Data communication monitoring system and method

A technology of data communication and monitoring system, applied in the field of electronic communication, can solve the problem of occupying network traffic, etc., to achieve the effect of ensuring security, highlighting substantive features, and ensuring safe use

Active Publication Date: 2020-08-14
SHANDONG INST OF COMMERCE & TECH
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For the existing data communication network, there are often malicious attacks and damages initiated by illegal personnel, such as sending some abnormal data continuously, maliciously occupying network traffic, or sending some data with illegal information from time to time , so that it spreads in the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data communication monitoring system and method
  • Data communication monitoring system and method
  • Data communication monitoring system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Such as figure 1 A data communication monitoring system is shown, including: an administrator authority identification unit, a communication authority setting unit, an abnormal data identification unit, a flow monitoring unit, a threshold alarm unit and a wireless communication unit;

[0045] The administrator authority identification unit is used to identify the identity of the system administrator and open the corresponding authority level to the administrator. The administrator authority authentication unit includes: an input module, a storage module, a comparison module and an authority opening module; the input module is used to input the administrator's identity information and identity verification code; the storage module is used to store the administrator's identity information , the corresponding identity verification code and authority level; the identity information and identity verification code of the administrator for multi-input by the comparison module ...

Embodiment 2

[0058] Correspondingly, such as figure 2 As shown, the present invention also discloses a data communication monitoring method, comprising the following steps:

[0059] S201: Identify the identity of the system administrator, and open the corresponding authority level to the administrator.

[0060] S202: Read the data stream sent by the client, and identify abnormal information in the data stream.

[0061] S203: After the identification is successful, the communication authority of the client is prohibited or the flow is limited, and a processing result is generated.

[0062] S204: Send the processing result to the administrator's handheld communication terminal through the GMS network.

Embodiment 3

[0064] On the basis of the above examples, if image 3 As shown, this embodiment also discloses a data communication monitoring method, including the following steps:

[0065] S301: Identify the identity of the system administrator, and open the corresponding authority level to the administrator.

[0066] S302: Read the data flow sent by the client, and establish a data queue of the data flow.

[0067] S303: Load the abnormal data model and match the data flow with the abnormal data model one by one according to the data queue, and record the client corresponding to the data flow after the matching is completed.

[0068] S304: Use batch processing to count the client data matched by the identification module, obtain the data size, abnormal information ratio, and sensitive information intensity, and obtain the abnormal level of the client according to the preset evaluation standard.

[0069] S305: When the abnormality level of the client reaches the first preset level, close ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data communication monitoring system and method. The data communication monitoring system comprises an administrator authority identification unit, a communication authority setting unit, an abnormal data identification unit and a flow monitoring unit. By identifying the authority of the system administrator, the use safety of the system is ensured; when the client uses the data communication network, the abnormal information in the data flow sent by the client is identified in real time, and after the identification is successful, the communication authority of the corresponding client is closed or the flow of the corresponding client is limited through the flow monitoring unit, so the safety of the communication network is effectively guaranteed while the user experience is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of electronic communication, and more specifically relates to a data communication monitoring system and method. Background technique [0002] Data communication is a form of communication that integrates data processing and transmission, realizes the reception, storage, processing and transmission of digital information, and controls, verifies and manages information flow. With the continuous development of data communication networks, more and more communication devices have been applied in industry and daily life, greatly facilitating people's work and life. [0003] With the wide application of data communication, the security problem of data communication is also becoming more and more obvious. For the existing data communication network, there are often malicious attacks and damages initiated by illegal personnel, such as sending some abnormal data continuously, maliciously occupying network t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G08B25/08G06F16/2458G06F21/62
CPCH04L63/08H04L63/1425G08B25/08G06F16/2462G06F21/6218
Inventor 秦继林
Owner SHANDONG INST OF COMMERCE & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products