Information processing method and device

An information processing method and equipment technology, which is applied in the field of network security, can solve problems such as multiple heterogeneous executives' consistent collaborative attack vulnerabilities, computer equipment user losses, etc., so as to avoid illegal operations and ensure safe and stable operation.

Active Publication Date: 2018-11-06
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU +2
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the practical application of the computer equipment system structure based on dynamic heterogeneous redundancy, in order to ensure the normal and safe operation of the computer equipment system, it is usually necessary to configure various functions of the computer equipment system. The coordinated attack vulnerability of the consistent output of a heterogeneous executive body is easy for the attacker to obtain some important data of the computer equipment, causing irreparable losses to the computer equipment users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information processing method and device
  • Information processing method and device
  • Information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The inventors of the present invention have found that: in the mimic defense system based on Dynamic Heterogeneous Redundancy (DHR), since the heterogeneous executive bodies in the Dynamic Heterogeneous Redundancy architecture can be independent of each other, there is a certain degree of The components are the same, and there are no strict reliability and security requirements for heterogeneous executives, allowing heterogeneous executives to "poisonously carry bacteria". Once the configuration in the system is wrong, it is difficult to overcome the influence of uncertain factors and form a consensus However, its mimic defense system cannot detect and deal with such vulnerabilities, that is, the defense function of the system fails, which will lead to attackers obtaining some of the computer equipment's Sensitive data or administrator privileges, leading to a complete compromise of the system of the computer device.

[0055]Among them, system management configuration e...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an information processing method and device. After a data access request is obtained, whether identity information carried in the data access request is qualified is verified atfirst, after it is confirmed that the identity information is qualified, voting results of multiple heterogeneous executive bodies on an independent processing result of the same input data, and corresponding processing logs of the multiple heterogeneous executive bodies can be obtained, thereby avoiding illegal operations of illegal users, and furthermore, in the embodiment, whether the multipleheterogeneous executive bodies contain an abnormal heterogeneous executive body is analyzed by combining the voting results and the multiple processing logs, and the abnormal heterogeneous executivebody is replaced in time, thereby solving the technical problem in the traditional scheme that, the abnormal heterogeneous executive body is only determined according the voting results, such that coordinated attack vulnerability caused by a system configuration error cannot be solved, and ensuring the safe and stable operation of a computer device.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically relates to an information processing method and equipment. Background technique [0002] The rapid development of the current information age has brought infinite convenience and fun to people's life and work. However, many threats and risks have emerged in the network environment, and cyberspace security issues also exist in people like ghosts. every corner of life. [0003] At present, the security defense methods for computer equipment are usually passive "remedial loopholes and plugging backdoors" defense system, not only the defense lags behind, but also for "unknown unknown threats" or uncertain threats, that is, based on computer equipment information system Vulnerabilities in software and hardware components, or threats caused by intentional implantation of software and hardware backdoors to implement artificial attacks, this passive defense method often cann...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/0876H04L63/108H04L63/1416H04L63/1425H04L63/1433H04L63/20H04L41/0668H04L63/083H04L41/0661
Inventor 张铮李卫超邬江兴王晓梅王立群
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products