Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

256 results about "White box" patented technology

A white box (or glass box, clear box, or open box) is a subsystem whose internals can be viewed but usually not altered. Having access to the subsystem internals in general makes the subsystem easier to understand but also easier to hack; for example, if a programmer can examine source code, weaknesses in an algorithm are much easier to discover. That makes white-box testing much more effective than black-box testing but considerably more difficult from the sophistication needed on the part of the tester to understand the subsystem.

Neural network black box aggressive defense method based on knowledge distillation

ActiveCN111027060AGuaranteed successful attackReduce the pitfalls of losing variance between classesPlatform integrity maintainanceNeural architecturesData setSample sequence
The invention discloses a neural network black box aggressive defense method based on knowledge distillation, and the method comprises the steps: selecting a plurality of sub-networks to construct a teacher network, softening the input vectors of softmax layers of all sub-networks, and then reloading the model parameters of the sub-networks for training to obtain a new sub-network; obtaining a prediction label of each sub-network, and taking all prediction labels as soft labels after averaging or weighted averaging; inputting the Image Net data set into a student network, and guiding student network training by adopting a soft label, a data set hard label and a black box model special label to obtain a substitution model; adopting a white box attack algorithm to attack the substitution model to generate an adversarial sample sequence, adopting the adversarial sample sequence to attack the black box model, and selecting an adversarial sample successfully attacked in the adversarial sample sequence; and adding the successfully attacked countermeasure sample into a training set of the black box model, and performing countermeasure training by adopting the updated training set to generate the black box model with attack defense.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Robustness evaluation and enhancement system of artificial intelligence image classification model

A robustness evaluation and enhancement system of an artificial intelligence image classification model comprises a white box evaluation module, a black box evaluation module and a defense enhancementmodule, the white box evaluation module obtains a to-be-evaluated model and selected evaluation indexes from a user, the attack resistance of the model is evaluated from all aspects according to multiple different indexes, and the defense enhancement module is used for enhancing the robustness of the model and calculating the scores of all indexes and the total score of robustness; and the blackbox evaluation module obtains an output result of the to-be-evaluated model from the user and compares the output result with the correct label to obtain an evaluation result. A plurality of black boxevaluation means is provided, and the robustness of the model is evaluated from the perspective of black boxes; the defense enhancement module is internally provided with a plurality of robustness improvement means. A to-be-enhanced model and selected defense enhancement method information are acquired from the user and robustness enhancement is performed on the model uploaded by the user by using a corresponding defense enhancement method. The robustness evaluation process of the whole model is optimized through multiple robustness evaluation indexes, so that the model is defended through multiple built-in technologies while different methods can be compared and evaluated more conveniently, accurately and comprehensively, and the robustness of the model is improved.
Owner:SHANGHAI JIAO TONG UNIV

White box adversarial sample generation method for scene character recognition model

The invention belongs to the technical field of scene character recognition and white box attack, particularly relates to a white box confrontation sample generation method, system and device for a scene character recognition model, and aims to solve the problems that an existing white box attack algorithm cannot meet requirements and is long in attack time and unstable. The method comprises the following steps: acquiring a to-be-attacked image, and generating an adversarial sample image in combination with disturbance; obtaining a recognition result of the adversarial sample image through a scene character recognition model, judging whether the image is successfully attacked or not based on the result, and taking the image as an optimal adversarial sample image if the image is successfully attacked and the disturbed matrix norm is reduced; otherwise, judging whether the number of iterations is less than a set maximum number of iterations: if so, updating the disturbance and adversarial sample image, and otherwise, outputting an optimal adversarial sample image. According to the method, the white box adversarial sample generation requirement for the scene character recognition model is met, and time consumption and instability of an attack algorithm are avoided through gradient cutting.
Owner:BEIJING YUNJIANG TECH CO LTD

Data processing method and device based on blockchain network, electronic equipment and storage medium

The invention provides a data processing method and device based on a block chain network, electronic equipment and a storage medium. The method comprises the following steps: receiving a transactionproposal submitted by a client and used for carrying out data query operation; executing endorsement verification on the transaction proposal, executing query operation on a state database in an account book of the node in the blockchain network to obtain corresponding key value pair data; calling a white box secret key library in the node through an original secret key carried by the transactionproposal to transform the original secret key to obtain a white box secret key, and decrypting the queried key value pair data through the white box secret key and a white box secret key algorithm; calling a transmission key library in the node so as to symmetrically encrypt the decrypted key value pair data through a transmission key and an encryption socket key algorithm; and constructing the symmetrically encrypted key value pair data into proposal response, and returning the proposal response to the client. According to the invention, the security of sensitive data uplink can be ensured, and the data security in data query is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

White box block cipher construction method and system based on FeisiteBox Box structure

The invention discloses a white box block cipher construction method and system based on a FeisiteBox Box structure. The method comprises the steps that an n-bit plaintext is input, the size na of a block and the iteration processing round number r of a FistelBox structure are set, bit conversion is conducted through a T function, input na-bit bits are converted into nb-bit bits to be output, andna + nb = n; affine transformation is added between the wheels of the iteration processing wheel number, chain connection is performed, the operation of each round is tightly connected with the operation of the previous round and the operation of the next round, the inverse transformation of the affine transformation of the previous round is embedded into the lookup table operation of the round, the affine transformation of the previous round is applied to the result of the lookup table, and the affine transformation layer adopts the reversible affine transformation matrix; S1-S2 encryption operation is executed to obtain an encryption result; the system comprises a bit conversion module, an affine transformation module and an operation execution module. According to the invention, an attacker cannot obtain the information of the ciphertext, the password cracking difficulty of the attacker is increased, and the security of key storage is enhanced.
Owner:SOUTH CHINA NORMAL UNIVERSITY

Non-directional white-box attack resisting method for scene character recognition

InactiveCN112836798ALittle noise disturbanceOptimizing Noise SizeCharacter and pattern recognitionNeural architecturesText recognitionNetwork model
The invention discloses a non-directional white-box attack resisting method for scene character recognition, which is characterized in that noise which is difficult to perceive by human eyes is added into an input image, so that a character recognition algorithm obtains a recognition result which is totally different from the original recognition result, and the effect of attacking a scene character recognition network model is achieved. Different from common object recognition, a character recognition result is a character sequence, so that an existing adversarial attack method cannot be directly applied to scene character recognition. Therefore, the method comprises the following steps: firstly, an objective function in a single object classification adversarial attack algorithm is modified into a sequence form; in order to accelerate generation of an adversarial sample, a step function is introduced in, and once a character is different from the recognition result of the original image in the recognition result of the adversarial sample, the penalty of the target function is zero; besides, in consideration of different attack difficulty levels of different samples, the more easily recognized correctly the samples are, the more difficultly attacked the samples are, recognition scores are introduced into the target function, so that adversarial samples with smaller disturbance are obtained.
Owner:HUAZHONG UNIV OF SCI & TECH

SM4 algorithm white box implementation method and device, electronic equipment and computer medium

The invention provides an SM4 algorithm white box implementation method and device, electronic equipment and a computer medium. The method comprises the steps of obtaining plaintext information to beencrypted; performing 32 rounds of transformation on the plaintext information to obtain an encryption result corresponding to the plaintext information, wherein each round of transformation in the 32rounds of transformation comprises the following steps: in the round of lookup table TAr, searching a first lookup result corresponding to the second round of data to be processed and the third roundof data to be processed; searching a first search result of the round and a second search result corresponding to fourth to-be-processed data of the round in the round search table TBr; searching a third search result corresponding to the second search result in the round of lookup table TCr; in the round of lookup table TDr, searching a fourth lookup result corresponding to the first round of data to be processed and the third round of lookup result, wherein r is equal to 1, 2, 3,..., 32, the lookup table TAr, the lookup table TBr, the lookup table TCr and the lookup table TDr are used for completing the rth round of operation of the SM4 algorithm, and encoding protection is carried out on an operation result; and the key has high security.
Owner:中电科网络安全科技股份有限公司

Base station oriented millimeter wave end-to-end performance test system and method

The invention discloses a base station oriented millimeter wave end-to-end performance test system and method. The system comprises a base station darkroom module, an intermediate hardware module anda terminal darkroom module. The base station darkroom module comprises a base station darkroom, a base station to be detected in the base station darkroom and a spherical probe wall, and the probe wall is provided with a probe supporting uplink and downlink bidirectional communication and used for transmitting bidirectional signals between the base station to be detected and the intermediate hardware module; the intermediate hardware module comprises variable frequency power amplifier equipment and a channel simulator, supports time slot synchronization with the base station to be tested, andperforms uplink and downlink switching; wherein the terminal camera obscura module comprises a shielding camera obscura, a probe and a millimeter wave terminal, and the millimeter wave terminal receives downlink data, sends uplink data and completes end-to-end connection with a base station to be tested. The method is applied to the system and comprises the steps of a probe selection algorithm anda white box test method based on a base station beam filtering signal.
Owner:CHINA ACADEMY OF INFORMATION & COMM

Android environment secret key segmentation processing method and device

The invention discloses an Android environment secret key segmentation processing method and device. The processing method comprises secret key storage and secret key extraction, wherein the secret key storage comprises inputting an initial secret key into a white box secret key module to generate a target storage secret key; generating a key operation factor according to the equipment unique identifier; and generating a to-be-segmented key according to the target storage key and the key operation factor, executing a segmentation operation, and storing the segmented sub-key to a correspondingso library. The key extraction comprises the steps of obtaining segmented sub-keys from a so library and assembling the segmented sub-keys into a ciphertext; decrypting the assembled ciphertext by using a key operation factor, and decomposing a decryption result into a key and a key hash value; and if the calculated hash value of the secret key is consistent with the decomposed hash value of the secret key, inputting the secret key into the white box secret key module to be decrypted to obtain an initial secret key, and enabling secret key extraction to succeed. According to the method and thedevice, the key data is protected by adopting a strategy of storing the keys in sections by multiple so libraries, so that the method and the device are suitable for all Android system equipment andare beneficial to popularization of security applications.
Owner:JIANGSU HENGBAO INTELLIGENT SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products