Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer defense system and method based on data depth association

A defense system and computer technology, applied in computer parts, computer security devices, computing, etc., can solve the problems of internal staff leaking secrets, affecting file transmission and use, etc., to improve security, improve training speed and convergence, and improve The effect of accuracy

Active Publication Date: 2022-03-01
深圳市辰星瑞腾科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the important data leaks and other scandals in most companies today are mainly caused by internal employees actively leaking secrets, and internal employees can leak important information through USB flash drives and mail transmissions, etc.
[0003] Some existing technologies detect that data is downloaded from the computer intranet or transmitted to the external network IP, automatically encrypting the files to be transmitted for the purpose of security defense, but often in the transmitted folder There are multiple documents, some documents are private and need to be encrypted, and some documents are non-private and do not need to be encrypted. Unified encryption will affect normal file transmission and use. Therefore, before encryption, how to encrypt files It is very important to identify the documents in the folder

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer defense system and method based on data depth association
  • Computer defense system and method based on data depth association
  • Computer defense system and method based on data depth association

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Hereinafter, exemplary embodiments according to the present application will be described in detail with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments of the present application. It should be understood that the present application is not limited by the exemplary embodiments described here.

[0045] Scenario overview

[0046] As mentioned above, at present, most enterprises mainly conduct information security protection work from the two aspects of external network and internal network. The external network mainly uses security equipment such as firewalls and anti-attacks for security information protection to prevent hackers or external visitors from entering the enterprise intranet to steal core data within the enterprise. However, scandals such as important data leaks in most companies today are mainly caused by internal employees actively l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a computer defense system and a computer defense method based on data depth association, which not only utilize and encode context information among contents in each document in a folder, but also utilize and encode context information among contents of a plurality of documents in the folder through a two-stage semantic understanding model. Therefore, the content correlation among the documents is fully utilized. Furthermore, context decoding is also realized through a converter class function value and a decoder hidden state mechanism at a decoding level, so that the accuracy of regression is improved, and the training speed and convergence are also improved. Therefore, each document in the file can be encrypted more accurately, and the security of file transmission is improved.

Description

technical field [0001] The present invention relates to the field of computer defense, and more specifically, relates to a computer defense system and defense method based on deep correlation of data. Background technique [0002] At present, most enterprises mainly conduct information security protection work from both the external network and the internal network. The external network mainly uses security equipment such as firewalls and anti-attacks for security information protection to prevent hackers or external visitors from entering the enterprise intranet to steal core data within the enterprise. However, scandals such as important data leaks in most companies today are mainly caused by internal employees actively leaking secrets, and internal employees can leak important information through USB flash drives and email transmissions. [0003] Some existing technologies detect that data is downloaded from the computer intranet or transmitted to the external network IP...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/62G06F40/284G06F40/30G06K9/62G06N3/04G06N3/08
CPCG06F21/57G06F21/6218G06F21/602G06F40/30G06F40/284G06N3/08G06F2221/2107G06N3/044G06F18/2415
Inventor 周鹏儿唐小勇李长叶吴智灿
Owner 深圳市辰星瑞腾科技有限公司