Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for intelligently identifying and processing network data flow

A technology for intelligently identifying and processing networks, which is applied in the field of network security and can solve problems such as leakage of important data

Active Publication Date: 2021-06-18
浙江华途信息安全技术股份有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of using the network for data transfer, users often leak important data intentionally or unintentionally. The market needs a method that can deeply and intelligently identify sensitive information and process network data streams. This invention solves such problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for intelligently identifying and processing network data flow
  • A method for intelligently identifying and processing network data flow
  • A method for intelligently identifying and processing network data flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be specifically introduced below in conjunction with the accompanying drawings and specific embodiments.

[0034] like figure 1 As shown, a method for intelligently identifying and processing network data flow includes the following steps:

[0035] Step 1: Connect the intelligent identification device, core switch or router to the terminal, internal data server, and public network installation; the identification device forwards the network data stream as an agent, and the device obtains the data to be detected; the data to be detected is the pre-defined target server network data. As an embodiment, the intelligent identification device is a gateway or a proxy server.

[0036] Step 2: Analyze the data to be detected and determine the protocol used for the transmission of the data to be detected. If the protocol used cannot be analyzed, according to the preset network protocol identification rules, directly block or release the data to be det...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for intelligently identifying and processing network data streams. In this scheme, each protocol has a characteristic of a specific command mark for key flow data, and the key flow data is checked and acquired according to the mark, so as to realize network Judgment and inspection of key circulation data in the flow; after obtaining the key data, the deep-level identification method is adopted. The deep-level identification is mainly reflected in the comprehensive scanning of key data, in-depth comparison of existing types of databases, and accurate matching; thus, this scheme can Effectively conceal sensitive information, can carry out in-depth intelligent identification of such information, prevent unauthorized transmission or even purposeful leakage of important data or illegal data, and provide smarter and deeper detection and protection means for network security and data security.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for intelligently identifying and processing network data flows. Background technique [0002] In the process of enterprise modernization, network office has been more and more widely used. In the process of using the network for data transfer, users often leak important data intentionally or unintentionally. The market needs a method that can deeply intelligently identify sensitive information and process network data streams. The present invention solves such problems. Contents of the invention [0003] In order to solve the deficiencies of the prior art, the purpose of the present invention is to provide a method for intelligently identifying and processing network data streams. This solution can effectively conceal sensitive information, and can perform deep intelligent identification of these information to prevent important data or illegal Data is transmitted wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/0428H04L63/205
Inventor 戴剑勇任先富谢永胜
Owner 浙江华途信息安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products