Network security defense method and system, effect evaluation method and related device thereof

According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: HE LEI, ZHOU JINSUO, ZHANG WEILI, GUO YIWEI, ZHOU JUN, DING RUIHAO, WU JIANGXING, REN QUAN, FU MIN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator HE LEI
ZHOU JINSUO
ZHANG WEILI
GUO YIWEI
ZHOU JUN
DING RUIHAO
WU JIANGXING
REN QUAN
FU MIN
description According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN112217778A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN112217778A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN112217778A3</originalsourceid><addsrcrecordid>eNqNy6EOwjAURuEaBAHe4eJBdIhiyQJBTeGbpv2bNXTt0t6N7O1BIJCoY76zFroDv3J5UoWdSuCFHDxSBQ3gPjsyyVFdKmM4ELyHZcJs4mQ45PSLCqJhuM8_BwviHgXZb8XKm1ix-3Yj9rfro70fMWaNOhqLBNZtJ2XTSKXU-XL6x7wBoyU9Jg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Network security defense method and system, effect evaluation method and related device thereof</title><source>esp@cenet</source><creator>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</creator><creatorcontrib>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</creatorcontrib><description>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</description><language>chi ; eng</language><subject>ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRICITY ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2021</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210112&amp;DB=EPODOC&amp;CC=CN&amp;NR=112217778A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20210112&amp;DB=EPODOC&amp;CC=CN&amp;NR=112217778A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>HE LEI</creatorcontrib><creatorcontrib>ZHOU JINSUO</creatorcontrib><creatorcontrib>ZHANG WEILI</creatorcontrib><creatorcontrib>GUO YIWEI</creatorcontrib><creatorcontrib>ZHOU JUN</creatorcontrib><creatorcontrib>DING RUIHAO</creatorcontrib><creatorcontrib>WU JIANGXING</creatorcontrib><creatorcontrib>REN QUAN</creatorcontrib><creatorcontrib>FU MIN</creatorcontrib><title>Network security defense method and system, effect evaluation method and related device thereof</title><description>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</description><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRICITY</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2021</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNy6EOwjAURuEaBAHe4eJBdIhiyQJBTeGbpv2bNXTt0t6N7O1BIJCoY76zFroDv3J5UoWdSuCFHDxSBQ3gPjsyyVFdKmM4ELyHZcJs4mQ45PSLCqJhuM8_BwviHgXZb8XKm1ix-3Yj9rfro70fMWaNOhqLBNZtJ2XTSKXU-XL6x7wBoyU9Jg</recordid><startdate>20210112</startdate><enddate>20210112</enddate><creator>HE LEI</creator><creator>ZHOU JINSUO</creator><creator>ZHANG WEILI</creator><creator>GUO YIWEI</creator><creator>ZHOU JUN</creator><creator>DING RUIHAO</creator><creator>WU JIANGXING</creator><creator>REN QUAN</creator><creator>FU MIN</creator><scope>EVB</scope></search><sort><creationdate>20210112</creationdate><title>Network security defense method and system, effect evaluation method and related device thereof</title><author>HE LEI ; ZHOU JINSUO ; ZHANG WEILI ; GUO YIWEI ; ZHOU JUN ; DING RUIHAO ; WU JIANGXING ; REN QUAN ; FU MIN</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN112217778A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>chi ; eng</language><creationdate>2021</creationdate><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRICITY</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>HE LEI</creatorcontrib><creatorcontrib>ZHOU JINSUO</creatorcontrib><creatorcontrib>ZHANG WEILI</creatorcontrib><creatorcontrib>GUO YIWEI</creatorcontrib><creatorcontrib>ZHOU JUN</creatorcontrib><creatorcontrib>DING RUIHAO</creatorcontrib><creatorcontrib>WU JIANGXING</creatorcontrib><creatorcontrib>REN QUAN</creatorcontrib><creatorcontrib>FU MIN</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>HE LEI</au><au>ZHOU JINSUO</au><au>ZHANG WEILI</au><au>GUO YIWEI</au><au>ZHOU JUN</au><au>DING RUIHAO</au><au>WU JIANGXING</au><au>REN QUAN</au><au>FU MIN</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Network security defense method and system, effect evaluation method and related device thereof</title><date>2021-01-12</date><risdate>2021</risdate><abstract>According to the technical scheme, the influence of generalized disturbance on the second strategy is eliminated by using the first strategy comprising encoding, decoding and memory elimination strategies, correct calculation, storage and communication of the data are realized by acting the second strategy on the data, and the generalized disturbance is used as an external cause, so the internal cause of the fault of the second strategy can be activated, and error and failure are generated, so the error and failure caused by the activated fault can be corrected through the first strategy, andthe first strategy is obtained through adjustment of the feedback control strategy triggered by the decoding result of the processed data; therefore, a closed loop is formed between the steps, and theendogenous security problem is solved without external software and hardware. In conclusion, according to the technical scheme provided by the invention, the endogenous safety problem can be solved through an endogenous safet</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language chi ; eng
recordid cdi_epo_espacenet_CN112217778A
source esp@cenet
subjects ELECTRIC COMMUNICATION TECHNIQUE
ELECTRICITY
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title Network security defense method and system, effect evaluation method and related device thereof
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T09%3A37%3A15IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=HE%20LEI&rft.date=2021-01-12&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN112217778A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true