Network data security transmission method and system, and electronic device

A technology for secure transmission and network data, applied in the field of network security, can solve problems such as low security, and achieve the effect of solving low security and achieving detection efficiency and accuracy.

Inactive Publication Date: 2019-02-01
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a network data secure transmission method, system and electronic equipment, to solve the technical problem of low security in the network data transmission process existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data security transmission method and system, and electronic device
  • Network data security transmission method and system, and electronic device
  • Network data security transmission method and system, and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A method for secure network data transmission provided by an embodiment of the present invention is applied to a server, such as figure 1 shown, including:

[0055] S11: Establish a network virus signature database, which includes virus signatures of various network viruses.

[0056] In this step, a virus signature database is created, and each virus signature corresponds to one or more virus information.

[0057] S12: Analyzing the network data packet transmitted by the server to obtain the target data.

[0058] As a preferred implementation of this embodiment, the collected network data packets are reassembled and analyzed.

[0059] S13: Match the target data with each virus signature in the network virus signature database through a multi-pattern matching algorithm.

[0060] In practical applications, a multi-pattern matching algorithm is used to match the virus signatures in the virus signature database.

[0061] S14: Determine whether there is a virus signature...

Embodiment 2

[0070] A method for secure network data transmission provided by an embodiment of the present invention is applied to a server, such as figure 2 shown, including:

[0071] S21: Establish a network virus signature database, which includes virus signatures of various network viruses.

[0072] As a preferred solution, a virus signature database is created, and each virus signature corresponds to one or more virus information.

[0073] S22: Authenticate the identity of the user operating the server, and encrypt the identity of the user after the authentication is passed.

[0074] As another implementation of this embodiment, the user verifies the login identity through the identity verification module, and after passing the verification, the identity is encrypted by the encryption unit to enter the server.

[0075] S23: Analyzing the network data packet transmitted by the server to obtain the target data.

[0076] In this step, the collected network data packets are reassemble...

Embodiment 3

[0091] A network data security transmission system provided by an embodiment of the present invention is applied to a server, such as image 3 As shown, the network data secure transmission system 3 includes: an establishment unit 31 , an analysis unit 32 , a matching unit 33 , a combination unit 34 and an isolation unit 35 .

[0092] Wherein, the establishing unit is used to establish a network virus signature database, which includes virus signatures of various network viruses. The parsing unit is used for parsing the network data packets transmitted by the server to obtain target data.

[0093] It should be noted that the matching unit is used to match the target data with each virus signature in the network virus signature database through a multi-pattern matching algorithm. The combination unit is used to determine the virus signature matching the target data as the target signature if there is a virus signature matching the target data in the network virus signature dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network data security transmission method and system and an electronic device, related to the technical field of network security. The network data security transmission method comprises the following steps: establishing a network virus feature library, and the network virus feature library includes virus features of a plurality of network viruses; parsing a network data packet transmitted by a server to obtain target data; matching the target data with each virus feature in the network virus feature library through a multi-mode matching algorithm; if the virus featurematching the target data exists in the network virus feature library, determining the virus feature matching the target data as a target feature, and combining all the target features to obtain a combined result; and isolating the network data packet if the combined result constitutes a piece of complete network virus information. The invention solves the technical problem that the security of the network data transmission process in the prior art is low.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network data security transmission method, system and electronic equipment. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. It has the characteristics of confidentiality, integrity, availability, controllability, and reviewability. [0003] With the development of network technology, the traditional LAN structure has shortcomings such as very fragile network security and incomplete network functions. The security, stability, versatility and speed of enterprise networks have become the most concerned issues of enterprise managers. Such as the security of user data within the enterprise network, the control of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/0428H04L63/145H04L69/22
Inventor 张凯歌范渊龙文洁刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products