Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

45results about How to "Reduce the probability of attack" patented technology

Biological feature template saving and verification method and biological feature identification device and terminal

The embodiments of the present invention provides a biological feature template saving and verification method and a biological feature identification device and terminal, and belongs to the biological identification technology field. The biological feature template saving method comprises the steps of processing a biological feature encryption template encrypted and generated according to a biological feature template to obtain M sets of biological feature encryption template data, wherein M >=2; storing the M sets of biological feature encryption template data in N storage areas, at least one set of biological feature encryption template data is saved in each storage area, wherein 1<N<=M. According to the embodiments of the present invention, the biological feature encryption template is processed into multiple sets of biological feature encryption template data, and then the biological feature encryption template data is saved in at least two storage areas dispersedly, so that the multiple sets of biological feature encryption template data is saved in the plurality of storage areas dispersedly, is not easy to leak overall, and accordingly the larger potential safety hazards brought by the prior art to the application of the biological feature template can be eliminated effectively.
Owner:SHENZHEN GOODIX TECH CO LTD

Monitoring method and device for industrial control equipment

The invention provides an industrial control equipment monitoring method and device, wherein the method comprises the steps: simulating and generating a plurality of virtual industrial control equipment, respectively obtaining the communication data of the virtual industrial control equipment and the industrial control equipment, carrying out the matching of the communication data with the pre-stored analysis data, generating a corresponding matching result, and when the abnormality of the matching result is detected, carrying out the monitoring of the industrial control equipment, and generating corresponding alarm information. According to the method and the device, the probability that the industrial control equipment is attacked is reduced by simulating and generating a plurality of virtual industrial control equipment, the communication data of the virtual industrial control equipment and the industrial control equipment are respectively acquired and are matched with the pre-stored analysis data, and the corresponding alarm information is generated when the communication data is detected to be abnormal, so that the abnormal detection efficiency of the industrial control equipment is improved, and the safety of the industrial control network is ensured.
Owner:STATE GRID FUJIAN ELECTRIC POWER RES INST +1

Method and system for selecting optimal transaction node in peer-to-peer network set, and storage medium

InactiveCN108833493AComprehensive trust value dropsReduce the probability of attackTransmissionArray data structureTrust score
The invention discloses a method and system for selecting an optimal transaction node in a peer-to-peer network set, and a storage medium. The method comprises: transaction trust values are given to all transaction records among all nodes in a current peer-to-peer network set respectively, so that the trust scores with transaction satisfaction are far less than trust scores of transaction dissatisfaction; on the basis of the transaction trust values, a two-dimensional transaction array between each node and other nodes in the current peer-to-peer network set is constructed and a time weight isassigned for each transaction trust value in the two-dimensional transaction array; according to the two-dimensional transaction array, direct trust values of all nodes with all other nodes are calculated and indirect trust values of one current node with all other nodes are calculated based on the direct trust values between all other nodes; and according to the direct trust values and indirecttrust values of the current node with other nodes, a comprehensive trust value of the current node with all other nodes is calculated and the node with the highest comprehensive trust values is selected to carry out transaction with the current node.
Owner:ZHEJIANG GONGSHANG UNIVERSITY

Control method for processing teleoperation system under DOS attack

The invention provides a control method for processing a teleoperation system under a DOS attack. The control method comprises the following steps of: constructing a parameter identification rule on a master mechanical arm and a slave mechanical arm by utilizing respective measurement information and received position information of the master mechanical arm and the slave mechanical arm respectively; designing event triggers on the master mechanical arm and the slave mechanical arm respectively; and considering communication time-varying delay, and designing moments of the master mechanical arm and the slave mechanical arm based on an event trigger communication mechanism to realize bilateral control of the teleoperation system. According to the control method, the stable tracking problem of the bilateral teleoperation system with uncertain parameters and time-varying delay in information transmission under the DOS is researched, and the parameter identification rule is constructed, so that an ideal parameter estimation value can be obtained when an excitation signal does not meet a continuous excitation condition, and the requirement on the transient performance of the teleoperation system can be met; and furthermore, the elastic event trigger is designed, so that data is sent as required, and the probability that the data is attacked on a communication network is reduced.
Owner:NANJING UNIV OF POSTS & TELECOMM

Communication method based on block chain technology

The invention relates to a communication method based on a block chain technology. The method comprises the following steps that when a terminal user sends request data to a server, firstly the request data is sent to a block chain server; the block chain server decrypts the received information and generates a plurality of pieces of false position information according to the real position information and privacy protection parameters; the block chain server packages the true and false position information and the service query information together and sends the packaged information to a block chain application server; the block chain application server generates a fuzzy result query data set according to the received location service query information; the block chain server performs refinement processing on the fuzzy result query data set according to the real position information of the user, encrypts refinement result query information and sends the refinement result query information to a service-side server; and the service-side server decrypts the received result query information so as to obtain the final result information of the service query. According to the invention, the communication security can be effectively improved.
Owner:STATE GRID FUJIAN ELECTRIC POWER CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products