Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

158 results about "Mimicry" patented technology

In evolutionary biology, mimicry is an evolved resemblance between an organism and another object, often an organism of another species. Mimicry may evolve between different species, or between individuals of the same species. Often, mimicry functions to protect a species from predators, making it an antipredator adaptation. Mimicry evolves if a receiver (such as a predator) perceives the similarity between a mimic (the organism that has a resemblance) and a model (the organism it resembles) and as a result changes its behaviour in a way that provides a selective advantage to the mimic. The resemblances that evolve in mimicry can be visual, acoustic, chemical, tactile, or electric, or combinations of these sensory modalities. Mimicry may be to the advantage of both organisms that share a resemblance, in which case it is a form of mutualism; or mimicry can be to the detriment of one, making it parasitic or competitive. The evolutionary convergence between groups is driven by the selective action of a signal-receiver or dupe. Birds, for example, use sight to identify palatable insects, whilst avoiding the noxious ones. Over time, palatable insects may evolve to resemble noxious ones, making them mimics and the noxious ones models. In the case of mutualism, sometimes both groups are referred to as "co-mimics". It is often thought that models must be more abundant than mimics, but this is not so. Mimicry may involve numerous species; many harmless species such as hoverflies are Batesian mimics of strongly defended species such as wasps, while many such well-defended species form Mullerian mimicry rings, all resembling each other. Mimicry between prey species and their predators often involves three or more species.

Majority consistent escape error processing device based on mimicry security defense zero-day attack and method thereof

The invention relates to a majority consistent escape error processing device based on mimicry security defense zero-day attack and a method thereof. The method comprises: a heterogeneous executive in a dynamic online executive assembly independently operating an input request; performing multimode adjudication on an operation result, if an adjudication result meets a consistency requirement, outputting the adjudication result, if not, feeding back the adjudication result to a dynamic decision dispatching module; comparing new online executive operation output with online original majority consistent executive operation output, respectively feeding back results to the dynamic decision dispatching module and a responding module; the responding module processing the response according to feedback, and feeding back abnormal output executive to the dynamic decision dispatching module; and the dynamic decision dispatching module selecting new executive to be online from an executive resource pool, and cleaning and resetting offline executives. The method is used to provide means of detection and response when majority of mimicry defense online executives are attacked, and solves security threat a mimicry defense system faces, so as to enhance robustness of the mimicry system.
Owner:THE PLA INFORMATION ENG UNIV

Mimicry defense architecture based zero-day attack detection, analysis and response system and method thereof

The invention relates to a mimicry defense architecture based zero-day attack detection, analysis and response system and a method thereof. The method comprises the steps of performing attack detection and processing on the input, cheating and inducing an attacker through honeypot type executing bodies, and performing meta-function inspection on the output of each executing body; performing statistical analysis on abnormal output by combining abnormal information, updating a zero-day attack database, feeding back an analysis result to an intrusion response module, and preventing persistent attacks of the attacker; performing dynamic adjustment and management on an online executing body by combining voting conditions, executing body dispatching, the executing body with abnormal output and the like, and selecting executing bodies from an executing body resource pool to get into a dynamic online executing body set; and analyzing a zero-day vulnerability in the executing body with abnormal output according to an anomaly statistical analysis result, and repairing the related executing bodies in the executing body pool. According to the invention, functions and the flexibility of mimicry defense architecture are enhanced, values of the abnormal output are sufficiently utilized, and the threat and the defense cost of zero-day attacks are reduced.
Owner:THE PLA INFORMATION ENG UNIV

Mimicry switch heterogeneous executor cleaning recovery method and device

The invention discloses a heterogeneous executor cleaning recovery method and device in a mimicry switch. The method comprises the steps that a mimicry scheduler judges downlink data from a pluralityof heterogeneous executors, and marks a to-be-cleaned specified heterogeneous executor; specifying a heterogeneous execution body to restart, and then specifying the heterogeneous execution body to send a normal protocol negotiation message to try to interact with the mimicry scheduler; the mimicry scheduler detects whether the specified heterogeneous executor is in a cleaning state or not according to the protocol negotiation message, the message sending process is repeated until the state of the specified heterogeneous executor is recovered, and the mimicry scheduler is notified; and the mimicry scheduler marks that the state of the specified heterogeneous executor is normal. According to the method, under the condition that protocol stacks on the heterogeneous executors do not need to be modified, the normal working state can be quickly restored when one or more heterogeneous executors are attacked by the outside or the inside of the heterogeneous executors is abnormal, and the method has important guiding significance for the cleaning and restoring technology of the multimode heterogeneous executor architecture system.
Owner:PURPLE MOUNTAIN LAB

Stapled-RGD polypeptide, and applications thereof in tumor targeting delivery

The invention belongs to the field of pharmacology, and relates to stapled-RGD polypeptide, and applications thereof in tumor targeting delivery. Multifunctional targeting polypeptide molecule stapled-RGD with high combination activity with integrin and biological membrane barrier penetration capacity is designed and prepared based on binding peptide cyclization technology; and preparation of fluorescein, drugs, and high molecule carriers modified by the multifunctional targeting polypeptide molecule stapled-RGD, and applications of the fluorescein, the drugs, and the high molecule carriers in tumor imaging and construction of targeted therapy targeted drug delivery systems are disclosed. It is shown by results that specific uptaking of model drugs carried by stapled-RGD by positive cells, tumor mimicry vessels, and tumor ball tissues of expressed integrin is realized, higher tumor targeting capacity, imaging functions, and membrane barrier cell penetration capacity are achieved; nano targeted drug delivery systems constructed by the high molecule carriers modified by stapled-RGD can be used for delivering carried model drugs to target tissues, antitumor drug effect is improved obviously; and stapled-RGD possesses a promising application prospect in mediating drugs, nano targeted drug delivery system membrane barrier penetration, active target searching, tumor diagnosis, and targeted therapy.
Owner:FUDAN UNIV

Universal mimicry distribution voting scheduling device and method based on user-defined protocol

The invention discloses a universal mimicry distribution voting scheduling device and method based on a user-defined protocol. The universal mimicry distribution voting scheduling device comprises a distribution unit, a heterogeneous executive body, a voting unit and a negative feedback scheduling unit; the distribution unit comprises a network packet receiving module, a protocol conversion module, a data distribution module and a management module; the heterogeneous execution body comprises a data receiving module, a protocol conversion module, a heterogeneous execution unit and a data sending module; and the voting unit comprises a data receiving module, a data voting module, a protocol conversion module, a network packet sending module and a management module. The invention provides a set of mimicry structure framework with universality, which is beneficial to rapidly, simply and conveniently developing various mimicry defense devices; compared with a traditional defense mechanism,the security can be greatly improved, so that higher-level security protection can be implemented on the system; and the distribution unit and the voting unit are separated, so that the safety of thevoter can be improved, the overall defects of the mimicry defense equipment are overcome, and the system-level safety is further guaranteed.
Owner:上海拟态数据技术有限公司 +1

Mimicry switch judgment system and method based on trusted measurement

The invention belongs to the technical field of network security, and discloses a mimicry switch decision system based on trusted measurement, and the system comprises a forwarding plane, a managementinterface agent, an intermediate adaptation module, a forwarding plane agent, a plurality of heterogeneous actuators, a trusted measurement-based mimicry decision module and a situation awareness andnegative feedback scheduling module. The invention further discloses a mimicry switch judgment method based on trusted measurement. The mimicry switch judgment method comprises the steps: setting mimicry switch judgment elements; distributing input information; collecting output information; carrying out mimicry decision based on credibility measurement; issuing a judgment result, sensing the threat situation of the switch, and scheduling an executor; the mimicry decision based on credibility measurement comprises the following steps: establishing an executive credible index tree; collectingand updating the credible index data of the executive body; calculating the credible weight of the output result of each executive body; and calculating the credibility of each output result. The method can effectively reduce the influence of unknown loopholes and potential backdoors, and improves the safety protection level of a local area network.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +1

Mimicry honeypot fingerprint confusion system and method and SDN network architecture thereof

ActiveCN109246108AReduce fingerprint recognition rateAvoid influenceTransmissionCommunications securityNetwork architecture
The invention belongs to the technical field of communication safety, and especially relates to a mimicry honeypot fingerprint confusion system and method and an SDN network architecture thereof. Thesystem comprises a control center which is deployed on a distributor and is used for maintaining the working state of a honeypot, dynamically generating a honeypot scheduling rule according to the suspicious traffic behavior characteristics fed back by the honeypot, and starting and closing the corresponding honeypot according to the scheduling rule; a distributor which is deployed between a honeypot group and a suspicious traffic source and is used for receiving the outputted suspicious traffic, recording the suspicious traffic, broadcasting the suspicious traffic to each honeypot in the honeypot group, receiving response messages from the honeypots, and transmitting the response messages to the suspicious traffic source as false response messages for replying to a corresponding attacker,wherein the honeypot group contains multiple types of honeypots. The method utilizes a dynamic transformation mechanism to comprehensively schedule a plurality of honeypots, reduces the influence onthe safety performance of the network from a condition that a single honeypot system is controlled by the attacker, and improves the reliability of the entire system.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Security analysis method for mimicry defense architecture

The invention discloses a security analysis method for a mimicry defense architecture. The method comprises the following steps: defining the dynamic transformation period of an executor in a securityanalysis model, the time required for successful attack implementation, the probability that the executor shows difference after being attacked, and the probability that an attacker successfully transfers the attack; analyzing the security of the single redundancy defense architecture; obtaining the probability of invading the input proxy component, the probability that the attack continues to stay in the input agent component, the probability that the attack invades into the heterogeneous execution body set from the input agent component, the probability that the attack continues to stay inthe heterogeneous execution body set, the probability that the attack invades into the voter component from the heterogeneous execution body set and the probability that an attacker successfully invades into the voter component from the input agent component are set; and analyzing the security of the n redundancy defense architecture to obtain general values corresponding to the six probability values. According to the method, different parameters are used for analyzing the security defense effectiveness of the mimicry defense system, and a theoretical analysis basis is provided for the security of the mimicry defense model.
Owner:NANJING UNIV OF SCI & TECH

Mimicry reconstruction and performance computing method of fiber filter medium structure

The invention discloses a mimicry reconstruction and performance computing method of a fiber filter medium structure, and belongs to the technical field of fiber structure mimicry reconstruction. The mimicry reconstruction process comprises the steps: first, obtaining fiber filter medium images; second, setting the best threshold value and performing binarization processing; third, performing center line detection on binary images; fourth, performing four-opposite-angle direction comparison on pixel points of the center line and obtaining the gyration radius di and the gyration direction df; fifth, performing three-dimensional gyration and obtaining a fiber filter medium mimicry reconstruction image. According to the mimicry reconstruction and performance computing method, by inputting a series of relevant parameters, filter efficiency curves and pressure loss curves of fiber filter media at different wind speeds are obtained by means of the empirical formula. According to the method, microcosmic single-layer structure images in real fiber filter media are used as the basis, mimicry reconstruction is performed on the obtained images by means of the simple and rapid image processing method, and a mimicry reconstruction model can simulate the real fiber filter medium structure realistically.
Owner:ANHUI UNIVERSITY OF TECHNOLOGY

Mimicry thought-based security exchange chip, implementation method and network exchange equipment

The invention belongs to the technical field of network switching, and particularly relates to a mimicry thought-based security switching chip, an implementation method of the security switching chipand network switching equipment, and the method comprises the following steps: carrying out scheduling processing on message data of each port according to input scheduling; aiming at each piece of message data, extracting a message header and caching the message data; parsing through a heterogeneous parsing algorithm, and carrying out mimicry judgment on a parsing result; generating a message descriptor according to the judgment result, wherein the message descriptor at least comprises message feature information related to the message forwarding strategy behavior; searching for a mimicry table item verification-based table item cache to obtain forwarding strategy behavior data and updating a message descriptor; and extracting corresponding message data from the cached message data, and sending the extracted message data to a corresponding port in the form of a data packet. The security and reliability of the switch chip are enhanced by introducing such technologies as de-collaborative caching, mimic forwarding engines and mimic table item checking, and the method has important guiding significance for the development of the network switching technology.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Human skeleton point parameter acquisition device applied to humanoid motion mimicry and recognition method thereof

The invention discloses a human skeleton point parameter acquisition device applied to humanoid motion mimicry and a recognition method thereof. The method is characterized by acquiring a depth image, recognizing human joint points by using the depth image by an OpenNI bone recognition algorithm library, extracting spatial coordinates, and providing control data for a robot controller by means of filtering, spatial vector calculation, and leg posture recognition. In view of a problem that posture recognition is influenced by environment so as to be low in recognition accuracy and poor in real-time performance, a new action recognition method based on human skeleton predefining is provided for human-machine interaction posture classification. The method give full scope to an advantage that the Kinect can obtain a depth image feature, organically combines 2bitBP characteristics, constitutes a skeleton predefined posture type, performs posture classification by using an improved support vector machine, and is good in real-time performance, high in recognition accuracy, and good in robustness in the case of illumination variation. The recognition efficiency and accuracy can meet a natural human-machine interaction system requirement.
Owner:江西制造职业技术学院

Mimicry defense system based on SaaS platform

The invention provides a mimicry defense system based on an SaaS platform. The mimicry defense system comprises a cloud management module for processing a user request and feeding back a processing result; a mirror image management module which is used for maintaining a mirror image remote warehouse and storing and deleting the uploaded mirror images; a mimicry arrangement module which is used forscheduling resources required for creating the heterogeneous executors of the application and generating information required for creating each heterogeneous executor; an executive management modulewhich is responsible for creating and deleting a heterogeneous executive; a mimicry distribution module which is used for sending the user request to each heterogeneous executive body to obtain an executive result and sending the executive result to the mimicry negative feedback module; and a mimicry negative feedback module which is used for carrying out consistency judgment on the execution result and taking the execution result judged to be consistent as a processing result of the corresponding user request to respond. Through centralized management of the cloud management module, the complexity of mimicry application deployment and management of a user is simplified, and the security of the cloud platform is improved.
Owner:EAST CHINA INST OF COMPUTING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products