Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A computer network information security control system and method

A computer network and information security technology, applied in the field of computer network information security control system, can solve the problems of loss, reduce the efficiency of information collection, expand the influence of rumors, etc., and achieve the effect of improving efficiency

Pending Publication Date: 2019-06-11
RIZHAO POLYTECHNIC
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problem existing in the existing technology is: the existing computer network information loses the source of the information and the related information between the sending and receiving parties during the transmission process during the repeated single-hop private communication process, and the other party user cannot Know the source of the information; how many hops (levels) the information has passed before reaching the user; the relationship between the sender and the receiver in each hop (level); cannot solve the problem of selecting the optimal receiver when forwarding information; at the same time , cannot identify the credibility of computer network information, which encourages the spread of rumors and expands the influence of rumors. Due to limited knowledge and information, ordinary users cannot identify rumors, which has caused great trouble to users; The scale of the network is expanding day by day, the phenomenon of network congestion is gradually increasing, and some nodes lose connection from time to time. Information collection will easily increase the network load and reduce the efficiency of information collection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer network information security control system and method
  • A computer network information security control system and method
  • A computer network information security control system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

[0047] The structure of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0048] Such as figure 1 As shown, the computer network information security control method provided by the embodiment of the present invention includes:

[0049] S101: Collect network data information using network equipment based on the LEAPS algorithm;

[0050] S102: Using a network transmission line or a wireless transmitter to transmit network data information;

[0051] S103: Use the information identification program to identify network information data packets; use the encryption program based on the improved CP-ABE algorithm to encrypt the network information data; use the intrusion detection program to detect and mark the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of computer network information security control, and discloses a computer network information security control system and method. The computer network information security control system comprises a network information acquisition module, a network information transmission module, a main control module, a network information identification module, an encryption module, an intrusion detection module, an alarm module, a cloud storage module and a display module. After the information to be forwarded is received through the network information transmission module, the information to be forwarded is forwarded to a next-level information receiver, so that in the multi-stage transmission process of the information, each stage of information receivercan acquire the source of the information, the transmission path of the information and the relationship between the information sender and the information receiver in each stage, at the same time, whether the to-be-identified network information is credible or not can be determined through the network information identification module background, that is, whether the to-be-identified network information is credible or not is determined by utilizing the similarity, and accordingly the rumor can be automatically and effectively identified.

Description

technical field [0001] The invention belongs to the technical field of computer network information security control, and in particular relates to a computer network information security control system and method. Background technique [0002] Network information resources refer to the storage of various forms of information such as text, images, sounds, and animations in the form of electronic resource data in non-printing media such as optical and magnetic, and use computers to publish, transmit, and store information through the network. The sum of all kinds of information resources. Information resources change from words on paper to electromagnetic signals on magnetic media or optical information on optical media, making information storage, transmission, and query more convenient, and the stored information has high density, large capacity, and can be read without loss. reuse. Information in digital form can be processed at a high speed in a computer, and can be tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 吴国杰刘丹彭静
Owner RIZHAO POLYTECHNIC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products