Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50results about How to "Reduce attack surface" patented technology

Resource access control method based on zero-trust single packet authentication and authorization

The invention belongs to the field of information security, and particularly relates to a zero-trust single packet authentication and authorization-based resource access control method, which comprises the following steps that: terminal equipment initiates an access request to a zero-trust gateway; the zero-trust gateway verifies the request information sent by the terminal equipment, and if the verification is passed, the key center generates a session key and a public key and a private key of the terminal equipment; the terminal equipment generates single packet information that a user accesses the zero-trust gateway, and encrypts the single packet information by using the session key; calculating a message digest of the single packet information, signing the encrypted single packet information and digest information by using a private key, and sending all information to a zero-trust gateway; the zero-trust gateway verifies the signature information, the encryption information and the summary information, if verification is passed, a consistent port is opened for the terminal equipment, and the terminal equipment is allowed to temporarily access the server; by adopting the method described by the invention, the hiding of the service port is realized, the network attack surface is reduced, and the network security is improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method, device and equipment for container mirror image construction, and storage medium

The invention discloses a method, a device and equipment for container mirror image construction, and a storage medium. The method comprises the following steps: receiving a Docker file creation instruction, and creating a first Docker file according to the Docker file creation instruction; combining operation instructions in the first Docker file; creating a first container mirror image accordingto the first Docker file after the operation instruction combination; creating a first container according to the first container mirror image; controlling to enter a container environment of the first container; obtaining a configuration file and a dependent file from the container environment of the first container, and forming a compressed file; controlling to exit the container environment ofthe first container; modifying a basic mirror image in the first Docker file into a scatch empty mirror image, replacing a mirror image operation instruction in the first Docker file with the compressed file, and adding configuration related information to form a second Docker file; and creating a second container mirror image according to the second Docker file. The method can effectively reducethe size of the container mirror image.
Owner:安超云软件有限公司

Method and system for realizing secure and high-performance inter-process communication

The invention provides a method and a system for realizing secure and high-performance inter-process communication, and the method comprises the following steps: a developer completes Enclave development and loads the Enclave development to a computing system; a host process Host program is loaded by a computing system, and thus starting an enclave process Enclave; a host process Host program starts communication with an enclave process Enclave, and a Monitor is called to request inter-process communication; the Monitor ensures that the relay page only has one memory mapping, and the ownership of the Monitor is transferred from the host process Host to the enclave process Enclave; inter-process communication between an enclave process Enclave program and another enclave process Enclave is started, and the monitor establishes connection between an enclave process Enclave 1 and a Name Server; the enclave process Enclave 1 requests the Capability of the enclave process Enclave 2 from the Name Server; and the Monitor remaps the relay page to realize the message transmission between the enclave process Enclave 1 and the enclave process Enclave 2. According to the invention, a relay page and software and hardware collaboratively provide integrity protection, so that an enclave process is subjected to high-performance inter-process communication (IPC) in a trusted computing scene.
Owner:SHANGHAI JIAO TONG UNIV

Online rapid identity verification method based on Hash chain

The invention discloses an online rapid identity authentication method based on a hash chain, and mainly solves the problems that according to an existing online rapid identity authentication protocol FIDO, a malicious UAF client and a malicious authenticator specific module possibly appear in the normal registration or authentication process of a honest entity, so that messages are leaked, the protocol confidentiality is affected, and malicious login is caused. The implementation scheme is as follows: initializing each related entity of the FIDO protocol; calling a local security environment instruction to verify the integrity of the entity; performing hash chain registration; the FIDO protocol is operated, on the premise that normal operation of the protocol is guaranteed, verification of the authenticator specific module and the user agent to the UAF client side and verification of the UAF client side to the authenticator specific module are achieved based on the Hash chain, the security of the protocol is enhanced, and identity registration and authentication of the user in online service are achieved. The method is high in security, high in speed and low in overhead, and can be used for remote login, identity authentication and transaction authentication of online services.
Owner:XIDIAN UNIV

Network security communication system based on block chain smart contract

The invention discloses a network security communication system based on a block chain smart contract, and belongs to the technical field of digital information transmission. The system comprises a network isolation module, a user-defined configuration module, an authorized access module, an intelligent contract module, a certificate management module, an automatic deployment module and a sentry verification module. Network isolation is carried out through a network isolation module by adopting an ebpf network firewall and utilizing a micro-segmentation technology; through the custom configuration module, a system administrator configures custom resources and authorization rules on the platform and initiates voting; the administrator votes and manages the management event through the trusteeship and security contract on the block chain by using the authorization access module; querying a contract through an intelligent contract module to obtain a corresponding state change; generating a CA certificate by using a certificate management module; automatically deploying a client and a service team sentinel by using an automatic deployment module according to CA certificate information injection; and the guard verification module is used for accessing a specified interface.
Owner:南京智人云信息技术有限公司

Unikernel-based cloud Android operating environment construction method

The invention discloses a Unikernel-based cloud Android operating environment construction method, and belongs to the technical field of cloud computing virtualization. The method comprises the stepsthat firstly, an Android subsystem assembly which must be supported for achieving the minimum Android operating environment cloud under the Android code unloading scene is analyzed and obtained at first; then, an Android essential subsystem and a Bionic and Dalvik virtual machine are transplanted into a library operating system; then, an Android application code is compiled, and a related dependence package is extracted from the library operating system for generating a Unikernel virtual machine mirror image; finally, the Unikerel is started on a KVM, an XEN and other Hypervisor, and the Android code is operated. The essential Android environment support is added to the library operating system, the Android application code is compiled to the Unikernel, the characteristics that the Unikernel mirror image is large in size, low in cost, rapid in starting, high in isolation performance and the like are utilized, the cloud resource cost can be effectively lowered, the number of virtual machine instances provided by the cloud is increased, meanwhile, the delay of cloud and terminal communication is greatly lowered, and the user experience of terminal applications is improved.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for constructing heterogeneous executive body and system thereof

The invention discloses a heterogeneous executor construction method and a system, and the method comprises the steps: carrying out the attack surface measurement of a target mimicry defense system based on an attack surface judgment model, and recognizing an attack surface resource; determining an original heterogeneous component and an original heterogeneous execution body corresponding to the attack surface resource; determining a new heterogeneous component equivalent to the original heterogeneous component; recombining the original heterogeneous executive body based on the new heterogeneous component to obtain a new heterogeneous executive body; after the original heterogeneous execution body is switched into the new heterogeneous execution body, measuring the attack surface, judgingwhether attack surface resources are eliminated or not, if yes, serving the new heterogeneous execution body as a final heterogeneous execution body, and if not, returning to re-determine the new heterogeneous assembly until the determined new heterogeneous assembly can eliminate the attack surface resources. Based on the relationship between the heterogeneous component and the system resource, the attack surface model is used to guide the combination design of the heterogeneous executive body, and the attack surface of the mimicry defense system is effectively reduced.
Owner:SHENZHEN POWER SUPPLY BUREAU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products