Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

728results about How to "Resist attack" patented technology

IP address jump safety communication method based on SDN framework

The invention discloses an IP address jump safety communication method based on an SDN framework. The method comprises steps that A, an IP address of a Host2 is requested by a Host1; B, a real IP address r2 of the Host2 is replaced by a virtual IP address h2 through a controller; C, a domain analysis response is forwarded by the controller to the Host1; D, an r1 is taken as a source address and the h2 is taken as a target address by the Host1 to send a data packet to the Host2; E, a flow rule is generated by the controller to replace the r1 by a virtual IP address h1, and the flow rule is issued; F, the r1 is replaced by the h1 through the source switch, and forwarding is carried out; G, the h2 is replaced by the r2 through the target switch, and forwarding is carried out; H, the r2 is taken as a source address and the h1 is taken as a target address by the Host2 to send a response data packet; I, the r2 is replaced by the h2 through the target switch, and forwarding is carried out; J, the h1 is replaced by the r1 through the source switch, and forwarding to the Host1 is carried out. Through the method, jump IPs can be dynamically distributed to a host computer in the IPH network, one-time one-change access to the host computer IP is transparently realized, attack based on scanning and DDoS attach can be effectively fought against.
Owner:芦斌

Network safety isolating and information exchanging system and method based on proxy mapping

The invention relates to network security isolation based on agent mapping and information exchanging system and its method. It uses in information exchanging field and network data exchanging field. The in-out net processing units are each connected to the inner net and the outer net in the system. Isolation exchanging unit includes isolation switching controller and isolation storage. The in-out net processing units are connected to the isolation switching controller through high speed data transmission line. The isolation switching controller is connected to the isolation storage. Only one of the in-out net processing units can assess the isolation storage. The in-out net processing units exchange the information through the isolation exchanging unit. The inner net processing unit includes an agent stub and the outer net processing unit includes an agent engine. The method of the invention is that the inner defined transmission interface is called by the agent stub and the agent engine, and the date is exchanged between the in-out net processing units by isolation exchanging unit. So this can construct an information exchanging channel between the inner net client end and the outer net server in the form of agent mapping.
Owner:SHANGHAI JIAO TONG UNIV

Digital watermark embedding and extraction method based on chaos sequences

The invention discloses a digital watermark embedding and extraction method based on chaos sequences. The digital watermark of the chaos sequences is used for carrying out scrambling, and the pertinence of the original watermark and the scrambled digital watermark is removed through the scrambling, so the digital watermark has the features like flat noise. Thereby, the transparency of the digital watermark is improved. The position of the watermark embedding into a DCT block is determined through the chaos sequences, the safety of the algorithm is improved, and better robustness on the large-area cutting attack can also be realized. In the watermark embedding process, firstly, image sub blocks carry out discrete cosine transform (DCT), and the energy can be converted into low-frequency factor compression blocks; and after the conversation, the obtained low-frequency component matrix A carries out singular value decomposition (SVD), and at the same time, the position of the watermark embedding into the DCT low-frequency compression blocks can be determined and the embedding intensity can be regulated through the chaos sequences. Thereby, the calculation complicity can be reduced, in addition, the embedding quantity is also increased, the robustness of the watermark is improved, and the capability is improved for resisting ordinary attack, so the invention has wider practicability.
Owner:UNIV OF ELECTRONIC SCI & TECH OF CHINA

Secure certification and transaction method with combination of digital certificate and one-time password

The invention discloses a secure certification and transaction method with the combination of a digital certificate and a one-time password. The method comprises two steps of: a secure certification method and a secure transaction method. The secure certification and transaction method specifically comprises the steps of: first, performing bidirectional certification between a client and a server on the basis of the digital certificate; then, realizing secure certification through the combination of the digital certificate and the one-time password on the basis of the bidirectional certification; and finally, realizing secure transaction through the combination of the digital certificate and the one-time password on the basis of the bidirectional certification. By the method, the identities of users are confirmed by combining the digital certificate and the one-time password so as to realize the secure login and secure transaction of various application systems. By the method, the digital certificate and the one-time password are organically combined, so that the safety hidden trouble caused by separately using the digital certificate or the one-time password is avoided, respective security advantages of the digital certificate and the one-time password are fully exerted, various attacks can be resisted, high security is achieved, the demand of various high security application in the network can be met, and the method has higher practical value and broad application prospect in the field of network security technology.
Owner:BEIHANG UNIV

Method for carrying out in-vivo detection based on human face recognition

The invention relates to a method for carrying out in-vivo detection based on human face recognition. The method comprises the following steps that a video including human faces is input, and the video is cut into picture sequences according to frame frequency; the human face in each frame of picture is detected out through the human face recognition technology; the pixel value of a green channel in a human face frame in one frame of picture is extracted to serve as the pixel value of the picture, the pixel values of all the pictures are ranked according to the sequence, and a pixel value sequence is formed; the pixel value sequence is subjected to noise reduction, then Fourier transform is carried out, and frequency domain information of the pixel value sequence is obtained; a heart rate value is calculated according to the frequency domain information; whether the human faces in the video are real human faces or not is judged according to the heart rate value. Heartbeat information reflected by the human faces is utilized, human face in-vivo detection is carried out faster in a better interaction mode, a tester does not need to carry out operation according to a voice instruction, and the detection speed is high. Hardware equipment such as infrared cameras or 3D cameras is not needed, the cost is low, and the method can be widely applied.
Owner:北京飞搜科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products