Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

952 results about "Blacklist" patented technology

In computing, a blacklist or blocklist is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, which means only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked (or temporarily allowed) until an additional step is performed.

A method for defending against denial of service attacks based on cloud computing platform

ActiveCN102291390ATroubleshoot Denial of Service AttacksDenial of service attack defenseTransmissionAttackInternet privacy
The invention relates to a method for defending against a denial of service attack based on a cloud computation platform, which solves the problem of the HTTP (HyperText Transfer Protocol) denial of service attack on a concrete application. A CPU (Central Processing Unit), a network throughput rate and the like are analyzed to determine whether the denial of service attack exists, and after the existence of an attack behavior is determined, access data is first intercepted; access users are subjected to redirected accesses, and identifying code technology with 4-digit random numbers/letters plus mathematical problems with fixed answers is adopted at Cookie; meanwhile, the number of the redirected accesses is defined to discriminate a legal user from an attacker, and therefore, the IP of the attacker is added to a blacklist, and is banned from accessing so as to filter the attacker; as for the attacks which are disguised as the legal user and continue to attack a server, the inherent elastic performance of the cloud computation platform is utilized to dynamically increase a network bandwidth and the number of virtual servers; and after a system is stabilized, an original system state is recovered, the bandwidth is recovered, and the virtual servers are removed so as to effectively defending against the denial of service attack.
Owner:NANJING UNIV OF POSTS & TELECOMM

Multi-stage phishing website detection method and detection system based on supervised learning

The invention relates to a multi-stage phishing website detection method and detection system based on supervised learning. A first detection layer performs phishing website judgment based on a blacklist database or a white list database, the to-be-detected website is directly output if the website is matched with the blacklist database or the white list database; or a second detection layer extracts features of the to-be-detected website URL and constructs a classifier model to perform detection according to the URL features of the known phishing website; if the website is detected as a suspicious website, a third detection layer downloads the page of the to-be-detected website to acquire the page content features, and the classifier model is constructed according to the known phishing website content features so as to perform the detection; an output end outputs the result that to-be-detected website is the phishing website or the normal website, and adds the data to the blacklist database and the white list database. The primary black-white list judges the known website and reduces the detection cost; the secondary URL detects and distinguish the clear phishing website or the normal website; and the third-stage page content detection identifies the suspicious website of the secondary detection, the judgment result is precise; an identification result is accurate, and the detection time is short.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD +1

System and method for charging billing of electric vehicle during network anomalies

The invention relates to a system and a method for charging billing of an electric vehicle during network anomalies. During the network anomalies, a user holds a terminal by hand to connect a centralized control through a WiFi network and submits a charging request of the user to the centralized control, after the centralized control compares a VIN (vehicle identification code) with a post blacklist stored in the centralized control after acquiring the VIN, and if the VIN is not in the blacklist, the centralized control starts a charger to perform charging billing on the electric vehicle through a charging module, stores charging information and arrearage data, then uploads the charging information and the arrearage data to a cloud server when the network is normal, and requests a newest post blacklist from the cloud server; the cloud server sends arrearage information to the user after receiving the charging information and the arrearage data which are uploaded by the centralized control; the cloud server sorts a new post blacklist and sends the new post blacklist to centralized controls of various charging stations; the cloud server receives payment information of the user and updates the blacklist. According to the method, the charging request is finished through access of a local area network; the vehicle is positioned uniquely by acquiring the VIN of the vehicle, the identification rate is high, and the feasibility is good.
Owner:XIAN TGOOD INTELLIGENT CHARGING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products