Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

5 results about "Attack" patented technology

In computer and computer networks an attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of an asset.

Industrial control safety auditing system and method based on artificial intelligence

ActiveCN112437041AImprove securityMeet industry compliance audit requirementsTransmissionTotal factory controlInformation transmissionAttack
The invention discloses an industrial control safety auditing system and method based on artificial intelligence. The system comprises a safety auditing terminal, a central control terminal and an artificial intelligence learning terminal. According to the invention, the security auditing terminal is arranged to monitor and record the network state, the intrusion behavior and the operation recordrespectively; loopholes and malicious attacks are protected in real time, and when a high-risk security condition occurs, data storage and service interruption are carried out immediately, and an alarm is given; the security of the industrial control network is improved, so that the industrial control network meets the industry compliance auditing requirement; by arranging the central control terminal, operation behaviors in an industrial control network and auditing services of the industrial control network are comprehensively recorded in detail, auditing data are safely reserved, and an information transmission function between the safety auditing terminal and the artificial intelligence learning terminal is achieved; and by arranging the artificial intelligence learning terminal, new security risks are found in time through the industrial control network learning module and the flow behavior learning module of deep learning analysis, and data support is provided for investigation and evidence collection of network security accidents.
Owner:北京珞安科技有限责任公司

Intelligent door lock system capable of automatically judging abnormal state of door lock

The invention provides an intelligent door lock system capable of automatically judging the abnormal state of a door lock. The intelligent door lock system comprises a central control unit, an electronic lock, a camera, a door magnetic sensor, a mobile terminal and a management platform, wherein the management platform displays the geographic positions of all intelligent door locks through an electronic map and binds the mobile terminal and the electronic lock, and the mobile terminal can only unlock the electronic lock bound to the mobile terminal. The central control unit controls and sensesthe states of the electronic lock, the camera and the door magnetic sensor, automatically judges the abnormal state of the door lock and gives an alarm. The combined shift time asynchronous algorithmdisclosed by the invention is simple in engineering realization and high in encryption performance, is different from a traditional encryption algorithm which has more password attack modes, and is relatively safer and more reliable. The intelligent door lock system which is simpler and easier to use, clear in responsibility, capable of sensing and judging the abnormal state in real time and capable of achieving post-event tracing is provided for a user, and warning and deterrence can be formed for an actor who intends to destroy a box body while the user can use the system conveniently.
Owner:NANJING LES CYBERSECURITY & INFORMATION TECH RES INST CO LTD

CSRF attack protection method and device

The present invention provides a CSRF attack protection method and device. The background server generates the token under the condition that the user request does not carry the token and writes the generated token into the browser cookie and the page request, and the token does not need to be stored in the background server, so that the pressure of the background server is reduced. When the user sends the user request again, the front-end preset script is triggered to run to write the token in the browser cookie and the page request into the user request, the background server realizes CSRF verification by judging whether the cookie in the user request is the same as the token in the parameter or not due to the fact that the browser cookie cannot be captured by a third party, the verification logic for binding the token with the user does not need to be added, and therefore, the CSRF attack problem can be simply and effectively solved.
Owner:HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products