Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

56results about How to "Realize active defense" patented technology

Trusted computing cryptogram platform suitable for general computation platform of electric system

The invention provides a trusted computing cryptogram platform suitable for a general computation platform of an electric system. The cryptogram platform comprises a trusted computing cryptogram module and a trusted software system, wherein the trusted computing cryptogram module comprises a trusted measurement root, a trusted storage root and a trusted report root and is a transferring starting point of a platform trust chain; and the trusted software system comprises a trusted computing cryptogram driving module, a measurement module and an auditing module and provides an interface which uses the trusted computing cryptogram platform for an operating system and application software. The trusted computing cryptogram module is the trusted root which provides trusted environment for the operation of the trusted computing cryptogram platform, and the trusted software system is a core for realizing the functions and the service of the trusted computing cryptogram platform and provides guarantee for the management of the trusted computing cryptogram platform. The trusted computing cryptogram platform can provide functions including static measurement, dynamic measurement, white lists, access control and the like for a business system, and manages the sources and the operation of the system software to guarantee that the software is trusted, recognizable and controllable.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +5

Trusted computing platform of a computing and protection parallel double-system structure

ActiveCN109871695AComputable, measurable and controllableRealize active security protectionPlatform integrity maintainanceActive safetyTrusted Computing
The invention discloses a trusted computing platform of a computing and protection parallel double-system structure. wherein the trusted computing platform comprises a computing subsystem and a protection subsystem which are parallel, the computing subsystem is used for completing a computing task, and the protection subsystem is used for carrying out active measurement and active control on the computing subsystem according to a trusted strategy through a trusted platform control module; And the protection subsystem is specifically used for respectively carrying out static measurement and dynamic measurement on the computing subsystem through the trusted software base. According to the trusted computing platform provided by the invention, active safety protection is realized while computing is realized through the computing subsystem and the protection subsystem which are parallel to each other. In addition to establishing a static trust chain which takes a trusted platform control module as a trust root for step-by-step measurement, a dynamic measurement mechanism based on a security trusted strategy is also designed, and active defense on the whole computer system in the starting and operating processes of the computer is realized.
Owner:北京自主可信科技有限公司

Network security monitoring method for industrial control system

The invention discloses a network security monitoring method for an industrial control system. The method comprises the following steps: collecting relevant information of an internal monitoring object of the industrial control system; performing security analysis on the collected relevant information; and when potential abnormal behavior is found through analysis, generating a relevant safety control order, and issuing the order to the relevant monitoring object for execution so as to block the abnormal behavior. According to the invention, real-time monitoring on major hidden security dangers of the industrial control system such as peripheral access, personnel operation, network external connection and the like is realized through abundant data acquisition of core networking equipment of the industrial control system. At the same time, through analysis processing on various behavior, the abnormal behavior is found and blocked timely, and thus real active defense of the industrial system is realized. For the current difficulty of effectively applying traditional security protection measures to the industrial control system, the major security threats to the industrial control system at present are well solved from the perspective of monitoring early warning.
Owner:NANJING NARI GROUP CORP +2

Network attack data analysis and intelligent processing method

The invention relates to a network attack data analysis and intelligent processing method which comprises the steps that: S1, various network safety devices are connected to one or more SDN switches to form a safety resource pool; S2, a safety controller sends out a safety control instruction to operate the SDN switches, and according to different user safety demands, pulling network traffic to designated network safety devices to carry out processing; and S3, the safety controller carries out strategy centralized management and state real-time monitoring on the network safety devices, and when the network safety devices are abnormal, the safety controller sends out a safety strategy instruction to carry out balanced load or traffic migration so as to ensure no influence on normal network communication. The network attack data analysis and intelligent processing method is characterized by further comprising the steps of: by a Telent protocol, actively collecting real-time state information, local flash memory information and collection log center information of a network device, a safety device and a server; carrying out big data real-time comprehensive analysis; updating and synchronizing a third-party IDS feature library; carrying out whole network attack modeling; generating a defense instruction; and carrying out combination defense.
Owner:INST OF APPLIED MATHEMATICS HEBEI ACADEMY OF SCI

Active defense system for security threats to key information infrastructure based on artificial intelligence

InactiveCN108494802ARealize monitoringImprove securityTransmissionCritical information infrastructureSecure state
The invention provides an active defense system for security threats to a key information infrastructure based on artificial intelligence. The system comprises a data acquisition module, a data analysis module, a security situation assessment module and an active defense module, wherein the data acquisition module is used for acquiring network detection data in a network system; the data analysismodule is used for analyzing and processing the acquired network detection data, and generating situation information used for describing a security state of network equipment; the security situationassessment module is used for assessing a secure state of the current network equipment according to an analysis result of the data analysis module; and the active defense module is used for determining a defense grade according to an assessment result of the security situation assessment module, and adopting a corresponding defense strategy according to the defense grade. According to the system,the threat behavior in the network system can be effectively detected, and different defense grades are determined according to a security situation value of the network equipment, so that the activedefense of the threat behavior is achieved, and the security and the stability of the network system are improved.
Owner:GUANGXI POWER GRID CORP

Explosion-proof shock-proof protecting system of cable-girder anchorage zone and manufacturing method of explosion-proof shock-proof protecting system

The invention relates to an explosion-proof shock-proof protecting system of a cable-girder anchorage zone and a manufacturing method of the explosion-proof shock-proof protecting system, belongs to the technical fields of highway, railway and municipal engineering traffics and bridge engineering protection, and aims to provide a protecting system of the cable-girder anchorage zone, which can actively defend explosion shock, of a wide-span cable beam bridge structure, and the manufacturing method of the protecting system. The protecting system is characterized in that an alpha type semi-hydrated gypsum mold wraps the outer part of the cable-girder anchorage zone; at least three PTFE film material layers wind and wrap the outer side of the alpha type semi-hydrated gypsum mold; an inner steel plate, a foam aluminum layer and an outer steel plate are sequentially arranged on the outer part of the PTFE film material layer in a sleeving manner; sand blasting is firstly performed on the cable-girder anchorage zone for rust cleaning before the alpha type semi-hydrated gypsum mold is wrapped; after being harden and demouded, the alpha type semi-hydrated gypsum mold needs to be dried and roasted; the cable beam anchoring region is wrapped once again; and then the PTFE film material layers, the inner steel plate, the foam aluminum layer and the outer steel plate are sequentially arranged on the outer part of the alpha type semi-hydrated gypsum mold to form the protecting system. The explosion-proof shock-proof protecting system and the manufacturing method thereof disclosed by the invention are applied to the traffic and the bridge engineering protection.
Owner:ZHONGBEI UNIV

Power grid CPS prevention control method based on anticipated accident scenes

The invention provides a power grid CPS prevention control method based on anticipated accident scenes. The power grid CPS prevention control method relates to the technical field of power system automation. The power grid CPS prevention control method comprises the steps of: firstly, constructing an initial accident scene model, and acquiring an optimized anticipated accident scene set based on feature similarity; secondly, comprehensively analyzing and calculating a benefit function according to an economic loss index, a heavy-load consequence severity index, a voltage offset severity index,a frequency offset severity index and a communication interruption severity index of loads of a power grid respectively; thirdly, acquiring a power flow transfer control strategy, a voltage instability adjustment strategy, a node removal strategy and a communication reliable adjustment strategy based on sensitivity; and further constructing a solution model, and adopting a relaxation method to perform a finite number of iterations to obtain a hybrid prevention control measure. The power grid CPS prevention control method based on the anticipated accident scene provided by the invention obtains the power grid hybrid prevention control method for different anticipated accident scenes, realizes active defense of the power grid, and ensures the safe operation of the power system.
Owner:NORTHEASTERN UNIV

A network security monitoring method for industrial control systems

The invention discloses a network security monitoring method for an industrial control system. The method comprises the following steps: collecting relevant information of an internal monitoring object of the industrial control system; performing security analysis on the collected relevant information; and when potential abnormal behavior is found through analysis, generating a relevant safety control order, and issuing the order to the relevant monitoring object for execution so as to block the abnormal behavior. According to the invention, real-time monitoring on major hidden security dangers of the industrial control system such as peripheral access, personnel operation, network external connection and the like is realized through abundant data acquisition of core networking equipment of the industrial control system. At the same time, through analysis processing on various behavior, the abnormal behavior is found and blocked timely, and thus real active defense of the industrial system is realized. For the current difficulty of effectively applying traditional security protection measures to the industrial control system, the major security threats to the industrial control system at present are well solved from the perspective of monitoring early warning.
Owner:NANJING NARI GROUP CORP +2

Endogenous security implementation device and method for forwarding flow table

ActiveCN113079096AAchieving endogenous securityRealize active defenseData switching networksData packService flow
The invention discloses an endogenous security implementation device and method for a forwarding flow table, and the method comprises the steps: a control unit separately calculates the forwarding flow table of current network equipment through different execution bodies based on different algorithms, allocates a uniform flow identifiers ID to each forwarding flow table according to a service flow attribute, and transmits each forwarding flow table to a security processing unit after the allocation is completed; a security processing unit detects the security of each execution body by comparing different forwarding flow tables, and issues the forwarding flow tables generated by the security execution bodies to a data plane according to a detection result; and after receiving the data packet, the data plane calculates the flow identifiers ID according to a key field, searches for a corresponding entry from the received secure forwarding flow tables based on the flow identifiers ID, and forwards the data packet. According to the method, the dynamic heterogeneous redundancy of the forwarding flow table is generated based on different algorithms, the problem that a single algorithm is easily attacked and is untrusted is avoided, and the endogenous security of the network equipment is realized in a better heterogeneous mode.
Owner:FENGHUO COMM SCI & TECH CO LTD

Information security defense method and system, electronic equipment and storage medium

The invention discloses an information security defense method and system, electronic equipment and a storage medium. The method mainly comprises the following steps: monitoring and capturing a data packet of a to-be-tested service system entering a host; comparing data in the data packet with pre-stored historical data, and determining whether the data packet has unknown threats; if it is determined that the unknown threat exists in the data packet, feature extraction is carried out on data in the data packet to obtain multiple pieces of feature information; respectively matching each piece of feature information with dangerous feature information in a feature library to obtain a matching result; if the matching result indicates that the data packet is abnormal request data, inputting the data packet into a machine learning module, performing calculation through a machine learning model to obtain dangerous feature information corresponding to the data packet, and updating the dangerous feature information into a feature library; if the matching result indicates that the data packet is normal request data, sending the data packet to the host. Therefore, a timely and effective defense method for information network security is realized based on machine learning.
Owner:优刻得(上海)数据科技有限公司

Network security equipment knowledge reasoning method, device and system and storage medium

The invention discloses a network security equipment knowledge reasoning method, device and system and a storage medium, and the method comprises the steps: obtaining data collected by distributed deployment network security equipment in real time, and carrying out the multiple fusion to obtain a knowledge state directed graph containing the directed relationship between the network security equipment; making the directed relationship of the knowledge state directed graph into a multivariate matrix, and sending the multivariate matrix into a risk reasoning state machine constructed by a pre-trained multi-layer deep neural network to obtain a state prediction result containing the directed relationship between the network security devices; and comparing the obtained state prediction result with a knowledge state directed graph obtained based on data collected by the network security equipment at the next moment, and if the state prediction result is inconsistent with the knowledge state directed graph, judging that a security risk situation occurs. According to the method, device and system, safety risks are found in time, active defense is achieved, the whole process of the system and the mutual relation are considered in the whole reasoning process, the whole process is highly integrated, and the reasoning result is more accurate.
Owner:SHENZHEN Y& D ELECTRONICS CO LTD

Device and method for implementing endogenous security of forwarding flow table

ActiveCN113079096BAchieving endogenous securityRealize active defenseSecuring communicationData packService flow
The invention discloses a device and method for implementing endogenous security of forwarding flow tables. The control unit calculates the forwarding flow tables of the current network equipment based on different algorithms through different executive bodies, and allocates a unified forwarding flow table for each forwarding flow table according to the attributes of business flows. After the distribution is completed, each forwarding flow table is sent to the security processing unit; the security processing unit detects the security of each executive by comparing different forwarding flow tables, and according to the detection result, forwards the forwarding flow table generated by the security executive Send to the data plane; after receiving the data packet, the data plane calculates the flow ID according to the key field, and based on the flow ID, finds the corresponding entry from the received secure forwarding flow table to forward the data packet. The present invention generates dynamic heterogeneous redundancy of forwarding flow tables based on different algorithms, avoids the problem that a single algorithm is vulnerable to attack and cannot be trusted, and realizes endogenous security of network equipment in a more optimal heterogeneous manner.
Owner:FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products