Method and system for obtaining network security event according to time node and electronic equipment

A time node and network security technology, applied in the transmission system, electrical components, etc., can solve the problem of not being able to accurately search for network security event information in time, and achieve the effect of conveniently searching for relevant network security event information

Pending Publication Date: 2021-03-12
北京冠程科技有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the above-mentioned related technologies, the inventor believes that it has the defect of not being able to accurately search for network security event information based on time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for obtaining network security event according to time node and electronic equipment
  • Method and system for obtaining network security event according to time node and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of this application clearer, the following in conjunction with the attached Figure 1-2 And embodiment, this application is described in further detail. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application.

[0035] Embodiments of the present application provide a method, a system, an electronic device, and a storage medium for acquiring network security events according to time nodes.

[0036] refer to figure 1 and figure 2 , the method of obtaining network security events according to the time node, specifically including:

[0037] S1: Obtain the time node of the network security event requested by the client.

[0038] In this embodiment, after the client establishes communication with the server through the Internet, the server receives the time node information input by the client, and the client...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and system for obtaining a network security event according to a time node and electronic equipment, and the method comprises the steps: obtaining the time node of the network security event requested by a client, enabling the time node to be matched with the data in a database, screening an event corresponding to the time closest to the time node, and obtaining the event corresponding to the time closest to the time node; and returning to the client for display. The method has the effect of accurately searching the network security event information accordingto the time node and feeding back the network security event information to the client.

Description

technical field [0001] The present application relates to the technical field of information acquisition, and in particular to a method, system and electronic equipment for acquiring network security events according to time nodes. Background technique [0002] In the era of continuous network development, network security issues have become one of the most concerned issues in today's society. If you do not know information about network security, network security issues will have a serious impact and threat on user information and property. [0003] At present, people usually obtain information related to network security through the Internet, for example, by searching for keywords in a browser to search for relevant network security information. [0004] With regard to the above-mentioned related technologies, the inventor believes that there is a defect that it cannot accurately search for network security event information according to time. Contents of the invention ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1416
Inventor 冯建行吴国华吴中华秦献忠丁聪霜陈华
Owner 北京冠程科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products