Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34 results about "Intrusion tolerance" patented technology

Intrusion tolerance is a fault-tolerant design approach to defending information systems against malicious attack. Abandoning the conventional aim of preventing all intrusions, intrusion tolerance instead calls for triggering mechanisms that prevent intrusions from leading to a system security failure.

Self-curing J2EE application server for intrusion tolerance and self-curing method thereof

The invention discloses a self-curing J2EE application server for intrusion tolerance and a self-curing method thereof. The application server comprises an intrusion tolerance functional unit, a self-curing functional unit, a secure group communication system and a base platform for the J2EE application server, wherein the self-curing functional unit is used for receiving output results of the intrusion tolerance functional unit and the secure group communication system to carry out self-curing treatment, provides self-curing function support for the base platform for the J2EE application server and comprises a detection component, a management component and an execution component; the detection component detects intrusion and failure and submits results to the management component; the management component analyzes the detection results and gives and sends a curing scheme to the execution component; and the execution component cures the application server according to the curing scheme. On the basis of the intrusion tolerance method, the self-curing method is additionally provided with reactive recovery and periodic recovery, further improves the reliability and the survivability of the J2EE application server and can be applied to the field of network security.
Owner:THE PLA INFORMATION ENG UNIV

Tolerant digital certificate distribute system and distribute method

A digital certificate issuing system with intrusion tolerance ability and the issuing method thereof are disclosed. The system comprises an offline secret key distributor, at least one online task distributor, k online secret share calculators and m online secret share combiners. And the method includes: splitting a private key into multiple first sub-secret-keys and multiple second sub-secret-keys, wherein the multiple first sub-secret-keys are divided into k groups, and the private key is constructed by one second sub-secret-key and t first sub-secret-keys, the second sub-secret-key corresponds to the t first sub-secret-keys according to an equation combination representation including t items of j and i, j is sequence number of the group which has the first sub-secret-key, and i is number of the first sub-secret-key in the jth group, each of j in one equation combination representation is different, j, i, k, and t are positive integers, and t is less than k; calculating t first calculation results according to a certificate to be signed and the t first sub-secret-keys in the multiple first sub-secret-keys upon receiving the certificate to be signed; obtaining the second sub-secret-key corresponding to the t first sub-secret-keys according to the equation combination representation; calculating a second calculation result according to the second sub-secret-key obtained and the certificate to be signed; generating a digital signature according to the t first calculation results and the second calculation result; generating a digital certificate according to the digital signature and contents of the certificate to be signed.
Owner:INST OF INFORMATION ENG CAS

Intrusion-tolerant cloud workflow implementation method and system

According to the cloud workflow implementation method with intrusion tolerance, the executive programs corresponding to the tasks in the workflow are deployed in the containers respectively, and thenthe containers are transplanted to the virtual machines with the different operating systems, so that the cloud system intrusion tolerance capability can be effectively improved. Furthermore, the subtask results executed by the plurality of virtual machines are judged; calculating the confidence coefficient of the sub-task result generated within the preset time; therefore, the reliability and credibility of the execution of the current subtask are determined, whether the selection result is submitted to the next subtask or the execution subtask of the virtual machine is reset is determined, the reliability and credibility of the output result are ensured through the mutual judgment and verification of the generation results of the plurality of virtual machines, and the invasion toleranceof the cloud system can be truly improved. In addition, the invention provides a system applying the cloud workflow implementation method with intrusion tolerance, and the purpose and the effect of the implementation method are achieved.
Owner:ZHUHAI GAOLING INFORMATION TECH COLTD +1

Multi-path safety topology control method with intrusion tolerance capacity

The invention relates to a multi-path safety topology control method with intrusion tolerance capacity, which comprises the steps of: cluster head selection, i.e., determining an optimal cluster number according to an initialization parameter, calculating cluster head election probabilities and cluster head competition radii, and determining cluster head nodes; clustering, i.e., selecting to add non-cluster-head nodes into an optimal cluster according to residual energy and node distance information of a cluster head which sends out an invitation; routing establishment, i.e., enabling a sourcenode to establish a single hop of single path by adopting direct communication or establish multiple hops of paths by adopting an indirect communication mode according to different transmission distances with target nodes, and storing routing information; and data transmission, i.e., enabling the source node to carry out patch transmission on data to the target nodes according to the establishedpath by combining (k, n) threshold secret sharing scheme. According to the invention, in a case that a malicious node exists in a network and a data transmission path is damaged, normal transmission of the data can be ensured so as to achieve effects of balancing energy consumption and prolonging the life cycle of the network.
Owner:ZHEJIANG SCI-TECH UNIV

Self-curing J2EE application server for intrusion tolerance and self-curing method thereof

The invention discloses a self-curing J2EE application server for intrusion tolerance and a self-curing method thereof. The application server comprises an intrusion tolerance functional unit, a self-curing functional unit, a secure group communication system and a base platform for the J2EE application server, wherein the self-curing functional unit is used for receiving output results of the intrusion tolerance functional unit and the secure group communication system to carry out self-curing treatment, provides self-curing function support for the base platform for the J2EE application server and comprises a detection component, a management component and an execution component; the detection component detects intrusion and failure and submits results to the management component; the management component analyzes the detection results and gives and sends a curing scheme to the execution component; and the execution component cures the application server according to the curing scheme. On the basis of the intrusion tolerance method, the self-curing method is additionally provided with reactive recovery and periodic recovery, further improves the reliability and the survivabilityof the J2EE application server and can be applied to the field of network security.
Owner:THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products