Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

323results about How to "Prevent malicious attacks" patented technology

Routing position data secrecy storing and sharing method based on block chain

Provided is a routing position data secrecy storing and sharing method based on block chains. The routing position data secrecy storing and sharing method includes a data storing method and a data sharing method. The data storing method includes the steps of node configuration, data encryption sending, storage subnetwork verification storing, etc. The data sharing method includes the steps of demand generation, demand response, sharing achievement and the like. The effects of the invention are as follows: through a block chain technology, data sharing is realized through data encryption storage and a decentralized network to solve the problems that data storage parties have no right to use data and users do not have channels to selectively enable personal data to be accessed; local encryption sending is adopted during data storage, service parties store encrypted data, the users themselves save decryption secret keys, and the service parties have no access to original data, so a better data protection effect is achieved; and the block chain technology is adopted during storage, commonly recognized storage is realized through a practical Byzantine fault-tolerant algorithm, workload bottleneck problems of centralized storage are solved, and data is prevented from being tampered.
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Chip, data communication method for chip, consumable container and imaging equipment

The invention provides a chip of a consumable container, which comprises a storage module, a control module, an interface module and a data safety module. The storage module is used for storing initial data, printing data, control data and key data; the interface module is used for realizing data communication between the storage module and the control module; the data safety module is respectively connected with the interface module and the control module, and is used for identifying a type and a content of data communicated between a printer and the chip, encrypting matched data in a selected safe mode and decrypting the data; the control module is connected with the storage module and is used for controlling data communication between the chip and the printer and the access operation of the data of the storage module and external data and sending a corresponding control command to the chip according to a safety module processing result so as to realize data communication; and the same keys are stored in the printer and the chip. The invention also provides a data communication method for the chip, the consumable container with the chip structure, and imaging equipment with the consumable container. The safety of the communication data of the chip can be protected.
Owner:ZHUHAI TIANWEI TECH DEV CO LTD

Method and device for implementation of picture verification code

The invention discloses a method for implementation of a picture verification code. The method includes: acquiring current verification code parameters including user setup parameters and random parameters; determining the length and content of a character string of the verification code according to the random parameters, and acquiring a corresponding shape numerical matrix of each character in the character string of the verification code from a designated font object library according to font object library route parameters in the user setup parameters; converting each shape numerical matrix into a character picture of a corresponding character shape, and subjecting all character pictures to character special effect processing according to part of the verification code parameters to generate an initial verification code picture; filling the background of the initial verification code picture with a randomly selected background color; and subjecting the initial verification code picture with the background filled to anti-decoding processing according to difficulty parameters in the user setup parameters and picture special effect processing parameters in the random parameters, and then performing color change processing to generate a final verification code picture. The invention further discloses a device for implementation of the picture verification code.
Owner:杭州网易智企科技有限公司

Radio frequency device, radio frequency card reader and related communication system and communication method

ActiveCN102096836AOvercoming the distance control problemAuthentication is reliableSensing record carriersTransmissionSecure communicationLow speed
The invention relates to the field of radio frequency secure communication and provides a radio frequency device, a radio frequency card reader corresponding to the radio frequency device, and a communication system and a radio frequency secure communication method which use the radio frequency device and the radio frequency card reader. The radio frequency device comprises a radio frequency receiving and transmitting module, a radio frequency antenna and a magnetic induction and receiving module; and the radio frequency card reader comprises a radio frequency receiving and transmitting module, a radio frequency antenna and a magnetic transmitting module. Two communication channels, namely a first low-speed unidirectional communication channel with a stable and controllable distance and asecond high-speed communication channel, with different characteristics are available between the radio frequency device and the radio frequency card reader, wherein the first communication channel is formed by communicating with a magnetic field and is used for transmitting a small data volume of information for identity authentication so as to prevent malicious interference and attack; the second communication channel is formed by using the radio frequency receiving and transmitting module and is used for finishing the identity authentication and a main transaction process; and through the system and the communication method, near field secure communication with a controllable distance can be realized better.
Owner:NATIONZ TECH INC

Service interaction platform system based on internal and external network isolation

The invention discloses a service interaction platform system based on internal and external network isolation. The system comprises an external network node and an internal network node, the externalnetwork node and the internal network node are connected with a database server, and the internal network node and the external network node operate a database in the database server for data interaction; the external network node in communication connection with a request client through an information external network, and the internal network node in communication connection with a website server through an information intranet; the request client accesses the website server through adoption of the isolated interaction method; and all the accesses of the request client employ the external network node to receive information, the external network node sends the access information to the internal network node which is used to replace the request client to access the website server and send the return information of the website server to the external network node, and finally, the external network node sends the return information to the terminal. The process can effectively isolate the terminal from the intranet website server for direct access and can perform filter for the access data so as to improve the information safety level.
Owner:DALIAN POWER SUPPLY COMPANY STATE GRID LIAONING ELECTRIC POWER +1

Security management method and system for application programming interface

The application provides a security management method and system for an application programming interface. On a gateway server side, the method includes the following steps that: service logical interface information submitted by a publisher is received; an interface external access address which is published to the outside is generated according to a preset format on the basis of the IP address of the gateway server and a port number allocated to the publisher, an association relationship between the interface external access address and the service logic interface information is established;an interface call request sent by a subscriber is received; and a request token center authenticates the identity of the subscriber that sends the interface call request, if the identity of the subscriber passes the authentication, the interface call request is forwarded to a corresponding service logical interface according to the association relationship between the interface external access address and the service logical interface information, and the execution result of the service logic interface is returned to the subscriber. With the above technical schemes of the invention adopted, the problem that illegal access to service data through an API cannot be blocked in the prior art can be solved.
Owner:亿阳安全技术有限公司

In-vehicle network invasion detection method and system

The invention discloses an in-vehicle network invasion detection method and system. The system comprises a timing module, a detection module, and a learning module; The timing module is used for transmitting the operation time of the system to the communication module, and the communication module records the timestamp of the receiving time of a received message and the identity label of a messagetransmitting node according to the operation time of the system. The communication module is used for transmitting the identity label and the timestamp of the receiving time to the learning module and the detection module. The learning module is used for determining a clock drift theoretical value of the transmitting node according to the timestamp of the receiving time when a network is normal,and carrying out the binding of the clock drift theoretical value with the identity label of the transmitting node. The detection module is used for determining the deviation of the clock drift of thetransmitting node relative to the clock drift theoretical value according to the timestamp of the receiving time during invasion detection. The system provided by the invention can be directly installed on a T-Box communication module, and the method and system are good in universality, and can guarantee the network safety of most vehicles.
Owner:BEIHANG UNIV

Virtualization technology based terminal trust enhancement method and system

The present invention provides a virtualization technology based terminal trust enhancement method and system. The method comprises: a trusted terminal, according to verification information stored in a Ukey, performing completeness verification on an operation system kernel file and a bare-type virtual machine related file, and starting an operation system after verification is passed; and the trusted terminal, according to a whitelist configuration file and a whitelist drive program, performing completeness verification on an application, a service and an external device drive that are loaded dynamically, so as to implement trust enhancement of the trusted terminal. According to the virtualization technology based terminal trust enhancement method and system provided by the present invention, the operation system is started according to verification information stored in the Ukey, a static trust chain is established, and operation system information is prevented from being leaked or tampered from internally; and completeness verification is performed on the loaded application according to the whitelist configuration file, a dynamic trust chain is established, and malicious attacks and unauthorized access are prevented from externally.
Owner:PLA PEOPLES LIBERATION ARMY OF CHINA STRATEGIC SUPPORT FORCE AEROSPACE ENG UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products