Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A data processing method and device

An illegal and characteristic parameter technology, applied in the field of data processing, can solve communication information security threats, increase client uplink traffic, increase information redundancy, etc., to improve communication efficiency, increase uplink traffic, and expand the range of types Effect

Active Publication Date: 2021-04-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of computer technology, communication through computer network has become the most mainstream communication method. However, in the process of communication, the security of communication information is also greatly threatened. Therefore, the communication system Security protection capabilities put forward higher requirements
[0003] In the prior art, if you want to filter the communication information, you need to modify the code of the client so that the information sent by the client carries a specific watermark field, and then combine the protection end to intercept the bad information carrying the illegal watermark field to achieve The purpose of protecting the communication system, but the technology based on the watermark field will increase the redundancy of the information sent by the client, which will increase the upstream traffic of the client and reduce the communication efficiency; and because the client needs to be modified, it can have Protection effect, so it also increases the limitation of the protection range

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data processing method and device
  • A data processing method and device
  • A data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] See figure 1 , figure 1 It is a schematic diagram of the deployment of a protection system provided by the embodiment of the present invention. Such as figure 1 As shown, the architecture includes attack detection system, control system, protection system, core router, core network management, server and Internet network. Wherein, the Internet network may be provided by an Internet provider. The steps for performing network protection through the various...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a data processing method and device. The method includes: when it is detected that the target protected object is under attack, obtain all sessions between the target protected object and multiple communication objects; obtain all sessions associated According to the message set, determine the session feature parameters of each session; input the session feature parameters of each session into the identification model, and determine the session type of each session based on the identification model; according to the session type of each session Determine the communication object type of each communication object among the plurality of communication objects; determine the illegal communication object as an illegal communication object, add the illegal communication object to the blacklist, and discard the session corresponding to the illegal communication object. By adopting the embodiment of the present invention, the security of communication information can be improved, thereby ensuring the stability of the communication system, and at the same time, the range of types of protected clients can be expanded.

Description

technical field [0001] The present invention relates to the technical field of data processing, in particular to a data processing method and device. Background technique [0002] With the continuous development of computer technology, communication through computer network has become the most mainstream communication method. However, in the process of communication, the security of communication information is also greatly threatened. Therefore, the communication system The security protection capability puts forward higher requirements. [0003] In the prior art, if you want to filter the communication information, you need to modify the code of the client so that the information sent by the client carries a specific watermark field, and then combine the protection end to intercept the bad information carrying the illegal watermark field to achieve The purpose of protecting the communication system, but the technology based on the watermark field will increase the redunda...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06N3/08G06N3/04
Inventor 陈国
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products