Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

502 results about "Active Defense" patented technology

Active defense. The employment of limited offensive action and counterattacks to deny a contested area or position to the enemy. See also passive defense.

Active defense method based on cloud platform

The invention discloses an active defense method based on a cloud platform. The active defense method comprises the following steps of: intercepting progress establishment by a client to acquire a program file route of a progress; calculating a characteristic value of a program file according to the program file route; judging whether the characteristic value of the program file exists in a local database; if the characteristic value of the program file does not exist in the local database, sending the characteristic value of the program file to a cloud end; judging whether the characteristic value of the program file exists in a database of the cloud end; if the characteristic value of the program file does not exist in the database of the cloud end, judging whether cloud end analysis is required to be performed on the program file; if the cloud end analysis is required to be performed on the program file, sending the program file to the cloud end; executing a command in the program file by the cloud end; judging whether the residual commands in the program file do not comprise commands related to a user environment; if the residual commands in the program file do not comprise commands related to the user environment, executing the residual commands; and detecting the security of the program file according to a behavior record of the program file, and returning a detection result back to the client.
Owner:HUAZHONG UNIV OF SCI & TECH

Sight line based finite time convergence active defense guidance control method

The invention provides a sight line based finite time convergence active defense guidance control method, relates to a guidance control method, in particular to an active defense guidance control method, and aims at solving the problem that a defensive missile is limited in overload capacity. The sight line based finite time convergence active defense guidance control method comprises the steps of firstly modeling relative motions of a target, the defensive missile and an intercept missile, adopting a sight line guidance mode to design a guidance rule for the defensive missile, then adopting a nonsingular terminal sliding mode to control the designed guidance rule, respectively defining sliding mode variables (shown in the description) of a longitudinal plane and a lateral plane, performing derivation on the sliding mode variables, substituting relative motion equations of the target, the defensive missile and the intercept missile into the variables and obtaining the guidance rule (shown in the description) of the longitudinal plane and the guidance rule (shown in the description) of the lateral plane through compilation, and controlling the missiles according to the guidance rules. By means of the sight line based finite time convergence active defense guidance control method, overload needed by the defensive missile can be effectively reduced. The sight line based finite time convergence active defense guidance control method is suitable for active defense guidance control.
Owner:HARBIN INST OF TECH

Trusted computing platform of a computing and protection parallel double-system structure

ActiveCN109871695AComputable, measurable and controllableRealize active security protectionPlatform integrity maintainanceActive safetyTrusted Computing
The invention discloses a trusted computing platform of a computing and protection parallel double-system structure. wherein the trusted computing platform comprises a computing subsystem and a protection subsystem which are parallel, the computing subsystem is used for completing a computing task, and the protection subsystem is used for carrying out active measurement and active control on the computing subsystem according to a trusted strategy through a trusted platform control module; And the protection subsystem is specifically used for respectively carrying out static measurement and dynamic measurement on the computing subsystem through the trusted software base. According to the trusted computing platform provided by the invention, active safety protection is realized while computing is realized through the computing subsystem and the protection subsystem which are parallel to each other. In addition to establishing a static trust chain which takes a trusted platform control module as a trust root for step-by-step measurement, a dynamic measurement mechanism based on a security trusted strategy is also designed, and active defense on the whole computer system in the starting and operating processes of the computer is realized.
Owner:北京自主可信科技有限公司

Network security monitoring method for industrial control system

The invention discloses a network security monitoring method for an industrial control system. The method comprises the following steps: collecting relevant information of an internal monitoring object of the industrial control system; performing security analysis on the collected relevant information; and when potential abnormal behavior is found through analysis, generating a relevant safety control order, and issuing the order to the relevant monitoring object for execution so as to block the abnormal behavior. According to the invention, real-time monitoring on major hidden security dangers of the industrial control system such as peripheral access, personnel operation, network external connection and the like is realized through abundant data acquisition of core networking equipment of the industrial control system. At the same time, through analysis processing on various behavior, the abnormal behavior is found and blocked timely, and thus real active defense of the industrial system is realized. For the current difficulty of effectively applying traditional security protection measures to the industrial control system, the major security threats to the industrial control system at present are well solved from the perspective of monitoring early warning.
Owner:NANJING NARI GROUP CORP +2

Network active defense policy selection method and device based on Bayesian evolutionary game

The invention belongs to the technical field of the network security, and especially relates to a network active defense policy selection method and device based on Bayesian evolutionary game. The method comprises the following steps: constructing a network attack Bayesian evolutionary game model according to an incomplete information game scene in an actual attack-defense adversarial network; setting a selection strength factor for describing gamer learning capacity, and constructing a random replicate dynamic equation about the attacker-defender policy evolution; combining the random replicate dynamic equations about the attacker-defender policy evolution, solving to acquire a stable balance point of the attacker-defender policy evolution, and determining and outputting an optimal defense policy. From the limited intellectual visual angle of the participant, a replicate dynamic equation about the participant decision process is constructed and solved by means of the replicate dynamicmechanism for describing the biological evolution, the method is suitable for incomplete information network attack-defense adversarial network and more suitable for the actual application, the generality and operability in the network decision implementation process are enhanced, and the effective guidance is provided for selecting the active defense policy.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Mobile terminal, security defense device thereof and security defense method thereof

ActiveCN103324887ASecurity Defense GuaranteeImplement non-uninstallable featuresPlatform integrity maintainanceFile systemComputer terminal
The invention provides a mobile terminal, a security defense device thereof and a security defense method thereof. The security defense device comprises a storage module, a start-up management module and a defense module. The storage module is arranged in a root file system of the mobile terminal and used for storing an executable file in the defense module. The start-up management module is used for acquiring and operating the executable file according to a configuration file in the mobile terminal during starting-up of the mobile terminal. The defense module is used for generating a permanent defense progress according to the operating executable file. The defense progress is used for monitoring abnormal behaviors of the mobile terminal and taking active defense according to the abnormal behaviors. By the security defense device, incapability of uninstalling of a safety protection program, and permanent memory operation and automatic start-up management of a safety protection progress are realized, all-around monitoring and protection as well as self-repairing, performed by the safety protection progress, on an application layer and a service layer of an operating system of the mobile terminal are guaranteed, and safety protection of the operating system can be effectively guaranteed.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Identity authentication method and system, electronic equipment and computer readable storage medium

The invention provides an identity authentication method and system, an electronic device, a computer readable storage medium. The method comprises the following steps that first identity verificationis conducted according to user information input by a user, the user information at least comprises a user name and a password, whether the input user name is matched with the password or not is determined according to the user information stored in a database, if yes, second identity verification is conducted, and if not, user verification fails is prompted; And collecting user face feature information to carry out second identity verification, determining whether the collected user face feature information is matched with user information input by the user according to the face feature information stored in the database, if so, granting a corresponding authority to the user, and if not, prompting that the user verification fails. The system, the electronic equipment and the computer readable storage medium are used for realizing the method. According to the invention, a safe, reliable and flexible integrated face recognition authentication service and early warning are provided foran enterprise, and the requirement of enterprise user identity information security active defense is better met.
Owner:SHENZHEN POWER SUPPLY BUREAU

Active defense method based on path and IP address hopping in SDN network

The invention discloses an active defense method based on path and address hopping in an SDN network, and belongs to the field of mobile target defense. The method comprises the following steps: S1, asource host sending a data packet to a first switch; S2, judging whether the data packet is successfully matched with the flow table item or not, if yes, forwarding the data packet to a next hop switch, and entering a step S5; otherwise, the switch sending the Packet-In message to the controller, and executing the step S3; S3, the controller selecting a data packet transmission path and a virtualIP at the same time; S4, the controller generating a flow table rule according to the selected transmission path and the virtual IP, and issuing a flow table and a reverse flow table to each switch;and S5, judging whether the switch is a final switch or not, if yes, sending the data packet to a target host, and otherwise, entering the step S2. By utilizing the separation characteristic of the SDN network data layer and the control layer and the idea of active operation change in the MTD, the IP and the transmission path of the data packet are changed on the premise of not influencing the normal communication of the network, and the difficulty of an attacker in acquiring information is increased, so that the active defense capability of the system is improved.
Owner:HUAZHONG UNIV OF SCI & TECH +1

Computer-system-based online handwriting authentication method

ActiveCN102592152AFull imitation of timeResist replay attacksCharacter and pattern recognitionHandwritingConfidentiality
The invention discloses a computer-system-based online handwriting authentication method, which comprises the following steps of: writing and submitting a plurality of groups of registered handwritings through handwriting input equipment by a user, storing the two-dimensional static character pattern position information of display handwritings corresponding to the registered handwritings into a database, and finishing handwriting registration according to the conventional online handwriting authentication method; in the test of a computer system, submitting a generated identification number by the user, randomly selecting a plurality of registered handwritings from the registered handwritings submitted by a corresponding user in a registration stage, and displaying the two-dimensional static character pattern position information of the display handwritings of the selected registered handwritings to the user; and submitting a corresponding test handwriting set at a time within a specified time by the user, finishing test handwriting authentication according to the computer-system-based online handwriting authentication method, and comprehensively making a decision to finish the authentication of the user. The method has the advantages of replay attack resistance, difficulty in the attack of an imitator and active defense; and the neglected shortcomings of dependence on handwriting confidentiality and high imitation rate neglected by the conventional online handwriting authentication method are effectively overcome.
Owner:HEFEI INSTITUTES OF PHYSICAL SCIENCE - CHINESE ACAD OF SCI

Asymmetric operational control method of direct current side monopolar grounding fault of MMC-HVDC system

The invention discloses an asymmetric operational control method of the direct current side monopolar grounding fault of an MMC-HVDC system. For the MMC-HVDC system based on monopolar symmetric wiring, after a direct current side monopolar grounding fault occurs, over voltage and fault current at AC and DC sides can be rapidly eliminated by setting the DC component of the output voltage of a bridge arm of a fault pole without locking a current converter, and further the insulation threat to AC/DC systems can be eliminated. Through adjusting phase angles of alternating components of different bridge arm voltages, the system still can continue transmitting half of a rated active power and provide reactive power support for the AC system while isolating the direct current side monopolar grounding fault, which has positive significance for the stability of the connected AC/DC systems; during the fault period, the current converter does not need to exit from operating, the restore speed of the system is high, the current converter is in a controlled state in the whole process, and therefore the active defense capability of the MMC-HVDC system based on monopolar symmetric wiring against the direct current side monopolar grounding fault can be improved.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products