Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

43 results about "Insider attack" patented technology

An insider attack is a malicious attack perpetrated on a network or computer system by a person with authorized system access.

SDN edge computing network system based on blockchain encryption, encryption method and medium

The embodiment of the invention discloses an SDN edge computing network system based on blockchain encryption, an encryption method and a medium. The embodiment of the invention provides a technical scheme. Encrypting the configured and updated network strategy through the application layer and sending the encrypted and updated network strategy to the blockchain layer; the block chain layer receives the network strategy and decrypts the network strategy; and performing consensus authentication on the decrypted network strategy through a plurality of consensus nodes, storing the authenticated network strategy in the blockchain network in a distributed manner, extracting the network strategy from the blockchain layer by the control layer, and issuing the network strategy to the data forwarding layer, so that the data forwarding layer performs data forwarding according to the network strategy. By adopting the technical means, the security of network strategy transmission and issuing can be guaranteed, and data loss and network internal attacks are avoided. And furthermore, by storing administrator account address information, the identity of a network strategy configurator is convenient to determine, so that a basis is provided for tracing the identity of an attacker in the network.
Owner:广州广大通电子科技有限公司

Identity-based digital signature password reverse firewall method

The invention discloses an identity-based digital signature password reverse firewall method, and belongs to the technical field of information security. The method comprises the following steps: firstly, a transparent and credible password reverse firewall is set at a signature end, and related system parameters are set; the password reverse firewall re-randomizes part of the received parametersand then transmits the re-randomized parameters and other non-re-randomized parameters to the signature end; the signature end carries out signature to obtain a signature result sigma = (V, Ru, Rm), the rear two parts of the signature result are reset through the password reverse firewall of the signature end, and then the partially reset signature result is transmitted to a verification end; andthe verification end verifies the legality of the received signature result, if the signature result passes the verification, 'acceptance' is output, and otherwise, 'rejection' is output. According tothe identity-based digital signature password reverse firewall method, transparency and credibility are realized, leakage is prevented, the safety of a user is improved, and the attack behavior of aninternal attacker is particularly protected.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Quantum arbitration signature method and system based on six-particle stealth transfer

The invention belongs to the technical field of quantum arbitration signature and discloses a quantum arbitration signature method and system based on six-particle stealth transfer, and the method comprises the steps: preparing n pairs of six-particle cluster states through Charlie, enabling the Charlie and Alice and Bob to respectively share secret keys Kac and Kbc, and enabling the Alice or Bobto initiate a communication request to the Charlie; preparing three parts of ABs (| psi > AB) according to the message M and Alice, selecting a random number r1, encrypting three parts of quantum states by using a one-time pad password book, and then encrypting the three parts of quantum states by using Kac (| psi > '1); verification signature. A six-particle entanglement system composed of two three-particle GHZ states is used, and the stable entanglement attribute of the six-particle entanglement system is utilized to realize long-term particle storage, so that noise interference existing ina quantum channel can be well resisted; internal attack and external attack strategies are resisted through a shared key pair; a three-party mutual identity authentication framework is established through key pairs shared by three parties respectively.
Owner:CHENGDU UNIV OF INFORMATION TECH

Password reverse firewall method suitable for digital signature

The invention discloses a password reverse firewall method suitable for a digital signature, and belongs to the technical field of information security. The method comprises the following steps: firstly, setting a transparent and credible password reverse firewall at a signature party, and setting related system parameters; when the password reverse firewall receives the parameters, resetting partof the parameters and then forwarding to the signature party; the signature party signing the message based on the received parameters to obtain a signature result and transmitting the signature result to a password reverse firewall of the signature party, and the password reverse firewall resetting part of sub-signatures in the signature result and then transmitting the sub-signatures to the verification party; and the verification party carrying out verification processing on the received signature, verifying a legal signature about the message, outputting acceptance if the verification ispassed, and outputting rejection if the verification is not passed. The arrangement of the password reverse firewall meets three basic requirements of the password reverse firewall, transparency and credibility are achieved, leakage is prevented, the safety of a user is improved, and the attack behavior of an internal attacker is particularly protected.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Private information comparison method based on continuous variable ionic state

The invention belongs to the field of quantum communication and quantum cryptography, and particularly relates to a private information comparison method based on a continuous variable ionic state. The method comprises the following steps: initializing a system; the third party prepares two pairs of continuous variable quantum entangled states, preprocesses the continuous variable quantum entangled states and sends corresponding particles to the participants; the participant encodes the preprocessed corresponding particles and sends the encoded particles to the third party; the third party processes the corresponding particles to obtain a first classical measurement result and a second classical measurement result; the third party carries out safety monitoring according to the first classical measurement result and the second classical measurement result, if the safety monitoring is passed, private information comparison is completed according to the first classical measurement result and the second classical measurement result, and a comparison result is published, otherwise, system initialization is returned; according to the method, external attacks and internal attacks can be effectively resisted, the security and correctness of the protocol are ensured, quantum resources can be prepared, unified operation and measurement can be realized, and the method has higher practicability.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

5g positioning truth detection and attack traceability method, system, equipment and application

The invention belongs to the technical field of user positioning security in mobile communication networks, and discloses a method, system, device and application for 5G positioning truth detection and attack traceability; relevant parameters are extracted from wireless signals sent by users, and the data fusion center utilizes clustering The method clusters the positioning data, excludes abnormal data, and realizes truth detection and credible positioning information calculation; uses the historical records of positioning parameters to extract relevant features, and completes the training of user attack detection model and base station traceability model. , respectively analyze the positioning parameters of the user to be detected and the parameters uploaded by the positioning base station, and effectively complete the attack detection of the target user and the attack traceability of the malicious base station. The invention can not only ensure the authenticity and reliability of user positioning, but also has extremely high positioning accuracy, and can effectively resist interference attacks on user wireless positioning signals and internal attacks on base stations responsible for positioning, ensuring the security of the positioning system, and has excellent robustness.
Owner:XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products