Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

118 results about "Defence system" patented technology

Specific Defence System. This defence system is called the specific defence system because the system attacks specific invaders. This can happen by the production of antibodies or by white blood cells engulfing a particular pathogen.

Large-scale DDoS attack detection and defense system based on cloud + end device on-demand linkage mode, and defense method

ActiveCN109450841ABreak through the bottleneck of anti-D defenseComprehensive defense against DDoS attacksTransmissionGranularitySystem protection
The invention relates to the technical field of network cloud security protection, and specifically relates to a large-scale DDoS attack detection and defense system based on a cloud + end device on-demand linkage mode. The system comprises a cloud platform defense system and a local end defense system, the cloud defense system comprises a cloud scheduling center, a cloud cleaning node device anda DNS near-source resolution server, and the local end defense system is used for performing fine-granularity cleaning protection for access service server traffic, performing cooperative processing with the cloud cleaning node device and performing message forwarding. Relative to single local end defense system protection, the large-scale DDoS attack detection and defense system provided by the invention can take advantages of high-capacity cleaning capability of cloud distributed cleaning nodes, and can break anti-D defense bottleneck of local bandwidth limit; and relatively to single continuous access cloud protection, the large-scale DDoS attack detection and defense system provided by the invention can realize more comprehensive defense to DDoS attacks and better cleaning effects through cloud node distributed cleaning and secondary fine filtering of the local end defense system.
Owner:ANHUI ZHONGXIN SOFTWARE

Security analysis method for mimicry defense architecture

The invention discloses a security analysis method for a mimicry defense architecture. The method comprises the following steps: defining the dynamic transformation period of an executor in a securityanalysis model, the time required for successful attack implementation, the probability that the executor shows difference after being attacked, and the probability that an attacker successfully transfers the attack; analyzing the security of the single redundancy defense architecture; obtaining the probability of invading the input proxy component, the probability that the attack continues to stay in the input agent component, the probability that the attack invades into the heterogeneous execution body set from the input agent component, the probability that the attack continues to stay inthe heterogeneous execution body set, the probability that the attack invades into the voter component from the heterogeneous execution body set and the probability that an attacker successfully invades into the voter component from the input agent component are set; and analyzing the security of the n redundancy defense architecture to obtain general values corresponding to the six probability values. According to the method, different parameters are used for analyzing the security defense effectiveness of the mimicry defense system, and a theoretical analysis basis is provided for the security of the mimicry defense model.
Owner:NANJING UNIV OF SCI & TECH

Industrial control security defense system

The invention discloses an industrial control security defense system which comprises a potential threat exclusion layer, an industrial control security audit system, a monitoring center, a field monitoring layer, a control layer and a physical layer. The potential threat elimination layer comprises a deep protocol analysis mechanism and a white list mechanism; the field monitoring layer performs data exchange and behavior control on the control layer and the physical layer through an industrial Ethernet; the industrial control security auditing system can analyze and identify illegal operation, abnormal events and external attacks in an industrial control network from multiple angles and give an alarm in real time; identity recognition is carried out through multiple means, system operation authority can be limited, override operation and malicious operation are avoided, it is avoided that external equipment carries viruses to affect system safety, meanwhile, exclusive detection can be carried out on common attack means, and the operation resource occupancy is small. The alarm response time of the whole system can be prolonged through unified monitoring management of the monitoring center, and the accident handling speed is increased.
Owner:上海磐御网络科技有限公司

Farm gate guard defense system

PendingCN110771516AAvoid harmGuaranteed to be absolutely cleanAnimal housingOther apparatusFisheryEngineering
The invention discloses a farm gate guard defense system, which comprises a vehicle passage and a personnel passage; the outside of a farm is communicated with a farm raising area through the vehiclepassage; the personnel passage leads to a disinfection area; the disinfection area comprises a personnel entry disinfection one-way passage and a material disinfection passage; an exit of the personnel entry disinfection one-way passage and an exit of the material disinfection channel face a quarantine region; the quarantine region is a closed region surrounded by a plurality of houses and enclosing walls; the quarantine area is internally provided with an entry disinfection passage for entry of the farm raising area and a personnel departure one-way passage leading to the personnel passage; the farm gate guard defense system also comprises a kitchen with an access door, and the access door of the kitchen faces the outside of the farm; the wall of the kitchen is provided with at least three meal pick-up ports which are isolated from one another; and the three meal pick-up ports are respectively opened to the raising area, the quarantine region and the outside of the farm. The farm allows the quarantine region and the raising area to be clearly divided, personnel in the areas are isolated from each other without crossing, one-way flow leads to the raising area, dirty and clean areashave a clear boundary, and the biological safety of the whole gate guard defense system is improved and guaranteed.
Owner:宿迁市立华牧业有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products