Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

147 results about "Security index" patented technology

Reserve Index/Security Index. The Security Index pertained to the FBI list of dangerous individuals who might commit acts inimical to the national defense and public safety of the United States in time of emergency. The list also included those who could be arrested upon the order of a U.S. President invoking the Emergency Detention Program.

Symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage

Provided is a symmetrical searchable encryption method for supporting result high-efficiency sequencing in hybrid cloud storage. A hybrid cloud storage system based on a data owning party, a data retrieving party, a private cloud platform and a public cloud platform is involved in the steps of design file preprocessing, security packing, file security storage, security inquiring and sequencing ciphertext retrieving, and the security packing and high-efficiency retrieving of a mass of file sets are organically integrated. Dual-layer security indexes are established to serve high-efficiency sequencing of ciphertext retrieving, and operations of adding, deleting, inquiring and changing dynamic indexes can be supported; the retrieving history and retrieving interests of a data user serve as subjective characteristics of ciphertext search sequencing and participate in the sequencing computation of retrieving results; the file uniqueness testing step is added to the file preprocessing step, and therefore a data repetitive deletion redundancy mechanism is achieved, the high efficiency of packing the file sets of the data owning party is ensured, and the technical support is provided for increasing the utilization rate of storage space of public cloud.
Owner:PLA AIR FORCE AVIATION UNIVERSITY

Fuzzy multi-keyword retrieval method of encrypted data in cloud environment

The invention discloses a fuzzy multi-keyword retrieval method of encrypted data in cloud environment. A file is subjected to set encryption by a data owner to generate a ciphertext file; keywords are extracted from each file; the keywords are subjected to binary segmentation and vectorization to obtain a binary vector group; the binary vector group is subjected to dimensionality reduction and is then inserted into a counting type bloom filter to generate index vectors; each index vector is encrypted to obtain a security index; the ciphertext file and the security indexes are sent to a cloud server; a pre-authorized data user or the data owner extracts the keywords from query data; binary segmentation and vectorization are performed to generate a query vector; encryption is performed to obtain a trap door; the trap door is sent to the cloud server; the cloud server obtains a certain number of files with the highest relevancy degree through query according to the trap door and the security index; after sorting, the files are returned to the data owner. The large data volume of ciphertext multi-keyword retrieval is supported; compared with the prior art, the method has the advantages that the index building and query processes are more efficient; the sorting result is more accurate; the data privacy is effectively protected.
Owner:WUHAN UNIV OF SCI & TECH

Searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments

ActiveCN108712366AFuzzy retrieval implementationSearch Encryption SimplifiedKey distribution for secure communicationSpecial data processing applicationsHash functionCiphertext
The invention belongs to the technical field of information security, and discloses a searchable encryption method and system for supporting fuzzy retrieval of word morphology and word meaning in cloud environments. The method includes establishing a security index by adopting a Bloom filter structure to support file dynamic update; accomplishing word morphology fuzzy matching by adopting a locally sensitive Hash function; performing word meaning expansion on keywords by using a natural language toolbox, constructing a word meaning fuzzy set, and inserting the word meaning fuzzy set into the established security index so that support word meaning keyword retrieval can be converted into accurate matching retrieval; performing inner product operation to realize the ordering of retrieval results by establishing query vectors and index vectors; and using the Hash function and a security knn algorithm to make the method and the system effectively resist selection keyword attacks so that thesearching of cryptograph on a cloud server under semi-trusted conditions. Cryptograph searching functions can be achieved; and the method and the system can support fuzzy retrieval of word morphologyand word meaning, multi-keyword retrieval, and dynamic adding and deleting files.
Owner:XIDIAN UNIV

Power system dynamic security assessment comprehensive model and spatiotemporal visualization method

The invention provides a power system dynamic security assessment comprehensive model and a spatiotemporal visualization method. The method comprises the following steps: constructing a dynamic security index and establish an initial sample set for dynamic security assessment based on the historical operation data of a power system and a predicted accident set; 2) constructing a feature selectionframework, performing feature selection on the initial sample set and forming a processed high-efficiency sample set; 3) constructing an online dynamic security assessment comprehensive model based ona random bit forest and performing offline training and updating on the model by using the high-efficiency sample set; and 4) using the continuously updating dynamic security assessment model to complete the online assessment of the dynamic security state and using the spatiotemporal visualization method to realize the visual presentation of the dynamic security information. The purpose of the present invention is to provide the online dynamic security assessment comprehensive model and the spatiotemporal visualization method which are beneficial to the system operators to take timely preventive and control measures, avoid large power outage caused by accidents and improve the secure operation level of the power grid.
Owner:CHINA THREE GORGES UNIV

Threat data processing method for information system

The invention discloses a threat data processing method for an information system. The method comprises the steps that an obtained information security incident is mapped into a potential threat index and an existing threat index; threat frequency calculation is performed on the existing threat index, the result of the frequency calculation is assigned to the security index threat index related to the information security incident; according to a preset period, information collection, formation and correlation are performed on the potential threat index according to a preset threat source to obtain a threat multi-component system; each threat element in a log of a target information system is indexed, the threat multi-component system is used for working out the occurrence probability of the multi-component system on the basis of an indexation calculation method, and assignment and mapping are performed to obtain a threat value; according to the security domain threat index and the threat value, a corresponding data model is generated so as to evaluate the security of the information system. By building the data model, a user can conveniently and visually observe the occurrence probability of each threat in the information security incident, and the threat with which the information system is faced can be evaluated objectively.
Owner:国家电投集团河南电力有限公司 +1

Transmission capacity and wind and fire bundling transmission optimization method of extra-high voltage channel

The invention relates to a transmission capacity and wind and fire bundling transmission optimization method, and in particular relates to the transmission capacity and wind and fire bundling transmission optimization method. The invention firstly establishes an index system considering receiving end power grid electricity power demand, static security index, transient stability index, economic index and power transmission electrovalence. The indexes are quantized for establishing mathematical model of multi-objective functions and the multi-objective optimization algorithm is adopted for computing. During the solving process, multi-objective functions are solved simultaneously and computed for obtaining alternative solution meeting constraint condition, and the entropy function method is adopted for confirming the optimal compromise solution. The index system considering receiving end power grid electricity power demand, static security index, transient stability index, economic index and power transmission electrovalence is adopted, the evaluation index is convenient to compute and analyze in a quantitative manner, the transmission capacity of the electric transmission line and the influence to the receiving end power grid from sending end wind and fire bundling ratio can be reflected synthetically.
Owner:STATE GRID CORP OF CHINA +4

Electric power information network security measuring method based on security log data mining

The invention provides an electric power information network security measuring method based on security log data mining. The electric power information network security measuring method comprises the steps of defining a security index measurement model parameter and a measurement standard; acquiring electric power information network heterogeneous security events, normalizing the security events by means of an extensible security event standard format which is defined based on a template, and buffering the security events, thereby forming standard security events; in mass standard security events, grouping the security events according to a dimension parameter Di, extracting a parameter which reflect network safety operation condition according to an index parameter Vk, and obtaining a real-time network security index data model; dynamically updating the network security index data baseline model according to fitting between the network security index historical data and the network security index real-time data; calculating a network security measurement index; and obtaining a network abnormity position through the network security measurement index. The electric power information network security measuring method settles the technical problems such as low accuracy, low efficiency and no effective facility for performing security problem positioning in prior art.
Owner:GUIZHOU POWER GRID INFORMATION & TELECOMM

Safe electronic medical system for cloud storage

The invention relates to a safe electronic medical data management system for cloud storage, and the safe electronic medical data management system can be applied to the field of cloud storage. The safe electronic medical data management system comprises a cloud storage server terminal and a cloud computing terminal. The cloud storage server terminal is used for storing encrypt files uploaded by users, and generating and modifying a safe index for users to search, and dynamically updating encrypted medical data. The cloud computing terminal comprises a doctor terminal and a patient terminal, doctors and patients login the system through different roles in a website the patients need U shields to carry out identity authentication during login, and a user can login successfully and enter the website to have a look only when double factor authentication of a login password of the user and a data certificate of the U shield is passed. According to the invention, a cloud storage technology is employed to conveniently and effectively store and manage electronic medical data, and the confidentiality of the electronic medical data is guaranteed. A safe and effective electronic medical data search function and a dynamic update scheme are provided, and the scheme is an electronic medical data management scheme advantaged by safety, high efficiency, strong feasibility and good practicability.
Owner:BEIJING INSTITUTE OF TECHNOLOGYGY

Distribution network connection method

InactiveCN103066596ASolve the problem of inconsistent index dimensionsAc network circuit arrangementsConnection typeSecurity index
The invention relates to a distribution network connection method and belongs to the distribution network method technical field. The distribution network connection method adopts that a primitive connection type is the basic unit of the distribution network transmission electric energy; a point-to-point connection type from a power supply to a load comprises an overhead primitive connection and a cable primitive connection. The distribution network connection method identifies the types and magnitudes of the primitive connection, forms the distribution network connection method in an inferring mode, and accesses the types of the distribution network connection. The appraisal types of the distribution network comprise a reliability access, an economic access, and a security access. The distribution network connection method chooses an optimized connection model, introduces obscure subordinating degree function to solve the problem of inconformity of all kinds of index dimensions, and achieves selecting the optimized connection type under different emphasis through dynamic weighting. The distribution network connection method has the advantages of avoiding a former inherent flaw of the connection type, improving the security index, an obscure subordinating degree and a weighting thought, providing novel synthetic evaluation module for the distribution network connection, and has a significant practical value and referential meaning on construction of the distribution network by introducing an obscure inference method to constitute the distribution network connection type.
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)

Similar sub-image inquiring method and system for protecting privacy under cloud computing environment

The invention provides a similar sub-image inquiring method and system for protecting privacy under a cloud computing environment. The similar sub-image inquiring method comprises the following steps: extracting characteristic sub-structures of an image shape data set; representing the quantity of each characteristic sub-structure contained in each image datum by using a characteristic vector; generating a parameter for encrypting and a random vector, and carrying out encryption calculation on the characteristic vector and the random vector of each image shape datum to generate a safety vector and establish a safety index; outsourcing the encrypted image shape data set and safety index into a cloud platform; extracting a characteristic sub-structure from an inquiry request image, and representing the quantity of each characteristic sub-structure contained in the inquiry request image by using a request characteristic vector; calculating a maximum allowable characteristic structure difference number, and generating a trap door and submitting the trap door to the cloud platform; after the cloud platform receives the trap door, calculating the difference between the request characteristic vector and the safety vector corresponding to the image shape data on the safety index to further inquire a similar sub-image. According to the similar sub-image inquiring method and system, the safety of privacy information referred in a similar sub-image inquiring process can be protected.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Rapid ciphertext retrieval method and system capable of resisting statistical analysis attack

The invention discloses a rapid ciphertext retrieval method and system capable of resisting a statistical analysis attack, and belongs to the technical field of information safety. According to the method and system, rapid retrieval of mass of ciphertext documents can be achieved, and the statistical analysis attack can be effectively resisted. The system comprises a cloud storage system and a plurality of client sides, and the client sides are connected with the cloud storage system through a network. On the basis of the principle, after the client sides carry out initial index setting on documents hopefully uploaded by users on client sides, a false index is firstly set up, then, random filling is carried out on a real index and the false index to generate a safety index, and therefore statistical information of the documents can be effectively hidden, and the aim of resisting the statistical analysis attack is achieved. The method specifically comprises (1) system initialization, (2), ciphertext index setting and (3) document retrieval. The system and method have the advantages that the retrieval efficiency is high, accuracy is high, the communication cost is low, the statistical information of the documents can be effectively hidden, and the statistical analysis attack can be resisted.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products