Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

80 results about "Safety property" patented technology

In distributed computing, safety properties informally require that "something bad will never happen" in a distributed system or distributed algorithm. Unlike liveness properties, safety properties can be violated by a finite execution of a distributed system. In a database system, a promise to never return data with null fields is an example of a safety guarantee. All properties can be expressed as the intersection of safety and liveness properties.

Method and device for detecting safety performance of application program

The embodiment of the invention provides a method and device for detecting the safety performance of an application program. The method includes the steps of obtaining program characteristics from the application program to be detected, wherein the program characteristics at least include the code structure characteristics and / or the file structure characteristics; matching the program characteristics with standard program characteristics, and determining the safety performance of the application program according to the matching result. By means of the scheme, the program characteristics are obtained from the application program to be detected, the important characteristics including the code structure characteristics and / or the file structure characteristics can be obtained, the program characteristics and the standard program characteristics are matched, the safety performance of the application program to be detected can be determined according to the matching result including successful matching, failed matching or the characteristic contact ratio and the like, whether codes are changed or not or whether malicious codes are added or not and whether files are replaced or not can be detected by matching the program characteristics, and therefore whether the application program to be detected is piratical or not can be fundamentally detected through the code structure characteristics and / or the file structure characteristics.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Distributed file storage method and system based on block chain

The invention relates to the technical field of block chains, and discloses a distributed file storage method and system based on a block chain, and the method comprises the steps: meta-information ofa to-be-uploaded file carried in a file uploading request is acquired when a coordination server detects the file uploading request of a client, a coordination server obtains the file size of the to-be-uploaded file from the meta-information, formulates a corresponding fragmentation strategy according to the file size, generates a file identification code according to the meta-information, and sends the fragmentation strategy and the file identification code to a client; and the client performs fragmentation processing on the to-be-uploaded file according to the fragmentation strategy and thefile identification code to obtain fragmentation data, and uploads the fragmentation data to a block chain node corresponding to the storage server for storage so as to realize distributed storage ofthe file. Potential safety hazards caused by the fact that the to-be-uploaded file is stored in the third-party server in the prior art are avoided, the storage pressure of the storage server is reduced, and the file storage efficiency and the storage safety are improved.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN

Safety processing method, device and apparatus based on user behaviors

The invention discloses a safety processing method, device and apparatus based on user behaviors, and relates to the technical field of data safety. The method comprises the following steps: judging whether a user is an attacker or not according to page browsing behavior data of the user before operating a verification code and operation behavior data of the verification code; and if judging the operation behavior data of the user is behavior data of a real user, performing clustering analysis by using similarity between counterfeit behaviors based on the operation behavior data of the user, and if the suspicious frequency of the user is set to be greater than a preset frequency threshold, performing clustering analysis by using similarity between counterfeit behaviors; If not, increasingthe verification difficulty, and the probability that the model is classified as an attacker, and re-classifying behavior data re-collected by the user by using the model; and finally, determining whether the user is an attacker or not by fusing classification results. Stricter black product attack defense can be realized based on the user behavior data of the operation verification code, and thewebsite security is ensured.
Owner:BEIJING PERFECT WORLD SOFTWARE TECH DEV CO LTD

Information safety sharing method for power industry multi-service subjects

The information safety sharing method for the power industry multi-service main bodies provided by the embodiment of the invention comprises the following steps: classifying the power industry multi-service main bodies according to different service categories, and obtaining safety requirements containing service main body codes and corresponding to each type of service main bodies; converting theobtained multiple safety requirements into an expression mode of the same description language; constructing a key generation tree, and controlling the key generation tree to generate a leaf node containing a key based on the initial generation code; the secret keys in the leaf nodes are distributed to different safety requirements; encryption and decryption operations are carried out on the converted safety requirements according to a secret key; the randomness of the secret key is improved by randomly generating the leaf nodes in the secret key generation tree. Meanwhile, the attribute limitation of the validity period of the secret key is increased, it is ensured that the secret key can be used for encryption and decryption only within the validity period, and the complexity of the secret key is increased based on the two dimensions, so that the safety of information transmission is ensured.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER CO MARKETING SERVICE CENT +1

Information generation method based on threat perception big data, and artificial intelligence perception system

An embodiment of the invention provides an information generation method based on threat perception big data, and an artificial intelligence perception system. According to the information generation method based on the threat perception big data, and the artificial intelligence perception system provided by the embodiment of the invention, after the security optimization application data is obtained, the security optimization performance evaluation is performed on the security optimization firmware information and the security optimization application data, whether the safety optimization application data are matched with the optimization performance of the safety optimization firmware information is judged by judging whether the safety optimization application data is matched with the optimization performance of the safety optimization firmware information, so that whether the safety performance optimization meets the safety performance optimization condition can be determined, and if yes, the target safety optimization firmware information can be added to a safety upgrading library to carry out upgrading basic resource recording. Therefore, high-reliability security upgrade library resources are continuously formed, and prompt information for updating the threat perception thermodynamic diagram information of a security optimization firmware information pushing basis is generated when the security upgrade library resources do not accord with the threat perception thermodynamic diagram information so as to prompt that the current threat perception thermodynamic diagram information needs to be updated.
Owner:广州天悦科技信息有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products