Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

54 results about "Grey list" patented technology

A gray list is a list of stocks that are ineligible for trade by an investment bank's risk arbitrage division. Securities on the gray list aren’t necessarily exceptionally risky or otherwise inherently flawed. The gray list is composed of firms working with the investment bank, often in matters of mergers and acquisitions.

Harassment-resistant telephone secretary cloud service achieving method based on intelligent question answering

The invention relates to a harassment-resistant telephone secretary cloud service achieving method based on intelligent question answering. The method comprises the following steps that (1) a telephone secretary service is configured for an owner telephone, a telephone secretary service process judges each incoming call number, ringing is performed to notify an owner for incoming calls belonging to a white list, interception is performed for incoming calls belonging to a black list, and a robot is started to perform answering for incoming calls belonging to a grey list; (2) for strange incoming calls, the robot is started to carry out intelligent question answering with callers, and whether the ringing is performed or the grey list is accessed is decided according to question answering contents; (3) for the incoming calls in the grey list, the robot is started to carry out intelligent question answering with callers, the incoming calls can be directly hung up and are classified in theblack list in combination with owner settings according to re-judgment of the suspicious degree of the incoming calls; and (4) for the harassment/fraud calls belonging to the black list, a mode can beswitched to a training/punishment mode in addition to direct hang-up, so that a training tool of the question-and-answer robot is realized.
Owner:SOUTHEAST UNIV

Anti-fraud and anti-harass fixed-line telephone based on intelligent question-answering system

The invention relates to an anti-fraud and anti-harass fixed-line telephone based on an intelligent question-answering system. A grey list and an intelligent question-answering module are arranged inthe fixed-line telephone, and the fixed telephone comprises the following operations: for each dialed-in number, performing matching on the numbers in the white list, the black list and the gray listaccording to the number through the intelligent question-answering module, if the matching is successful, judging the dialed-in number as the known number in the white list if the matching is successful, and ringing to notify a telephone owner to answer; judging the dialed-in number as the known telephone in the blacklist if the matching is successful, and directly rejecting the dialed-in number;judging the dialed-in number as the known telephone in the grey list if the matching is successful, or judging as the strange number if the matching is unsuccessful, and starting a robot to perform intelligent question-answering with a caller; extracting marker words according to the question-answering content, and judging whether rings to notify the owner or adds in the grey list or adds in the black list through marker words matching. The telephone disclosed by the invention can effectively judge whether the strange incoming call is a harass telephone, thereby avoiding the condition that theowner is harassed due to missed judgment or the normal telephone is missed due to misjudgment.
Owner:SOUTHEAST UNIV

Vehicle detection method and device, storage medium and electronic equipment

The embodiment of the invention provides a vehicle detection method and device, a storage medium and electronic equipment, and the method comprises the steps: obtaining a to-be-detected data frame ina vehicle, and obtaining a to-be-detected identification of the to-be-detected data frame; matching the to-be-detected identifier with the white list, and determining whether the to-be-detected identifier appears in the white list or not; when the to-be-detected identifier does not appear in the white list, matching the to-be-detected identifier with the blacklist, and determining whether the to-be-detected identifier appears in the blacklist or not; under the condition that the to-be-detected identifier does not appear in the blacklist, determining that the to-be-detected data frame is a suspicious data frame; and detecting the suspicious data frames by utilizing the grey list. According to the embodiment of the invention, black, white and gray three-level classification is carried out onthe identifier of the to-be-detected data frame on the in-vehicle bus, so the coverage range can be improved. Moreover, the to-be-detected data frame can be detected through the obtained white list,black list and grey list, so diversified measures can be taken.
Owner:BEIJING TOPSEC NETWORK SECURITY TECH +2

White list self-adapting program management method and system, terminal and storage medium

The invention provides a white list self-adapting program management method and system, a terminal and a storage medium. The method comprises the following steps: scanning program information of a target server; uploading the program information to a program centralized management center in the form of a list for permission identification, identifying white list programs and black list programs on the list, and dividing unidentified programs into a grey list; monitoring operation behaviors of the grey list programs in an observation period according to a built-in malicious behavior rule base, and generating credit scores of the grey list programs according to monitoring results; and adjusting operation permissions of the grey list programs according to the credit scores of the grey list programs, and performing list division on programs according to the credit scores of the grey list programs after the observation period ends. According to the invention, the program list of all executable programs on a host is managed, so that attacks of unknown malicious software are effectively prevented, and continuity and safety of services are guaranteed to the maximum extent; and meanwhile, the operation and maintenance efficiency of safety operation and maintenance personnel is improved, and the operation and maintenance cost is reduced.
Owner:INSPUR SUZHOU INTELLIGENT TECH CO LTD

Operation and maintenance operation instruction security analysis method and system and storage medium

The invention discloses an operation and maintenance operation instruction security analysis method and system and a storage medium, and the method comprises the following steps: 1) reading historicaloperation instruction data, and carrying out character vectorization of a character set of the historical operation instruction data; 2) taking the vectorized operation instruction data as input, establishing a neural network model, and forming a mesh relation graph of the operation instruction data; 3) performing data dimension reduction processing on the operation instruction character data inthe mesh relation graph; 4) performing data clustering processing after the data dimension reduction processing is finished; and 5) performing definition and arrangement of black and white grey listson the operation and maintenance instruction data set clustered in the step 4) according to an actual service scene to form output data, and writing all black and white grey list output data into a specified database. According to the method, the problems of difficulty in manually labeling categories, excessively complicated labeling and the like in the operation and maintenance operation instruction security analysis process are solved, and the automation degree of operation and maintenance operation instruction security analysis is improved.
Owner:STATE GRID CORP OF CHINA +6

Blacklist management method and device, computer system and readable storage medium

The invention discloses a blacklist management method and device, a computer system and a readable storage medium, and the method comprises the following steps: receiving proposal information, verifying a first node, generating a verification result, and writing the proposal information into a grey list of a blockchain according to the verification result; receiving voting information, setting successfully verified voting information of a second node as normal voting information, and writing the normal voting information into a grey list; calculating a voting result according to the normal voting information and the weight of the second node generating the normal voting information; if the voting result is yes, writing the proposal information and the voting result thereof into a blacklistof the block chain; if the voting result is negative, reserving the proposal information and the voting result thereof in a grey list; increasing or decreasing the weight of the first node accordingto the proposal information written into the blacklist or reserved in the grey list and the voting result thereof. According to the method disclosed in the invention, blockade and privacy of the proposal information and the voting information are ensured, and authenticity of the proposal information written into the blacklist is ensured.
Owner:PING AN ASSET MANAGEMENT CO LTD

Intelligent question and answer-based fax machine with advertisement shielding function

The invention relates to an intelligent question and answer-based fax machine with an advertisement shielding function. A grey list and an intelligent question and answer module are arranged in the fax machine. For each dialed fax number, the fax number is matched with numbers in a white list, a black list and the grey list through the intelligent question and answer module; if the matching succeeds and a fax is determined as a known fax in the white list, ringing is performed for notifying an owner and the fax is received; if the matching succeeds and the fax is determined as a known fax in the black list, the fax is directly intercepted; and if the matching succeeds and the fax is determined as a known fax in the grey list, or if the matching fails and the fax is determined as a strangefax, a robot is enabled to carry out intelligent question and answer with a fax sender, marked words are extracted according to question and answer contents, and whether the ringing is performed for notifying the owner to receive the fax or add the fax to the grey list or the black list is determined through marked word matching. The fax machine can effectively determine whether the strange fax isa junk fax of an advertisement harassment type or not, so that the purpose that advertisement faxes are accurately shielded can be effectively realized.
Owner:SOUTHEAST UNIV

Active defense method and system for exclusive storage space

The invention relates to an exclusive storage space active defense method and system, and the method comprises the steps: collecting environment elements in an authorization server and the information of a monitoring object, and determining that the monitoring object belongs to a white list, a black list or a grey list; when a monitoring object of the authorization server is started, based on the monitoring object, a black list, a white list and a grey list which are respectively stored in the authorization server, the management end equipment and the storage equipment, and a preset protection strategy, performing security verification on the authorization server, and determining whether the authorization server is allowed to access the storage space. According to the invention, a verification mechanism of multi-copy and multi-position storage of black, white and grey lists and security policies enables the lists to be effectively protected; meanwhile, an authorization server, specific authorization application software on the server and a storage equipment security verification mechanism are established; in addition, the method can also support setting of permissions of whether different application software deployed on the same server can access the protected storage area or not, and classified and graded protection of the service system is achieved.
Owner:何小林
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products