Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

50 results about "Sensor network security" patented technology

Wireless Sensor Networks Security means secure the data from any kind of attack from outside or inside of the network. This network is always exchange small foot print data in like Sensor reading, Configuration details,Operational data.. and so on.

Automatic locating and isolating method of internal attack source of local area network

The embodiment of the invention discloses an automatic locating and isolating method of an internal attack source of a local area network. The method comprises the following steps: automatically collecting data of a network device, and storing the data in a database, inquiring an MAC address of the network device according to an IP address of the attack source, detecting ARP fraud counterfeiting the host and matching the timestamps of different IP-MAC items to automatically process the situation that one IP address corresponds to a plurality of MAC addresses, locating a switch port according to the MAC address, and filtering a cascade port of the switch and matching the timestamps of different MAC-switch port items to automatically process the situation that one MAC address corresponds to a plurality of switch ports, and operating the switch to isolate the attack source. The automatic locating and isolating method can be applicable to all kinds of network environments without any manual operation, the larger the network scale is, the more obvious the effect of the automatic locating and isolating method is, by adoption of the automatic locating and isolating method, the processing time of a network security event can be shortened, the working efficiency of a network administrator is improved, and the network security of the local area network is ensured.
Owner:SHANTOU UNIV

Wireless sensor network switching and pre-authenticating method based on evaluation

The invention discloses a wireless sensor network switching and pre-authenticating method based on evaluation, comprising the steps of: 1, predicting a new subnet to be switched by a mobile node, evaluating and predicting the mobile node, and making a pre-authenticating request; 2, evaluating the mobile node by the original subnet cluster head node, if the evaluation is safe, sending pre-authenticating information to a new subnet cluster head node; 3, evaluating the new subnet by the new subnet cluster head node, and authenticating the identity of the mobile node, if the evaluation is qualified, passing the authentication, agreeing to access, and sending evaluation information to the original subnet cluster head node; 4, deciding whether agreeing to access or not by the original subnet cluster head node according to the request of the mobile node and the evaluation on the new subnet, giving an adjustment suggest; and 5, if agreeing to access, negotiating a private key between the mobile node and the new subnet cluster head node. The invention has the advantages of short time delay, high safety and long service life of a sensor network, and can be applied to the field of sensor networks with high requirements for time delay and safety.
Owner:XIDIAN UNIV +2

A management system, method and apparatus for network security

The embodiment of the invention discloses a management system, method and apparatus for network security. The system includes UE, an AN, a network function selection module and at least two authentication modules. The UE is used to send a first service request to the network function selection module, wherein the first service request carries authentication protocol information. The network function selection module is used to select a target authentication module according to the authentication protocol information and send a second service request to the target authentication module; and thetarget authentication module is used to perform mutual authentication with the UE; and the target authentication module is further used to determine first security configuration according to a specified security policy and send the first security configuration to the AN. The AN is used to determine second security configuration according to the first security configuration or the specified security policy and send the second security configuration to the UE. The technical solution provided by the invention can meet the security requirements of differentiated authentication protocols and security policies of the network so as to improve network security.
Owner:HUAWEI TECH CO LTD

System for providing network security as a service in cloud computing environment

The embodiment of the invention provides a system for providing network security as a service in a cloud computing environment. The system comprises a cloud computing management platform, security applications corresponding to virtual nodes in a virtual network, virtual security switches and a target security detection containers. The virtual security switches process a plurality of tunnel packets in target virtual network traffic corresponding to the virtual nodes, thereby obtaining a transmission layer packet, and transmits the transmission layer packet to each target security detection container for security detection. After the security detection of the transmission layer packet is successful, the transmission layer packet is processed and transmitted, so security service is provided for the virtual network, and the security of the virtual network is improved. In a mode that the plurality of tunnel packets are combined into one transmission layer packet and the transmission layer packet is transmitted to each target security detection container for security detection, the transmission speed is improved, the number of the data packets on the target security detection containers is reduced, the data packet processing performance of the target security detection containers is improved, and the energy consumption of the whole system is reduced.
Owner:BEIJING BAIWU TECH CO LTD

Security chip for protecting network security system and network security system using same

A security chip for protecting a network security system comprises a data security part for providing a secure encryption and decryption algorithm and an interaction protocol, wherein the data security part mainly comprises an encryption and decryption algorithm control engine, an authorization counter, a true random number generator, a unique serial number and a secure EEPROM; and a network security part composed of a network white list filtering module and a network data processing module. The encryption and decryption algorithm control engine comprises private key security storage for supporting private key ECDH operation and ECDSA signature authentication. The mainstream national password and commercial password encryption and decryption algorithms perform high-speed encryption and reduction on the data stream so as to adapt to the security requirements of different scenes. The chip safety management supplies power, manages the read-write ROM on the chip, allows special equipment to write, and allows remote erasure but does not allow reading. The invention also provides a network security system using the security chip. The sensitive data communication security can be protectedfrom the hardware level, and the efficiency can be greatly improved while the system security is improved.
Owner:XI AN JIAOTONG UNIV

Big data implementation system and method based on network security

The invention discloses a big data implementation system and method based on network security. The big data implementation platform of the system comprises: a big data acquisition module, a big data preprocessing module, a big data processing module, a network security monitoring module and a controller; the network security monitoring module comprises a network detection unit, a visitor verification unit and an access flow monitoring unit. The big data implementation system collects multiple paths of data in parallel via a data receiver with multiple data interfaces, a priority number and a frame number are added to the frame packaging data, the collected data are stored in a hierarchical manner, so that the stored data are analyzed and screened according to the priority number and the frame number and are output; that is, in a big data implementation process, the data are collected via multiple channels, so that the collection efficiency is high, and the collection data is large; and the data stored in the hierarchical manner are output according to the priority number and the frame number, so that the data transmission is sequential, network blockage and data loss are unlikely to generate, the data processing efficiency is low, and the resource utilization rate is low.
Owner:SHENGDA ECONOMICS TRADE & MANAGEMENT COLLEGE OF ZZ

Small data distribution method enabling wireless sensor network security and denial of service attack defense

The invention discloses a small data distribution method enabling wireless sensor network security and denial of service attack defense. The method includes the following steps that: a system initialization phase: a base station generates a key material and loads a public parameter into each sensor node before sensor network deployment; a data packet earlier-stage processing phase: the base station generates data packets through adopting a cipher confusing technology and a digital signature method before data item distribution; and a data packet authentication phase: after receiving the data packets, the sensor nodes judge the validity of the data packets, if the data packets are valid data packets, the sensor nodes receive and update the data packets, otherwise, the sensor nodes discard the data packets. With the mall data distribution method of the invention, under the condition that sensor node resources are limited, resistance to compromise of the sensor nodes can be realized, the integrity and security of information can be ensured, and no time synchronization is required between the base station and the sensor nodes, and defense for denial of service attack can be effectively realized. The small data distribution method has high robustness in packet loss and data packet transmission out-of-sequence.
Owner:EAST CHINA NORMAL UNIV +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products