Unlock instant, AI-driven research and patent intelligence for your innovation.

System safety realizing method and relative system using sub form automatic machine

A technology of system security and implementation method, applied in computer security devices, transmission systems, digital transmission systems, etc., and can solve problems such as infeasibility

Active Publication Date: 2012-05-23
LIONIC CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For attacks against real-time protocol (real-time protocol), because this type of communication protocol has strict time limit requirements, the aforementioned "assembling-before-scanning" solution will become less feasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System safety realizing method and relative system using sub form automatic machine
  • System safety realizing method and relative system using sub form automatic machine
  • System safety realizing method and relative system using sub form automatic machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In the following description, the present invention will be explained through some specific embodiments. After reading the following description, you will have a more thorough understanding of the concept of the present invention. Of course, the detailed data provided in the following description shall not limit the patent scope of the present invention.

[0027] Since the relevant theories and knowledge of "regular expression", "state machine" and "automaton" are well known to those with ordinary knowledge in the technical field, the I won't go into details. And please note that in the following description, the name "state machine" will be used interchangeably with the term "state automaton". "Wild card" is used to represent special symbols, such as the combination of period (.) and asterisk (*) in English, which is used to represent 0, 1, or more characters (for example , ".*abc" means all patterns ending with "abc"). A "data unit" refers to data stored at a parti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for ensuring system security is disclosed. The method and system split a regular expression that corresponds to a number of patterns into sub-expressions. The dependency relationships among the finite automata that correspond to the sub-expressions are maintained. Then, as data units are put through these finite automata in a sequence that is based on the dependency relationships, suspected data units are identified. The suspected data units are the ones containing content that collectively matches one or more of the aforementioned patterns. Identification of the suspecteddata units is based on the merged results of the finite automata. Depending on the result of identifying the suspected data units, different actions are performed.

Description

technical field [0001] The present invention relates to system security, and more particularly to a method and related system for responding to attacks on devices in a network through preventive measures. Background technique [0002] With the widespread popularity of computer networks, any device connected to the network may be subject to various attacks, such as from viruses, worms, or crackers s attack. Firewall (firewall) and anti-virus program (anti-virus program) are the solutions used to deal with such network attacks. Generally speaking, a firewall can be used to prevent certain types of files or data packets from being transmitted into the network, and an antivirus program can prevent a single device or a group of devices from executing files containing viruses. [0003] Several firewall technologies are common today, such as packet filters, application gateways, and proxy servers. The data packet filter will inspect the control information in each data packet, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24G06F11/00G06F21/00H04L9/00
CPCH04L63/1416H04L63/145G06F21/563
Inventor 赵士铭简士伟
Owner LIONIC CORP