Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Computer security protection system based on big data

A computer security and protection system technology, applied in the field of information security, can solve the problems of reduced free space and reduced user experience, and achieve the effect of reducing workload

Pending Publication Date: 2021-07-06
ZHENGZHOU VOCATIONAL UNIV OF INFORMATION & TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, what users generally pursue is the space for their own use, and the increasingly large virus database will reduce the free space that users can use freely, thus reducing the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer security protection system based on big data
  • Computer security protection system based on big data
  • Computer security protection system based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] A specific embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings, but it should be understood that the protection scope of the present invention is not limited by the specific embodiment.

[0035] Specifically, such as Figure 1-4 As shown, the embodiment of the present invention provides a computer security protection system based on big data, including: a program extraction module, a keyword extraction module, a data summary module, a result judgment module and a result execution module. The following is an introduction to the functions of each module.

[0036] The program extraction module is used for intercepting the program to pass through the firewall, and converting the program into a text format to obtain the original program text. In this module, the program that needs to pass through the firewall is the program that is currently accessing the computer, and it is also the program that is blocked by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer security protection system based on big data, and the system comprises a program extraction module which is used for intercepting a program which needs to pass through a firewall; a keyword extraction module which is used for extracting keywords from an original program text through a keyword extraction algorithm; a data summarization module which is used for arranging the keywords extracted by the keyword extraction module according to the appearance sequence of the keywords in the original program text to obtain character strings; a result judgment module which is used for inputting the character string into a support vector machine and outputting a result whether the character string passes through a firewall; and a result execution module which is used for controlling the firewall to allow the program to pass according to the firewall passing result. The method comprises the following steps: extracting a program to pass through a firewall, converting the program into a text format, extracting keywords in a text, arranging the keywords into numerical values in a character string form, sending an array into a support vector machine to obtain a result whether to pass through the firewall, and executing the result.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a computer security protection system based on big data. Background technique [0002] In the field of information security, firewalls are usually set up for virus protection, so that only data flows that comply with security policies can pass through the firewall. In order to achieve better protection effect, it is necessary to update the firewall's memory virus database in real time. However, this requires higher and higher computer configurations and larger storage capacity, so that the demand for virus database storage can be met. At present, users generally pursue self-use space, and the increasingly large virus database will reduce the free space that users can use freely, thereby reducing user experience. Contents of the invention [0003] The purpose of the present invention is to overcome the problems in the above-mentioned prior art, and provide a compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06K9/62
CPCG06F21/562G06F18/2411
Inventor 贾博文杨丽陈月阳付宁娴杨贝贝段韶鹏
Owner ZHENGZHOU VOCATIONAL UNIV OF INFORMATION & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products