Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

32results about How to "Reduce the probability of being attacked" patented technology

Double-layer grouping Byzantine fault-tolerant consensus method and system

The invention discloses a double-layer grouping Byzantine fault-tolerant consensus method and system. The method comprises the following steps: S1, determining node groups; S2, for each group of nodes, selecting a part of nodes from the nodes as committee nodes, forming committee of the group, taking the remaining nodes except the committee nodes as common nodes, and selecting a main node of each group from the committee nodes; S3, building a block chain network; S4, if a certain group of committee receives a proposal request, the main node of the group generating a block according to the proposal request and sending the block to other committee nodes of the group for a first round of consensus, and if the first round of consensus passes, generating an initial block and sending the initial block to the common node of each group; and S5, performing a second round of consensus on the initial block by the common node of each group, and if the second round of consensus is passed, chaining the initial block and storing the initial block in a local account book. According to the method, a double-layer grouping consensus structure is adopted, and the system robustness is improved on the premise that low communication complexity is guaranteed.
Owner:NAT UNIV OF DEFENSE TECH

Information distribution method for mobile terminal

The present invention relates to an information distribution method of mobile terminal; in the process of mutual authentication between a mobile terminal and a network server, the mobile terminal sends the relevant information code of the mobile terminal to an authentication server; after the authentication succeeds, a session key is established; the authentication server sends the relevant information code of the mobile terminal to the network server; according to the relevant information code of the mobile terminal, the network server completes the operation of information distribution and returns operating results to the authentication server; the authentication server informs the mobile terminal of the authentication and the information distribution results. With the method of the present invention, the information distribution is embedded to the AKA process, reduces the communication cost and can reduce omissions and errors of information distribution by the network server as possible; the present invention can use the session key consulted in the authentication process to encrypt distributed information and reduces the probability of being attacked. The key consulted in the AKA process has safe protection on data distribution and improves the safe performance.
Owner:ZTE CORP

DNP3 protocol fuzzy test method based on sequence generative adversarial network

The invention discloses a DNP3 protocol fuzzy test method based on a sequence generative adversarial network. The DNP3 protocol fuzzy test method comprises the following steps: 1, constructing a DNP3protocol sample database; 2, preprocessing DNP3 protocol sample data; 3, carrying out data variation on the preprocessed DNP3 protocol sample; 4, generating a primary test case; 5, comparing the similarity of the test cases to remove redundancy; 6, carrying out seed test case variation; 7, performing a DNP3 protocol fuzzy test; 8, carrying out vulnerability verification; and 9, debugging and monitoring the abnormal test case. According to the method, the sequence generative adversarial network is utilized to generate the high-pass-rate test case; the redundancy of the test cases is reduced through a screening algorithm taking case similarity as an index; a random variation strategy is introduced to perform test case variation, so that the test case diversity and the vulnerability discoveryprobability are improved; by analyzing the stack frame information of the program when the vulnerability occurs, the cause of the vulnerability is found and recorded, so that the attack probability of the industrial control system is reduced, and the security of the industrial control system is improved.
Owner:XIAN UNIV OF SCI & TECH

Attack detection method and device based on attack detection model, medium and equipment

The invention discloses an attack detection method and device based on an attack detection model, a medium and equipment, relates to the field of network security, and mainly aims to solve the problems that when an existing machine learning algorithm is used for attack behavior detection, due to the fact that the number of training samples and the number of feature selection are small, the accuracy of an attack detection result is low, and the efficiency is high. And the false alarm rate is high. Comprising the steps of obtaining operation behavior data of a target user; the operation data are classified based on an attack detection model after model training is completed, a classification result is obtained, the attack detection model is constructed based on a support vector machine algorithm, model training is completed based on training samples and script language features, and the classification result is obtained. The training sample is composed of an attack sample collected based on an attack tool and a normal sample generated based on an automatic test attack, and the script language feature is extracted based on the attack sample; and if the classification result is an attack behavior, outputting an attack warning, and intercepting data generated by all operation behaviors of the target user.
Owner:PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD

A modular and building block digital array radar system

The present invention provides a modular and building block type digital array radar system. The system comprises a plurality of building block type digital active transceiver sub-modules and a data fusion server. The building block type digital active transceiver sub-modules are respectively mounted on a preset antenna array-plane framework and are respectively connected with the data fusion server. Each building block type digital active transceiver sub-module is composed of an antenna radiation module in card-inserting type connection with a comprehensive backboard, a digital T / R module, a digital beam forming unit, an optical power divider and an array-plane monitoring network module, wherein the antenna radiation module, the digital T / R module, the digital beam forming unit and the optical power splitter are sequentially in communication connection. The optical power splitter is connected with the data fusion server. The array-plane monitoring network module is respectively connected with the digital T / R module and the data fusion server. The modular and building block type digital array radar system has the advantage of multi-angle viewing angle and can effectively resist the main-lobe interference. A distributed arrangement receiving station is passive and can effectively reduce the radar intercepted probability and the radar attacked probability.
Owner:SHANGHAI SPACEFLIGHT INST OF TT&C & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products