1) generating and encrypting a key, initializing a network, and starting a key management protocol of a distributed dynamic self-organizing network; (2) after the key management protocol is started, counting the key encryption times, startingto accumulate the key generation and encryption times, updating a key encryption algorithm after the specified times are reached, and waiting for a new round of key generation and encryption operation; and (3) after the secret key is generated and encrypted, broadcasting a message generated by the secret key to the whole network for verification. In order to solve the problem that potential safetyhazards exist due to dynamic changes of a blockchain distributed network, a secret key management protocol is designed, generation and encryption of a secret key are managed, the efficiency of secretkey generation and encryption and decryption processes is guaranteed, an encryption method of an iterative encryption algorithm is designed for attackers to forcibly crack the secret key or launch replay attacks, secret key loss is reduced, and transaction information transmission safety is guaranteed.
Owner:HANGZHOU YUNXIANG NETWORK TECH

Quantum image encryption method based on image association dissection

Disclosed is a quantum image encryption method based on image association dissection. A quantum-state superposition and measurement principle is used to establish correlation between image pixels. An image is dissected into superposition of a series of characteristic sub-images. Conversion operations are performed on the characteristic sub-images stored in a complete binary-tree digit group through use of a random phase door and a quantum rotating door and then a plurality of superpositions are performed on all the images through quantum-state superposition so as to obtain a cipher image. Schmidt orthogonal dissection is performed on the quantum random phase door, the quantum rotating door, a coefficient matrix and the cipher image so as to obtain a standard orthogonal ground state which is then used as a key. The quantum image encryption method based on the image association dissection has a larger key space so that strong attacks can be resisted and combination of a quantum-mechanical theory and an image encryption technology is realized. The method has classical information theory security and quantum information theory security so that quantum image encryption surpasses restriction of classical image encryption and compared with classical images, quantum images are higher in security.
Owner:NANCHANG UNIV

Wavelet domain-based method for weighting fractional differential image digital watermark

The invention provides a wavelet domain-based method for weighting a fractional differential image digital watermark, which mainly solves the problem that the high-frequency coefficient of an image undergoing wavelet decomposition is susceptible to extraneous noises and conventional image processing. The method comprises the implementation steps of: doing two different orders of differentials for a sinusoidal signal by utilizing a fractional order Cauchy formula; respectively carrying out discrete sampling and superposing by utilizing a given weight to generate a pseudorandom sequence and adding the pseudorandom sequence with a watermark pixel value to realize watermark scrambling; carrying out two-stage decomposition on a carrier image by utilizing a Haar wavelet and embedding the scrambled watermark information in the carrier image through the exchanged and decomposed high-frequency coefficient; and through comparing the high-frequency coefficient undergoing the two-stage decomposition by utilizing the Haar wavelet, extracting the scrambled watermark and subtracting the pseudorandom sequence to realize watermark recovery. The method provided by the invention has the advantages of strong anti-attack ability and good safety of the image, and can be applied to copyright protection, restriction of illegally spreading audiovisual products, individual privacy protection, identification hiding and high-tech crime prevention.
Owner:XIDIAN UNIV

Intelligent control water meter

The invention relates to an intelligent quantitative control water meter. When a valve in the water meter is opened by separating magnets which attract with each other, energy required by closing a valve is registered in the displacement of the magnets generated when the valve is opened; magnetic force is used for quantitative control when the magnets are far away from each other and magnetic attraction force is weak, and the magnetic attraction force is used as power for closing the valve when the magnets are close to each other and the magnetic force is strong; the water meter has a unified measurement reading which conforms to the purpose of legislation of the metrology law; water supply and power supply are alternately performed, normal water supply is performed without the power supply, and the valve is automatically closed without electric energy when a quota is finished; a circuit is electrified for short time to intelligently judge, a motor in the meter is conditionally started and the valve is opened to recover the water supply; and the water meter is provided with an internal locking device for preventing the water meter from being illegally and nondestructively opened or disassembled. The intelligent quantitative control water meter has the advantages of simpleness, stability and reliability. The problems of the measurement, charging, management and measurement law of the intelligent water meter and a remote water meter caused by the conventional non-electrical quantity electrical testing technology are radically solved in a mechanical quantization and electronic equipment power-off working mode.
Owner:杨启梁
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products