CN112926039A - Computing device management software with high safety - Google Patents

Computing device management software with high safety Download PDF

Info

Publication number
CN112926039A
CN112926039A CN202110378954.6A CN202110378954A CN112926039A CN 112926039 A CN112926039 A CN 112926039A CN 202110378954 A CN202110378954 A CN 202110378954A CN 112926039 A CN112926039 A CN 112926039A
Authority
CN
China
Prior art keywords
module
data
computing
program
self
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110378954.6A
Other languages
Chinese (zh)
Inventor
李明
李照
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youfu Information Technology Co ltd
Original Assignee
Shenzhen Youfu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youfu Information Technology Co ltd filed Critical Shenzhen Youfu Information Technology Co ltd
Priority to CN202110378954.6A priority Critical patent/CN112926039A/en
Publication of CN112926039A publication Critical patent/CN112926039A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2205Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing using arrangements specific to the hardware being tested
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/2273Test methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B3/00Audible signalling systems; Audible personal calling systems
    • G08B3/10Audible signalling systems; Audible personal calling systems using electric transmission; using electromagnetic transmission

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Electromagnetism (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)

Abstract

The invention belongs to the technical field of software, in particular to computing equipment management software with high safety, and provides a scheme for solving the problem of poor safety, wherein the scheme comprises a control center, a network attack defense unit and a data storage unit, wherein the control center controls an external protection unit, an internal element protection unit, a network attack defense unit and the data storage unit of equipment; the equipment external protection unit comprises a timing module, a monitoring module, an alarm module and a user information authentication module; the internal element protection unit comprises a calculation program self-checking module, a calculation program maintenance module and a calculation program maintenance module; the network attack defense unit comprises a calculation operation module, a data input module, a data comparison module and a self-locking module; the data storage unit comprises a calculation data storage module and a deep data mining module. The invention prevents the computing equipment from being stolen or damaged, prevents the failure of the computing program, defends the network attack, protects the computing equipment from multiple aspects and ensures that the security performance of the computing equipment is higher.

Description

Computing device management software with high safety
Technical Field
The invention relates to the technical field of software, in particular to computing equipment management software with high safety.
Background
At present, most enterprise equipment management system modes comprise a paper accounting mode, a single machine mode and a network mode, wherein the traditional paper accounting management mode is basically eliminated due to the difficulties in storage, modification, retrieval and statistics, large daily management consumption and the like, and the most used modes in the prior art are the single machine mode and the network mode. Both the stand-alone mode and the network mode require computing and recording with a computing device.
The existing computing device has poor security, not only is the external easy to be stolen, but also elements such as internal computing programs and the like are easy to be damaged, and the computing device is easy to be attacked by network viruses and the like, so that the computing device is easy to be damaged or lost, and therefore computing device management software with high security is needed to manage and protect the computing device.
Disclosure of Invention
Based on the technical problems in the background art, the invention provides computing equipment management software with high safety.
The invention provides high-safety computing equipment management software which comprises a control center, wherein the control center controls an equipment external protection unit, an internal element protection unit, a network attack defense unit and a data storage unit, the equipment external protection unit is used for protecting and preventing an equipment external unit from theft, the internal element protection unit is used for maintaining an internal computing program, the network attack defense unit is used for defending network virus attack and the like, and the data storage unit is used for storing various data;
the equipment external protection unit comprises a timing module, a monitoring module, an alarm module and a user information authentication module;
the internal element protection unit comprises a calculation program self-checking module, a calculation program maintenance module and a calculation program maintenance module, wherein the calculation program self-checking module is connected with the calculation program maintenance module, and the calculation program self-checking module is connected with the calculation program maintenance module;
the network attack defense unit comprises a calculation operation module, a data input module, a data comparison module and a self-locking module, wherein the calculation operation module is connected with the data input module, the data input module is connected with the data comparison module, and the data comparison module is connected with the self-locking module;
the data storage unit comprises an equipment information query module, a basic data management module, a calculation data storage module and a deep data mining module.
Preferably, the monitoring module includes a camera, the monitoring module is configured to monitor people near the periphery of the computing device, and the timing module is configured to time the time when the people shot by the monitoring module are near the computing device.
Preferably, the user information authentication module is used for identity authentication of a user, the alarm module comprises a buzzer, and the alarm module is used for alarming to whistle when the time of approaching the computing equipment exceeds the standard time and the identity authentication is not completed, so that a stranger is prevented from approaching the computing equipment for a long time, the computing equipment is prevented from being stolen or damaged, and the computing equipment is protected from the outside.
Preferably, the calculation program self-checking module is configured to perform periodic self-checking on the calculation program, the calculation program maintenance module is configured to maintain the calculation program, and the calculation program maintenance module is configured to maintain the calculation program.
Preferably, when the result of the self-checking of the calculation program by the calculation program self-checking module is abnormal, the calculation program maintenance module performs daily maintenance processing on the calculation program, and when the result of the self-checking of the calculation program by the calculation program self-checking module is abnormal, the calculation program maintenance module maintains the abnormality of the calculation program, so that the calculation program of the internal element is protected and prevented from being out of order.
Preferably, the calculation operation module is used for calculating input data, the data entry module is used for entering data, the data comparison module is used for comparing the entered data with data in the calculation data storage module, and the self-locking module is used for self-locking the calculation program.
Preferably, when the data comparison module compares the data with the data in the calculation data storage module to determine that the comparison result is abnormal, the self-locking module operates to stop the operation of the calculation program, and when the data comparison module compares the data with the data in the calculation data storage module to determine that the comparison result is abnormal, the calculation program operates normally and stores the new data in the calculation data storage module, so as to prevent the data from containing viruses and the like to damage the program, thereby defending against network attacks, protecting the calculation device from multiple aspects, and improving the safety performance of the calculation device.
Preferably, the device information query module is configured to store information of the computing device and provide a query channel, the basic data management module is configured to store and manage basic data of the computing device, and the computing data storage module is configured to store normal data computed by running a computing program.
Preferably, the deep data mining module is used for deeply mining data newly stored in the calculation data storage module, mining possible normal operation data, and storing the mined data in the calculation data storage module again.
The beneficial effects of the invention are as follows:
1. this high computing equipment management software of security, through being provided with the outside protection unit of equipment, utilize monitoring module to monitor the people that are close to computing equipment all around, and time the people that shoots the monitoring module with timing module and be close to computing equipment's time, the people that use computing equipment need reason user information authentication module carries out authentication, alarm module reports to the police with a whistle under the condition that the time that is close to computing equipment surpasss standard time and does not accomplish authentication, prevent that stranger from being close to computing equipment for a long time, thereby prevent that computing equipment is stolen or damaged, from outside protection computing equipment.
2. The high-safety computing equipment management software is provided with an internal element protection unit, a computing program self-checking module is used for carrying out regular self-checking on a computing program, when the self-checking result is abnormal, the computing program maintenance module carries out daily maintenance processing on the computing program, and when the self-checking result is abnormal, the computing program maintenance module maintains the abnormal condition of the computing program, so that the computing program of an internal element is protected, and the fault is prevented.
3. The high-safety computing equipment management software is provided with a network attack defense unit, a data comparison module is used for comparing data with data in a computing data storage module, when the comparison result is abnormal, a self-locking module operates to stop operation of a computing program, when the comparison result is abnormal, the computing program operates normally and stores new data in the computing data storage module, once the data abnormality is detected, the program operation is stopped immediately, the damaged programs such as viruses contained in the data are prevented, the network attack is defended, the computing equipment is protected from multiple aspects, and the security performance of the computing equipment is higher.
The non-involved parts of the software are the same as or can be implemented using existing technology.
Drawings
FIG. 1 is a system diagram of a high security computing device management software according to the present invention;
FIG. 2 is a system diagram of an external protection unit of a computing device management software with high security according to the present invention;
FIG. 3 is a system diagram of an internal component protection unit of a high security computing device management software according to the present invention;
FIG. 4 is a system diagram of a network attack defense unit of a computing device management software with high security according to the present invention;
FIG. 5 is a diagram of a data storage unit system of a high security computing device management software according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Referring to fig. 1-5, a high-security computing device management software includes a control center, a control center controlling a device external protection unit, an internal element protection unit, a network attack defense unit and a data storage unit, wherein the device external protection unit is used for protecting and preventing an external device from theft, the internal element protection unit is used for maintaining an internal computing program, the network attack defense unit is used for defending network virus attack and the like, and the data storage unit is used for storing various data;
the equipment external protection unit comprises a timing module, a monitoring module, an alarm module and a user information authentication module;
the internal element protection unit comprises a calculation program self-checking module, a calculation program maintenance module and a calculation program maintenance module, wherein the calculation program self-checking module is connected with the calculation program maintenance module, and the calculation program self-checking module is connected with the calculation program maintenance module;
the network attack defense unit comprises a calculation operation module, a data input module, a data comparison module and a self-locking module, wherein the calculation operation module is connected with the data input module, the data input module is connected with the data comparison module, and the data comparison module is connected with the self-locking module;
the data storage unit comprises an equipment information query module, a basic data management module, a calculation data storage module and a deep data mining module.
In the invention, the monitoring module comprises a camera, the monitoring module is used for monitoring people near the periphery of the computing equipment, and the timing module is used for timing the time of the people near the computing equipment, which is shot by the monitoring module.
In the invention, the user information authentication module is used for identity authentication of a user, the alarm module comprises a buzzer, and the alarm module is used for alarming whistle when the time of approaching the computing equipment exceeds the standard time and the identity authentication is not completed, so that a stranger is prevented from approaching the computing equipment for a long time, the computing equipment is prevented from being stolen or damaged, and the computing equipment is protected from the outside.
In the invention, the calculation program self-checking module is used for periodically and automatically checking the calculation program, the calculation program maintenance module is used for maintaining the calculation program, and the calculation program maintenance module is used for maintaining the calculation program.
In the invention, when the self-checking result of the calculation program by the calculation program self-checking module is abnormal, the calculation program maintenance module carries out daily maintenance processing on the calculation program, and when the self-checking result of the calculation program by the calculation program self-checking module is abnormal, the calculation program maintenance module maintains the abnormality of the calculation program, thereby protecting the calculation program of the internal element and preventing the internal element from being out of order.
In the invention, the calculation operation module is used for calculating input data, the data entry module is used for entering the data, the data comparison module is used for comparing the entered data with the data in the calculation data storage module, and the self-locking module is used for self-locking a calculation program.
In the invention, when the data comparison module compares the data with the data in the calculation data storage module to obtain an abnormal result, the self-locking module operates to stop the operation of the calculation program, and when the data comparison module compares the data with the data in the calculation data storage module to obtain an abnormal result, the calculation program operates normally and the new data is stored in the calculation data storage module to prevent the damage program such as virus contained in the data, thereby defending network attack, protecting the calculation equipment from multiple aspects and ensuring the safety performance of the calculation equipment to be higher.
In the invention, an equipment information query module is used for storing information of the computing equipment and providing a query channel, a basic data management module is used for storing and managing basic data of the computing equipment, and a computing data storage module is used for storing normal data computed by running a computing program.
In the invention, the deep data mining module is used for deeply mining the data newly stored in the calculation data storage module, mining possible normal operation data and storing the mined data in the calculation data storage module again.
The working principle is as follows: the device external protection unit is arranged, the monitoring module is used for monitoring people near the periphery of the computing device, the timing module is used for timing the time of the people shot by the monitoring module when the people approach the computing device, the people using the computing device need to reason the user information authentication module to perform identity authentication, and the alarm module is used for whistling and alarming when the time of approaching the computing device exceeds the standard time and does not finish the identity authentication, so that strangers are prevented from approaching the computing device for a long time, the computing device is prevented from being stolen or damaged, and the computing device is protected from the outside; the internal element protection unit is arranged, the calculation program self-checking module is used for carrying out regular self-checking on the calculation program, when the self-checking result is abnormal, the calculation program maintenance module carries out daily maintenance processing on the calculation program, and when the self-checking result is abnormal, the calculation program maintenance module maintains the abnormality of the calculation program, so that the calculation program of the internal element is protected, and the failure of the calculation program is prevented; by arranging the network attack defense unit, the data comparison module is used for comparing the data with the data in the calculation data storage module, when the comparison result is abnormal, the self-locking module operates to stop the operation of the calculation program, when the comparison result is abnormal, the calculation program operates normally and new data is stored in the calculation data storage module, and once the data abnormality is detected, the program operation is stopped immediately, so that the damage programs such as viruses contained in the data are prevented, the network attack defense unit defends the calculation equipment from multiple aspects, and the safety performance of the calculation equipment is higher.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (9)

1. A high-safety computing device management software comprises a control center and is characterized in that the control center controls an external protection unit, an internal element protection unit, a network attack defense unit and a data storage unit of a device, wherein the external protection unit of the device is used for protecting and preventing an external machine of the device from theft, the internal element protection unit is used for maintaining an internal computing program, the network attack defense unit is used for defending network virus attack and the like, and the data storage unit is used for storing various data;
the equipment external protection unit comprises a timing module, a monitoring module, an alarm module and a user information authentication module;
the internal element protection unit comprises a calculation program self-checking module, a calculation program maintenance module and a calculation program maintenance module, wherein the calculation program self-checking module is connected with the calculation program maintenance module, and the calculation program self-checking module is connected with the calculation program maintenance module;
the network attack defense unit comprises a calculation operation module, a data input module, a data comparison module and a self-locking module, wherein the calculation operation module is connected with the data input module, the data input module is connected with the data comparison module, and the data comparison module is connected with the self-locking module;
the data storage unit comprises an equipment information query module, a basic data management module, a calculation data storage module and a deep data mining module.
2. The software for managing computing equipment with high security according to claim 1, wherein the monitoring module comprises a camera, the monitoring module is configured to monitor people near the periphery of the computing equipment, and the timing module is configured to time the time when the people photographed by the monitoring module are near the computing equipment.
3. The software of claim 2, wherein the user information authentication module is configured to authenticate the user, the alarm module includes a buzzer, and the alarm module is configured to alarm when the time period of the user approaching the computing device exceeds the standard time period without completing the authentication.
4. The computing equipment management software with high safety according to claim 1, wherein the computing program self-checking module is used for performing periodic self-checking on the computing program, the computing program maintenance module is used for performing maintenance on the computing program, and the computing program maintenance module is used for performing maintenance on the computing program.
5. The software as claimed in claim 4, wherein when the result of the self-check of the computing program by the computing program self-check module is abnormal, the computing program maintenance module performs routine maintenance processing on the computing program, and when the result of the self-check of the computing program by the computing program self-check module is abnormal, the computing program maintenance module maintains the abnormal computing program.
6. The computing equipment management software with high safety according to claim 1, wherein the computing operation module is used for computing input data, the data entry module is used for entering data, the data comparison module is used for comparing the entered data with data in the computing data storage module, and the self-locking module is used for self-locking a computing program.
7. The software for managing computing equipment with high security as claimed in claim 6, wherein the self-locking module is operated to stop the operation of the computing program when the data comparison module compares the data with the data in the computing data storage module, and the computing program is operated normally and new data is stored in the computing data storage module when the data comparison module compares the data with the data in the computing data storage module.
8. The software for managing computing equipment with high security as claimed in claim 1, wherein the equipment information query module is configured to store and provide a query channel for information of the computing equipment, the basic data management module is configured to store and manage basic data of the computing equipment, and the computing data storage module is configured to store normal data computed by running a computing program.
9. The computing device management software of claim 8, wherein the deep data mining module is configured to perform deep mining on data newly stored in the computing data storage module, mine possible normal operation data, and store the mined data in the computing data storage module again.
CN202110378954.6A 2021-04-08 2021-04-08 Computing device management software with high safety Pending CN112926039A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110378954.6A CN112926039A (en) 2021-04-08 2021-04-08 Computing device management software with high safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110378954.6A CN112926039A (en) 2021-04-08 2021-04-08 Computing device management software with high safety

Publications (1)

Publication Number Publication Date
CN112926039A true CN112926039A (en) 2021-06-08

Family

ID=76173893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110378954.6A Pending CN112926039A (en) 2021-04-08 2021-04-08 Computing device management software with high safety

Country Status (1)

Country Link
CN (1) CN112926039A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592875A (en) * 2000-11-03 2005-03-09 迈克尔·O·罗宾 Method and apparatus for protecting information and privacy
CN105681276A (en) * 2015-12-25 2016-06-15 亿阳安全技术有限公司 Sensitive information leakage active monitoring and responsibility confirmation method and device
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN108809886A (en) * 2017-04-26 2018-11-13 牡丹江医学院 A kind of computer network security guard system
CN109743320A (en) * 2019-01-03 2019-05-10 黄河科技学院 A kind of information security of computer network system and information protecting method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1592875A (en) * 2000-11-03 2005-03-09 迈克尔·O·罗宾 Method and apparatus for protecting information and privacy
CN105681276A (en) * 2015-12-25 2016-06-15 亿阳安全技术有限公司 Sensitive information leakage active monitoring and responsibility confirmation method and device
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN108809886A (en) * 2017-04-26 2018-11-13 牡丹江医学院 A kind of computer network security guard system
CN109743320A (en) * 2019-01-03 2019-05-10 黄河科技学院 A kind of information security of computer network system and information protecting method

Similar Documents

Publication Publication Date Title
CN102222194A (en) Module and method for LINUX host computing environment safety protection
CN205681457U (en) A kind of data safety network gateway equipment with inherently safe defense function
CN109711126A (en) A kind of computer information safe management system and method
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
CN109672689A (en) A kind of big data network security monitoring equipment
CN109934010A (en) A kind of computer information safe stocking system
CN102637332B (en) Illegal invasion detection system and illegal invasion detection method
CN108810035A (en) A kind of Network Security Device monitored in real time
CN112231781A (en) Anti-theft method for edge computing server and server
CN107045605A (en) A kind of real-time metrics method and device
CN112926039A (en) Computing device management software with high safety
CN109035535A (en) A kind of novel intelligent face recognition door control system
WO2005013031A3 (en) An improved firearm repository. security and access control system
CN108460284A (en) A kind of computer critical data protection system and method
CN107277070A (en) A kind of computer network instrument system of defense and intrusion prevention method
US10721253B2 (en) Power circuitry for security circuitry
KR101749995B1 (en) Apparatus, system, method and computer program for controlling and tracking the usage of gun
CN110310108A (en) A kind of band tears the self-destructed New Hardware wallet of machine open
CN110222509A (en) A kind of smart machine data storage system and method
CN107229869A (en) Secure user data is locked
CN115952477A (en) User data protection system of safety computer
CN108768996A (en) A kind of detection guard system of SQL injection attack
CN206946489U (en) A kind of computer critical data protects system
CN205405621U (en) Management entrance guard of tourist enterprise attendance machine
CN109903427A (en) A kind of security system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination