Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain intelligent control network data security vulnerability mining method and system

A network data and vulnerability mining technology, applied in digital transmission systems, transmission systems, secure communication devices, etc., can solve the problems of real-time, online, traceable tracking, potential safety hazards, and poor traceability of network data information that are difficult to implement

Active Publication Date: 2022-07-15
法诺信息产业有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the computer network is a complex issue involving a wide range of factors, including both technical factors and management factors; both natural and human factors; both external security threats and internal security risks
In the existing technology, network data monitoring is realized through monitoring equipment. This method has relatively poor traceability, and it is difficult to realize real-time, online, and traceable tracking of network data information vulnerabilities. When encountering network data vulnerability information, it is also difficult to track Vulnerability data information analysis and early warning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain intelligent control network data security vulnerability mining method and system
  • Block chain intelligent control network data security vulnerability mining method and system
  • Block chain intelligent control network data security vulnerability mining method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The preferred embodiments of the present invention will be described below with reference to the accompanying drawings. It should be understood that the embodiments described herein are only used to illustrate and explain the present invention, but not to limit the present invention.

[0057] like Figure 1-Figure 4 As shown in the figure, a method for mining network data security vulnerabilities controlled by blockchain intelligently includes:

[0058] The data information transmission is realized through the blockchain control network, the network data information transmission rate, communication protocol and communication type are calculated, and the data information transmission is realized through the encapsulation and disassembly of the data information; and the physical layer and data chain are set in the blockchain network. road layer, internet layer, transport layer and application layer;

[0059] Obtain data information in the process of network data informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain intelligent control network data security vulnerability mining method and system, relates to the field of control or monitoring, and solves the technical problem of lagging of network data information security vulnerability detection. Calculating a network data information transmission rate, a communication protocol and a communication type, and setting a physical layer, a data link layer, an internet layer, a transportation layer and an application layer in the block chain network; the method comprises the following steps: acquiring data information in a network data information transmission process through network data acquisition, and labeling block chain node data information and position information passing through a block chain network on the acquired data information; security threat analysis in a network data transmission process is realized through a vulnerability analysis algorithm with a positioning function; and when a data vulnerability is detected, information transmission is carried out through a block chain control network, and an alarm signal is transmitted to a user. According to the invention, the network data vulnerability monitoring capability is greatly improved.

Description

technical field [0001] The invention relates to the field of control or monitoring, and more specifically to a method and system for mining network data security loopholes controlled by blockchain intelligence. Background technique [0002] Network data is one of the most commonly used types of data in the real world. Relationships between people, road connections between cities, and citations between scientific research papers all form networks. Network data monitoring means that for the data flowing on the Internet, firstly complete the effective interception according to the pre-set interception principle, then restore the intercepted data, and finally analyze the restored data and make some control decisions. Strengthening the function of network monitoring not only needs to reduce the data processing quantity of the network monitoring system and improve its processing efficiency, but also because the monitoring target range is different, the data range in the network co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L41/142
CPCH04L63/1433H04L63/20H04L9/3239H04L9/3297H04L41/142
Inventor 汤智林宋昊刘滨
Owner 法诺信息产业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products