CN111832071A - Information security system and information security method - Google Patents
Information security system and information security method Download PDFInfo
- Publication number
- CN111832071A CN111832071A CN202010619215.7A CN202010619215A CN111832071A CN 111832071 A CN111832071 A CN 111832071A CN 202010619215 A CN202010619215 A CN 202010619215A CN 111832071 A CN111832071 A CN 111832071A
- Authority
- CN
- China
- Prior art keywords
- information
- module
- input
- grade
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 21
- 238000011084 recovery Methods 0.000 claims abstract description 23
- 238000012544 monitoring process Methods 0.000 claims abstract description 21
- 238000012546 transfer Methods 0.000 claims abstract description 15
- 230000002159 abnormal effect Effects 0.000 claims description 41
- 238000002955 isolation Methods 0.000 claims description 20
- 238000004458 analytical method Methods 0.000 claims description 17
- 230000002457 bidirectional effect Effects 0.000 claims description 17
- 230000010365 information processing Effects 0.000 claims description 13
- 238000001514 detection method Methods 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 claims description 7
- 241000700605 Viruses Species 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an information security system and an information security method, wherein the information security system comprises an information viewing module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, and relates to the technical field of information security. According to the information safety system and the information safety method, the level information storage module is divided into the open level information storage unit, the secret level information storage unit and the secret level information storage unit, an operator checks the information files with the corresponding levels according to the key levels of the operator, and only the files can be transferred to the storage unit with the corresponding automatic levels, so that the files are prevented from being interfered by viruses, the information files are divided according to the important levels through the structure, and the condition that the important information files are leaked is reduced to a great extent.
Description
Technical Field
The invention relates to the technical field of information security, in particular to an information security system and an information security method.
Background
The information security subject can be divided into two levels of narrow security and generalized security, the narrow security is established in the field of computer security based on cryptography, the information security profession usually takes the narrow security as a reference and is supplemented with contents in the aspects of computer technology, communication network technology, programming and the like, with the development and popularization of computer technology, many enterprise units and management organizations establish own information security systems, in the process of developing and designing the information security systems, the security performance is always placed at the primary position and becomes the key for the survival of the information systems, and usually, the enterprise units place important information files in the information security systems to prevent information leakage.
The information security system at present locks a storage module in the information security system through a commercial password to ensure the security of information, and when a plurality of enterprises know the commercial password, the commercial file is difficult to avoid leakage to cause the stealing of important information files, so that the invention provides the information security system and the information security method.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an information security system and an information security method, which solve the problem that information is difficult to avoid leakage after a plurality of people know a password.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: an information security system comprises an information security system, wherein the information security system comprises an information viewing module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, the user operation module is in bidirectional connection with the key identification module, the output end of the information viewing module is connected with the input end of the key identification module, the output end of the key identification module is connected with the input end of the grade information storage module, the grade information storage module is in bidirectional connection with the backup recovery system, the grade information storage module is in bidirectional connection with the information monitoring system, the output end of the user operation module is connected with the input end of the information transfer module, and the output end of the user operation module is connected with the input end of the information uploading system, and the output end of the information transfer module is connected with the input end of the grade information storage module.
Preferably, the level information storage module includes a secret level information storage unit, a secret level information storage unit and an open level information storage unit, an output end of the secret level information storage unit is electrically connected with the secret level information storage unit, and an output end of the secret level information storage unit is electrically connected with an input end of the open level information storage unit.
Preferably, the information monitoring system comprises an information acquisition module, an information analysis module, an abnormal information isolation module and an abnormal information processing module, wherein the output end of the information acquisition module is electrically connected with the input end of the information analysis module, and the information acquisition module is in bidirectional connection with the abnormal information isolation module.
Preferably, the output end of the information analysis module is electrically connected with the input end of the abnormal information isolation module, and the abnormal information isolation module is in bidirectional connection with the abnormal information processing module.
Preferably, the information uploading system comprises a key detection module, a firewall system, an information input module and an information transmission module, wherein the output end of the key detection module is connected with the input end of the information input module, the output end of the information input module is connected with the input end of the firewall system, and the firewall system is connected with the input end of the information transmission module.
Preferably, the information delivery module includes an open-level information delivery unit, a sealed-level information delivery unit, and a confidential-level information delivery unit.
Preferably, the backup and recovery system comprises a cloud uploading module, a log recording module, a cloud storage module and an information recovery module, wherein the output end of the cloud uploading module is electrically connected with the input end of the log recording module, the output end of the cloud uploading module is connected with the input end of the cloud storage module, and the output end of the information recovery module is connected with the input end of the log recording module.
The invention also discloses an information security method, which specifically comprises the following steps:
s1, firstly, a user inputs a key through a user operation module, a key identification module detects whether the key input by the user is correct, the user operation module operates again after the correct key is input, the key detection module in the information uploading system is used for detecting the grade of the user, the information input module and the information transmission module are used for transmitting, and the firewall system detects whether the input information file is in the safety grade information storage module or not;
s2, transmitting information to a corresponding grade information storage module according to the grade of a detected user, monitoring an information file in real time through an information monitoring system, acquiring the information file from the grade information storage module through an information acquisition module, detecting the file according to an information analysis module, and if the information file is found to be abnormal, transmitting the file to an abnormal information isolation module through the information acquisition module and processing the abnormal file through an abnormal information processing module;
and S3, after the file in the level information storage module is uploaded, the information is transmitted to the cloud storage module through the cloud uploading module, the detailed condition is recorded through the log recording module, after the operator carries out misoperation on the information in the level information storage module, the information in the cloud storage module is recovered through the information recovery module, the detailed condition is recorded through the log recording module, and the higher-level operator can transfer the partial information of the level into the storage unit of the lower level of the operator through the information transfer module.
(III) advantageous effects
The invention provides an information security system and an information security method. Compared with the prior art, the method has the following beneficial effects:
(1) the information safety system and the information safety method, through the information safety system comprising an information checking module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, the user operation module and the key identification module realize two-way connection, the output end of the information checking module is connected with the input end of the key identification module, the output end of the key identification module is connected with the input end of the grade information storage module, the grade information storage module realizes two-way connection with the backup recovery system, the grade information storage module realizes two-way connection with the information monitoring system, the output end of the user operation module is connected with the input end of the information transfer module, the output end of the user operation module is connected with the input end of the information uploading system, the output end of the information transfer module is connected with the input end of the grade, the level information storage module comprises an absolute security level information storage unit, a secret level information storage unit and an open level information storage unit, the output end of the absolute security level information storage unit is electrically connected with the secret level information storage unit, the level information storage module is divided into the open level information storage unit, the secret level information storage unit and the absolute security level information storage unit, an operator can check information files of own corresponding levels according to own key levels and only can transmit the files to the storage unit corresponding to the automatic level, virus interference is prevented, the information files are divided according to important levels through the structure, and the condition that the important information files are leaked is reduced to a large extent.
(2) The information security system and the information security method, through the information monitoring system comprising an information acquisition module, an information analysis module, an abnormal information isolation module and an abnormal information processing module, the output end of the information acquisition module is electrically connected with the input end of the information analysis module, and the information acquisition module is in bidirectional connection with the abnormal information isolation module, the output end of the information analysis module is electrically connected with the input end of the abnormal information isolation module, the abnormal information isolation module is in bidirectional connection with the abnormal information processing module, the information analysis module in the information monitoring system is arranged to monitor the change of the types and the like of the files in real time, when the files are found to be abnormal, the abnormal files are isolated, and the files are deleted through the abnormal information processing module, thereby preventing viruses from being disguised as common files to damage the system to a certain degree, further enhancing the safety thereof.
Drawings
FIG. 1 is a schematic block diagram of the construction of an information security system of the present invention;
FIG. 2 is a schematic block diagram of the structure of an information monitoring system according to the present invention;
FIG. 3 is a schematic block diagram of the structure of the information uploading system of the present invention;
FIG. 4 is a schematic block diagram of the structure of a hierarchical information storage module according to the present invention;
fig. 5 is a schematic block diagram of the structure of the backup-restore system of the present invention.
In the figure, 1-information security system, 11-information viewing module, 12-key identification module, 13-level information storage module, 131-secret information storage unit, 132-secret information storage unit, 133-open information storage unit, 14-user operation module, 15-information transfer module, 16-information upload system, 161-key detection module, 162-firewall system, 163-information input module, 164-information delivery module, 1641-open information delivery unit, 1642-seal information delivery unit, 1643-secret information delivery unit, 17-backup recovery system, 171-cloud upload module, 172-log recording module, 173-cloud storage module, 174-information recovery module, 18-an information monitoring system, 181-an information acquisition module, 182-an information analysis module, 183-an abnormal information isolation module and 184-an abnormal information processing module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-5, an embodiment of the present invention provides a technical solution: an information security system and an information security method, comprising an information security system 1, wherein the information security system 1 comprises an information viewing module 11, a key identification module 12, a level information storage module 13, a user operation module 14, an information releasing module 15, an information uploading system 16, a backup recovery system 17 and an information monitoring system 18, the user operation module 14 is in bidirectional connection with the key identification module 12, the output end of the information viewing module 11 is connected with the input end of the key identification module 12, the output end of the key identification module 12 is connected with the input end of the level information storage module 13, the level information storage module 13 is in bidirectional connection with the backup recovery system 17, the level information storage module 13 is in bidirectional connection with the information monitoring system 18, the output end of the user operation module 14 is connected with the input end of the information releasing module 15, and the output end of the user operation module 14 is connected with the input end of the information uploading system 16, the output end of the information transfer module 15 is connected with the input end of the level information storage module 13, the level information storage module 13 comprises a secret information storage unit 131, a secret information storage unit 132 and an open information storage unit 133, the output end of the secret information storage unit 131 is connected with the secret information storage unit 132, the output end of the secret information storage unit 132 is electrically connected with the input end of the open information storage unit 133, the information monitoring system 18 comprises an information acquisition module 181, an information analysis module 182, an abnormal information isolation module 183 and an abnormal information processing module 184, the output end of the information acquisition module 181 is electrically connected with the input end of the information analysis module 182, the information acquisition module 181 is in bidirectional connection with the abnormal information isolation module 183, the output end of the information analysis module 182 is electrically connected with the input end of the abnormal information isolation module 183, the abnormal information isolation module 183 is in bidirectional connection with the abnormal information processing module 184, the information uploading system 16 includes a key detection module 161, a firewall system 162, an information input module 163 and an information delivery module 164, the firewall system 162 is configured to perform preliminary detection on the type of a file, an output end of the key detection module 161 is connected to an input end of the information input module 163, an output end of the information input module 163 is connected to an input end of the firewall system 162, the firewall system 162 is connected to an input end of the information delivery module 164, the information delivery module 164 includes an open-level information delivery unit 1641, a sealed-level information delivery unit 1642 and a confidential-level information delivery unit 1643, the backup and recovery system 17 includes a cloud uploading module 171, a log recording module 172, a cloud storage module 173 and an information recovery module 174, an output end of the cloud uploading module 171 is electrically connected to an input end of the log recording module 172, the output end of the cloud uploading module 171 is connected to the input end of the cloud storage module 173, and the output end of the information recovery module 174 is connected to the input end of the logging module 172, and the contents not described in detail in this specification all belong to the prior art known to those skilled in the art.
The invention also discloses an information security method, which specifically comprises the following steps:
s1, firstly, the user inputs the key through the user operation module 14, the key identification module 12 detects whether the key input by the user is correct, the user operation module 14 operates again after the correct key is input, the key detection module 161 in the information uploading system 16 is used for detecting the grade of the user, the information input module 163 and the information transmission module 164 are used for transmitting, and the firewall system 162 is used for detecting the input information file to determine whether the input information file is in the safety grade information storage module 13;
s2, sending information to the corresponding grade information storage module 13 according to the grade of the detected user, monitoring the information file in real time through the information monitoring system 18, acquiring the information file from the grade information storage module 13 through the information acquisition module 181, detecting the file according to the information analysis module 182, if the information file is found to be abnormal, sending the file to the abnormal information isolation module 183 through the information acquisition module 181, and processing the abnormal file through the abnormal information processing module 184;
s3, after the file in the level information storage module 13 is uploaded, the information is transmitted to the cloud storage module 173 through the cloud uploading module 171, and the details are recorded through the log recording module 172, when the operator performs a misoperation on the information in the level information storage module 13, the information in the cloud storage module 173 is recovered through the information recovery module 174, and the details are recorded through the log recording module 172, and the higher-level operator can transfer part of the information of his level to the storage unit of his lower level through the information transfer module 15.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. An information security system comprising an information security system (1), characterized in that: the information security system (1) comprises an information checking module (11), a key identification module (12), a level information storage module (13), a user operation module (14), an information releasing module (15), an information uploading system (16), a backup and recovery system (17) and an information monitoring system (18), wherein the user operation module (14) is in bidirectional connection with the key identification module (12), the output end of the information checking module (11) is connected with the input end of the key identification module (12), the output end of the key identification module (12) is connected with the input end of the level information storage module (13), the level information storage module (13) is in bidirectional connection with the backup and recovery system (17), the level information storage module (13) is in bidirectional connection with the information monitoring system (18), and the output end of the user operation module (14) is connected with the input end of the information releasing module (15), and the output end of the user operation module (14) is connected with the input end of the information uploading system (16), and the output end of the information transferring module (15) is connected with the input end of the grade information storage module (13).
2. An information security system according to claim 1, wherein: the grade information storage module (13) comprises a secret grade information storage unit (131), a secret grade information storage unit (132) and an open grade information storage unit (133), wherein the output end of the secret grade information storage unit (131) is electrically connected with the secret grade information storage unit (132), and the output end of the secret grade information storage unit (132) is electrically connected with the input end of the open grade information storage unit (133).
3. An information security system according to claim 1, wherein: the information monitoring system (18) comprises an information acquisition module (181), an information analysis module (182), an abnormal information isolation module (183) and an abnormal information processing module (184), wherein the output end of the information acquisition module (181) is electrically connected with the input end of the information analysis module (182), and the information acquisition module (181) is in bidirectional connection with the abnormal information isolation module (183).
4. An information security system according to claim 3, wherein: the output end of the information analysis module (182) is electrically connected with the input end of the abnormal information isolation module (183), and the abnormal information isolation module (183) is in bidirectional connection with the abnormal information processing module (184).
5. An information security system according to claim 1, wherein: the information uploading system (16) comprises a key detection module (161), a firewall system (162), an information input module (163) and an information transmission module (164), wherein the output end of the key detection module (161) is connected with the input end of the information input module (163), the output end of the information input module (163) is connected with the input end of the firewall system (162), and the firewall system (162) is connected with the input end of the information transmission module (164).
6. An information security system according to claim 5, wherein: the information delivery module (164) comprises an open-level information delivery unit (1641), a sealed-level information delivery unit (1642) and a confidential-level information delivery unit (1643).
7. An information security system according to claim 1, wherein: backup and recovery system (17) are including high in the clouds upload module (171), logging module (172), high in the clouds storage module (173) and information recovery module (174), the output of high in the clouds upload module (171) and the input electric connection of logging module (172) to the output of high in the clouds upload module (171) is connected with the input of high in the clouds storage module (173), the output of information recovery module (174) and the input of logging module (172).
8. An information security method, characterized by: the method specifically comprises the following steps:
s1, firstly, a user inputs a key through a user operation module (14), whether the key input by the user is correct is detected through a key identification module (12), the correct key is input and then is operated through the user operation module (14), the grade of the user is detected through a key detection module (161) in an information uploading system (16), then the grade is transmitted through an information input module (163) and an information transmission module (164), and whether the input information file is detected in a safety grade information storage module (13) through a firewall system (162);
s2, information is transmitted to a corresponding grade information storage module (13) according to the grade of a detected user, an information file is monitored in real time through an information monitoring system (18), an information acquisition module (181) acquires the information file from the grade information storage module (13), the file is detected according to an information analysis module (182), if the information file is found to be abnormal, the file is transmitted to an abnormal information isolation module (183) through the information acquisition module (181), and the abnormal file is processed through an abnormal information processing module (184);
s3, after the file in the level information storage module (13) is uploaded, the information is transmitted to the cloud storage module (173) through the cloud uploading module (171), the detailed condition is recorded through the log recording module (172), after the operator carries out misoperation on the information in the level information storage module (13), the information in the cloud storage module (173) is recovered through the information recovery module (174), the detailed condition is recorded through the log recording module (172), and the higher-level operator can transfer part of the information of the level into the storage unit of the lower level through the information transfer module (15).
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010619215.7A CN111832071B (en) | 2020-06-30 | 2020-06-30 | Information security system and information security method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010619215.7A CN111832071B (en) | 2020-06-30 | 2020-06-30 | Information security system and information security method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111832071A true CN111832071A (en) | 2020-10-27 |
CN111832071B CN111832071B (en) | 2024-04-16 |
Family
ID=72901103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010619215.7A Active CN111832071B (en) | 2020-06-30 | 2020-06-30 | Information security system and information security method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111832071B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114401105A (en) * | 2021-11-30 | 2022-04-26 | 北京基智科技有限公司 | Internet personal privacy information safety protection system |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020010679A1 (en) * | 2000-07-06 | 2002-01-24 | Felsher David Paul | Information record infrastructure, system and method |
US20120072723A1 (en) * | 2010-09-20 | 2012-03-22 | Security First Corp. | Systems and methods for secure data sharing |
US20150205979A1 (en) * | 2012-06-19 | 2015-07-23 | Beijing Qihoo Technology Company Limited | Method and system for repairing file at user terminal |
US20160275303A1 (en) * | 2015-03-19 | 2016-09-22 | Netskope, Inc. | Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (ccs) |
CN106131072A (en) * | 2016-08-28 | 2016-11-16 | 姜俊 | A kind of computer information safe system |
CN107135211A (en) * | 2017-04-25 | 2017-09-05 | 山东管理学院 | A kind of Compositive Information Security Audit System and method |
CN109242383A (en) * | 2018-08-27 | 2019-01-18 | 合肥工业大学 | Goods transportation method and system |
CN109711126A (en) * | 2019-01-03 | 2019-05-03 | 黄河科技学院 | A kind of computer information safe management system and method |
CN208922209U (en) * | 2018-12-17 | 2019-05-31 | 郑州工业应用技术学院 | A kind of laptop external connection keyboard support frame |
CN110874483A (en) * | 2019-09-26 | 2020-03-10 | 合肥触点传媒有限公司 | Method and device for preventing personal information from being leaked |
CN111131151A (en) * | 2019-11-15 | 2020-05-08 | 苏州浪潮智能科技有限公司 | Method and equipment for controlling security level of storage system |
-
2020
- 2020-06-30 CN CN202010619215.7A patent/CN111832071B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020010679A1 (en) * | 2000-07-06 | 2002-01-24 | Felsher David Paul | Information record infrastructure, system and method |
US20120072723A1 (en) * | 2010-09-20 | 2012-03-22 | Security First Corp. | Systems and methods for secure data sharing |
US20150205979A1 (en) * | 2012-06-19 | 2015-07-23 | Beijing Qihoo Technology Company Limited | Method and system for repairing file at user terminal |
US20160275303A1 (en) * | 2015-03-19 | 2016-09-22 | Netskope, Inc. | Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (ccs) |
CN106131072A (en) * | 2016-08-28 | 2016-11-16 | 姜俊 | A kind of computer information safe system |
CN107135211A (en) * | 2017-04-25 | 2017-09-05 | 山东管理学院 | A kind of Compositive Information Security Audit System and method |
CN109242383A (en) * | 2018-08-27 | 2019-01-18 | 合肥工业大学 | Goods transportation method and system |
CN208922209U (en) * | 2018-12-17 | 2019-05-31 | 郑州工业应用技术学院 | A kind of laptop external connection keyboard support frame |
CN109711126A (en) * | 2019-01-03 | 2019-05-03 | 黄河科技学院 | A kind of computer information safe management system and method |
CN110874483A (en) * | 2019-09-26 | 2020-03-10 | 合肥触点传媒有限公司 | Method and device for preventing personal information from being leaked |
CN111131151A (en) * | 2019-11-15 | 2020-05-08 | 苏州浪潮智能科技有限公司 | Method and equipment for controlling security level of storage system |
Non-Patent Citations (5)
Title |
---|
ASIF等: ""Impact of storage of mobile on quality of experience (QoE) at user level accessing cloud"", PROCEEDINGS OF 2017 IEEE 9TH ICCSN, pages 1402 - 1409 * |
刘芳,刘文成: ""计算机网络信息安全思考"", 信息与电脑(理论版), pages 36 * |
朱修阳;吴圣杰;: "检察信息***分级保护研究和体会", 信息网络安全, no. 12, 10 December 2009 (2009-12-10), pages 32 - 33 * |
赵红超等: ""网络应用***的信息安全模型设计和应用"", 硅谷, pages 129 * |
陈丹伟等: ""基于动态信用等级的密文访问控制方案"", 计算机应用, pages 1587 - 1592 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114401105A (en) * | 2021-11-30 | 2022-04-26 | 北京基智科技有限公司 | Internet personal privacy information safety protection system |
Also Published As
Publication number | Publication date |
---|---|
CN111832071B (en) | 2024-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101626368A (en) | Device, method and system for preventing web page from being distorted | |
US9854000B2 (en) | Method and apparatus for detecting malicious software using handshake information | |
CN106503524B (en) | A kind of computer network security guard system | |
CN103914899A (en) | Alarm entrance guard controller and control system and method thereof | |
CN103441926A (en) | Security gateway system of numerically-controlled machine tool network | |
CN103593616A (en) | System and method for preventing and controlling USB flash disk viruses in enterprise information network | |
CN105205581A (en) | Power-supply-enterprise electronic file safety risk evaluation system | |
CN111832071A (en) | Information security system and information security method | |
US10721135B1 (en) | Edge computing system for monitoring and maintaining data center operations | |
CN110826094A (en) | Information leakage monitoring method and device | |
CN113810366A (en) | Website uploaded file safety identification system and method | |
CN109753410A (en) | O&M service system based on big data | |
CN101122988B (en) | Safe treatment method of network tax-control system | |
JP2020086978A (en) | Information processing system and information processing method | |
EP4199390A1 (en) | Computer network hacking prevention system and method | |
CN209897087U (en) | VPN technology-based whole network management monitoring system | |
KR102024148B1 (en) | An access control system of monitoring the file data during file transferring | |
KR100265978B1 (en) | Method and apparatus for communication controlling between terminal equipment and branch processor | |
CN207490952U (en) | A kind of Maintenance of Computer Network system | |
CN111970348B (en) | Cloud desktop management platform | |
KR101681017B1 (en) | Monitoring system of server using closed network | |
Zhao | Development of Electric Power Information Communication in the Era of Big Data | |
KR20200071793A (en) | Block Chain Solution Providing System to Ensure Data Integrity of Private Data-set, and Process Method thereof | |
CN103729921A (en) | Door control data processing method and device based on data monitoring | |
CN117077227B (en) | Abnormality monitoring method and system based on USB level signal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information |
Inventor after: Liu Liwei Inventor after: Zhao Hongchao Inventor after: Liu Wencheng Inventor before: Liu Wencheng Inventor before: Liu Liwei Inventor before: Zhao Hongchao |
|
CB03 | Change of inventor or designer information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |