Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

181 results about "Trojan horse" patented technology

In computing, a Trojan horse, or Trojan, is any malware which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Security and secrecy method for sharing storage files

The invention relates to a method suitable for information protection security, and discloses a security and secrecy method for sharing storage files. The method is based on independent third-party assurance and encryption equipment, wherein the third-party assurance and encryption equipment comprises a control chip, a memory and a fingerprint reader; a program running on the control chip comprises a control module and a file encryption module; the control chip is used for realizing identity authentication and file encryption through the control module and the file encryption module; the memory consists of an encrypted storage area and a common storage area; the encrypted storage area comprises an equipment command, fingerprint authentication information, a key and an algorithm software carrier; and the common storage file comprises a file sharing service terminal program. According to the security ad secrecy method for sharing storage files, the file sharing service terminal program is adopted to control the data encryption and decryption, and prevent the illegal misappropriation of viruses such as Trojan horses, illegal users and file sharing service providers, so that the data storage security is improved and the security of the user data is ensured.
Owner:新昌县七星街道明盛模具厂

Gate-level hardware Trojan horse detection method based on multiple characteristic parameters

The invention relates to a gate-level hardware Trojan horse detection method based on multiple characteristic parameters. The method mainly comprises two parts: characteristic parameter extraction anddata processing. Specifically, characteristic parameters such as hopping probability, correlation, controllability and observability of a gate-level netlist are extracted in the detection process, the hopping probability reflects the activity degree of circuit nodes, the correlation reflects the correlation degree between the nodes, and the controllability and observability indicate the difficulty degree of node control and observation. Then, different algorithms are designed according to different parameter characteristics to distinguish normal nodes and Trojan horse nodes. According to themethod, the gate-level netlist hardware Trojan horse detection effect can be improved; the situation of all nodes in the circuit is reflected through multiple characteristic parameters, the possibility that a design company uses an IP core provided by a third party to introduce a hardware Trojan horse maliciously modifying the circuit in the chip design stage is reduced, and therefore the method can be universally applied to gate-level hardware Trojan horse detection and has high practicability.
Owner:PEKING UNIV

Dynamic mobile signature system and method

The invention discloses a dynamic mobile signature system and method. An improvement is conducted on the software and hardware environment of a mobile terminal, so that the dynamic encryption process and the dynamic decryption process are achieved. The mobile terminal is made to conduct dynamic signature on trade data sent to a commercial tenant through data interaction between a cloud dynamic signature service platform and the mobile terminal and data interaction between the cloud dynamic signature service platform and a commercial tenant platform, then, the trade data are sent to the commercial tenant platform through the cloud dynamic signature service platform to be confirmed after the signature is authenticated, and the operation of mobile payment is permitted according to trade information confirmed by a commercial tenant, wherein the cloud dynamic signature service platform and the mobile terminal are connected through the internet. By means of the dynamic mobile signature scheme, the defects of the hardware signature are overcome, the dynamic signature authentication at the software level is achieved, safety and flexibility of the mobile terminal are greatly improved when the mobile terminal participates in electronic commerce trade information confirming, the signature and authentication process is produced through a dynamic signature algorithm which is unceasingly updated on the basis of a cloud server, and therefore invasion of Trojan horse viruses can be effectively resisted, and safety performance of information confirming can be improved.
Owner:JIANGSU PAYEGIS INFORMATION SECURITY TECH CO LTD

Mixed mode multi-level gate-level hardware Trojan horse detection method based on machine learning

The invention discloses a mixed mode multi-level gate-level hardware Trojan horse detection method based on machine learning, and belongs to the technical field of calculation, reckoning or counting.The mixed mode multi-level gate-level hardware Trojan horse detection method comprises the steps of: firstly, by analyzing a structure and characteristics of a gate-level Trojan horse circuit at a first level, providing two effective Trojan horse circuit characteristics, combining with traditional Trojan horse characteristics, carrying out static detection on a suspicious circuit to be detected through a machine learning algorithm, and separating the Trojan horse circuit and a normal circuit preliminarily; secondly, providing Trojan horse characteristics of two scanning chain structures at a second level, and continuing to perform static detection on the normal circuit separated at the first level by using a scan chain detection method; and finally, dynamically detecting the normal circuitseparated at the second level, and integrating detection results of the three levels to obtain the final Trojan horse circuit. Compared with a traditional gate-level hardware Trojan horse detection method, the mixed mode multi-level gate-level hardware Trojan horse detection method combines a static detection method and a dynamic detection method, and the suspicious circuit to be detected is detected more comprehensively and efficiently by means of the multi-level structure.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Method and circuit for credible design of integrated circuit design process

The invention discloses a method and a circuit for credible design of an integrated circuit design process. The method comprises the following steps: acquiring a gate-level netlist of an integrated circuit; wherein the integrated circuit gate-level netlist comprises process deviation information; acquiring a to-be-tested path in the integrated circuit; configuring the to-be-measured path into a ring oscillator; adding a gate-level netlist of an on-chip detection circuit in the gate-level netlist of the integrated circuit to complete the layout design of a new circuit; performing first dynamicsimulation on the new circuit to obtain a frequency threshold range of the ring oscillator; and performing credible design verification on the new circuit by utilizing the detection circuit accordingto the frequency threshold range. According to the credible design method provided by the invention, the influence of the Trojan horse on the side channel information is directly reflected on the pathdelay, so that the process of modeling the Trojan horse is omitted, and the test difficulty is reduced; and meanwhile, the detection circuit is simple in structure and easy to integrate into an integrated circuit design process, so that the measurement accuracy is ensured.
Owner:XIDIAN UNIV

One-time pad bidirectional authentication safe logging technology for internet bank

The invention relates to one-time pad bidirectional authentication safe logging technology for an internet bank. The technology ensures that a user safely logs in a personal e-bank, and the account capital security of the user is protected. A character table disclosed in the technology has electronic and substantial double characteristics and has huge information space. Because all used authentication information is hashed values in the bidirectional authentication process, it is difficult to calculate the character table back through the hashed values, and various network eavesdropping and Trojan horse programs can be sufficiently resisted. An input password must be subjected to bidirectional authentication of the internet bank and the user in a one-time pad mode, and in the process, any failures can prevent the password of the user himself or herself from being divulged. Any ordinary people can easily master the one-time pad bidirectional authentication safe logging technology for the internet bank, and extra auxiliary authentication hardware devices and authentication cost are not needed. The technology can ensure that an ordinary user frequently conducts the operation of logging in a personal e-bank account and an ATM in a long term without reducing the safety of a system.
Owner:YANTAI UNIV

Machine learning Trojan horse detection method based on structural feature screening and load expansion

The invention belongs to the technical field of hardware security, and discloses a machine learning Trojan horse detection method based on structural feature screening and load expansion, which comprises the following steps: firstly, converting a netlist of a circuit into a quantifiable mathematical model, and performing feature extraction through a mathematical method based on the model; then, in combination with hardware Trojan trigger structure characteristics, screening nodes to obtain a more balanced data set, and carrying out Trojan detection in combination with a machine learning classification method; and finally, according to the structural characteristics of the hardware Trojan load, carrying out backward expansion on Trojan nodes so as to obtain a complete hardware Trojan circuit. According to the method, the structural features of the Trojan horse with low trigger probability and the circuit static features used by machine learning are creatively combined, the data set of machine learning is preliminarily screened, the data set for training is balanced, the efficiency and accuracy of machine learning are effectively improved, a new thought is provided for subsequent related research, and the detection effects of most hardware Trojan horse detection methods are improved.
Owner:XIDIAN UNIV

System chip hardware Trojan horse detection method and system based on differential amplification controllability

The invention discloses a system chip hardware Trojan horse detection method and system based on differential amplification controllability. The detection method comprises the following steps of S1, obtaining a gate-level netlist of a to-be-detected circuit; s2, acquiring the controllability of the signal combination of the circuit to be tested; s3, classifying the signals of which the combined controllability is greater than a threshold value into Trojan signals; s4, calculating the differential amplification controllability of the residual signals; s5, carrying out kmeans clustering on the differential amplification controllability of the residual signals; and S6, dividing the kmeans clustering result into a normal signal and a Trojan signal to be output. According to the method, the gate-level netlist is analyzed, and all Trojans inserted before chip manufacturing can be detected theoretically; the combined controllability of the signals in the circuit is analyzed, the controllability of differential amplification is calculated and utilized, the testability of the signals can be reflected, the static overturning probability of the signals can also be reflected, the concealment characteristic of Trojan horses can be better reflected, and a good detection effect is achieved.
Owner:FOSHAN POWER SUPPLY BUREAU GUANGDONG POWER GRID

Trojan horse virus detection method based on DNS

The invention relates to the technical field of network security and discloses a DNS-based Trojan horse virus detection method. The method comprises a data packet acquisition and integration module, aDNS session recombination module, a random forest classification training module, a DNS tunnel Trojan horse traffic monitoring module and a user management interface. The Trojan horse virus detectionmethod based on the DNS comprises steps that the first sample information is acquired, and the first sample information comprises the domain name information of the DNS and flow behaviors of the DNS;a characteristic value of the first sample information is extracted; weighted summation is conducted on feature values to obtain a score value; the DNS suspicious model is established according to the score value, so that weighted summation is performed on the feature value, the DNS suspicious model is established according to the score value after the score value is obtained, and the DNS suspicious model can be used for subsequent suspicious judgment on DNS information, namely, multi-dimensional recognition is performed on the feature value, so many problems such as misinformation generatedby a conventional algorithm are reduced; and DNS information detection and identification accuracy is improved.
Owner:江苏今浪信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products