Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 11. Отображено 11.
20-05-2010 дата публикации

REALIZING METHOD OF COMMUNICATION SERVICE, DEVICE AND SYSTEM

Номер: WO2010054555A1
Принадлежит:

A realizing method of communication service, includes that: determining whether a user subscribes an IP CENTREX (CENTREX) service and an intelligent service according to acquired user subscription information after receiving a calling request (S101); if the user subscribes IP CENTREX service and the intelligent service, inquiring of an application server whether the calling request is an in-group calling (S102); if the inquiring result is an in-group calling, performing corresponding service processing to realizing preferential billing of the in-group calling according to the inquiring result (S103). When the user subscribes IP CENTREX service and the intelligent service, the realizing method of communication service in the current invention could realize that two kinds of services don't interfere with each other and realize the preferential billing of the in-group calling. The current invention also discloses a network device and a mobile communication system.

Подробнее
21-09-2017 дата публикации

SECRET KEY PROCESSING METHOD AND APPARATUS

Номер: WO2017157006A1
Автор: SHI, Xun, YU, Fajiang, ZHAO, Bo
Принадлежит:

Provided are a secret key processing method and apparatus, which relate to the field of communications and can avoid returning an error code representing that a space is full during secret key loading and ensure smooth secret key loading. The secret key processing method comprises: acquiring a secret key loading command, wherein the secret key loading command indicates the loading of a first secret key on a trusted platform module (TPM) chip; if all secret key slots within the TPM chip are in a non-idle state, releasing a first secret key slot in all the secret key slots within the TPM chip; and according to the secret key loading command, loading the first secret key on the first secret key slot.

Подробнее
14-08-2014 дата публикации

METHOD AND DEVICE FOR REALIZING ATTACK PROTECTION IN CLOUD COMPUTING NETWORK, AND NETWORK

Номер: WO2014121510A1
Автор: YE, Sihai, SHI, Xun
Принадлежит:

A method and device for realizing attack protection in a cloud computing network, and a network, for solving the problem of a low defensive success rate. The method comprises: configuring an initialized security baseline for a computation node, with the security baseline comprising at least one configuration parameter; sending a dynamic security detection request to the computation node, wherein the dynamic security detection request comprises at least one configuration parameter for the computation node to execute dynamic security detection; receiving a dynamic security detection result which is sent by the computation node according to the dynamic security detection request and obtained by executing the dynamic security detection in a security execution environment; determining whether the security baseline of the computation node has changed according to the dynamic security detection result; if the security baseline of the computation node has changed, detecting whether the change was ...

Подробнее
07-07-2016 дата публикации

DEPTH PROOF METHOD OF VIRTUAL MACHINE, COMPUTING DEVICE AND COMPUTER SYSTEM

Номер: WO2016107394A1
Автор: SHI, Xun
Принадлежит:

The present invention relates to the field of communications. Provided in an embodiment of the present invention are a depth proof method of a virtual machine (VM), a computing device and computer system. The VM depth proof method addresses the problem that a current VM depth proof can easily cause a performance bottlenecking of a hardware trust root. The method comprises: a VM receives a verification request message transmitted by a distal end verification server; according to the verification request message, obtaining, from a storage space corresponding to the VM virtual trust root, a credible proof of a virtualization platform where the VM is located and a VM credible proof, the storage space corresponding to the VM virtual trust root storing the credible proof of the virtualization platform; transmitting the credible proof of the virtualization platform and the VM credible proof to the distal end verification server to perform a verification. The embodiment of the present invention ...

Подробнее
03-08-2017 дата публикации

VTPM-BASED METHOD AND SYSTEM FOR VIRTUAL MACHINE SECURITY AND PROTECTION

Номер: WO2017128720A1
Автор: SHI, Xun, WANG, Juan, ZHAO, Bo
Принадлежит:

The present invention relates to the technical field of the Internet. Disclosed are a VTPM-based method and system for virtual machine security and protection. The method comprises: a physical host receives a primary seed access request sent by a virtual machine, wherein the primary seed access request at least carries a UUID (201); the physical host sends the UUID to a KMC (202), such that the KMC can generate a primary seed according to the UUID; the physical host receives the primary seed fed back by the KMC (204), and then sends the primary seed to the virtual machine (205) and allow the virtual machine to create, on the basis of the primary seed, a root key of the VTPM, wherein the root key is used by the VTPM to create a key for the virtual machine for security and protection of the virtual machine. The method does not rely on any physical host, and uses a third-party device to assign a primary seed to a virtual machine, subsequently enabling the creation of an identical root key ...

Подробнее
19-03-2015 дата публикации

MEASUREMENT METHOD, ELECTRONIC DEVICE AND MEASUREMENT SYSTEM

Номер: WO2015035843A1
Принадлежит:

A measurement method, an electronic device (701) and a measurement system. The electronic device (701) reading run code and run data in a run process of a virtual machine monitor (VMM) from a hardware storage device (601) and generating first verification information based on the run code and the run data; the electronic device (701) storing the first verification information and transferring log information generated in a process from the electronic device (701) reads the run code and the run data to the electronic device (701) stores the first verification information to a trusted data center (702) so as to enable the trusted data center (702) to measure the electronic device (701) based on second verification information generated based on the log information and the first verification information obtained from the electronic device (701).

Подробнее
30-05-2014 дата публикации

MANAGEMENT CONTROL METHOD, DEVICE AND SYSTEM FOR VIRTUAL MACHINE

Номер: WO2014079009A1
Автор: YE, Sihai, SHI, Xun
Принадлежит:

Provided are a management control method, device and system for a virtual machine. The method in the embodiments of the present invention comprises: a security control platform receiving a request message for starting a virtual machine from a user terminal, which is forwarded by a management platform, the request message for starting a virtual machine comprising an identifier of the virtual machine to be started and user information; invoking a third-party trusted platform to determine that the request message for starting a virtual machine is initiated by the user terminal according to an authorized user instruction; and authenticating the user information, and invoking the third-party trusted platform to decapsulate the virtual machine to be started on the basis of successful authentication. Thus, it is guaranteed that other user terminals (including the management platform) will not acquire a key for the third-party trusted platform, and the security of the virtual machine management ...

Подробнее
21-05-2015 дата публикации

METHOD AND SYSTEM FOR REALIZING VIRTUALIZATION SECURITY

Номер: WO2015070376A1
Автор: SHI, Xun, YE, Sihai
Принадлежит:

In the method and system provided in the embodiments of the present invention, a user virtual machine receives a command from a user of a virtual machine, classifies the command according to an executive body corresponding to the command, and obtains at least one of the following: a first type of command and a second type of command, wherein the first type of command is executed by the user virtual machine, the second type of command is executed by a security virtual machine, and then the user virtual machine presents the execution results of the command to the user of the virtual machine, thereby improving the user experience while being able to realize virtualization security.

Подробнее
11-12-2014 дата публикации

METHOD, SERVER, HOST AND SYSTEM FOR PROTECTING DATA SECURITY

Номер: WO2014194494A1
Автор: SHI, Xun, YE, Sihai
Принадлежит:

Disclosed are a method, a server, a host and a system for protecting data security. A server generates a unique cloud characteristic value corresponding to the server, and binds data encryption keys required by hosts so as to generate data encryption key ciphertexts. The data encryption key ciphertexts and the cloud characteristic value are transmitted to the hosts. The hosts use the cloud characteristic value to decrypt the data encryption key ciphertexts so as to acquire data encryption keys distributed to users. In this way, security protection for user data is implemented based on the cloud characteristic value, which improves data security.

Подробнее
04-04-2023 дата публикации

Data transmission method and device

Номер: CN115913466A
Принадлежит:

The invention provides a data transmission method and device, and the method comprises the steps: determining a parameter for transmitting data through a first control entity according to information for scheduling air interface resources, and then transmitting the parameter for transmitting data to a first execution entity, and the first execution entity performs redundant transmission on the data according to the parameters for transmitting the data, and a receiving party of the redundant transmission is the second execution entity. According to the secure communication method and device provided by the invention, when the service is damaged due to poor air interface quality, the retransmission time delay can be reduced, and the success rate of redundancy transmission can be improved.

Подробнее
18-04-2023 дата публикации

Autonomous underwater robot for aquaculture

Номер: CN115973379A
Принадлежит:

The autonomous underwater robot for aquaculture comprises an upper cabin body located on the upper portion and two lower cabin bodies located on the lower portion, and the upper cabin body, the two lower cabin bodies and the lower cabin bodies are connected through T-shaped supports and are parallel to one another and arranged in the shape of a Chinese character'pin '; the top of the T-shaped support is connected with the upper cabin body, and the two sides of the bottom of the T-shaped support are connected with the two lower cabin bodies respectively. The upper cabin body comprises a lighting module, a buoyancy adjusting module, a vertical propeller module, an electric control module and an upper cabin body stern part which are sequentially connected from front to back; the video image acquisition module is installed above the T-shaped support and used for shooting water surface or underwater images. The stern part of the upper cabin body is connected with a water surface communication ...

Подробнее