Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 16. Отображено 16.
04-05-2011 дата публикации

Secure data exchange method and system for electric vehicle and charging and exchanging power station

Номер: CN0102045340A
Принадлежит:

The invention relates to a secure data exchange method for an electric vehicle and a charging and exchanging power station. The method comprises the following steps that: the electric vehicle transmits self digitally signed integrity information to the charging and exchanging power station, acquires the integrity information of the charging and exchanging power station and submits the integrity information of the charging and exchanging power station to a security information management centre; the charging and exchanging power station submits the integrity information transmitted by the electric vehicle to the security information management centre and submits the digitally signed integrity information to the electric vehicle; the security information management centre authenticates the integrity information and feeds an authentication result back; and when the authentication result is coincident, connection is established between the electric vehicle and the charging and exchanging power ...

Подробнее
30-07-2014 дата публикации

Static trojan horse detection method based on terminal self-starting item

Номер: CN103955644A
Принадлежит:

The invention discloses a static trojan horse detection method based on a terminal self-starting item. The static trojan horse method comprises the following steps: establishing an engine analysis model of a system starting item, performing full-periodic starting item change monitoring, performing grey list intelligent analysis on data which is filtered by the engine analysis model of the system starting item, recording the data and storing into respective databanks, performing static scanning detection on the databanks and intelligently analyzing and comparing the databanks. By adopting the static trojan horse detection method disclosed by the invention, the conventional trojan horse searching and killing mode based on a starting item is changed. The conventional trojan horse is detected, searched and killed based on known Trojan horse behavior, and no detection methods are available for unknown trojan horse or trojan horse started based on application; through engine analysis static detection ...

Подробнее
30-07-2014 дата публикации

Trojan horse detection method based on terminal traffic

Номер: CN103957205A
Принадлежит:

The invention provides a trojan horse detection method based on terminal traffic. The method comprises the steps of capturing data traffic information, analyzing time period traffic, analyzing uplink data traffic and downlink data traffic of a terminal, conducting approval matching between the data traffic which is analyzed intelligently and communication white list data, and detecting the correctness of a terminal traffic data packet. According to the trojan horse detection method based on the terminal traffic, the situation that when a conventional trojan horse detection means according to existing feature codes, samples, malicious codes and the like in the prior art is used, trojan horses which are highly hidden, incapable of being killed, capable of conducting irregular communication and being injected through system program files and the like can not be found or killed in time is changed; by means of the trojan horse detection method based on the terminal traffic, the terminal data ...

Подробнее
09-11-2011 дата публикации

Quality-of-service-based secure communication method for wireless sensor network

Номер: CN0102238651A
Принадлежит:

The invention belongs to the field of wireless sensor network communication, and particularly relates to a quality-of-service-based secure communication method for a wireless sensor network, which mainly aims to solve the problem of simultaneously ensuring the quality of service (QoS) and security of the wireless sensor network communication. The QoS and the security are both important performance indexes of the wireless sensor network, but are factors influencing each other in network designing. Therefore, the quality-of-service-based secure communication method is provided on the premise of not changing the structure of an institute of electrical and electronic engineer (IEEE) 802.15.4 data frame, and is simple and practical.

Подробнее
01-10-2014 дата публикации

Method for enhancing communication safety in industrial control system

Номер: CN104079408A
Принадлежит:

The invention relates to a method for enhancing communication safety in an industrial control system. The method is applied in the industrial control system. The industrial control system comprises a master station side and a terminal side which are in communication with each other. The method is implemented through a preparation stage before communication, a master station side sending stage, and a terminal side receiving, processing and replying stage. The method is used for solving the problems that in communication of an existing industrial control system, the computing capacity of a client is weak, time of the client comes from a server, a communication channel is not reliable, and instantaneity and high safety are needed for key communication. The method is designed for safety communication in the special environment, identity authentication and a complete guarantee are provided for a key communication message, and safety of the whole system is effectively enhanced.

Подробнее
27-07-2011 дата публикации

Industrial control system data exchange safety protection method and system and device thereof

Номер: CN0102137095A
Принадлежит:

The invention discloses an industrial control system data exchange safety protection method and a system and a device thereof. The method comprises the following steps: the receiving end of an industrial control system extracts a payload and a complete check code from a compound control message, the complete check code is a signature or summary information, and the summary information is generated according to the payload and a secret; according to the payload, new summary information is acquired; and according to the complete check code, a public key or a secret, the new summary information is subject to the complete verification. In the technical field of the invention, data source certification, complete protection and replay attack prevention are carried out to interactive messages, the control center (main station) and the controlled terminal (substation) of an industrial control system can carry out verification to the identity of a message sender, so that the condition that malicious ...

Подробнее
24-06-2015 дата публикации

Novel solar cell panel

Номер: CN204424277U
Автор: ZHU YIFAN, GAO KUNLUN

The utility model provides a novel solar cell panel. The novel solar cell panel comprises a base, a support and a hollow sphere fixed to the support through a rotary shaft, wherein the hollow sphere comprises an outer shell and an inner shell, the outer shell is in the shape of a football and is composed of multiple equilateral hexagon-shaped infrared optical filters and equilateral pentagon-shaped infrared optical filters and used for filtering out infrared light, the surface of the inner shell is inlaid with multiple convex lenses, and multiple silicon cell panel bodies are arranged below the convex lenses, connected and gathered according to charge requirements into two electric energy output wires and then connected to a storage battery in the base. The novel solar cell panel is simple, novel and unique in structure and convenient to install, it is guaranteed that illuminated areas are basically equal in sunny days throughout the year in regions with different direct solar radiator ...

Подробнее
21-11-2012 дата публикации

Attack prevention system based on structured query language (SQL)

Номер: CN0101448007B
Принадлежит:

The invention provides a modified misuse-type structured query language (hereinafter referred as to SQL) attack defense system which is based on application system services and an SQL-injected characteristic extraction malicious attack behavior characteristic library and combined with the SQL request of the characteristic library to a user to carry out strict test and block the SQL request with the attack characteristics according to test results, so as to provide the security protection for the database and the corresponding audit record. The invention can be flexibly allocated to boundary defense devices, application servers, database servers and various security audit software, and the SQL attack behavior characteristic library can be updated at any time when the application environment is changed and a new attack type or normal behavior pattern appears.

Подробнее
03-06-2009 дата публикации

Attack prevention system based on structured query language (SQL)

Номер: CN0101448007A
Принадлежит:

The invention provides a modified misuse-type structured query language (hereinafter referred as to SQL) attack defense system which is based on application system services and an SQL-injected characteristic extraction malicious attack behavior characteristic library and combined with the SQL request of the characteristic library to a user to carry out strict test and block the SQL request with the attack characteristics according to test results, so as to provide the security protection for the database and the corresponding audit record. The invention can be flexibly allocated to boundary defense devices, application servers, database servers and various security audit software, and the SQL attack behavior characteristic library can be updated at any time when the application environment is changed and a new attack type or normal behavior pattern appears.

Подробнее
09-09-2015 дата публикации

Refrigerated container dedicated Internet of Things gateway based on Beidou satellite positioning

Номер: CN104900038A
Принадлежит:

The invention discloses a refrigerated container dedicated Internet of Things gateway based on Beidou satellite positioning, comprising a hollow gateway shell, wherein the gateway shell is internally provided with a gateway main module, a Beidou positioning module and a wireless radio frequency receiving module; the Beidou positioning module is used for transmitting gateway position information acquired by the Beidou positioning module to the gateway main module; the wireless radio frequency receiving module is used for transmitting temperature information received from a wireless temperature sensor in the refrigerated container to the gateway main module; the gateway main module is used for transmitting received position information and temperature information to the detection platform of the server by GPRS. According to the invention, the position information and the temperature information of the refrigerated container can be monitored and transmitted in real time, and real-time management ...

Подробнее
02-11-2011 дата публикации

Method for predicting theoretical line loss of power distribution network based on Boosting algorithm

Номер: CN0102231144A
Принадлежит:

The invention relates to a method for predicting theoretical line loss of a power distribution network based on a Boosting algorithm. The method comprises the following three steps of: pre-processing data: converting historical line loss records related to the prediction of the theoretical line loss of the power distribution network into an original sample set Soriginal suitable for the Boosting algorithm; training the Soriginal by using an integrated learning algorithm to obtain a model Mlineloss for predicting the theoretical line loss of the power distribution network, satisfying error requirements; and using the model Mlineloss for predicting the theoretical line loss of the power distribution network to complete the prediction of theoretical line losses in unmeasured lines in the power distribution network. By using the method for predicting the theoretical line loss of the power distribution network based on the Boosting algorithm in the invention to predict the theoretical line losses ...

Подробнее
07-01-2015 дата публикации

SSH (Secure Shell) network security access protocol monitoring method

Номер: CN104270334A
Принадлежит:

The invention provides an SSH (Secure Shell) network security access protocol monitoring method. The method comprises the following steps that: an SSH operation and maintenance session agent module records and analyzes intercepted data packets and forwards the data packets to the other end of communication once a client or a server side transmits data to the SSH operation and maintenance session agent module, and the SSH session agent module automatically cuts off connection of the other end and releases corresponding resources when the session of either or both the client or/and an operation and maintenance equipment server is disconnected; and a data processing unit forwards the data packets and writes the data into a shared buffer region in order to record data and completely record the operating process of operation and maintenance personnel, comprising executed valid commands and corresponding results. Through adoption of the method, recording, forwarding and monitoring of SSH session ...

Подробнее
27-06-2023 дата публикации

Battery liquid injection machine

Номер: CN116345083A
Принадлежит:

The invention discloses a battery liquid injection machine, and relates to the field of battery production equipment. The device comprises a rack, a liquid injection mechanism, a sealing mechanism and a clamping mechanism. The opening and closing type sealing plug is installed on the rack through the jig, the liquid injection head is driven by the lifting translation assembly to move downwards along the sealing plug before liquid injection, the liquid injection needle below the liquid injection head can be inserted into and locked in the sealing plug, then the sealing plug is driven by the liquid injection needle to be movably inserted into the battery, and the battery in liquid injection is sealed; after liquid injection is completed, the lifting translation assembly pulls out the liquid injection needle, and the sealing plug is still hermetically inserted into the battery to continuously seal the battery, so that volatilization loss of electrolyte in the battery in the liquid injection ...

Подробнее
29-06-2011 дата публикации

Pre-sharing-based secure data transmission method for electric load management system

Номер: CN0102111273A
Принадлежит:

The invention provides a pre-sharing-based secure data transmission method for an electric load management system, which is significant to a power load management system to resist various security threats in wireless communication environments and open Internet environments. The confidentiality, integrity and availability of transmission data of the system can be ensured through perfection of the transmission protocol identity authentication and the integrity checking mechanism of the power load management system, and encryption of important control instructions. The method has significant meaning and demonstration effects to the formulation of secure data transmission schemes for other power application systems.

Подробнее
12-11-2014 дата публикации

Remote desktop detection system and detection method thereof

Номер: CN104144087A
Принадлежит:

The invention discloses a remote desktop detection system which comprises a WEB managing page module, an agent program module and a playback program module. The agent program module is used for agent service for remote desktop access, records remote desktop protocol data in the agent process, stores the remote desktop protocol data as playback files to be called by a playback program. Meanwhile, operation and maintenance can be interrupted in real time, an operation and maintenance function interface is provided for a managing page, and a protocol agent program can agent operation and maintenance personnel for operation and maintenance conversations when the operation and maintenance personnel operate and maintain a certain machine through page clicking. Operation and maintenance initiator information, the process of the operation and maintenance conversations, operated and maintained devices and other information are recorded and stored for in-process control, after-vent playback, centralized ...

Подробнее
03-09-2014 дата публикации

Method and device for detecting defects of Java source codes

Номер: CN104021084A
Принадлежит:

The invention discloses a method and device for detecting defects of Java source codes. The method comprises the steps of firstly performing static analysis on syllable codes of a Java source program, and generating a function call graph; generating a relation database storing the basic information of the Java source program according to the function call graph; according to a preset loophole mode, performing pointer alias analysis and taint analysis on the Java source program in a relation database inquiring mode; generating a defect report according to the taint analysis result. The method and device can comprehensively and accurately defect the safety defects of the Java source codes, meanwhile, the amount of program operation is reduced, and the detection performance is improved.

Подробнее