Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

113 results about "Attack device" patented technology

Nut shell breaking machine

The invention relates to a nut shell breaking machine, aiming at providing the shell breaking machine which has the characteristics of simple structure, high production efficiency and convenience in use. The shell breaking machine comprises a rack, a feed hopper and a discharge port, wherein the feed hopper and the discharge port are positioned on the rack. The shell breaking machine is characterized in that a feeding device and an attacking device are also arranged at the shell breaking machine; the feeding device comprises two rotatable feeding rollers, a ratchet-pawl mechanism and a power machine, the two feeding rollers are horizontally and symmetrically arranged at the bottom end of the feed hopper, and the ratchet-pawl mechanism is used for driving the feeding rollers to intermittently rotate; the attacking device comprises fixed attacking plates, movable attacking plates, a transverse push rod and a power machine; the fixed attacking plates are positioned under each feeding roller and are vertically fixed, and the movable attacking plates are arranged correspondingly to the plate faces of the fixed attacking plates and are positioned at the inner side of the rack; the transverse push rod is hinged with the movable attacking plates to drive the movable attacking plates to do a horizontal attacking motion; and the power mechanism is used for driving the transverse push rod.
Owner:杭州虹环电子有限公司

System for detecting safety performance of safety chip under induced error attacks

ActiveCN103530566ADetect securityThe detection environment is stableInternal/peripheral component protectionPlatform integrity maintainanceEmbedded systemEncryption
The invention relates to a system for detecting the safety performance of a safety chip under induced error attacks. The system comprises a control unit, a result analysis unit and an attack device, wherein the control unit controls a safety chip encryption and decryption functional unit to carry out encryption and decryption calculation under the induced error attacks; the result analysis unit reads a encryption and decryption calculation result and compares the result with a built-in reference result; the attack device performs the induced error attacks on the safety chip under the control of the control unit. Therefore, the safety chip and the attack device are combined together through the control unit, the calculation result, under the induced error attacks, of the encryption and decryption functional unit is analyzed through the result analysis unit, and after an error is caused on the encryption and decryption calculation result, the attack device is controlled by the control unit to position coordinates of the positions, on the safety chip, of the induced error attacks as fault point coordinates, so that the system effectively detects the safety performance of the safety chip and positions the fault points.
Owner:SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI

Network anti-attack device, system and method, readable medium and storage controller

InactiveCN107241338AAggressive Behavior BlockingTransmissionControl storeAnalysis center
The invention discloses a network anti-attack device, system and method, a readable medium and a storage controller. The network anti-attack device comprises a camouflage behavior processing center, a linkage processing center and a threatening behavior analysis center, wherein the camouflage behavior processing center is used for camouflaging a preset number of false terminals and making the false terminals to transmit analog broadcasts to a network; the linkage processing center is used for intercepting the attack and extracting attack behavior characteristics of the attack when the analog broadcasts are attacked and transmitting the attack behavior characteristics to a defensive system in the network to interrupt the attack through the defensive system; and the threatening behavior analysis center is used for receiving interrupt information transmitted by the defensive system after successfully interrupting the attack, extracting interrupt information characteristics of the interrupt information, packaging the attack behavior characteristics and the interrupt information characteristics to form a characteristic group and transmitting the characteristic group to a database to form a characteristic library. The problem that a passive defense mode falls behind virus transmission is effectively solved, an overall network defense linkage system is formed, and the security of a real terminal is improved.
Owner:BEIJING VRV SOFTWARE CO LTD

Safe trapping method and device and computer equipment

The present application is applicable to the technical field of network security, and provides a secure trapping method, comprising: generating a plurality of categories of first simulation devices and first virtual services, the first simulation devices and the first virtual services being generated through a simulator according to device parameters of physical devices and application scenarios of the physical devices; generating shadow equipment of the entity equipment, wherein each shadow equipment corresponds to a plurality of virtual communication addresses; and when the virtual communication address receives a traffic data packet from the attack device, if the shadow device corresponding to the virtual communication address is high interaction, forwarding the traffic data packet to the corresponding first simulation device and/or the first virtual service through the shadow device. According to the method, the simulation device is generated through the simulator corresponding to the entity device, and then deployment of the industrial internet deception trapping system is achieved. And a plurality of containers do not need to be generated, so that a large amount of server resources can be saved, and the cost of deploying the industrial internet deception trapping system is reduced.
Owner:烽台科技(北京)有限公司

Self-turning type wire walking foreign body clearing fire attacking deviceand using method thereof

The invention discloses a self-turning type wire walking foreign body clearing fire attacking device which comprises a self-turning type falling pulley, a major rope, a minor rope, and a shot line. The self-turning type wire walking foreign body clearing fire attacking device further comprises a right-angle triangular support. The vertical edge of the right-angle triangular support is fixed on the major rope, and the vertical edge of the right-angle triangular support is provided with an upward extending section. When the self-turning type wire walking foreign body clearing fire attacking device is used, the upper section of the extending section exactly abuts against the lower end face of the self-turning type falling pulley. The upper right-angle edge of the right-angle triangular support is provided with another extending section extending towards the direction of the bevel edge of the right-angle triangular support, an end portion of the another extending section is provided with an L-shaped bend, and the upper end portion of the bend is provided with a U-shaped fence tank. A U-shaped alcohol lamp is arranged in the U-shaped fence tank, and the distance between the upper end of the alcohol lamp and a wire is 10 centimeters. The distance between the alcohol lamp and the major rope is 40 centimeters. A rope ring is arranged on the upper right-angle edge of the right-angle triangular support, and the minor rope is tied to the rope ring. The alcohol lamp is a jar-shaped alcohol lamp. The diameter and the height of an alcohol jar are both 8 centimeters. The height of flame formed when alcohol burns is 4 centimeters. The whole foreign body clearing link needs to be accomplished only by two persons, so that the self-turning wire walking foreign body clearing fire attacking device and the using method of the self-turning wire walking foreign body clearing fire attacking device are simple, rapid and practical.
Owner:STATE GRID CORP OF CHINA +1

Method for attacking elliptical curve encryption algorithm and attacking device

ActiveCN104717060AThe timing of error injection is easy to controlImprove attack efficiencyPublic key for secure communicationPlaintextCiphertext
The invention discloses a method for attacking the elliptical curve encryption algorithm and an attacking device. The method comprises the steps that the attacking device acquires the corresponding relation between the coordinates of an error base point with one byte error, parameters of an elliptical curve where the error base point is located and order in advance, wherein the order meets the condition that the length of a maximum prime factor is smaller than or equal to a preset threshold value; the attacking device injects one byte error into the coordinates of a base point of an elliptical curve used by the elliptical curve encryption algorithm in an encryption unit to obtain the coordinates of the error base point; the attacking device controls the encryption unit to encrypt a plaintext by means of the elliptical curve encryption algorithm according to the coordinates of the error base point so that error ciphertext output can be obtained; the attacking device calculates the parameters of the elliptical curve where the error base point is located according to the error ciphertext output and finds the coordinates and order of the error base point corresponding to the curve parameters in the corresponding relation; the attacking device acquires the plaintext according to the coordinates and order of the error base point, the curve parameters obtained through calculation, and error ciphertext output. By the adoption of the method for attacking the elliptical curve encryption algorithm and the attacking device, attacking efficiency is improved.
Owner:DATANG MICROELECTRONICS TECH CO LTD +1

Sound wave based anti-UAV system

The invention discloses a sound wave based anti-UAV (unmanned aerial vehicle) system which is characterized in that position information of an attack UAV is found and collimation position deviation is calculated in real time through a positioning tracking device, and the position information and the collimation position deviation are transmitted to a control and display device in real time; the control and display device transmits the collimation position deviation to a servo module of a sound wave attack device in real time so as to drive the sound wave attack device to aim at the target UAV dynamically in real time; when the target UAV enters an early warning range, the control and display device displays a motion trail of the target UAV in real time; and when the target UAV enters an attack range, the control and display device sends an attack instruction to the sound wave attack device, the sound wave attack device then transmits a sound wave attack signal to the target UAV, and the UAV generates resonance and thus falls down. Through a method of toughly destroying the UAV on general and special occasions by emitting sound waves capable of resonating with a component of the UAV, the purpose that the UAV can be effectively struck in general cases and can also be struck back in particular cases is achieved.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products