-
公开(公告)号:US20230161916A1
公开(公告)日:2023-05-25
申请号:US18151890
申请日:2023-01-09
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Yongzheng WU , Zhiguo GE , Tao HUANG , Chenyu WANG
CPC classification number: G06F21/64 , G06F12/023 , G06F2212/1052
Abstract: A processor obtains a first child node in response to a read request for target data when the first child node is not verified in the processor. The first child node is a child node that is in an integrity tree and that is related to the target data. The integrity tree includes a plurality of root nodes and a plurality of child nodes. The plurality of root nodes are in a decompressed state and the plurality of child nodes are in a compressed state. The processor decompresses the first child node in the compressed state, and caches the decompressed first child node into the processor for integrity verification on the target data. The plurality of child nodes of the integrity tree are stored in a form of the compressed state in the memory, so that storage space of the memory can be saved, and the sizes of the child nodes can be reduced.
-
公开(公告)号:US20250023890A1
公开(公告)日:2025-01-16
申请号:US18901338
申请日:2024-09-30
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: Chenyu WANG , Yongzheng WU , Zhuo WEI
IPC: H04L9/40
Abstract: A security detection method and apparatus, and a vehicle are provided. The method includes: obtaining a first data packet; inputting the first data packet into a first security detection apparatus for security detection, to obtain a first security detection result; obtaining a second data packet and inputting the second data packet into a second security detection apparatus for security detection if the first security detection result indicates that the first data packet poses a security threat, to obtain a second security detection result; and forwarding the second data packet or executing a first security instruction based on the second security detection result. The technical solution can be applied to a new energy vehicle or an intelligent vehicle, to implement multi-level detection on a security threat in a data packet, so as to help improve security performance of a vehicle.
-
公开(公告)号:US20230239159A1
公开(公告)日:2023-07-27
申请号:US18192834
申请日:2023-03-30
Applicant: HUAWEI TECHNOLOGIES CO., LTD.
Inventor: ZHIGUO GE , Chenyu WANG , Yongzheng WU , Tao HUANG
CPC classification number: H04L9/3242 , G06F9/5016
Abstract: The method includes: obtaining, in response to a write request for a target data block, a value of a first sub-counter corresponding to the target data block in an integrity tree, where the first sub-counter is a sub-counter of a first shared counter, and a first storage resource of the first sub-counter belongs to a storage resource of the first shared counter; and allocating a second storage resource to the first sub-counter when it is detected that a value obtained after a first value is added to the value of the first sub-counter is greater than a maximum storage value of the first storage resource. In this way, the adjusted storage resource of the first sub-counter is increased, thereby further preventing overflow of the first sub-counter and improving performance of data integrity verification of the integrity tree.
-
-