Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

74 results about "Threat model" patented technology

Threat modeling is a process by which potential threats, such as structural vulnerabilities can be identified, enumerated, and prioritized – all from a hypothetical attacker’s point of view. The purpose of threat modeling is to provide defenders with a systematic analysis of the probable attacker’s profile, the most likely attack vectors, and the assets most desired by an attacker. Threat modeling answers questions like “Where are the high-value assets?”, “Where am I most vulnerable to attack?”, “What are the most relevant threats?”, and “Is there an attack vector that might go unnoticed?”.

Method of planning three dimensional route of unmanned plane by means of improved artificial fish swarm algorithm

The invention discloses a method of planning three dimensional route of an unmanned plane by means of an improved artificial fish swarm algorithm. The method of planning three dimensional route of an unmanned plane by means of an improved artificial fish swarm algorithm is used for carrying out static state planning of route and real-time dynamic re-planning of route when an unmanned plane executes a single task. The method of planning three dimensional route of an unmanned plane by means of an improved artificial fish swarm algorithm includes the steps: constructing a digital map through a landform model and a simplified threat model, considering the influence of space division granularity on the complexity of an optimizing control algorithm, and realizing division of space according to a fence self-adaptive algorithm; realizing static state route planning by means of an improved artificial fish swarm algorithm; and considering the time factor, constructing a threat prediction model based on a dynamic Bayesian network, predicting the unexpected threat, combined with flight constraint of the unmanned plane, obtaining the re-planning starting point, and realizing global route dynamic re-planning by means of the improved artificial fish swarm algorithm. The method of planning three dimensional route of an unmanned plane by means of an improved artificial fish swarm algorithm has the advantages of reducing the complexity of a route optimizing control algorithm, improving the optimum route searching capability, and satisfying the practical route planning demand.
Owner:NANCHANG HANGKONG UNIVERSITY

Multi-unmanned aerial vehicle track planning method based on culture ant colony search mechanism

ActiveCN107622327ASolving multipath trajectory planning problemsWide applicabilityForecastingBiological modelsNODALSimulation
The invention provides a multi-unmanned aerial vehicle (UAV) track planning method based on a culture ant colony search mechanism, which includes the following steps: (1) carrying out mesh generationon a standard space according to a grid method; (2) building a multi-UAV track planning model, including the number of UAVs, the start and end points and a threat model; (3) initializing the start point and the end point; (4) initializing an ant colony algorithm, including: initializing an ant colony and calculating a heuristic factor and a guide factor; and (5) assigning all ants to an initial node, and updating taboo knowledge; selecting next node for transfer according to the taboo knowledge and the state transfer probability until there is no optional node or a destination node is selected, updating historical knowledge, and updating pheromones according to the historical knowledge; and outputting a shortest path if the maximum number of iterations is achieved, and continuing the process until U multi-UAV optimal multi-path tracks are obtained. The problem that it is difficult to find the optimal flight tracks of unmanned aerial vehicles due to slow search and heavy computing burden is solved, and multi-UAV track planning is realized.
Owner:HARBIN ENG UNIV

Internal threat model establishing method based on layered mapping

InactiveCN101505216ASensitive detection of insider threatsImprove accuracySecuring communicationHierarchical database modelSystem safety
The invention provides a method for establishing an internal threat model based on layered mapping. The method comprises the following steps: establishing a partial ordering relation by using resource access control authority of a user defined by an access control relation of a system on resources, and establishing hierarchical models of a subject and an object according to the partial ordering relation; establishing mapping between the subject hierarchical model and the object hierarchical model according to the access control relation between the subject and the object so as to form a hierarchical quantized model which overall describes internal threat characteristics of the system from the subject aspect and the object aspect; quantizing the internal threat characteristics related to the subject and the object by using an analytic hierarchy process, and interrelating the internal threat characteristics of the subject and the internal threat characteristics of the object according to the mapping relation between the subject model and the object model to realize fusion of the internal threat characteristics of the subject and the object. The fusion realizes simultaneously monitoring of the internal threat characteristics of the subject and the object, so that a system security administrator can comprehensively observe a variation regulation of the threat inside the system from real-time evaluation and detection data of the system internal threat, and discover the internal threat in time.
Owner:XIDIAN UNIV +1

Network security threat identification method based on event detection mode

The invention relates to a network security threat identification method based on an event detection mode. According to the method, feature engineering processing is performed on event big data of each node of a network, model learning training is performed on the data after feature engineering processing according to two modes of event points and event streams, and two types of model knowledge of an event point anomaly detection model and an event stream risk prediction model are generated. On the basis of model knowledge, for threat identification of a single-point event, a matching value of an event feature and a certain threat model abnormal point feature is calculated to judge whether a potential threat exists or not; for threat identification of a plurality of associated events similar to multi-step attacks, firstly, a feature sequence of the associated events is obtained by using an association analysis algorithm, and then a matching value of a sequence feature of an event stream and a sequence feature of a certain threat model is calculated to predict whether potential threats exist or not. According to the method, instant threat identification and hidden threat mining can be realized, and the level of network security operation and maintenance is greatly improved.
Owner:CHINA YOUKE COMM TECH

Intelligent vehicle threat estimation system and method based on variable-structure Bayesian network

The invention, which relates to the field of the intelligent vehicle cognitive technology, claims for protection of an intelligent vehicle threat estimation system and method based on a variable-structure Bayesian network thereby evaluating a threat degree of a moving target to a vehicle. The system is composed of a threat modeling module, a data collection module and a threat estimation module. At a threat modeling stage, factors affecting intelligent vehicle threat estimation are determined, wherein the factors include an external environmental factor, a target characteristic factor and a driver factor; a topology of a Bayesian network model is constructed; and then a local condition probability table of the model is determined. During the driving process, the data acquisition module uses sensors to collect real-time data of various influence factors; the threat estimation module reconstructs corresponding variable nodes only for quickly changing factors according to changing rates of all factors to obtain a variable-structure Bayesian network model and then carries out reasoning calculation to obtain a target threat index. Therefore, the performance of intelligent vehicle threatestimation can be improved effectively.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Path planning method based on improved A* algorithm in off-road environment

The invention discloses a path planning method based on an improved A * algorithm in an off-road environment, which belongs to the technical field of path planning, and comprises the following steps: dividing a working space of a vehicle into identical grids, and storing environment information by adopting a numerical matrix, an obstacle model, a threat model and a road model are established and fused to obtain a final cross-country environment model, the position relation between child nodes and obstacles is analyzed, and a selection area of the child nodes is established; a direction change penalty rule is introduced into the selected area, and an evaluation function in the off-road environment is established by quantifying information of a local area; and path optimization is realized by setting an anti-collision safety distance D. According to the method provided by the invention, a safe, feasible and efficient driving path can be quickly and effectively planned under the cross-country environment condition under the joint coupling action of obstacles, environmental threats and road conditions, the inflection point number of the planned path is reduced by 4 times compared with that of a traditional A * algorithm, and the efficiency is improved by 30%.
Owner:CHONGQING UNIV OF ARTS & SCI

Routing inspection unmanned aerial vehicle nest distribution and information interaction method

The invention discloses a routing inspection unmanned aerial vehicle nest distribution and information interaction method, and belongs to the field of routing inspection unmanned aerial vehicle nest site selection. The routing inspection unmanned aerial vehicle nest distribution and information interaction method comprises the steps of: firstly, analyzing data and related technologies of unmannedaerial vehicles; secondly, substituting the data of the unmanned aerial vehicle into environmental modeling, and establishing an unmanned aerial vehicle maneuvering performance constraint model and threat constraint models, wherein the unmanned aerial vehicle maneuvering performance constraint model comprise a maximum flying range, a maximum climbing angle, a minimum turning radius and a flight speed, and the threat constraint models mainly comprise a terrain threat model, a weather threat model, a man-made threat model and the like; in addition, considering that the unmanned aerial vehicles use terrain to avoid risks, regarding the height as one of track costs; and on the basis of establishing the mechanical constraint model and the threat models, carrying out two-dimensional and three-dimensional static flight path planning of the unmanned aerial vehicle respectively, planning nest positions through covering the whole region by means of flight path planning, and controlling an unmanned aerial vehicle group through using a distributed control system.
Owner:ANHUI JIYUAN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products