Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A monitoring system and network security technology, applied in transmission systems, computer security devices, instruments, etc., can solve the problems of poor system security, slow information monitoring and review rate, and small proportion, so as to improve work efficiency and speed up monitoring. The effect of the audit
Active Publication Date: 2021-12-31
深圳市众云网科技有限公司
View PDF4 Cites 1 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] However, the current network security monitoring system has poor system security and lacks protection for information data. Due to the complexity of collected information, the speed of information monitoring and review is slow. At the same time, the binding of violation and compliance information is often difficult. The bundled information is released because the proportion of illegal information is small, and the bundled information is directly deleted because the proportion of illegal information is large, resulting in the loss of available information. In order to solve this problem, a solution is now provided
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0031] Such as Figure 1-3 As shown, an intelligent network security monitoring system includes a user unit, an information collection unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a No. 1 inspection unit, a No. 2 inspection unit, and a No. 3 inspection unit , No. N inspection unit, information reorganization unit, information database, secondary antivirus unit and information inspection unit;
[0032] The classification unit classifies according to the proportion of various types of information in each piece of information, including four types of picture information, text information, sound information and video information;
[0033] The No. 1 inspection unit includes a separation module, an information numbering module, a picture inspection module, a text inspection module, a sound inspection module and an image inspection module, and the modules in the No. 2 inspection unit, No. 3 inspection unit, and No. N i...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention discloses an intelligent network security monitoring system and a monitoring method thereof. The method comprises a user unit, an information acquisition unit, a firewall unit, an emergency unit, an early warning unit, a classification unit, a processing database, a first inspection unit, a second inspection unit, a third inspection unit, an N inspection unit, an information recombination unit, an information database, a secondary antivirus unit and an information inspection unit. According to the method, after virus information breaks through a firewall, information collection can be stopped, information data in an information database can be isolated, damage to the information data or leakage of important information data can be prevented, information processing of corresponding classification is carried out, complex information is simplified, monitoring and auditing of the information are accelerated, working efficiency is improved, and meanwhile, after the violation information is bound with the compliance information, the violation information is released along with the compliance information, and meanwhile, useful information is extracted and utilized, so that available information resources are fully utilized.
Description
technical field [0001] The invention belongs to the field of network security monitoring, and relates to a face recognition and code scanning authentication technology, in particular to an intelligent network security monitoring system. Background technique [0002] The network security monitoring system is based on people and the system, realizes the monitoring and auditing of network information, optimizes network information security, and makes the information in the network healthy. This system is an intelligent monitoring and auditing, and is controlled by humans at the same time monitoring system. [0003] However, the current network security monitoring system has poor system security and lacks protection for information data. Due to the complexity of collected information, the speed of information monitoring and review is slow. At the same time, the binding of violation and compliance information is often difficult. The bundling information is released because the p...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.