Network security defense method and system, effect evaluation method and related device thereof
According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second s...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | HE LEI ZHOU JINSUO ZHANG WEILI GUO YIWEI ZHOU JUN DING RUIHAO WU JIANGXING REN QUAN FU MIN |
description | According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN112217778A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN112217778A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN112217778A3</originalsourceid><addsrcrecordid>eNqNy6EOwjAURuEaBAHe4eJBdIhiyQJBTeGbpv2bNXTt0t6N7O1BIJCoY76zFroDv3J5UoWdSuCFHDxSBQ3gPjsyyVFdKmM4ELyHZcJs4mQ45PSLCqJhuM8_BwviHgXZb8XKm1ix-3Yj9rfro70fMWaNOhqLBNZtJ2XTSKXU-XL6x7wBoyU9Jg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network security defense method and system, effect evaluation method and related device thereof</title><source>esp@cenet</source><creator>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</creator><creatorcontrib>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</creatorcontrib><description>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210112&DB=EPODOC&CC=CN&NR=112217778A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20210112&DB=EPODOC&CC=CN&NR=112217778A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HE LEI</creatorcontrib><creatorcontrib>ZHOU JINSUO</creatorcontrib><creatorcontrib>ZHANG WEILI</creatorcontrib><creatorcontrib>GUO YIWEI</creatorcontrib><creatorcontrib>ZHOU JUN</creatorcontrib><creatorcontrib>DING RUIHAO</creatorcontrib><creatorcontrib>WU JIANGXING</creatorcontrib><creatorcontrib>REN QUAN</creatorcontrib><creatorcontrib>FU MIN</creatorcontrib><title>Network security defense method and system, effect evaluation method and related device thereof</title><description>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNy6EOwjAURuEaBAHe4eJBdIhiyQJBTeGbpv2bNXTt0t6N7O1BIJCoY76zFroDv3J5UoWdSuCFHDxSBQ3gPjsyyVFdKmM4ELyHZcJs4mQ45PSLCqJhuM8_BwviHgXZb8XKm1ix-3Yj9rfro70fMWaNOhqLBNZtJ2XTSKXU-XL6x7wBoyU9Jg</recordid><startdate>20210112</startdate><enddate>20210112</enddate><creator>HE LEI</creator><creator>ZHOU JINSUO</creator><creator>ZHANG WEILI</creator><creator>GUO YIWEI</creator><creator>ZHOU JUN</creator><creator>DING RUIHAO</creator><creator>WU JIANGXING</creator><creator>REN QUAN</creator><creator>FU MIN</creator><scope>EVB</scope></search><sort><creationdate>20210112</creationdate><title>Network security defense method and system, effect evaluation method and related device thereof</title><author>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN112217778A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HE LEI</creatorcontrib><creatorcontrib>ZHOU JINSUO</creatorcontrib><creatorcontrib>ZHANG WEILI</creatorcontrib><creatorcontrib>GUO YIWEI</creatorcontrib><creatorcontrib>ZHOU JUN</creatorcontrib><creatorcontrib>DING RUIHAO</creatorcontrib><creatorcontrib>WU JIANGXING</creatorcontrib><creatorcontrib>REN QUAN</creatorcontrib><creatorcontrib>FU MIN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HE LEI</au><au>ZHOU JINSUO</au><au>ZHANG WEILI</au><au>GUO YIWEI</au><au>ZHOU JUN</au><au>DING RUIHAO</au><au>WU JIANGXING</au><au>REN QUAN</au><au>FU MIN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network security defense method and system, effect evaluation method and related device thereof</title><date>2021-01-12</date><risdate>2021</risdate><abstract>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | chi ; eng |
recordid | cdi_epo_espacenet_CN112217778A |
source | esp@cenet |
subjects | ELECTRIC COMMUNICATION TECHNIQUE ELECTRICITY TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | Network security defense method and system, effect evaluation method and related device thereof |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T09%3A37%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HE%20LEI&rft.date=2021-01-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN112217778A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |