CN1556612A - Network medium content safety macromonitoring method - Google Patents

Network medium content safety macromonitoring method Download PDF

Info

Publication number
CN1556612A
CN1556612A CNA2003101098386A CN200310109838A CN1556612A CN 1556612 A CN1556612 A CN 1556612A CN A2003101098386 A CNA2003101098386 A CN A2003101098386A CN 200310109838 A CN200310109838 A CN 200310109838A CN 1556612 A CN1556612 A CN 1556612A
Authority
CN
China
Prior art keywords
supervision
data
rule
content
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2003101098386A
Other languages
Chinese (zh)
Other versions
CN100466533C (en
Inventor
���
李建华
张全海
王明政
李生红
苏波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2003101098386A priority Critical patent/CN100466533C/en
Publication of CN1556612A publication Critical patent/CN1556612A/en
Application granted granted Critical
Publication of CN100466533C publication Critical patent/CN100466533C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1043Gateway controllers, e.g. media gateway control protocol [MGCP] controllers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10009Improvement or modification of read or write signals
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10009Improvement or modification of read or write signals
    • G11B20/10305Improvement or modification of read or write signals signal quality assessment
    • G11B20/10398Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors
    • G11B20/10425Improvement or modification of read or write signals signal quality assessment jitter, timing deviations or phase and frequency errors by counting out-of-lock events of a PLL
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03LAUTOMATIC CONTROL, STARTING, SYNCHRONISATION OR STABILISATION OF GENERATORS OF ELECTRONIC OSCILLATIONS OR PULSES
    • H03L7/00Automatic control of frequency or phase; Synchronisation
    • H03L7/06Automatic control of frequency or phase; Synchronisation using a reference signal applied to a frequency- or phase-locked loop
    • H03L7/08Details of the phase-locked loop
    • H03L7/085Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal
    • H03L7/091Details of the phase-locked loop concerning mainly the frequency- or phase-detection arrangement including the filtering or amplification of its output signal the phase or frequency detector using a sampling device
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/03Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
    • H03M13/23Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using convolutional codes, e.g. unit memory codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2903Methods and arrangements specifically for encoding, e.g. parallel encoding of a plurality of constituent codes
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/29Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
    • H03M13/2957Turbo codes and decoding
    • H03M13/2993Implementing the return to a predetermined state, i.e. trellis termination
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/63Joint error correction and other techniques
    • H03M13/635Error control coding in combination with rate matching
    • H03M13/6356Error control coding in combination with rate matching by repetition or insertion of dummy data, i.e. rate reduction
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M13/00Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
    • H03M13/63Joint error correction and other techniques
    • H03M13/635Error control coding in combination with rate matching
    • H03M13/6362Error control coding in combination with rate matching by puncturing
    • HELECTRICITY
    • H03ELECTRONIC CIRCUITRY
    • H03MCODING; DECODING; CODE CONVERSION IN GENERAL
    • H03M7/00Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
    • H03M7/30Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
    • H03M7/40Conversion to or from variable length codes, e.g. Shannon-Fano code, Huffman code, Morse code
    • H03M7/4006Conversion to or from arithmetic code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/25Arrangements specific to fibre transmission
    • H04B10/2575Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
    • H04B10/25752Optical arrangements for wireless networks
    • H04B10/25753Distribution optical network, e.g. between a base station and a plurality of remote units
    • H04B10/25754Star network topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/24Radio transmission systems, i.e. using radiation field for communication between two or more posts
    • H04B7/26Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile
    • H04B7/2628Radio transmission systems, i.e. using radiation field for communication between two or more posts at least one of which is mobile using code-division multiple access [CDMA] or spread spectrum multiple access [SSMA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/0077Multicode, e.g. multiple codes assigned to one user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J13/00Code division multiplex systems
    • H04J13/16Code allocation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0064Concatenated codes
    • H04L1/0066Parallel concatenated codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0067Rate matching
    • H04L1/0068Rate matching by puncturing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference
    • H04L25/03012Arrangements for removing intersymbol interference operating in the time domain
    • H04L25/03019Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception
    • H04L25/03038Arrangements for removing intersymbol interference operating in the time domain adaptive, i.e. capable of adjustment during data reception with a non-recursive structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/38Synchronous or start-stop systems, e.g. for Baudot code
    • H04L25/40Transmitting circuits; Receiving circuits
    • H04L25/49Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems
    • H04L25/497Transmitting circuits; Receiving circuits using code conversion at the transmitter; using predistortion; using insertion of idle bits for obtaining a desired frequency spectrum; using three or more amplitude levels ; Baseband coding techniques specific to data transmission systems by correlative coding, e.g. partial response coding or echo modulation coding transmitters and receivers for partial response systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/58Message adaptation for wireless communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/304Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M7/00Arrangements for interconnection between switching centres
    • H04M7/12Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal
    • H04M7/1205Arrangements for interconnection between switching centres for working between exchanges having different types of switching equipment, e.g. power-driven and step by step or decimal and non-decimal where the types of switching equipement comprises PSTN/ISDN equipment and switching equipment of networks other than PSTN/ISDN, e.g. Internet Protocol networks
    • H04M7/1295Details of dual tone multiple frequency signalling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/103Selection of coding mode or of prediction mode
    • H04N19/109Selection of coding mode or of prediction mode among a plurality of temporal predictive coding modes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/136Incoming video signal characteristics or properties
    • H04N19/137Motion inside a coding unit, e.g. average field, frame or block difference
    • H04N19/139Analysis of motion vectors, e.g. their magnitude, direction, variance or reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/625Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/90Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using coding techniques not provided for in groups H04N19/10-H04N19/85, e.g. fractals
    • H04N19/91Entropy coding, e.g. variable length coding [VLC] or arithmetic coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/30TPC using constraints in the total amount of available transmission power
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/12Setup of transport tunnels
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/22Signal processing not specific to the method of recording or reproducing; Circuits therefor for reducing distortions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1016IP multimedia subsystem [IMS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • H04W72/23Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • H04W88/085Access point devices with remote components
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S370/00Multiplex communications
    • Y10S370/901Wide area network
    • Y10S370/902Packet switching
    • Y10S370/903Osi compliant network
    • Y10S370/906Fiber data distribution interface, FDDI
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S370/00Multiplex communications
    • Y10S370/901Wide area network
    • Y10S370/902Packet switching
    • Y10S370/903Osi compliant network
    • Y10S370/907Synchronous optical network, SONET

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Probability & Statistics with Applications (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Discrete Mathematics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a monitoring method for network media content security, which belongs to network technology field. The invention realizes the macro supervising to the content through the interaction between the national supervising centre, local supervising centre and media website supervising centre, the national supervising centre issues the content security behavior rules by using the rules issuing flow, the rules are leaded to local supervising centre and media website supervising centre with the leading flow, the media website supervising centre uses the content security behavior security rules distribution flow to act on the media website supervising subsystem, each subsystem generates supervising original information which is sealed by the isomeric data sealing flow, they are transmitted to local supervising centre, and are backed up with supervising data backup model, transmitted to national supervising centre to be audited through the synthesis auditing flow, the content security behavior rule are created through the content security behavior, returns to the national supervising centre. The invention realizes the management to the network globally.

Description

Network medium contents safety macroscopic supervision method
Technical field
The present invention relates to a kind of network media macroscopic view content safety monitoring and managing method, is a kind of network medium contents safety macroscopic supervision method with three layers of supervision structure.Belong to networking technology area.
Background technology
The network media is a kind of new type of Media, the domestic media website is thousands of at present, Regional Distribution is extensive, the isomerism of network environment makes press chief department can not utilize conventional supervision method promptly to rely on manpower to click one by one merely, carry out subjective assessment again, under the prior art condition, also can't realize issue is monitored and authorized to network medium contents at any time.And the technology that exists now is just to supervising individual other Web content unit, as to BBS, the chatroom, the supervisory systems of webpage etc., can not satisfy press chief department to the macro-management of web site contents safety and the formulation and the adjustment of macro policy, and help the subjective department of news that the overall monitoring and managing method of network medium contents safety is also relatively lacked at present.
At present the method for effectively supervising for network medium contents safety is less, find by literature search, the 28th the 5th phase of volume of " computer engineering " May in 2003, " based on multi-protocols agency's the internet content safety classification supervision " that Bao Jia delivers, this article proposes a kind of by using the content safety classification monitoring and managing method of multi-agent technology, but the deficiency of method is, all to make up an agency for each supervision content, " each service, its default port; protocol format; data difference mean that each all needs independently to act on behalf of ", cause some problems like this, for example service response speed slows down, it is many to act on behalf of quantity, causes difficult in maintenancely, and agreement and Data Format Transform are frequent, different environment will add different agencies, has increased the burden of supervision.
Summary of the invention
The objective of the invention is at the deficiency in the background technology, be based on the regulatory responsibility of China News authorities and the characteristics of adaptation network medium contents safety, a kind of network medium contents safety macroscopic supervision method is provided, be press chief department effective technical means and utility system are provided, satisfy it carries out macroscopic supervision to Chinese network medium contents demand, make press chief department can obtain the supervision situation and the feedback information of each online media sites, and can be according to the unified strategy of adjusting the online media sites content safety monitoring of the development of situation, and online media sites can be according to the actual conditions of this locality and the Regulation Policy of press chief department, formulation meets the content safety strategy of local demand, can be to different kinds of information such as webpage, BBS, the chatroom, Emails etc. carry out unified management, having remedied traditional network medium contents monitoring administration method disperses independently to be difficult to the deficiency that manages from the overall situation.
The present invention is achieved by the following technical solutions, the inventive method is based upon on the basis of three grades of supervisory systems that authority separates, comprise that three supervision center are the state supervision center, local supervision center and online media sites supervision center, the macroscopic supervision of the mutual realization content by these three supervision center, be specially: the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center is provided with independently communication port in order to carry out dedicated data transmission, the supervision subsystem is connected on the online media sites supervision center with network, the state supervision center utilizes the content distributed safety management rule of conduct of content safety rule of conduct issue flow process, import flow process by the content safety rule of conduct and import local supervision center respectively, the online media sites supervision center; It is that online media sites are supervised subsystem that the online media sites supervision center utilizes content safety rule of conduct allocation flow to act on respectively, after each subsystem generation supervision raw information encapsulates via isomeric data encapsulation flow process, deliver to local supervision center, by the backup of supervision data backup module records, deliver to the heart channel of Hang-Shaoyin comprehensive audit flow process generation audit information in the state supervision, formulate flow process through the content safety behavior and produce new content safety rule of conduct, turn back to the state supervision center.
Below the present invention is further illustrated, particular content is as follows:
1, content safety rule of conduct issue flow process
Content safety rule of conduct issue flow process is will formulate good rule of conduct earlier to store with pre-specified data format, but use extension flag language (XML) form that it is encapsulated then, use simple target access protocal (SOAP) to its transmission at the transmit port of special use at last;
2, content behavior safety Rulemaking flow process
Content behavior safety Rulemaking flow process mainly is to determine and add and filter keyword, formulates monitor strategy, determines the serious grade of content etc., according to prompting set by step by user's input information, waits user's submission information then after, the rule of a reference format of formation.Monitor strategy can be divided into two kinds of macroscopical leading type monitor strategy and local self-discipline type monitor strategy: macroscopical leading type monitor strategy produces at the state supervision center and issue, can arrive all the subordinate's supervision center in its coverage; Local produce and only this supervision center compass of competency is worked in local supervision center from type of law monitor strategy.
3, the content safety rule of conduct imports flow process
It is that the information that will receive at private port receives according to soap protocol that the content safety rule of conduct imports flow process, separate protocol package then, obtain the XML encapsulation of data, then this encapsulation of data is resolved, obtain rule of conduct according to the storage of fixed data form.
4, content safety rule of conduct allocation flow
Content safety rule of conduct allocation flow then is to judge earlier management domain BBS in this way under this rule according to the type attribute in the rule of conduct, the chatroom still is a webpage etc., (BBS supervises subsystem to select corresponding supervision subsystem according to the type again, chatroom supervision subsystem still is a webpage supervision subsystem), rule is sent in the correct supervision subsystem.
5, isomeric data encapsulation flow process
This flow process is utilized some characteristic informations such as the data type (BBS, chatroom or web data) of XML form with original supervision data and these data, the sender, and dates of shipping etc. encapsulate, and are packaged into the packet according to standard x ML format organization.
6, comprehensive audit flow process
The comprehensive audit flow process is carried out detailed information analysis, in order to supervision information is controlled, is convenient to formulate rule of conduct.Detailed process is:
Read Audit data: the data query that is undertaken by various conditions, as conditions such as time period, IP address field, content keyword are set, just can in Large Volume Data, inquire the own information of being concerned about apace;
Browsing data: every data record has all been stipulated authority, will carry out Authority Verification here, only has to read authority and just can check concrete content;
Analyze data: utilize conventional data analysing method that data are handled and added up, as can be by date, serious hierarchical arrangement data record be made tables of data and figure, log record statistics etc., and the use of these auditing methods does not have strict sequencing;
Data are preserved: data after will auditing and record are written in the audit document of appointment, and initial data is preserved back database.
The needed data of supervision center provide by the application subsystem that is articulated in each online media sites, and upload to the state supervision center by local supervision center collection with after handling.Each supervision center is arranged in the subjective department of news, and the online media sites supervision center is deployed in online media sites.The online media sites supervision center receives the details of respectively supervising the relevant information that subsystem (BBS, chatroom, webpage) sends, and is recorded in daily record and the record storehouse, in order to inquiry, so that the record of being preserved is carried out various forms of query analysis.The state supervision center need utilize various information to carry out the macroscopic analysis of the content safety of news website, formulate online media sites safety behavior rule, the area supervision center mainly is responsible for the content monitoring work of online media sites in the scope of this area, its function realizes the transmission to the content safety rule of conduct of each online media sites, receives the supervision target data of each online media sites simultaneously.Each supervision center is according to the supervision demand customized development of self.
Can carry out the transmission of information by the Internet between online media sites supervision center and regional supervision center and the state supervision center, realization is issued relevant policies and management expectancy by the upper management center to subordinate administrative center, news administrative department can be thus to the relevant management policy of web site contents supervision center issue, the online media sites supervision center also can by this efficiently approach to administrative department's feedback management suggestion.Each supervision center is by the Internet and other supervision center and the associated working of centralized supervisory platform, finish various work of uploading the information of assigning, each supervision center of while can deposit the information of catching that receives in each database and be convenient to work such as record, tabulation, investigation, analysis.
The network media macroscopic supervision method that the present invention proposes is supported in the distributed heterogeneous network carries out the supervision of the content safety overall situation to the network media, can also can browse related content and various statistics by the configuration monitoring strategy, satisfy the differentiated control of country, can realize upgrading in time of information filtering strategy content.The present invention meets national conditions to foundation online media sites content safety macroscopic supervision pattern is to realize that the supervision on the common meaning more is once effectively to explore.The present invention has realized the information interaction of supervision center at different levels and online media sites, to the unified management and the content auditing function of isomery website, makes press chief department more effective to the content safety management of online media sites.
Description of drawings
Fig. 1 is a monitoring and managing method schematic diagram of the present invention
Embodiment
As shown in Figure 1, the content with method provides an embodiment in conjunction with the accompanying drawings, and is specific as follows:
Three grades of supervision center are the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center need be provided with that independently communication port is in order to carry out dedicated data transmission, and the supervision subsystem is connected on the online media sites supervision center with network.Content safety administration behaviour rule after the state supervision center utilizes content safety rule of conduct issue flow process by dedicated issue communication port issue process XML form and soap protocol encapsulation, local supervision center, the online media sites supervision center imports respectively if having information to reach then call content safety rule of conduct importing flow process then in the detecting of dedicated communication ports place; If local supervision center has imported the content safety rule of conduct that the issue of state supervision center is arranged, then it is published to suitable online media sites supervision center according to the content according to rule by dedicated communication ports, if the online media sites supervision center has imported the state supervision center or local supervision center is issued the rule of coming, then its effect field according to rule utilizes content safety rule of conduct allocation flow to act on respectively to be online media sites supervision subsystem, each subsystem is had an effect according to the rule that receives, produce original supervision information and carry out the encapsulation of XML form via the isomeric data package module, supervision information after the encapsulation is delivered to the online media sites supervision center, deliver to local supervision center via the online media sites supervision center by network data contribute supervision information again, by supervision data backup module supervision information record is backed up, supervision information is simultaneously delivered to the state supervision center, the heart channel of Hang-Shaoyin comprehensive audit flow process is audited to supervision information and (is added up in the state supervision, record etc.) produce audit information, authorities formulate flow process by the content safety rule of conduct and formulate new content safety rule of conduct according to the audit information that produces, turn back to the state supervision center, and by its issue.
The present invention has the administration interface of unified Web webpage, the functional module link arrangement of each supervision center is on the page, be easy to visit and operation, utilize the simple target access protocal to realize transfer of data between the heterogeneous network, data are encrypted in transmission course, prevent that data from not intercepted and captured and distorting, each supervision center all uses private port to receive and dispatch carrying out the needed data of macroscopic supervision, simultaneously can carry out data ciphering and deciphering, ensure the fail safe of communicating by letter between each supervision center.But utilize XML to realize that each isomery content-data form identifies with unified format, can effectively be embedded among the SOAP simultaneously and transmit, transmit by data being converted to the XML data format, and then according to the database that will change over to the XML data are returned to and to change in the database, realize the isomeric data transmission.

Claims (7)

1, a kind of network medium contents safety macroscopic supervision method, it is characterized in that, be based upon on the basis of three grades of supervisory systems that authority separates, comprise that three supervision center are the state supervision center, local supervision center and online media sites supervision center, the macroscopic supervision of the mutual realization content by these three supervision center, be specially: the state supervision center, local supervision center, the online media sites supervision center connects with network mutually, and each supervision center is provided with independently communication port in order to carry out dedicated data transmission, the supervision subsystem is connected on the online media sites supervision center with network, the state supervision center utilizes the content distributed safety management rule of conduct of content safety rule of conduct issue flow process, imports flow process by the content safety rule of conduct and imports local supervision center respectively, the online media sites supervision center; It is that online media sites are supervised subsystem that the online media sites supervision center utilizes content safety rule of conduct allocation flow to act on respectively, after each subsystem generation supervision raw information encapsulates via isomeric data encapsulation flow process, deliver to local supervision center, by the backup of supervision data backup module records, deliver to the heart channel of Hang-Shaoyin comprehensive audit flow process generation audit information in the state supervision, formulate flow process through the content safety behavior and produce new content safety rule of conduct, turn back to the state supervision center.
2, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct issue flow process, be to formulate good rule of conduct earlier to store with pre-specified data format, but with the extension flag language format it is encapsulated then, the transmit port in special use sends it with the simple target access protocal at last.
3, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content behavior safety Rulemaking flow process, mainly be to determine and interpolation filtration keyword, formulate monitor strategy, determine the serious grade of content, according to pointing out set by step by user's input information, after waiting user's submission information then, form the rule of a reference format, monitor strategy is divided into two kinds of macroscopical leading type monitor strategy and local self-discipline type monitor strategy: macroscopical leading type monitor strategy produces at the state supervision center and issue, arrive all the subordinate's supervision center in its coverage, locally produce and only this supervision center compass of competency is worked in local supervision center from type of law monitor strategy.
4, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct imports flow process, be to receive according to soap protocol in the information that private port receives, separate protocol package then, but obtain extension flag language encapsulation of data, then this encapsulation of data is resolved, obtain rule of conduct according to the storage of fixed data form.
5, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described content safety rule of conduct allocation flow, be according to the management domain under the elder generation of the type attribute in the rule of conduct this rule of judgement, select corresponding supervision subsystem according to the type again, rule is sent in the correct supervision subsystem.
6, network medium contents safety macroscopic supervision method according to claim 1, it is characterized in that, described isomeric data encapsulation flow process, but be to utilize the extension flag language format that some characteristic informations of original supervision data and these data are encapsulated, as data type, sender, date of shipping, but be packaged into packet according to standard extension flag language format tissue.
7, network medium contents safety macroscopic supervision method according to claim 1 is characterized in that described comprehensive audit flow process is carried out detailed information analysis, in order to supervision information is controlled, is convenient to formulate rule of conduct, and detailed process is:
Read Audit data: the data query that is undertaken by various conditions, as time period, IP address field, content keyword are set, in Large Volume Data, inquire the own information of being concerned about apace;
Browsing data: every data record has all been stipulated authority, carries out Authority Verification, only has to read authority and just can check concrete content;
Analyze data: utilize data analysing method that data are handled and added up;
Data are preserved: data after will auditing and record are written in the audit document of appointment, and initial data is preserved back database.
CNB2003101098386A 2003-12-30 2003-12-30 Network medium content safety macromonitoring method Expired - Fee Related CN100466533C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2003101098386A CN100466533C (en) 2003-12-30 2003-12-30 Network medium content safety macromonitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2003101098386A CN100466533C (en) 2003-12-30 2003-12-30 Network medium content safety macromonitoring method

Publications (2)

Publication Number Publication Date
CN1556612A true CN1556612A (en) 2004-12-22
CN100466533C CN100466533C (en) 2009-03-04

Family

ID=34335397

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2003101098386A Expired - Fee Related CN100466533C (en) 2003-12-30 2003-12-30 Network medium content safety macromonitoring method

Country Status (1)

Country Link
CN (1) CN100466533C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633065B (en) * 2004-12-28 2010-05-12 华中师范大学 Method and system for secure distribution of network digital books with content monitoring
CN102316104A (en) * 2011-09-01 2012-01-11 北京中兴网安科技有限公司 Method, apparatus and systems for recording perfect information
CN106484885A (en) * 2016-10-17 2017-03-08 深圳市穗彩科技开发有限公司 The auditing method of multi-source heterogeneous data and system
CN109361683A (en) * 2018-11-13 2019-02-19 华迪计算机集团有限公司 Low layer, middle layer, high-rise website maintenance device and system based on trust systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1349190A (en) * 2001-12-03 2002-05-15 上海交通大学 Central network medium safety monitoring system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633065B (en) * 2004-12-28 2010-05-12 华中师范大学 Method and system for secure distribution of network digital books with content monitoring
CN102316104A (en) * 2011-09-01 2012-01-11 北京中兴网安科技有限公司 Method, apparatus and systems for recording perfect information
CN106484885A (en) * 2016-10-17 2017-03-08 深圳市穗彩科技开发有限公司 The auditing method of multi-source heterogeneous data and system
CN109361683A (en) * 2018-11-13 2019-02-19 华迪计算机集团有限公司 Low layer, middle layer, high-rise website maintenance device and system based on trust systems
CN109361683B (en) * 2018-11-13 2020-12-15 华迪计算机集团有限公司 Trust system-based low-level, middle-level and high-level website supervision device and system

Also Published As

Publication number Publication date
CN100466533C (en) 2009-03-04

Similar Documents

Publication Publication Date Title
CN101826993A (en) Method, system and device for monitoring security event
US7185366B2 (en) Security administration server and its host server
CN103152352B (en) A kind of perfect information security forensics monitor method based on cloud computing environment and system
EP1604486B1 (en) Relational model for management information in network devices
CN109286676B (en) Electric power data safety information system based on block chain
CN102291280A (en) Intelligent measuring and controlling Internet of things platform based on cloud computing and measuring and controlling method thereof
CN105631522A (en) IT system operation and maintenance management system
CN103034929A (en) Operations management system (OMS) and remote information management system for sewage plants
CN103559570A (en) Fault recording master station information management system
CN102156447A (en) Basic automation-based plant-level equipment management and alarming system and method
CN102932846A (en) Data management system for distributed heterogeneous sensing network and data management method for data management system
CN105262210A (en) System and method for analysis and early warning of substation network security
CN103532749A (en) Main station information management system
CN113849553A (en) Substation data acquisition and processing method and system based on Internet of things equipment data acquisition
CN102148827A (en) Security event management method, device and security management platform
CN109214788A (en) A kind of OA management system
CN105401771A (en) Stereo garage integrated management system
CN109164720A (en) Injection molding machine group of planes remote monitoring system and method based on IIoT
CN202275310U (en) Intelligent monitor system of cold storage warehouse assembly
CN100495975C (en) Network message safety comprehensive management method based on safety application servicer
CN114827140A (en) Real-time data centralized management and control system for wind tunnel site
CN100466533C (en) Network medium content safety macromonitoring method
CN106407072A (en) Monitoring system of big data platform
CN103067355A (en) Network guard method and system based on domain name
CN102316122A (en) Method for managing intranet security based on cooperative mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090304

Termination date: 20141230

EXPY Termination of patent right or utility model