FIELD: computer engineering, possible use in devices for controlling informational streams to monitor informational traffic.
SUBSTANCE: method includes preliminarily forming a base of standard informational signs, receiving informational stream, serially selecting and recording fragments of informational stream, selecting identification signs from these, comparing them to standard ones. Base of standard informational signs is formed by computing morphological coefficient d of identification sign and its address A with utilization of hash-function. For identification signs received from informational stream, morphological coefficients d and identification addresses A are additionally computed, after that on basis of computed address, identification sign selected from informational stream is compared to standard one.
EFFECT: increased information processing speed due to shorter time needed for identification of addresses of signs in base of standard informational signs.
4 cl, 2 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
ADDRESS METHOD OF DETECTING IDENTIFICATION FEATURES IN INFORMATION STREAMS | 2009 |
|
RU2409850C1 |
METHOD OF DETECTING IDENTIFICATION FEATURES FOR DIFFERENT LETTER-SYMBOL WRITING SYSTEMS | 2011 |
|
RU2473964C1 |
DEVICE OF INFORMATION PROCESSING FOR INFORMATION SEARCHING | 2008 |
|
RU2386167C1 |
DEVICE FOR INFORMATION PROCESSING FOR INFORMATION RETRIEVAL | 1996 |
|
RU2096825C1 |
METHOD OF PROTECTING COMPUTER NETWORKS BASED ON ADAPTIVE INTERACTION | 2019 |
|
RU2715165C1 |
METHOD FOR PROTECTING COMPUTING NETWORKS FROM COMPUTER ATTACKS DIRECTED ON VARIOUS NODES AND INFORMATION RESOURCES | 2021 |
|
RU2782704C1 |
METHOD FOR ARRANGEMENT OF INFORMATION EXCHANGE BETWEEN SUBCRIBERS OF MOBILE COMMUNICATION AND SYSTEM FOR ORGANISATION OF INFORMATION EXCHANGE BETWEEN SUBSCRIBERS OF MOBILE COMMUNICATION | 2006 |
|
RU2351980C2 |
METHOD FOR AUTOMATED PROCESSING OF TEXT INFORMATION MATERIALS | 2003 |
|
RU2242048C2 |
METHOD FOR PROTECTION OF COMPUTER NETWORKS | 2012 |
|
RU2475836C1 |
METHOD OF PROTECTING INFORMATION COMPUTER NETWORKS FROM COMPUTER ATTACKS | 2011 |
|
RU2472211C1 |
Authors
Dates
2006-08-27—Published
2005-01-31—Filed