Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

36results about How to "Improve security protection efficiency" patented technology

Duplicating information processing method and device, and electronic equipment

ActiveCN106203077AImprove security protection efficiencySolve the problem of low security protection efficiencyPlatform integrity maintainanceInformation mappingElectric equipment
The embodiment of the invention discloses a duplicating information processing method and device, and electronic equipment, relates to the technology of information safety, and can improve the safety protection efficiency of an operating system. The method comprises the following steps: when the calling of a kernel DuplicateHandle object function is monitored in a pre-injected hook function, hooking the kernel DuplicateHandle object function; monitoring whether the kernel DuplicateHandle object function succeeds in duplicating a target process handle or not, and if the kernel DuplicateHandle object function succeeds in duplicating the target process handle, judging whether the target process handle which succeeds in duplicating is matched with any one protection process handle in a preset protection process handle library or not; if the target process handle which succeeds in duplicating is matched with any one protection process handle in the preset protection process handle library, obtaining the process path information of the target process handle which succeeds in duplicating, and extracting a to-be-verified application program mapped by the process path information; and if the extracted to-be-verified application program is the same with any one to-be-intercepted application program in a preset to-be-intercepted application program library, closing the target process handle which succeeds in duplicating. The duplicating information processing method and device is suitable for monitoring whether the target process handle is illegally duplicated or not.
Owner:ZHUHAI BAOQU TECH CO LTD

Management and control method, device, equipment and system for intranet malicious reverse connection behavior

The invention relates to a management and control method, device, equipment and system for an intranet malicious reverse connection behavior. Based on policy-based routing, the method comprises the steps of: obtaining an external network access request forwarded from a core switch, if the external network access request is an http access request, analyzing a host field at the head of the http datapacket in the http access request to take as a target domain name,if the external network access request is an https access request, analyzing a Server Name field of a Server Name Indication extension at the head of the SSL negotiation data packet, taking the Server Name field as a target domain name, and if the target domain name is detected to be in a preset white list, allowing the terminal equipment to access an IP corresponding to the target domain name. According to the invention, security management and control are carried out through the target domain name, error interception caused by IP resolution errors is avoided, the target domain name is obtained without adding a certificate to decrypt the https data packet, all application systems can be covered, and management and controlof malicious reverse connection behaviors of an intranet are realized.
Owner:SHANGHAI ZHONGTONGJI NETWORK TECH CO LTD

Intelligent beach safety protection method and system based on machine vision

The invention discloses an intelligent beach safety protection method and system based on machine vision, and the method comprises the steps: controlling a camera to carry out the image collection of a beach according to a preset time interval, and obtaining a beach image; inputting the obtained beach picture into a tide analysis model to obtain the tidal condition of the beach; dividing the beach into a risk area and a non-risk area according to the tidal condition of the beach and the current beach picture; distributing monitoring resources of the camera to the risk area and the non-risk area according to a preset proportion; the monitoring resources obtained in the risk area are larger than the monitoring resources obtained in the non-risk area; after the monitoring resources are distributed, tourist identification is carried out on beach pictures collected by a camera, and tourist behaviors are obtained; inputting the tourist behavior into a risk behavior recognition model to judge whether the tourist behavior belongs to a risk behavior; and giving an alarm prompt in response to the tourist behavior belonging to the risk behavior. The risk behavior identification accuracy and the safety protection efficiency are improved, and the life safety of tourists is guaranteed.
Owner:FUZHOU UNIVERSITY

A processing method, device and electronic equipment for copying information

ActiveCN106203077BImprove security protection efficiencySolve the problem of low security protection efficiencyPlatform integrity maintainanceInformation processingOperational system
The embodiment of the invention discloses a duplicating information processing method and device, and electronic equipment, relates to the technology of information safety, and can improve the safety protection efficiency of an operating system. The method comprises the following steps: when the calling of a kernel DuplicateHandle object function is monitored in a pre-injected hook function, hooking the kernel DuplicateHandle object function; monitoring whether the kernel DuplicateHandle object function succeeds in duplicating a target process handle or not, and if the kernel DuplicateHandle object function succeeds in duplicating the target process handle, judging whether the target process handle which succeeds in duplicating is matched with any one protection process handle in a preset protection process handle library or not; if the target process handle which succeeds in duplicating is matched with any one protection process handle in the preset protection process handle library, obtaining the process path information of the target process handle which succeeds in duplicating, and extracting a to-be-verified application program mapped by the process path information; and if the extracted to-be-verified application program is the same with any one to-be-intercepted application program in a preset to-be-intercepted application program library, closing the target process handle which succeeds in duplicating. The duplicating information processing method and device is suitable for monitoring whether the target process handle is illegally duplicated or not.
Owner:ZHUHAI BAOQU TECH CO LTD

A processing method for endogenous security dynamic protection function of routing and switching equipment

ActiveCN112202814BGuaranteed reliabilityMeet the needs of high-performance security protectionSecuring communicationMultiplexingManycore processor
The invention discloses a processing method for endogenous safety and dynamic protection functions of routing switching equipment, relying on switching chips and multi-core processors inside the routing switching equipment to achieve security protection, including: detecting and identifying the content of the 2-7 layer of the message, Implement refined security control strategies based on classification results; the switch chip completes message filtering and attack defense functions for the 2-4 layer of the message; the multi-core processor detects the content of the 3-7 layer of the message, completes the deep security defense detection, and sends The switch chip actively issues security control policies, which are finally executed by the switch chip. The switch chip cooperates with the multi-core processor to realize the in-depth detection of the message content, and can actively implement the security control strategy in a targeted manner, which greatly improves the active protection capability of the routing and switching equipment. The method of one-time detection, matching, and multiple multiplexing greatly reduces the impact on system performance and avoids the risk of processing performance bottlenecks caused by the introduction of some safety protection equipment.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Electronic fence area generation system based on hazard monitoring and personnel positioning

The invention relates to the technical field of computer vision, in particular to an electronic fence area generation system based on hazard source monitoring and personnel positioning, comprising a visual perception module, a data analysis module, a hidden danger assessment module and a fence dynamic generation module, which solves the problem of existing fixed The electronic fence cannot adjust the fence range in real time and accurately according to the environmental conditions, the safety is poor, and the cost is high. The present invention comprehensively analyzes the state and trend of danger sources, can effectively monitor a variety of major danger sources, and reduces the occurrence rate of danger; the virtual electronic fence generated by the present invention is organically and dynamically combined with the positioning technology, and is realized according to each heat level. Automatic grading alarm, and no need to manually arrange virtual electronic fences, which is convenient and quick to set up, which greatly reduces the cost and workload of security personnel, and can adjust the effective area in real time according to the degree of danger, which significantly improves the safety protection efficiency of dangerous areas.
Owner:国能智慧科技发展(江苏)有限公司

A method, device and electronic equipment for processing thread registration

ActiveCN106169049BImprove security protection efficiencySolve the problem of low security protection efficiencyPlatform integrity maintainanceOperational systemApplication software
The embodiment of the invention discloses a processing thread register method and device and an electronic device and relates to the technology of information safety. Safety protection efficiency can be improved. The method includes the steps that when a pre-injected hook function monitors that a kernel drive-stage user callback double-parameter function is called, the function is hooked; current operation system version information is obtained, and function index number information transmitted by the function is called; if the current operation system version information and the transmitted function index number information are matched with an operation system version information / function index number information set mapped by a preset system thread, process information for calling the kernel drive-stage user callback double-parameter function is obtained; if an obtained application mapped by the process information is the same with any to-be-intercepted application in a preset to-be-intercepted application feature library, calling of the kernel drive-stage user callback double-parameter function is refused. The processing thread register method is suitable for processing thread register.
Owner:ZHUHAI BAOQU TECH CO LTD

Method, device and electronic equipment for processing process registration

ActiveCN106228062BImprove security protection efficiencySolve the problem of low security protection efficiencyPlatform integrity maintainanceOperational systemApplication software
The embodiment of the invention discloses a course register processing method and device and electronic equipment and relates to information security technology. By the adoption of the course register processing method and device and the electronic equipment, safety protection efficiency can be improved. The method comprises the steps of hooking a kernel driver stage user callback two-parameter function when the calling of the function is monitored by a hook function which is injected in advance, obtaining the version information of a current operation system and function index number information introduced by calling of the function, obtaining the course information of calling the kernel driver stage user callback two-parameter function if the version information of the current operation system and the introduced function index number information are matched with an operation system version information / function index number information set mapped by a preset login course, and refusing the calling of the kernel driver stage user callback two-parameter function if an application mapped by the acquired course information is identical with any one application needing to be intercepted in a preset intercept-required application feature library. The method and device are suitable for course register processing.
Owner:ZHUHAI BAOQU TECH CO LTD

Course register processing method and device and electronic equipment

ActiveCN106228062AImprove security protection efficiencySolve the problem of low security protection efficiencyPlatform integrity maintainanceOperational systemApplication software
The embodiment of the invention discloses a course register processing method and device and electronic equipment and relates to information security technology. By the adoption of the course register processing method and device and the electronic equipment, safety protection efficiency can be improved. The method comprises the steps of hooking a kernel driver stage user callback two-parameter function when the calling of the function is monitored by a hook function which is injected in advance, obtaining the version information of a current operation system and function index number information introduced by calling of the function, obtaining the course information of calling the kernel driver stage user callback two-parameter function if the version information of the current operation system and the introduced function index number information are matched with an operation system version information/function index number information set mapped by a preset login course, and refusing the calling of the kernel driver stage user callback two-parameter function if an application mapped by the acquired course information is identical with any one application needing to be intercepted in a preset intercept-required application feature library. The method and device are suitable for course register processing.
Owner:ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products