Network data security management method and equipment

A network data and security management technology, applied in the field of network data security management, can solve the problems of filter leakage, illegal content deception, sensitive data filtering and early warning, etc.

Inactive Publication Date: 2012-11-28
BEIJING TIANYI DIANLIAN TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that: due to the phenomena of homonyms and synonyms of different words in words, the existing network data security management method cannot be sensitive to sensitive data in the case of keyword matching and filtering. Accurate filte

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data security management method and equipment
  • Network data security management method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1. Network data security management method. The procedure of this method is as follows figure 1 shown.

[0028] figure 1 The specific process of the network data security management method shown in includes the following steps:

[0029] S100. Obtain network data.

[0030] Specifically, the present invention can intercept network data flowing through the node at a certain node in the network and needs to continue to be transmitted in the network. The node can be the source node or intermediate node of the network data transmission path. For example, the node can Network devices such as switches, routers, or servers. The network data may be all payloads carried in a data packet, or may be part of payloads carried in a data packet. The present invention does not limit the specific location of the network device for acquiring network data, the specific form of the network device, and the like.

[0031] S110. Extract samples to be matched from the acquired n...

Embodiment 2

[0053] Embodiment 2, a network data security management method.

[0054] The flow of this method is basically the same as that of the first embodiment above, except that an additional step of judging the frequency of occurrence is required. In order to realize this judgment step, the corresponding relationship information also includes the field of the keyword occurrence frequency probability threshold value, and it is also necessary to calculate the matching samples whose distance calculated by S120 exceeds the ambiguity threshold value in the full text of the network data. If the frequency of occurrence does not exceed the keyword occurrence frequency probability threshold value corresponding to the matching sample, the network data is determined to be safe network data; otherwise, the network data is determined to be unsafe network data.

[0055] The newly added judging step in the second embodiment should be after S120, and the newly added judging step may not be performed...

Embodiment 3

[0056] Embodiment 3, network data security management equipment. The structure of the device is attached as figure 2 shown.

[0057] figure 2 The network data security management device shown in specifically includes: an acquisition module 1 , an extraction module 2 , a distance module 3 , and a first prediction module 4 . Optionally, the device may further include: at least one of a storage module 5 , a second prediction module 6 , a warning module 7 , and a shielding module 8 .

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network data security management method and network data security management equipment. The network data security management method comprises the following steps of: acquiring network data; extracting a sample to be matched from the network data; calculating a voice distance and/or a semantic distance between the sample to be matched and at least one pre-stored keyword according to a distance algorithm; acquiring a weight value corresponding to a keyword which is at a distance which exceeds an ambiguity threshold value away from the sample to be matched; calculating a security value of the network data according to the weight value; and determining that the network data are secure network data if the security value does not exceed a preset security value, otherwise determining that the network data are insecure network data. By using the technical scheme, sensitive data can be accurately filtered and early-warned, and a pseudo-matching phenomenon can be avoided, so that the security of the network data is enhanced, and the method and the equipment are practical.

Description

technical field [0001] The invention relates to a network data security management technology, in particular to a network data security management method and equipment. Background technique [0002] With the wide application of terminal devices with interconnection characteristics such as computers, networks (such as the Internet or local area networks or mobile communication networks, etc.) have been deeply popularized in all walks of life in society. [0003] The rapid development of the network not only provides a lot of convenience for people's work, study, and entertainment, but also brings new problems to people. Among them, the network data management problem, especially the network data security problem, has become a problem for many people. The focus of the industry is very concerned about. For example, the State Grid Corporation of China is vigorously promoting the construction of the "SG186" project and power communication, and the blueprint for digital power gri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
Inventor 张翼英李宝林
Owner BEIJING TIANYI DIANLIAN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products