Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

504results about How to "Meet security needs" patented technology

Intelligent terminal isolation system and intelligent terminal isolation method both based on processor safety extension

Disclosed are an intelligent terminal isolation system and an intelligent terminal isolation method both based on processor safety extension. The intelligent terminal isolation system comprises a safety starting module, a transaction commission module, a communication agent module, a safety extension abstraction layer, a safety operating system, safety middleware, credible application modules and a common application module. The safety starting module simply initializes hardware environment of an intelligent terminal, and authenticates and guides the safety operating system. The communication agent module is responsible for encapsulation and communication of bottom layer data of the credible application modules and the common application module. The safety extension abstraction layer provides a uniform calling interface to the safety operating system. The safety operating system provides mutually independent operation space for the credible application modules in a whole safety domain and manages all software and hardware resources in the safety domain. The safety middleware is a core library related to implementation of safety functions and transaction commissions and provides related functional interfaces to credible applications. The intelligent terminal isolation system and the intelligent terminal isolation method aim to provide a complete safety isolation mechanism to the intelligent terminal and improve safety of software operation environment.
Owner:INST OF INFORMATION ENG CHINESE ACAD OF SCI

Matrix fully homomorphic encryption method

InactiveCN103259643AInput protectionSatisfy the requirement of full homomorphismSecuring communicationComputer hardwareCiphertext
The invention discloses a matrix fully homomorphic encryption method. The matrix fully homomorphic encryption method comprises an initialization module, an encryption module, a decryption module and a matrix fully homomorphic module. The initialization module is used for generating secret keys needed by encryption and decryption according to dimensions of matrices to be encrypted, encryption types and ranges of matrix element values. The encryption module is used for utilizing encryption algorithms and the secret keys to conduct encryption on plaintext matrices and outputting ciphertext matrices according to the given plaintext matrices. The decryption module is used for utilizing the secret keys and decryption algorithms to conduct decryption on ciphertext matrices and outputting the plaintext matrices according to the given ciphertext matrices. According to the matrix fully homomorphic module, additive operation and multiplying operation of the matrices meet homomorphic properties of the matrices, output generated by the additive operation and the multiplying operation of the matrices still meets the homomorphic properties, namely, fully homomorphic properties of the matrices are met. The matrix fully homomorphic encryption method has the advantages of meeting safety requirements, meeting fully homomorphic requirements of the matrices and remarkably increasing the operating rate of the ciphertext matrices.
Owner:SUZHOU UNIV

Forced access control method and apparatus in virtual environment

The invention relates to a forced access control method and a device applied to a virtual environment in the technical field of computer application. The method comprises: designating a virtual machine in a virtual environment as a credible virtual machine with security management authority, in which, the credible virtual machine uses security classification and security category as a sensitive label to identify the security level of a single virtual machine; establishing an access matrix and setting the access type set of each virtual machine to other virtual machines; and when a certain virtual machine main body gets access to a certain virtual machine object in a certain access type, judging whether the access is permitted according to the sensitive label of both the main body and the object and the access type set of the main body to the object in the access matrix. The device comprises an access control initializing module, a virtual machine state monitoring module, an access judgment module, a security management assisting module and a virtual machine security information management module in the credible virtual machine. The forced access control method and the device can effectively control communication and resource sharing between virtual machines in a virtual environment of multilevel security.
Owner:SHANGHAI JIAO TONG UNIV

Smart home security system

The invention discloses a smart home security system. The smart home security system comprises a vibration sensor, a door and window magnetic sensor, an infrared sensor, a smoke sensor, a temperature sensor and a gas sensor, wherein the vibration sensor, the door and window magnetic sensor and the infrared sensor are connected with a signal processing circuit A respectively; the smoke sensor and the temperature sensor are connected with a signal processing circuit B respectively; the gas sensor is connected with a signal processing circuit C; the signal processing circuit A, the signal processing circuit B and the signal processing circuit C are connected with a power line carrier communication circuit respectively; the power line carrier communication circuit is connected with a microprocessor; the microprocessor is connected with a keyboard, a camera, a driving circuit, a display, a communication device, a voice alarm circuit and an Ethernet respectively; the driving circuit is connected with a relay; the relay is connected with an electric bell; the communication device is connected with a remote controller. The smart home security system can meet needs of people on theft prevention, fire prevention and gas poisoning prevention, is free of mistaken alarm and has an on-spot snapshot function.
Owner:CHENGDU XINXIN INFORMATION TECH

Dynamic generation and maintenance method of heterogeneous cloud host

The invention relates to the technical field of network security, and especially relates to a dynamic generation and maintenance method of a heterogeneous cloud host. The method comprises the following steps: 1) a heterogeneous cloud host node whose isomerism is embodied by the diversified physical facilities, virtual machines and software; 2) a mirror image library management system comprising creating diversified virtual machines and software mirror images; 3) dynamic deployment of a heterogeneous virtual machines and software: when the virtual machine or the software is instantiated, generating virtual machines or software of different versions according to physical nodes and application attributes, and deploying the virtual machines or software on the physical nodes; 4) dynamic virtual machine migration mechanism: a development operation and maintenance unit performs security posture estimation on the current virtual machine and its operation environment, and performs initiative migration on the virtual machine according to a strategy; and 5) a dynamic virtual machine and software cleaning mechanism: cleaning the online virtual machines according to the security posture or periodically. By adoption of the method, the anti-attack ability of a cloud data center is improved, and higher security requirements of users and providers for cloud services and infrastructure are satisfied.
Owner:THE PLA INFORMATION ENG UNIV

Rule and learning model-based highway leaving method for driverless cars

The invention relates to a rule and learning model-based highway leaving method for driverless cars. The method comprises the steps of: in a process that a driverless car runs on a highway, generatingan off-ramp motivation at a distance before a ramp according to a navigation system, trying to get off the ramp by utilizing a rule model, judging whether off-ramp decided by a rule-based decision making model reduces the success rate or not, if the judging result is negative, adopting an action decided by the rule model, and otherwise, entering the next step; and establishing a rule and reinforcement learning mixed hybrid decision making model and a training method thereof on the basis of a framework of reinforcement learning, wherein the hybrid decision model is capable of adopting a rule model for running when being far away from the ramp, and utilizing the reinforcement learning decision making model to adjust the vehicle action according to off-ramp urgency in the process of drivingto the ramp. The method is capable of enhancing the running efficiency and stability of driverless cars in the off-ramp process, and realizing efficient and high-stability off-ramp decision making ofdriverless cars under the condition that the perception range is limited and the environment vehicles are difficult to predict.
Owner:北京超星未来科技有限公司

Online monitoring method and device for identities of personnel in vehicle, and storage medium

The invention discloses an online monitoring method and an online monitoring device for identities of personnel in a vehicle, and a storage medium. The online monitoring method comprises the steps of:acquiring face image information of the personnel in the vehicle in real time by means of a face acquisition device, wherein the personnel in the vehicle at least comprises a driver; and performingface recognition on the driver according to the acquired face image information of the personnel in the vehicle, transmitting a recognition result and an acquired face picture to a management cloud platform in real time through wireless communication, querying personnel identity in a database and performing personnel identity online monitoring by means of the management cloud platform, and transmitting a monitoring result to a preset management terminal of the management cloud platform in real time. The online monitoring method, the online monitoring device and the storage medium realize the flexible and convenient real-time online monitoring of the identities of the driver and passengers in the vehicle, improve the intelligence and efficiency of personnel detection, satisfy the security requirements in special occasions, can completely eradicate the substitution of the driver in the midway, can analyze the driving time of a certain driver by using online data, and performs fatigue driving early warning.
Owner:XIAN IRAIN IOT TECH SERVICES CO LTD

Economical high-plasticity 360MPa grade structural steel plate and manufacturing method thereof

The invention discloses an economical high-plasticity 360MPa grade structural steel plate and a manufacturing method thereof, wherein the economical high-plasticity 360MPa grade structural steel platecomprises the following components in percentage by weight: 0.13-0.18% of C, 1.0-1.6% of Mn, 0.20-0.50% of Si, less than or equal to 0.025% of P, less than or equal to 0.010% of S, 0.020-0.050% of Ti, greater than or equal to 0.015% of Als, less than or equal to 0.005% of N and balance Fe and unavoidable impurity elements. The yield strength of the steel plate provided by the invention at a normal temperature is greater than or equal to 360MPa; the tensile strength is greater than or equal to 500MPa; the ductility is greater than or equal to 30%; the yield ratio is less than or equal to 0.80;the ballistic work at minus 20 DEG C is greater than or equal to 180J; with high strength, high plasticity, low yield ratio and excellent welding performance, the economical high-plasticity 360MPa grade structural steel plate can meet the safety demands of bridge steel well; and with low alloy content, short process flow, high production efficiency and low manufacturing cost, the economical high-plasticity 360MPa grade structural steel plate conforms to the development demands of green and economical steel ball.
Owner:WUHAN IRON & STEEL GRP ECHENG IRON & STEEL CO LTD

Mimetic mail server information processing device and mail service processing method, device and mail system

ActiveCN108833417AMeet security needsSolve the problem of building homogeneityData switching networksResource poolInformation processing
The invention relates to a mimetic mail server information processing device and a mail service processing method, device and a mail system. The information processing device comprises a resource poolcomposed of a user transfer proxy component and a server mailbox component, multiple parallel heterogeneous mail service chains composed of various components randomly selected from the resource pool, and a dynamic feedback control module, wherein the user transfer proxy component includes a number of heterogeneous user transfer proxy executors, and the server mailbox component includes a numberof server mailbox executors; and the dynamic feedback control module is used to monitor the operation of each executor and perform dynamic scheduling on various components. According to the scheme ofthe invention, the diversified executors are created, multiple processing results are subjected to mimetic decision output, the security performance of the mail system services can be improved, the initiative, variability and randomness of the mail system defense capability can be improved, the problem of privacy protection can be effectively solved, a more secure mail server solution can be provided, and the important guiding significance can be provided for the mail system security technologies.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Automatic teller machine-based safe monitoring device and method and automatic teller machine

InactiveCN102004904ASolve the problem of not being able to effectively stop illegal transactionsMake up for the shortcomings of not having the ability to prevent crimes in advanceCharacter and pattern recognitionClosed circuit television systemsFace detectionNetwork packet
The invention discloses an automatic teller machine-based safe monitoring device, an automatic teller machine-based safe monitoring method and an automatic teller machine. The monitoring device is used for monitoring the automatic teller machine, is arranged between a card reader and the automatic teller machine and comprises a card control unit and a human face detecting unit, wherein the card control unit is used for informing the human face detecting unit to start to detect when acquiring a data packet sent by the card reader and resolving the acquired card insertion information, and receiving the detection result from the human face detecting unit, if the detection result is that human face information is undetected, stopping the transaction at the time, and if the detection result isthat human face information is not detected, permitting the transaction at the time and forwarding the data packet sent by the card reader to a host of the automatic teller machine; and the human face detecting unit is used for performing human face detection on an image from an image taking device according to a received detection start notification and informing the card control unit of the detection result. The device, the method and the automatic teller machine of the invention can prevent a masked criminal suspect from drawing money of a loser from the automatic teller machine (ATM).
Owner:NEUSOFT CORP

Method and system for controlling depositing and withdrawing safety based on safety core

The invention discloses a method and a system for controlling depositing and withdrawing security based on a security core. A security chip is arranged in a depositing and withdrawing core and put in the safe case of an automatic teller machine. The core safety chip is called the security core for short; the security core communicates with an automatic teller machine pre-system (ATMP); the safe communication of the security core with the ATMP is realized by virtue of certificate issuing and key exchange; the ATMP authorizes the core to dispense cashes, and meanwhile, checks the amount deposited. According to the method and the system for controlling the depositing and withdrawing security based on the security core, due to the safe communication of the security core and the ATMP, the identity is authenticated, an instruction sent out is verified legally and a message sent out is encrypted, and then the ATMP authorizes the core to dispense cashes and checks the amount deposited; the method and the system have the advantages that authentication and encryption/decryption can be effectively authenticated to achieve integrity protection, prevent tampering and prevent replay attack protection, and therefore, the security of the ATM is improved.
Owner:HUNAN GREATWALL INFORMATION FINANCIAL EQUIP

Realization method and device of attachment procedure

The invention discloses a realization method and device of attachment procedure. The method comprises the following steps: receiving an attachment request message sent by UE through a first network element, computing a DH public key of the first network element, and sending a signature request message to the second network element, wherein the signature request message comprises the DH public keyof the first network element; receiving a signature response message sent by the second network element, wherein the signature response message comprises the DH public key of the first network elementsigned by a private key of the second network element; sending an identity request message to the UE, wherein the identity request message comprises the DH public key of the first network element signed by the private key of the second network element; if the UE successfully verifies the signature by using the public key of the second network element, receiving the identity response message sentby the UE, wherein the identity response message comprises the identity information, encrypted by the encrypted key, of the UE; and computing the encrypted key based on the own DH public key, and acquiring the identity information of the UE from the identity response message based on the encrypted key.
Owner:CHINA MOBILE COMM LTD RES INST +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products