Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

81results about How to "Reduce the risk of being attacked" patented technology

Automatic WIFI accessing method and system of device

The invention discloses an automatic WIFI accessing method and system of a device. The method comprises: a device waiting for accessing to the Internet establishes connection with a device already accessing to the Internet and sends authentication information to an authentication platform via the device already accessing to the Internet, wherein the device already accessing to the Internet is already authenticated via the authentication platform and already logs in a home gateway; the authentication platform authenticates the authentication information of the device already accessing to the Internet; when the authentication platform succeeds in authenticating the authentication information of the device already accessing to the Internet, the device already accessing to the Internet sends a service set identification (SSID) and a key of the home gateway to the device waiting for accessing to the Internet; and the device waiting for accessing to the Internet logs in the home gateway according to the received SSID and key of the home gateway and then accesses to the Internet. The automatic WIFI accessing method and system of the device are capable of reducing the risk that an intelligent device is attacked in the process of automatically accessing to the Internet, and reducing user intervention.
Owner:CHINA UNITED NETWORK COMM GRP CO LTD

Client based on biometric feature recognition and working method thereof

The invention discloses a client based on biometric feature recognition and a working method thereof, and belongs to the field of information security. The client comprises a client application program module and a client identity authentication module, wherein the client application program module generates an identity authentication request according to a client identifier and request data acquired from a server, and sends the identity authentication request to the client identity authentication module; the client identity authentication module reminds the user to input biometric feature data for authentication after the condition that the client identifier and the request data are legal is determined, works out assertion data according to a registration identifier, a secret key and a private key if the authentication is successful, the assertion data is sent to the server via the client application program module, and the client identity authentication module receives and displays a request result returned by the server. According to the client provided by the invention, authentication of the biometric feature information of the user is completed in the client identity authentication module, the risk that the biometric feature information of the user is attacked is reduced, and user online register and login security are improved.
Owner:FEITIAN TECHNOLOGIES

Identity verification method and device, computer equipment and storage medium

The invention relates to an identity authentication method and device based on a password technology, computer equipment and a storage medium. The method comprises the following steps: performing facedetection on a to-be-detected object to obtain a face detection result, and generating a random display code sequence according to the face detection result; extracting lip action features of the to-be-detected object, and performing feature analysis on the lip action features by utilizing the lip language recognition model to obtain a lip action feature display code; extracting interpretation audios of the to-be-detected object, converting the interpretation audios into voice text display codes, comparing the lip action feature display codes and the voice text display codes with the random display code sequence, and performing living body detection on the to-be-detected object when the lip action feature display codes and the voice text display codes conform to the random display code sequence; when living body detection is passed, comparing the face image file of the to-be-detected object with the face detection result to obtain an identity authentication result. According to the method, face, lip language and voice recognition is combined, and the reliability and safety of identity authentication are enhanced.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Distributed software distribution method

ActiveCN106713483AReduce backbone network load and master server loadImprove distribution speed and efficiencyTransmissionClient-sideDistribution method
The invention provides a distributed software distribution method, comprising the following steps: a server issues software distribution commands to all clients, wherein the software distribution commands contain random time; after reaching the random time, the client requests a distribution node from the server; the client of which the random time is 0 directly downloads the software from the server, opens a download port after completing the download, and registers as the distribution node to the server; if the request for the distribution node succeeds, the client can download the required software from the distribution node; if the request for the distribution node fails or times out, the client will download the software from the server; and the server sends the distribution node to the client after receiving the register of the distribution node. According to the distributed software distribution method provided by the invention, the client in the network is fully used to ensure that the load of the backbone network and the primary server can be reduced, and the distribution speed and efficiency can be increased; and meanwhile, as the opening time of the distribution node is limited, the attack risk of terminals can be reduced.
Owner:BEIJING KINGSOFT SECURITY MANAGEMENT SYST TECH CO LTD

Network forwarding keyboard mouse code processing method, device and system

InactiveCN112462961ASolve the problem of needing to install specific driversReduce the risk of being attackedTransmissionDigital output to display deviceData packNetwork packet
The invention discloses a network forwarding keyboard and mouse code processing method, device and system, and the method comprises the steps: enabling a control end to receive an operation instruction when the control end needs to control a controlled end, selecting the control end and the controlled end which need to be controlled, and obtaining keyboard and mouse event data; enabling the control end to encode the acquired keyboard and mouse event data into a network data packet, and sending the network data packet to a board card connected with the controlled end and used as transfer equipment through a network; receiving the network data packet by a board card which is connected with the controlled end and serves as transfer equipment, decoding and restoring the network data packet into a keyboard and mouse event code, and sending the keyboard and mouse event code to a host of the controlled end; and enabling the host of the controlled end to receive the converted standard keyboardand mouse event code, and executing corresponding control operation according to the standard keyboard and mouse event code. The USB keyboard and the mouse are forwarded through the network, the standard keyboard and the standard mouse can operate different computers and be controlled by the different computers through the network, safety is improved, and convenience is brought to use of a user.
Owner:SHENZHEN SKYWORTH QUNXIN SECURITY TECH

Unmanned aerial vehicle GNSS deception detection method based on flight path

ActiveCN112859013AReal-time spoofing attackSpoofing attacks will notWave based measurement systemsInternal combustion piston enginesGuidance systemSimulation
The invention discloses an unmanned aerial vehicle GNSS deception detection method based on a flight path, and mainly solves problems that an attack risk is increased due to the change of a task flight path and the interference is easily caused due to the dependence on a sensor in the prior art. According to the scheme, a guidance position is calculated by means of an expected course angle obtained by a guidance system and a flight speed and a navigation position obtained by a navigation system; a navigation track and a guidance track are obtained according to the two positions; whether the distance deviation between the navigation position and the guidance position is continuously larger than a threshold value or not is judged, whether the average value of the distance deviation between the two tracks is larger than the threshold value or not is judged, and whether the distance deviation between the two track end points is larger than the threshold value or not is judged, if so, the unmanned aerial vehicle is determined to be subjected to spoofing attack, and the unmanned aerial vehicle does not use GNSS data any more and finishes detection; otherwise,the data is continuously used to realize cyclic detection of the unmanned aerial vehicle. According to the invention, the risk that the unmanned aerial vehicle is subjected to spoofing attacks is reduced, the safety of an unmanned aerial vehicle system is enhanced, and the method can be used for detecting external attacks of the unmanned aerial vehicle system.
Owner:XIDIAN UNIV

Method for ensuring safety of local operating environment of financial App

The invention discloses a method for ensuring the security of a local operating environment of a financial App, which is characterized by comprising the following steps of: A, judging whether a started App is the financial App or not, and if so, detecting the operating environment; b, entering a site cleaning mode and executing site cleaning operation; c, executing different site clearing operations according to the state of the application, such as temporarily quitting a site clearing mode, restarting the site clearing mode, clearing a background financial App and the like; and D, completelyquitting the site cleaning mode. According to the method, the state of the App is monitored, the financial App is matched according to the package name of the App, and the site clearing strategy is started; when the financial App is started, the operation environment is detected, and the site clearing operation is executed, so that the financial App operates in the site clearing mode, and the useof the financial App and the safety of financial transactions are ensured. By using the System Server, an external interface is not exposed, and the attack difficulty of the method is improved. Therefore, the method has the advantages that the security of the local operation environment of the financial App is improved, the attacked risk is reduced, and the financial security is protected.
Owner:中天掌金(北京)科技有限公司

Cross-network transmission system and method for individual soldier

PendingCN113949523ARealize cross-network transmissionGuaranteed relativityKey distribution for secure communicationEngineeringSerial code
The invention relates to a cross-network transmission system and method used by an individual soldier. A secret key request and transmission data are sent to an isolation exchange unit through an intranet transmission unit; the isolation exchange unit generates an encryption key and a corresponding serial number and feeds back the encryption key and the corresponding serial number to the intranet transmission unit; an external network transmission unit obtains the encryption key and the corresponding serial number, and sends a data request to the isolation exchange unit according to the serial number; the isolation exchange unit sends a key verification request to the external network transmission unit based on the serial number; the external network transmission unit sends the encryption key to the isolation exchange unit; the isolation exchange unit verifies whether the encryption key sent to the intranet transmission unit is consistent with the encryption key received from the extranet transmission unit or not according to the serial number, and if yes, transmission data is sent to the extranet transmission unit; and the external network transmission unit obtains transmission data. In the invention, the cross-network transmission of the file is realized through the isolation exchange unit, and the encryption cross-network transmission between individuals is realized through the encryption key.
Owner:ELECTRIC POWER RES INST OF STATE GRID ANHUI ELECTRIC POWER +1

Traceable access control method based on double block chains

The invention discloses a traceable access control method based on double block chains, and the method comprises the steps: generating a decryption key, storing a file, storing an access control strategy, carrying out access authorization, carrying out user access, carrying out file decryption, and enabling an initial user to provide own attribute information for registration, thereby obtaining the decryption key; the uploaded file is encrypted and then stored in the IPFS, an intelligent access strategy of attributes is set according to the file, and the file can be accessed only when the intelligent strategy is met; and the accessed file also needs to be decrypted by a decryption key during registration, and when the file is tampered, the access process is checked to search for illegal users, so that more accurate equipment traceability is achieved. According to the method, the unpaired CP-ABE algorithm is adopted to encrypt the uploaded file, and the simple scalar multiplication in the elliptic curve encryption is utilized to replace bilinear pairing, so that the file encryption efficiency is improved; the IPFS is used for storing file data, the risk that a database is attacked is reduced, and the files are prevented from being lost and tampered.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products