Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

48results about How to "Increase attack cost" patented technology

Android application program protection method based on dual ARM instruction virtualization

The invention discloses an Android application program protection method based on dual ARM instruction virtualization. The method comprises the steps that key code segments needing to be protected ina so file are searched for, wherein the key code segments include a key code segment needing VOP protection and a key code segment needing VMP protection; Hex extraction and mapping virtualization areperformed on the key code segment needing VOP protection, and a VOP virtual machine so file is formed; the key code segment needing VOP protection is encrypted, Hook replacement is performed on the encrypted VOP key code segment, and a virtual instruction code in the VOP virtual machine so file is made to replace an encrypted code, corresponding to the encrypted VOP key code segment, in the so file; instruction virtualization is performed on the key code segment needing VMP protection, and a protected VMP virtual machine so file with virtual sections is formed; and driving data in the VMP virtual machine so file is made to replace the code, corresponding to the key code segment, in the so file. Through the method, two different virtual machine protection thoughts are combined, attack costof a reverser is increased, and the complexity of a protected program is enhanced.
Owner:NORTHWEST UNIV(CN)

Php-based independent sql injection defense analysis alarm method and system thereof

The invention discloses a php-based independent sql injection defense analysis alarm method and a system thereof, and the method comprises the steps: checking whether a request IP is a forbidden IP blacklist, ending the request if the request IP is the forbidden IP blacklist, and entering the next step if the request IP is not the forbidden IP blacklist; judging whether parameters of sql injectioncontain blacklist symbols, and if yes, setting the sql injection as a note level; judging whether parameters of sql injection contain blacklist keywords, and if yes, setting the sql injection as a winning level; dividing the parameters of the sql injection by taking a space as a criterion, judging whether the parameters contain blacklist keywords, and if yes, setting the sql injection as an errorlevel; and performing sql injection on the error level, checking whether the request ip injected by the sql is subjected to injection attacks for a specified number of times, and if yes, forbidding the request ip and listing the request ip into a forbidden IP blacklist. According to the method, measures are taken for the sql injection problem in an omnibearing manner, corresponding measures are taken for prevention, response, monitoring and recording, and the data security is protected to a greater extent.
Owner:GUANGDONG EFLYCLOUD COMPUTING CO LTD

Big data network data protection method and system based on edge computing

ActiveCN111371813AAvoid computational processing overhead issuesAvoid excessive performance degradationUser identity/authority verificationApplication serverEdge computing
The invention discloses a big data network data protection method and system based on edge computing. The big data network data protection method comprises the steps of S1, determining a computing power level of a client; S2, determining the data encryption strength of this time; S3, judging whether the computing power level of the client can meet the encryption strength requirement or not, if yes, executing the step S4, and if not, executing the step S5; S4, slowly encrypting the plaintext password to obtain a first temporary password, and executing the step S8; S5, the application server selects a plurality of other connected clients, and sends the plaintext password, the salt and the encryption strength to the selected client; S6, slowly encrypting the plaintext password by the selectedclient to obtain a second temporary password; S7, the application server determines a first temporary password based on the plurality of received second temporary passwords; and S8, the server quickly encrypts the first temporary password to obtain an encrypted password, and stores the user name, the salt and the encrypted password. Effective balance between safety protection and calculation performance is achieved, and data safety is high.
Owner:杭州灿八科技有限公司

Method and device for optimizing embedding parameters of anti-copy two-dimensional code

The present disclosure describes an optimization method for embedding parameters of an anti-copy two-dimensional code, which is characterized in that it includes: obtaining an initial two-dimensional code; printing and scanning the initial two-dimensional code to obtain multiple target two-dimensional codes; A target two-dimensional code, according to the method of smoothing and averaging, synthesize multiple target two-dimensional codes with a preset number of target two-dimensional codes into a corresponding two-dimensional code composite graph; calculate the mean value, variance and shape factor of the two-dimensional code composite graph, and correct them The corrected mean, corrected variance and corrected shape factor are obtained by modifying the mean, variance and shape factor of the function; the theoretical corrected bit error rate is obtained through the generalized Gaussian function based on the corrected mean, corrected variance and corrected shape factor; and the theoretical corrected bit error rate is compared with the two-dimensional The error correction ability of the code, when the theoretical corrected bit error rate is less than or equal to the error correction ability of the two-dimensional code, the error correction ability of the two-dimensional code is reduced to increase the attack cost of the illegal copying party.
Owner:SHENZHEN UNIV

Financial transaction system authentication method based on OCR identification

The invention discloses a financial transaction system authentication method based on OCR identification, which comprises the following steps: acquiring picture information data of a user through an input interface and a calling recognition interface, and recognizing and reading the data by utilizing an OCR technology and combining a set algorithm; carrying out information identification, identifying the type of the user picture information data, carrying out authenticity check, and verifying whether the dynamic verification code is consistent with the displayed dynamic verification code or not; after the identification is successful, performing data check and field value integration, so that the data can be modified or filled by a user; after the field data is integrated, performing authority distribution and data processing of the user according to the output data, and triggering interaction of a transaction page. The user information identification login is performed by calling the OCR identification interface to perform image character identification of the user information and perform information verification and storage, so that the information input cost is reduced, the user authentication security mechanism is verified, the security risk is avoided, the input is accurate, the data correctness is ensured, and flexible configuration can be performed according to the system requirements.
Owner:中企云链(北京)金融信息服务有限公司

Verification method, device and storage medium

The embodiment of the invention discloses a verification method and device and a storage medium, and belongs to the field of information security. The method comprises the steps of obtaining a verification task, wherein the verification task comprises a preset algorithm and a preset condition; Determining at least one piece of verification data, and calculating the determined verification data according to a preset algorithm to obtain a calculation result corresponding to the determined verification data; And when a calculation result corresponding to the currently determined check data satisfies a preset condition, sending the currently determined check data to a server, calculating the currently determined check data by the server according to a preset algorithm; and when the calculationresult obtained by calculation satisfies the preset condition, determining that the verification is passed. According to the embodiment of the invention, under the condition that the security is ensured, the server only needs to calculate the verification data which are sent by the terminal and meet the verification task, and the verification data which do not meet the verification task do not need to be calculated, so that the workload of the server is reduced, and the working pressure of the server is reduced.
Owner:TENCENT TECH (SHENZHEN) CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products