Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

64results about How to "Prevent cyber attacks" patented technology

Internet of things security access gateway

InactiveCN103139058ARealize security border controlMeeting Multi-Protocol Complexity RequirementsNetwork connectionsGate arrayThe Internet
The invention discloses an internet of things security access gateway. A three component framework of 2+1 is adopted in a hardware layer of the gateway. The three component framework comprises an outer host machine, an isolation exchange component and an inner host machine. A filed programmable gate array (FPGA) card based on hardware serves as the isolation exchange component so that isolation of a network and safe and rapid exchange of data are achieved. Device certification, access control, protocol analysis, data security check, data ferry service and audit service are achieved through software layers on the inner host machine and the outer host machine and action of the services can be traced. The internet of things security access gateway has the advantages that relative requirements that data collected by an internet of things perception terminal is introduced to a core network safely are satisfied, network attack, Trojan horse virus transmission and denial of service attack are prevented from being launched through a sensing layer network with weak safety protection to the core network, safe exchange of data is achieved under the condition that the sensing network and the core network are in network isolation, and practical application of the internet of things is achieved under the condition that safety is guaranteed.
Owner:THE FIRST RES INST OF MIN OF PUBLIC SECURITY +1

Method for realizing encrypted authentication of distribution automation remote control command

The invention discloses a method for realizing encrypted authentication of a distribution automation remote control command. The method comprises the following steps of: (1) digitally signing a remote control message, and generating a key pair by a main station; (2) storing a private key by the main station and issuing a public key to a power distribution terminal; (3) storing the public key by the power distribution terminal; (4) signing by using the private key by the main station; (5) verifying the signature by using the public key by the power distribution terminal; and (6) sending out an actuating signal from the distribution terminal to a switch. The method comprises that: the main station generates the key pair periodically or randomly through manual triggering by using an asymmetric cryptographic algorithm, stores the private key locally, and sends the public key to the power distribution terminal through a public network; the power distribution terminal stores the received public key locally; the main station when sending the remote control command to the power distribution terminal firstly generates a signature for the remote control message by using the private key, and then attaches the signature at the tail end of the remote control message; and the terminal when receiving the remote control command verifies the signature on the remote control message by using the public key, then carries out the switching action after the successful signature verification, and refuses the action if the signature verification is failed. The method for realizing encrypted authentication of the distribution automation remote control command has strong practicability, and enhances reliability and safety of the remote control.
Owner:CEEC HUNAN ELECTRIC POWER DESIGN INST

Communication protocol security defending system for electric power serial server

ActiveCN105245555AAdd security detection functionEnsure safetyTransmissionService modelNetwork Communication Protocols
The invention discloses a communication protocol security defending system for an electric power serial server. A protocol data security defending system is provided in an internet access protocol to serial port protocol and a serial port protocol to internet access protocol, and any protocol data and access requests sent to an internet access and a serial port will pass security certification and detection of the security defending system. The communication protocol security defending system is characterized by being composed of a communication protocol data analytical reduction and formatting processing module, a protocol data analysis detection system and a communication protocol data service model security policy definition system. The problems that an existing electric power serial server does not have the security protection function on a communication protocol layer for various kinds of connected electric power industrial control equipment, an electric power telecommunication service protocol protection layer is provided on a protocol conversion layer (the internet access protocol to serial port protocol and the serial port protocol to internet access protocol) in a serial server software control system and used of preventing attackers from illegally operating and attacking various kinds of electric power control equipment connected in the electric power serial server.
Owner:HUAIAN OF JIANGSU ELECTRIC POWER COMPANY POWER SUPPLY +2

Biological characteristic-based security verification method, client and server

The invention discloses a biological characteristic-based security verification method, a client and a server. The method includes the following steps that: a client sends an authentication request to a server; after receiving the authentication request, the server returns an authentication request reply message; the client receives a fingerprint image for verification inputted by a user, obtains a corresponding biometric characteristic template ID, compares the biometric characteristic template ID with a locally-stored biometric characteristic template ID in an enabling record, generates an authentication response message containing the acquired biometric characteristic template ID, and sends the authentication response message to the server; the server receives the authentication response message and compares the biometric characteristic template ID in the authentication response message with a locally-stored biometric characteristic template ID in a corresponding user record; if the biometric characteristic template ID in the authentication response message is matched with the locally-stored biometric characteristic template ID in the corresponding user record, verification is successful, otherwise, an error is reported. The present invention also provides a client and a server corresponding to the above method. With the biological characteristic-based security verification method, the client and the serve of the invention adopted, the risk of personal biological characteristic leakage when personal biological characteristics are uploaded to a network can be avoided, and the network traffic of network transmission can be decreased, and therefore, higher security can be achieved.
Owner:ADVANCED NEW TECH CO LTD

Soft isolation assembly for network access debugging and using method thereof

The invention provides a soft isolation assembly for network access debugging and a using method thereof. A network monitoring module, an isolation control module and a link establishment and data forwarding module are included; the network monitoring module is responsible for monitoring a debugging port information network to access debugging port information and submitting client link establishment information and transmitted data to the isolation control module; the isolation control module analyzes the link information and the transmitted data and compares the information with a pre-configured authorized access condition, the network data belonging to an allowable access range are submitted to the link establishment and data forwarding module, and the network data not belonging to theallowable access range are blocked. In a condition of not changing a network structure and debugging object parameters, isolation, monitoring and control on a maintenance computer and a device are carried out when an operation and maintenance person accesses and debugs the device, device access by the operation and maintenance person in excess of authority and network attacks on the device by themaintenance computer can be avoided, and the safety operation of a substation network and the device is ensured.
Owner:南京捷安信息科技有限公司

Transaction information exchange method and system between internal and external networks in financial industry

The invention discloses a transaction information exchange method between the internal and external networks in the financial industry. The method comprises steps that the quota information of each transaction opponent or a transaction kind is acquired from an internal network server, the test key information is further added, and a corresponding quota information two-dimensional code is generated; the corresponding quota information two-dimensional code is scanned and analyzed through an external network server, the corresponding quota information of files is updated; the transaction essential factor information is generated in the external network server, the test key information is further added, a corresponding transaction essential factor two-dimensional code is generated, the transaction essential factor two-dimensional code is scanned and analyzed through the internal network server, and the corresponding transaction information of the files is updated. The invention further discloses a transaction information exchange system between the internal and external networks in the financial industry. The method is advantaged in that information interaction between the mutually-separated internal and external networks is carried out through the two-dimensional code, hidden safety trouble caused by network attack and virus infection during communication of the internal and external networks can be avoided, and transaction compliance management and safe transaction are realized.
Owner:苏州凯联信息科技有限公司

Portable operation and maintenance bastion host system

The invention relates to a portable operation and maintenance bastion host system comprising a soft isolation module, a process management module, a message communication module and a human-computer interface module, wherein the soft isolation module, the human-computer interface module and the process management module are separately connected with the message communication module. The portable operation and maintenance bastion host system is relatively concise in framework, and relatively simple for user; the monitoring and guard on each process can be achieved, the communication interactionof each process in the operation and maintenance bastion host can be achieved, and a dedicated human-computer interface can be provided for electric power maintenance; the access behavior of accessing and debugging transformer substation running equipment via a network is monitored and controlled, when the operation and maintenance personnel accesses the other network equipment in an unauthorizedmanner, the operation and maintenance personnel can be blocked and warning can be provided; an unauthorized network link initiated by a computer can be blocked and maintained, and the maintenance computer can be prevented from initiating a network attack to the operation and maintenance equipment.
Owner:南京捷安信息科技有限公司

Automatic metering system of roller scale based on weighing controller and method thereof

The invention relates to an automatic metering system of a roller scale based on a weighing controller and a method thereof. The automatic metering system comprises a steel billet transportation roller table, a roller scale, a programmable logic controller, a weighing controller, a position switch, a production computer system and a metering computer system. The metering method comprises the following steps: transporting a steel billet to a weighing position, i.e., the transportation roller table above the roller scale; judging information indicating that the steel billet is put in place; starting to weighing by the weighing controller after reception of a weighing request and a steel billet number; judging whether the weighing condition is satisfied or not; and after the metering computersystem receives the steel billet number and weight, carrying out a saving action. Through adoption of the automatic metering system, steel billet metering and complete steel billet information transmission functions can be finished automatically without manual participation; information transmission errors in steel billet metering caused by manual operation errors or untimeliness are avoided, andphysical isolation is realized between a production automation network and a metering network, thereby completely avoiding virus transmission and network attacks between the production network and metering network.
Owner:SD STEEL RIZHAO CO LTD

Clock calibration method and network security protection method and device based on clock synchronization

The invention relates to the technical field of security monitoring, and provides a clock calibration method and a network security protection method and device based on clock synchronization. The clock calibration method comprises the following steps: sending a heartbeat request to a server, recording request sending time of the heartbeat request, receiving a heartbeat request response message which is fed back by the server and carries request receiving server time for receiving the heartbeat request, and recording message receiving time; and if time deviation between the request sending time and the message receiving time is less than or equal to preset time deviation, determining a clock error relative to the server, and calibrating a local clock according to the clock error. By adopting the method, clock calibration efficiency can be improved. The network security protection method based on clock synchronization comprises the following steps: receiving a heartbeat request which is sent by a user terminal and carries request initiation time, recording request receiving time, and filtering the heartbeat request in which the time deviation between the request initiation time and the request receiving time exceeds the preset time deviation. The method can realize efficient network protection.
Owner:PING AN ASSET MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products