Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

154results about How to "Normal access" patented technology

Cloud network end cooperative defense method and system based on end-side edge computing

The invention discloses a cloud network end cooperative defense method and system based on end-side edge computing, and relates to information security of an electric power industrial control system. The method comprises the following steps: setting an edge computing center at a terminal side, collecting industrial control system terminal equipment information and communication flow information, defining and identifying attribute characteristics of an electric power industrial control terminal by utilizing equipment fingerprints, automatically collecting the fingerprints of the electric power industrial control terminal equipment by utilizing an Nmap scanning method, establishing a training model by a decision tree algorithm, and achieving the dynamic fingerprint authentication of the terminal equipment; through setting a switch mirror image, intelligent monitoring host flow control and cloud computing center training flow baseline, industrial control terminal equipment flow anomaly detection is realized, and a cloud cooperative defense technology based on edge computing is realized. Through flow data acquisition, information entropy quantification flow characteristic attribute preprocessing and improved semi-supervised clustering K-means algorithm training, abnormal flow detection of the electric power industrial control intranet is realized, and cloud network real-time defense based on abnormal flow detection is realized.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING) +3

File encryption method based on two-dimension code scanning

The invention discloses a file encryption method based on two-dimension code scanning. The file encryption method comprises the steps that a safe file box storing a plurality of files is installed on a PC, a two-dimension code for encryption of the safe file box is generated based on a user name, current time, a random value and the overall unique identification GUID of the PC, the user name and a user password are used as a log-on message and are stored on an authentication server, when a user name and a user password for logging onto an APP of a mobile terminal are identical to the user name and the user password of the log-on message respectively, a user is authorized to successfully log onto the APP of the mobile terminal, the APP of the mobile terminal scans the two-dimension code and sends the scanned two-dimension code to the authentication server, the authentication server analyzes the scanned two-dimension code to obtain the user name, and when the user name obtained through analysis is identical to the user name of the log-on message, the user is authorized to access the files stored in the safe file box. According to the file encryption method, the PC and the mobile terminal are coordinated, the user is authorized to access the files stored in the safe file box of the PC based on two-dimension code scanning, and therefore the password for file encryption is prevented from being forgotten or stolen.
Owner:SHANGHAI PEOPLENET SECURITY TECH

Online recovery method for PPPoE (Point-to-Point Protocol over Ethernet), BRAS (Broadband Remote Access Server) equipment and AAA (Authentication, Authorization and Accounting) server

The invention provides an online recovery method for a PPPoE (Point-to-Point Protocol over Ethernet), BRAS (Broadband Remote Access Server) equipment and an AAA (Authentication, Authorization and Accounting) server. The online recovery method for the PPPoE comprises the following steps: receiving the data message of a PPPoE client side; if the data message does not name a user table item, searching a first abnormal offline table item corresponding to the PPPoE client side in a preset first abnormal offline user table; if the first abnormal offline table item is searched and the first abnormaloffline table item is permitted to recover, according to the first abnormal offline table item, generating a first temporary user table item, and sending a request to the AAA server to authenticate the authentication request of the identity of the PPPoE client side; if the AAA server returns an authentication success response, recovering the first temporary user table item as the user table item.According to the online recovery method for the PPPoE, the technical effects that an access side link is immediately recovered after being cut off, the client side does not sense a broken line and cannormally access the network, and the user can conveniently use the online recovery method can be achieved.
Owner:XINHUASAN INFORMATION TECH CO LTD

Method for updating network security table and network device and dynamic host configuration protocol (DHCP) server

The invention discloses a method for updating network security table, a network device and a dynamic host configuration protocol (DHCP) server. When a virtual machine moves in a management domain of a network device, the network device analyses a first received request message from the virtual machine, an internet protocol (IP) address and a medium access control (MAC) address of the virtual machine are obtained, when a security table item including the IP address and the MAC address doesn't exist in a network security table of the network device, the network device sends a second request message generated according to the IP address and the MAC address to the DHCP server, so that the DHCP server is enabled to launch mandatory communication between the DHCP server and the virtual machine, the network device monitors an interactive message between the DHCP server and the virtual machine to obtain the security table item of the virtual machine, the network security table is updated according to the security table item. Through the above mode, the method for updating network security table, the network device and the DHCP server ensure that the virtual machine can access the network normally when the virtual machine moves in the management domain of the network device, reliability of the network security table is also ensured, and therefore network security is ensured.
Owner:HUAWEI TECH CO LTD

Method and device for realizing global system for mobile communications (GSM) terminal to access 3G universal subscriber identity module (USIM) card

The invention provides a method and device for realizing a global system for mobile communications (GSM) terminal to access a 3G universal subscriber identity module (USIM) card. The method comprises the following steps: after a starting terminal activates a card, judging the type of a smart card which is inserted into a terminal in accordance with instruction conditions supported by the card; and if the smart card is the 3G USIM card, realizing information interaction between a GSM protocol stack and the card by conversion operations, wherein the conversion operations comprise the conversion of operating command heads which are sent to a USIM from the GSM terminal, the conversion of status words returned by the USIM into GSM status words, the conversion of file control parameters returned by the USIM into GSM file attributes, and the mutual conversion of 3G formatted file contents and GSM formatted file contents when the GSM terminal modifies or acquires USIM file contents. According to the invention, the protocol stack of the GSM terminal can access the 3G USIM card normally and acquire corresponding information from the 3G USIM card; and the 3G USIM card can realize fundamental service functions.
Owner:芯鑫融资租赁(天津)有限责任公司

Method, gateway and network access system for controlling data acquired by mobile terminal

The invention relates to the field of communication, and discloses a method, a gateway and a network access system for controlling data acquired by a mobile terminal. The technical problem that network access in the prior art needs to consume a large amount of data flow of a mobile terminal is solved. The method comprises the following steps of receiving a data access request transmitted by the mobile terminal by using the gateway; judging whether the data access request contains a first preset label or not; transmitting the data access request to a distribution server providing flow-free authority if the data access request contains the first preset label so that the distribution server is an agency server which is used for the mobile terminal to visit a network in a flow-free mode; and reckoning all or part of data flow which is consumed in a network access process of the mobile terminal through the agency server in an appointed service provider by a mobile network operator on the basis of a flow-free mark. The data access request contains address information of a resource server. The technical effect of reducing data flow consumed in the network access process of the mobile terminal is achieved.
Owner:北京鸿享技术服务有限公司

Video monitoring system based on cloud platform

The invention relates to the network monitoring technology field, especially relates to a video monitoring system based on a cloud platform. The video monitoring system comprises a service bus, a user management module, a cloud server proxy module, a network management module, distributed type storage service, and an application program. The service bus is used to provide a connection pivot for message interaction among the various modules. The user management module is used to create a cloud server automatically for a newly registered or added user, and a camera is bond with the cloud server. The distributed type storage service is used to provide block storage service. The cloud service proxy module is used to download latest video files, and store the downloaded video files in a clouddisk based on an internal network or a special network. The network management module is used to provide the service port mapping of the video files, and the ports are limited to be only open to the access of the IP address of the application program, and the access of other IP addresses is forbidden, and in addition a virtual firewall is provided. The application program is used for the query ofthe videos. The problems of the network video monitoring such as easy illegal attacks on the address, low safety performance, difficulty in expanding storage space are solved, and the video monitoringsystem can be used for the network video monitoring technology field.
Owner:G CLOUD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products