Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Integrity verification calculation method and system based on operation spanning tree state machine

A technology of integrity verification and calculation method, which is applied in the field of calculation method and system for integrity verification based on operation spanning tree state machine, can solve the problems of limiting the number of concurrent connections of firewalls, congestion or overflow, etc., so as to reduce the risk of being attacked and ensure calculation safety effect

Active Publication Date: 2021-03-02
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing ordinary firewalls cannot resist the latest attack vulnerabilities without setting policies. The limit on the number of concurrent connections of the firewall can easily lead to congestion or overflow, and it is impossible to conduct integrity monitoring of network behavior from multiple dimensions such as user identity, role authority, application type, and transmission content. Computational recognition, and traditional firewalls based on local hosts cannot provide sufficient computing power and storage space support in the case of large-scale connections

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity verification calculation method and system based on operation spanning tree state machine
  • Integrity verification calculation method and system based on operation spanning tree state machine
  • Integrity verification calculation method and system based on operation spanning tree state machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Attached The embodiment described in the figure is exemplary, only for explaining the present invention, and can not be interpreted as limiting the present invention, based on the embodiment in the present invention, those of ordinary skill in the art obtain under the premise of not making creative work All other embodiments belong to the protection scope of the present invention.

[0026] In this application, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes none. o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an integrity verification calculation system and method based on an operation spanning tree state machine, and the method comprises: an operation tree generation step: receiving a business request, generating an operation tree, and forming a state machine according to each state of the operation tree and a conversion condition of the operation tree; a fireproof cloud detection filtering step: carrying out integrity detection on a state machine of the operation tree, and filtering operation behaviors according to a detection result; and a brain-like computing step: providing computing power for the operation tree generation step and the fireproof cloud detection filtering step. The user operation behavior is converted into the operation tree state machine for integrity detection, bidirectional detection and comprehensive detection can be achieved, the risk that a service system is attacked is reduced, the behavior of a legal user has safety and non-repudiation, and the strong computing power provided based on brain-like computing can ensure the security, stability and high efficiency of the computing of the business system when massive users access in parallel.

Description

technical field [0001] The invention relates to the field of computer information security, in particular to a calculation method and system for verifying the integrity of a state machine based on an operation spanning tree. Background technique [0002] With the continuous development of computer and network technology and the rapid development of informationization at home and abroad, the application of e-commerce and large and medium-sized enterprise information systems has gradually become widespread and complicated. With the convenience and speed of information brought by the application of information network systems, the issue of information security has become the main problem faced by application development. [0003] Currently, gateway-type security products on the market, such as firewalls, isolation gatekeepers, and security gateways, mainly filter the link layer, transport layer, and network layer based on the source and destination MAC addresses, IP addresses, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55G06F21/56G06N3/06
CPCH04L63/0227H04L63/123H04L63/1416G06F21/55G06F21/566G06N3/061
Inventor 戚建淮郑伟范唐娟刘建辉彭华宋晶
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products