Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

59results about How to "Improve security defense performance" patented technology

Weighted decision and random scheduling method based on physical heterogeneous redundancy

The invention discloses a weighted decision and random scheduling method based on physical heterogeneous redundancy. Different unicast, multicast routing protocols are executed in each routing protocol processing unit, and a calculation result is output to a multi-mode decision unit; the multi-mode decision unit decides the calculation result of each routing protocol processing unit, and deliversand outputs a final decision result to a data forwarding plane; a redundancy scheduling unit builds a routing protocol pool, performs protocol setting on each routing protocol processing unit, recordsand calculates each decision result, and then dynamically and randomly schedules the routing processing unit according to the calculation result. Due to design of the routing mechanism with the heterogeneous redundant decision function, the invention provides a weighted multi-mode decision method to compare output results of multiple heterogeneous routing function execution bodies, so as to perform multi-mode decision on final routing selection, dynamic random scheduling selection is performed on the execution bodies through a trust degree weight, then a simulation defense capability of a switch routing control plane is realized.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Low-altitude short-range cluster cooperative defense system and defense method

The invention discloses a low-altitude short-range cluster cooperative defense system and defense method. The system comprises an early-warning monitoring module, an aerial counter-measure module, a ground counter-measure module and a control center. Data acquired by the early-warning monitoring module is transmitted to the control center to form visualization air situation, when an illegal low-slow small flyer invades, the early-warning monitoring module identifies, follows and monitors the illegal flyer and indicates an azimuth and height of the illegal flyer, and the control center drives the aerial counter-measure module or the ground counter-measure module to handle the illegal flyer. The control center transmits a control instruction to the aerial counter-measure module or the ground counter-measure module and can also process information returned by an aerial unmanned counter-measure module or a ground unmanned counter-measure module in real time. The aerial unmanned counter-measure module repels or hits a target by virtue of a carried task load. The ground unmanned counter-measure module repels and hits the target or effectively suppresses the low-altitude flyer by virtue of a carried task load.
Owner:武汉天宇智戎防务科技有限公司

Internet of Things safety monitoring method and system based on double engines

The invention discloses an Internet of Things safety monitoring method and system based on double engines, and the method comprises the steps: deploying a detection processing engine in an Internet ofThings sensing layer in advance, and deploying a collection analysis engine in a network layer of the Internet of Things; discovering and identifying terminal equipment of the Internet of Things through a detection processing engine, obtaining equipment information of the terminal equipment, and reporting equipment attributes and equipment state information to an acquisition analysis engine; andacquiring, by the acquisition and analysis engine, flow data of a network core switch, constructing a network behavior analysis model of the terminal equipment according to the flow data and equipmentinformation of the terminal equipment, monitoring abnormal network behaviors by using the network behavior analysis model, and performing alarm and / or blocking operation. Through linkage of the two types of engines, terminal equipment discovery and identification and risk disposal are realized, centralized management and control and behavior analysis are performed on the dispersedly isolated Internet of Things terminals, the comprehensiveness and accuracy of behavior analysis and monitoring are improved, and the disposal efficiency is ensured.
Owner:深圳市云盾科技有限公司

Tamper-proof data storage method, device and system based on blockchain

The invention discloses a tamper-proof data storage method, device and system based on a block chain, and the method comprises the steps: storing original data as blocks, and enabling all blocks to belinked into the block chain; wherein original data is stored in the block body; wherein the block head comprises a version number, signature information, a random number set and a Merkle root; wherein the signature information is generated by encrypting a hash value generated by performing hash operation on a previous block; wherein the random number set comprises N elements, and the elements arerandom block version numbers or set values; and when the random number group element is the version number corresponding to the block, the leaf node of the Merkle root is the hash value of the corresponding block, otherwise, the leaf node of the Merkle root is the hash value of the set value. During data review, chain verification can be carried out through block signature information, and merkleroot verification can be carried out through merkle roots to verify whether the data is tampered or not. According to the method, whether the data is tampered or not is verified through the stored data, hardware does not need to be additionally added, the time cost for tampering the data is very high, and the credibility of data auditing can be effectively guaranteed.
Owner:NANJING NARI GROUP CORP +4

Self-security defense system and security defense method thereof for Internet of Things terminal

The invention relates to a self-security defense system and a security defense method thereof for an Internet of Things terminal. The system comprises a security monitoring module used for monitoringan Internet of Things terminal system in real time and transmitting information to a security defense module, and the security defense module which is used for comparing the transmitted information byutilizing an analysis model matched with the terminal system and performing processing based on a comparison result. The method comprises the steps: constructing and obtaining a terminal system process white list and a terminal system network relationship white list; after the terminal system updates the system process and the network relationship information, continuing the monitoring if the updated content is consistent with the white list, otherwise, starting the strategy response, and sending a corresponding protection strategy to the interior of the terminal system, so the strategy protection is implemented on an abnormal process, network connection and a port. According to the invention, the Internet of Things terminal is helped to establish a self-security defense mechanism, self-security protection for attack threats and virus invasion is realized, the security level of the terminal system is comprehensively improved, and the information security of a user using the intelligent Internet of Things terminal is ensured.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Ocean nuclear power platform power grid grounding fault line selection protection method and system

The invention discloses an ocean nuclear power platform power grid grounding fault line selection protection method and an ocean nuclear power platform power grid grounding fault line selection protection system, belonging to the field of ocean nuclear power platform power grid protection. The ocean nuclear power platform power grid grounding fault line selection protection method comprises the following steps of: when a single-phase earth fault occurs in the system, if a fault current amplitude is higher than a given threshold, keeping a neutral point in a high-resistance grounding mode, selecting an optimal wavelet basis and a decomposition scale based on a maximum energy joint entropy ratio, and performing earth fault line selection by utilizing a wavelet transformation method based ona modulus maximum value; when a high-transition resistance grounding fault occurs in the system, switching the neutral point to a small-resistance grounding mode, and constructing a branch zero-sequence current and fault phase voltage break variable phase comparison line selection protection method based on features of the high-resistance grounding fault to perform grounding fault line selection.The ocean nuclear power platform power grid grounding fault line selection protection method can be effectively matched with the operation mode and the grounding fault features of an ocean nuclear power platform power system, is high in line selection accuracy rate, is suitable for various grounding fault modes possibly happening to the platform system, and effectively improves the safety defensecapacity of the ocean nuclear power platform.
Owner:HUAZHONG UNIV OF SCI & TECH

Network security protection method and device and electronic device

The invention provides a network security protection method, device and an electronic device and relates to the technical field of network security. The method comprises the steps of obtaining environmental data changing along with time through a terminal device; calculating the fluctuation quantity of the environmental data at current moment relative to the environmental data at the adjacent moment and judging whether the fluctuation quantity is greater than a set fluctuation quantity threshold or not; if so, obtaining a to-be-detected program of the terminal device at the current moment, extracting an operation code of the to-be-detected program and determining characteristics of the to-be-detected program according to the operation code; determining a characteristic vector corresponding to the to-be-detected program according to the characteristic of the to-be-detected program and a characteristic library obtained in advance; detecting the characteristic vector by using the trained classifier and judging whether the to-be-detected program is a malicious program or not; and if so, determining that an attack event appears in the terminal device and carrying out protection control on the terminal device. The abnormal condition of a physical network sensing layer can be timely found out and the security protection performance of the Internet of Things is improved.
Owner:紫光恒越技术有限公司

Automobile safety pre-warning method, automobile safety pre-warning device, equipment and storage medium

The invention relates to the field of automobile visual surveillance intelligent safe-guard system, and provides an automobile safety pre-warning method, an automobile safety pre-warning device, equipment and a storage medium. The method comprises the following steps: obtaining monitoring information inside an automobile, wherein the monitoring information comprises environmental state, video dataand using state of the automobile, the video data comprises moving objects inside the automobile, the moving objects comprise persons and/or animals, the using state of the automobile comprises the condition whether an engine operates and whether windows and doors are locked; after the monitoring information is determined to meet abnormal warning conditions, automatically opening the windows anddoors of the automobile, wherein the abnormal warning conditions comprise one of the following items: the oxygen concentration is lower than preset concentration, the temperature is higher than a first temperature value and lower than a second temperature value, the temperature is higher than the second temperature value, the humidity is lower than a first humidity value, the air pressure is higher than a first air pressure value, the air pressure is higher than a second air pressure value, or the concentration of harmful gas is higher than a warning value. By using the scheme, the occurrenceof unnecessary tragedies can be avoided, and the safety defense performance of the automobile is improved.
Owner:PING AN TECH (SHENZHEN) CO LTD

Asset certificate based method for managing trusted terminal device

The present invention provides an asset certificate based method for managing a trusted terminal device. The trusted terminal device is a terminal device comprising a trusted chip; the trusted chip is provided with a nonvolatile memory, and asset certificate information of the trusted terminal device is stored in the nonvolatile memory of the trusted chip of the trusted terminal device; the asset certificate information is attribute information of the trusted terminal device or encrypted attribute information after the attribute information is subjected to encryption; and the attribute information of the trusted terminal device comprises a unique device identification number, owner information, a start use time, user information, a use period, configuration information and the like. According to the asset certificate based method for managing the trusted terminal device provided by the present invention, the asset certificate information of the trusted terminal device is stored in the nonvolatile memory of the trusted chip, so that the asset certificate information is not liable to be lost; and even if an operating system of the terminal is reinstalled, a write operation can be performed on the asset certificate information only by inputting a correct operation password, so that completeness and reliability of the asset certificate information can be ensured.
Owner:GOHIGH DATA NETWORKS TECH CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products