Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

93results about How to "Reduce the risk of attack" patented technology

Dynamically and smoothly expandable data acquisition system and method

ActiveCN103532975ASelf-describingImplement self-describing data accessUser identity/authority verificationData switching networksData acquisitionComputer terminal
The invention discloses a dynamically and smoothly expandable data acquisition system and method. The dynamically and smoothly expandable data acquisition system comprises a central data acquisition system and a data acquisition terminal, wherein the central data acquisition system comprises a gateway routing node, a data acquisition man aging node, data acquisition nodes, a security authenticating node, an acquired data storing node, a monitoring node, a time synchronizing service node, a security certificate storing node, a log managing node and a log storing node; the central data acquisition system communicates with the data acquisition terminal through a communication network; the data acquisition terminal transmits acquired device data to the data acquisition node, submits a data acquisition application form to the gateway routing node, acquires a node routing information form according to data fed back by the gateway routing node, and initiates a business report block transmission request to each data acquisition node for encrypted transmission of the data. According to the invention, the problems that the existing data acquisition system is high in expansion cost, poor in expansion capability and high in security risk under new application requirements are solved.
Owner:STATE GRID INTELLIGENCE TECH CO LTD

Authentication server, method and system for bidirectional authentication in mesh network

The invention relates to a bi-directional certification method for a certification server and a mesh network and a system thereof, belonging to the communication technical field; the certification server comprises a trust degree distribution module, a node state detecting module, a trust degree lowering/deprivation module and a trust degree management module, wherein the trust degree distributionmodule is used to determinate the security level of the node according to the received information of the node which requires to be certificated, and generates the trust degree time stamp after successful certification, and time stamp is sent to the node which requires to be certificated together with the signature algorithm mark after the signature; the node state detecting module is used to detect if nodes are attacked; the trust degree lowering/deprivation module is used to receive the break information or lower/deprive the trust degree of the node which is attacked; the rust degree management module is sued to store the user identity information of nodes in the Mesh network, which is successfully certificated, and the trust degree, the signatures and time stamps which are approved by the AS. The invention realizes that all nodes in the mesh network can choose correlation nodes based on the trust degree; moreover, the invention also realizes the bi-directional certification by verifying the trust degree signatures fed back from the correlation nodes at one time.
Owner:HUAWEI TECH CO LTD

Cloud terminal identity authentication method and system

The invention provides a cloud terminal identity authentication method. The cloud terminal identity authentication method includes that an account and a password of a user are converted to a first cipher text through a preset password algorithm and then converted to a two-dimensional code image corresponding to the first cipher text through a two-dimensional code tool; a cloud terminal submits the first cipher text to a server-side to store; when the user logins, the cloud terminal scans the two-dimensional code image provided by the user and obtains a second cipher text corresponding to the two-dimensional code image through the two-dimensional code tool, and the second cipher text is sent to the server-side; and the second cipher text received by the server-side is matched with the stored first cipher, and if the second cipher text received by the server-side is successfully matched with the stored first cipher, an identity authentication of the user is passed. The invention further provides a corresponding cloud terminal identity authentication system. The cloud terminal identity authentication method and the corresponding cloud terminal identity authentication system can improve the safety performance of the cloud terminal identity authentication, and the risk that user information is disclosed is greatly lowered.
Owner:GCI SCI & TECH

Intelligent distribution terminal security protection method based on asymmetric digital signature authentication

The invention discloses an intelligent distribution terminal security protection method based on asymmetric digital signature authentication. According to the actual characteristics of an intelligent distribution terminal, asymmetric digital signature authentication is realized on the distribution terminal; and the authentication of a digital signature technology can be realized by making small changes on the conventional communication protocols of the conventional distribution automation system without redefining a new communication protocol, namely the authentication of the digital signature technology can be realized by adding a digital signature section and a timestamp security information section of a sending party on the basis of the original standard protocol communication message section. The compatibility with the protocol before renovation is guaranteed, the renovation cost is low, and the method is easy to implement in engineering project construction, so that the risk of the distribution automation system from public network attack is reduced, and the operation security of the distribution automation system is guaranteed; and therefore the method has a good application prospect.
Owner:NANJING NARI GROUP CORP +1

Hardware trojan resistant integrated circuit design method and system

The embodiment of the invention discloses a hardware trojan resistant integrated circuit design method and system. The hardware trojan resistant integrated circuit design method comprises the steps that internal nodes with integrated circuit conversion probability lower than a preset conversion probability threshold value form a first node set; the internal nodes having the lowest signal probability and smallest logic depth in the first node set are selected to form a second node set; according to the number of the internal nodes in the second node set, corresponding internal nods are selected to be inserted into a preset circuit, wherein the preset circuit comprises a one-from-two multiplexer and one scanning trigger; when the key path delay of an integrated circuit after preset circuit insertion is compared with the key path delay of an original integrated circuit, whether new internal nodes are needed for replacement and need to be inserted into the preset circuit or not is determined. After the corresponding internal nods are selected to be inserted into the preset circuit, the node conversion probability is improved, the activated probability is improved when hardware trojan selecting nodes are inserted, so that hardware trojans cannot find appropriate insertion nodes to be inserted into the integrated circuit, the risk that the integrated circuit is attached by hardware trojans is reduced.
Owner:SOUTHWEST JIAOTONG UNIV +1

Power distribution safety protection monitoring system

The invention discloses a power distribution safety protection monitoring system, which comprises a power distribution master station and a plurality of substations. The power distribution master station is provided with a master processing module, a master check module and a master communication module. Each substation is provided with a slave processing module, a slave check module and a slave communication module. The master communication module is in communication connection with the slave communication modules; the master communication module and the slave communication modules are used for communication data two-way transmission; the master check module is connected with the master processing module and the master communication module, and is used for checking substation identity information in the communication data received by the master communication module, and after the check passes, the master processing module carries out processing on substation control information in the communication data; and the slave check modules are connected with the slave processing modules and the slave communication modules. The new power distribution safety protection monitoring system can improve power distribution safety protection in both-way communication.
Owner:ELECTRIC POWER SCI RES INST OF GUIZHOU POWER GRID CO LTD

Design method and system for anti-hardware Trojan horse chip

The embodiment of the invention discloses a design method and system for an anti-hardware Trojan horse chip. The method comprises the following steps of: acquiring the conversion probability of internal nodes of an integrated circuit; forming a first node set by internal nodes, the conversion probability of which is smaller than a predetermined conversion probability threshold value; acquiring the minimal signal probability from the first node set and forming a second node set by the internal nodes, the logic depths of which are the smallest; and selecting corresponding internal nodes according to the quantity of the internal nodes in the second node set, and inserting the internal nodes into an and logic gate or an or logic gate. After the selected corresponding internal nodes are inserted into the and logic gate or the or logic gate, the conversion probability of corresponding nodes is increased, and the corresponding conversion probability of the whole integrated circuit is also increased, so that when the hardware Trojan horse selects nodes to insert, the probability that the hardware Trojan is activated is increased, so that the hardware Trojan horse cannot find proper insertion points to be inserted into the integrated circuit, and therefore, the risk that the integrated circuit is attached by the hardware Trojan horse is reduced.
Owner:宁波汉达信息科技有限公司 +1

Cable tensioning device

The invention relates to the field of inhaul cable pre-stressed structure construction devices, in particular to an inhaul cable tensioning device. In the prior art, the inhaul cable tensioning construction adopts manual construction through a wrench, the labor intensity is high, the construction is dangerous and cannot be constructed in extreme environment. The invention provides the inhaul cabletensioning device. The inhaul cable tensioning device comprises a node plate, a fork ear anchorage device, a connecting nut and a connecting anchorage device which are connected in sequence. The nodeplate is used for connecting with a connecting inhaul cable or a building, the fork ear anchorage device is connected with the node plate through a pin shaft, and the connecting anchorage device is internally connected with an inhaul cable; and the inhaul cable tensioning device further comprises a power device, the input end of the power device is used for connecting with a remote control deviceto realize the purpose of remotely controlling the rotation of the connecting nut, and the output end of the power device is connected with the connecting nut and used for driving the connecting nutto rotate. Compared with the prior art, the inhaul cable tensioning device has the advantages of low labor intensity, suitability for extreme environments, and safe use.
Owner:北京奇力建通工程技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products