Network security method and network security service system

A network security and security technology, applied in the field of network security methods and network security service systems, can solve problems such as computer network and data attacks, and achieve the effect of avoiding network attacks, improving security, and improving network security.

Pending Publication Date: 2020-08-07
李云浩
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this application is to provide a network security method, which can solve the problem of computer network and data being attacked caused by unverified websites or malicious data to lure or deceive users to choose
[0004] Another purpose of this application is to provide a network security service system, which can solve the problem of computer network and data being attacked caused by unverified websites or malicious data to lure or deceive users to choose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security method and network security service system
  • Network security method and network security service system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0016] Therefore, the following pair of Figure 1~2 The detailed descriptions of the embodiments of the application provided in the section are not intended to limit the scope of the claimed application, but represent only selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network security method and a network security service system, and relates to the field of network security. The network security method comprises the following steps of: (1)performing bypass acquisition on a network data packet to extract public data content in a network message; (2) analyzing generation formats and operation authorities of all editable information in the public data content; (3) verifying the source security of each piece of editable information according to different generation formats of each piece of editable information, and deleting illegal andabnormal editable information; and (4) respectively operating each piece of editable information to generate result information according to the operation authority of each piece of editable information, and deleting duplicate and abnormal result information. According to the network security method and the network security service system, malicious information in the network data is eliminated,and the security of network use is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network security method and a network security service system. Background technique [0002] Network security refers to the use of network management control and technical measures to ensure that the confidentiality, integrity and usability of data are protected in a network environment. Computer network security includes two aspects, namely physical security and logical security; physical security refers to the physical protection of system equipment and related facilities from damage or loss; logical security includes information integrity, confidentiality and availability. Existing website visits are generally authenticated by signing a security agreement, and malicious data or unauthenticated websites are selected by users to judge whether they are safe or not. Some websites use false information to lure and deceive users to choose illegal or unsafe information, thereby mal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416H04L63/126
Inventor 李云浩
Owner 李云浩
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products