Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

61 results about "Data theft" patented technology

Data theft is a growing phenomenon primarily caused by system administrators and office workers with access to technology such as database servers, desktop computers and a growing list of hand-held devices capable of storing digital information, such as USB flash drives, iPods and even digital cameras. Since employees often spend a considerable amount of time developing contacts and confidential and copyrighted information for the company they work for, they may feel they have some right to the information and are inclined to copy and/or delete part of it when they leave the company, or misuse it while they are still in employment. They can be sold and bought and then used by criminals and criminal organizations. Alternatively, an employee may choose to deliberately abuse trusted access to information for the purpose of exposing misconduct by the employer; From the perspective of the society such an act of whistleblowing can be seen as positive and is in certain situations protected by law in some jurisdictions, such as the USA.

Method and device for detecting a suspicious process by analyzing data flow characteristics of a computing device

Disclosed are methods and devices for detecting a suspicious process. Test values of data flow direction characteristics of a to-be-detected host and sample values of the data flow direction characteristics corresponding to the to-be-detected host in a data flow direction library are acquired, wherein the data flow direction characteristics comprise at least one of a process list and a network egress characteristic, and a data source characteristic. It is then determined that a suspicious process is detected when a test value of the process list is different from a sample value of the process list and / or a test value of the network egress characteristic is different from a sample value of the network egress characteristic in the case that a test value of the data source characteristic is the same as a sample value of the data source characteristic. It can be seen that the disclosed methods and devices for detecting a suspicious process according detect a suspicious process based on the data flow direction characteristics rather than the attack behaviors of applications. Moreover, because data flow direction characteristics change whenever data theft occurs, the methods and devices can accurately detect a suspicious process in which data might be stolen.
Owner:ALIBABA GRP HLDG LTD

User behavior analysis-based data theft risk assessment method and system

The invention provides a user behavior analysis-based data theft risk assessment method and system. The method includes the following steps that: operation behavior pairs of a terminal user are obtained; dangerous operation behavior pairs and the number of the dangerous operation behavior pairs are obtained according to the operation behavior pairs, and a first dangerousness coefficient is obtained; the matching number and mismatching number of web site visit behavior business types and registration business types are obtained according to the dangerous operation behavior pairs, and a second dangerousness coefficient is obtained; dangerous copy behaviors and the number of dangerous copy files are obtained according to copy behaviors, and a third dangerousness coefficient and a fourth dangerousness coefficient are calculated; and a preset risk assessment model is adopted to calculate the dangerousness coefficient of a terminal according to the first dangerousness coefficient, the second dangerousness coefficient, the third dangerousness coefficient and the fourth dangerousness coefficient. With the user behavior analysis-based data theft risk assessment method and system of the invention adopted, the network behaviors of the terminal user of an intranet are analyzed; potential terminals where risk operation may exist can be discovered; data security can be protected; the security of the intranet can be improved; and the losses of enterprises can be reduced.
Owner:BEIJING VRV SOFTWARE CO LTD

Power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission

The invention relates to a power transmission and transformation equipment state monitoring system security protection method based on trust chain transmission, which carries out credible transformation to a power transmission and transformation equipment state monitoring system through identity authentication, platform authentication, integrity measurement, trust chain transmission and other methods. A credible authentication service, an access actuation server and a centralized regulation server are deployed in a main station, and a monitoring terminal, a state information access controller, a state information access gateway machine and a state monitoring proxy are transformed into a credible monitoring terminal, a credible state information access controller, a credible state information access gateway machine and a credible state monitoring proxy, so that the whole monitoring system is constructed into a credible system. The system can effectively prevent malicious program attack, malicious code injection attack, physical data theft, network tapping, sniffing attack and the like, and protect the security of the monitoring system and an internal power grid system; and the invention also provides a trust chain transmission model which is used for proving that under trust chain transmission, as long as each level of a trust chain is credible, the whole system is credible.
Owner:STATE GRID ELECTRIC POWER RES INST

Method for protecting digital asset private key and handling private key loss or identity data theft

The invention discloses a method for protecting a digital asset private key and handling private key loss or identity data theft. The method comprises the steps of: generating identity data of a private key for the user to save after the private key is generated; generating a new private key-address pair when the private key of the user is lost or stolen; initiating a loss reporting transaction bythe user or a thief, and depositing a guarantee deposit; verifying whether a signature is correct, and determining that the present loss report is invalid and the deposit is not refunded if the signature is not correct; locking the loss reporting behavior as a delay period by means of a blockchain node, wherein a private key corresponding to a loss reporting new address cannot transfer assets while an original private key can transfer assets; and allowing the private key corresponding to the loss reporting new address to transfer assets after the delay period ends. The method does not need tobackup a private key mnemonic word, truly realizes the effect that ''the private key cannot come out of hardware'', significantly reduces the stolen risk of the private key, is easy to retrieve the assets after the private key is lost, avoids the loss of the assets due to the loss of the private key, can protect the assets for a period of time after the private key is stolen, and enhances the anti-theft performance of digital assets.
Owner:四川链安信科技有限公司

Household NAS network memory

The invention discloses a household NAS network memory comprising a shell, a sealing door, a pair of lifting handles, one or multiple hard disks, a microprocessor, a secrecy mechanism and a loudspeaker. The sealing door is hinged with the shell. The pair of the lifting handles are respectively arranged at the two sides of the top part of the shell which is internally provided with a hard disk accommodating cavity. The internal wall of the shell is provided with a layer of damping pad. The hard disks are arranged in the hard disk accommodating cavity and are fixed via connecting members arranged at the periphery of the hard disks. The microprocessor and the secrecy mechanism are arranged above the hard disk accommodating cavity. The microprocessor is connected with the secrecy mechanism which is composed of a secrecy controller, a displacement sensor and a photosensitive sensor. The secrecy controller is respectively connected with the displacement sensor and the photosensitive sensor. The loudspeaker is arranged at the top part of the shell. The loudspeaker is connected with the secrecy mechanism. Data theft can be prevented via change of light rays and movement of the position of the hard disks. Besides, the shell is sealed so as to be dustproof and waterproof, the hard disks can be effectively protected and data security is ensured.
Owner:TIANJIN LIANGZHENG SCI & TECH

Anti-theft storage device below network data line

The invention relates to the technical field of data theft prevention, in particular to an anti-theft storage device below a network data line. The anti-theft storage device comprises a containing box, a storage device is arranged on the inner side face of the containing box, and a baffle making contact with the storage device is rotationally connected to one side of the side face, located on the opening side, of the containing box through hinges. A connecting plate is arranged at the position, corresponding to a front panel of the storage device, on one side of the side face of the baffle, a locking block making contact with the inner top face of the containing box is fixedly connected to the side face of the baffle, a lock cylinder rotationally connected with the connecting plate is rotationally connected in the locking block, and an open groove rotationally connected with the lock cylinder is formed in the side face of the containing box. In the anti-theft storage device, a sliding plate is slidably connected through the open groove, after the storage device is placed in the containing box, the containing box and the baffle can be mutually fixed through the locking block, and therefore the containing box and the baffle can block the storage device, a hard disk in the storage device is prevented from being taken away, other people are not prone to stealing an NAS storage server, and the device is beneficial to data storage and is convenient to use.
Owner:CAPITAL UNIV OF ECONOMICS & BUSINESS

Method for tampering secret stealing information on power line and preventing interference

The invention provides a method for tampering secret stealing information on a power line and preventing interference, and relates to the technical field of data theft prevention. The method for tampering secret stealing information on the power line and preventing interference comprises the following steps: 1) installing current and voltage sensors on a live wire and a zero wire, and then connecting the current and voltage sensors with an ADC of a single-chip microcomputer MCU; and 2) performing high-speed sampling on the power information by using a single-chip microcomputer, performing AD conversion on the information on the current sensor and the voltage sensor by the single-chip microcomputer, judging whether secret stealing information is transmitted on the power line or not throughcalculation, and if the secret stealing information is transmitted, calculating the Baud rate, the amplitude and the waveform starting time of the secret stealing information. After the amplitude of secret stealing information is analyzed through the single-chip microcomputer, proper loads are selected from the load array through calculation to form an interference load, the single-chip microcomputer drives the loads to be synchronously and randomly switched on and off at the frequency the same as that of the secret stealing information, and the purposes of interfering and tampering the secretstealing information are achieved under the condition that the network is not connected.
Owner:中科可来博(固安)航天电器制造有限公司

Self-hiding data transmission port data theft prevention encryption device for computer

The invention relates to the technical field of computer encryption, and discloses a self-hiding data transmission port data theft prevention encryption device for a computer, which comprises a mounting base, a reset spring is movably connected to the top of the mounting base, a connecting rod is movably connected to the top of the reset spring, and a push block is movably connected to the top of the connecting rod. The top of the push block is movably connected with an explosion-proof plate, the top of the explosion-proof plate is movably connected with a strong magnetic block, the left side of the strong magnetic block is movably connected with a transmission port, magnetism is generated by electrifying an electrified coil, and therefore an encryption spring is stretched to deform to drive an encryption magnet to move, and the encryption magnet moves to drive the transmission port to move. Meanwhile, the force compresses the reset spring to deform and then drive the explosion-proof plates to move, and the two explosion-proof plates move oppositely at the moment, so that the two strong magnetic blocks are separated, the connecting seat is completely exposed, and the effect of automatically hiding the data transmission port to prevent data from being stolen is achieved.
Owner:杭州墨磬智能技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products