CN208128283U - Information security of computer network monitor system - Google Patents
Information security of computer network monitor system Download PDFInfo
- Publication number
- CN208128283U CN208128283U CN201820529316.3U CN201820529316U CN208128283U CN 208128283 U CN208128283 U CN 208128283U CN 201820529316 U CN201820529316 U CN 201820529316U CN 208128283 U CN208128283 U CN 208128283U
- Authority
- CN
- China
- Prior art keywords
- module
- input terminal
- output end
- information
- central processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model is information security of computer network monitor system, and structure includes:Computer, server, central processing unit and CPU, computer is connect with server, the server side is connected with warning device and camera, the server other end is connected with information resource database, the information resource database connects central processing unit, the central processing unit input terminal and information tracking module, viral real time scan module, authentication module, network information security module is connected with the output end of Network Abnormal evaluation module, the central processing unit is bi-directionally connected with CPU, the CPU output end is connect with data migration module and data backup module input terminal, the CPU input terminal is connect with emergency module output end, the data migration module and data backup module output end are connect with storage module input terminal.The information security of computer network monitor system improves the safety of computerized information and network by the monitoring of many-sided multi-angle.
Description
Technical field
The utility model relates to technical field of the computer network, specially information security of computer network monitor system.
Background technique
The network information security is one and is related to computer science, network technology, the communication technology, cryptographic technique, information security
The multi-disciplinary comprehensive branch of learning such as technology, applied mathematics, number theory, information theory.It is primarily referred to as the hardware of network system, software
And its data in system are protected, not by the reason of accidental or malice and by destroying, changing, revealing, system connects
Continuous reliably normally to run, network service is not interrupted.
In recent years, it is grown rapidly along with Internet technology in the whole world, people are providing great convenience, however, letter
For breathization while bringing various substances and culture is enjoyed, we are also just by the safety for carrying out automatic network got worse
Threaten, the data burglar of such as network, the invasion of hacker, virus distribution person or even internal system blabber.Although we are just
In the software technology that various complexity are widely used, such as firewall, proxy server invade detector, channel controlling mechanism, but
It is that no matter in developed country, or in developing country (including China), activities of hacker is more and more savage, they are all-pervasive,
Serious harm is caused to society.At the same time, more allow people uneasy, hacker website is also being continuously increased on internet,
Study hacking technique, acquisition hacking tool become easy.In this way, making originally that just very fragile internet is more aobvious
It obtains dangerous.So reinforcing we itself safety precaution, it is quite necessary to.Therefore, we have proposed computer network informations
Safety custody system.
Utility model content
The purpose of this utility model is to provide information security of computer network monitor system, solves institute in background technique
The problem of proposition.
To achieve the above object, the utility model provides the following technical solutions:Information security of computer network monitor system,
Its structure includes:Its structure includes:Computer, server, central processing unit and CPU, the computer are connect with server, institute
It states server side and is connected with warning device and camera, the server other end is connected with information resource database, the information
Resources bank connects central processing unit, the central processing unit input terminal and information tracking module, viral real time scan module, identity
Authentication module, network information security module are connected with the output end of Network Abnormal evaluation module, and the central processing unit and CPU are bis-
To connection, the CPU output end is connect with data migration module and data backup module input terminal, the CPU input terminal with answer
Anxious module output end connection, the data migration module and data backup module output end are connect with storage module input terminal, institute
The input terminal of the output end and recovery module of stating storage module connects, and the output end of the recovery module and the input terminal of CPU connect
It connects.
As a kind of preferred embodiment of the utility model, the network information security module is generated by netkey
Device, netkey controller and netkey decipher are constituted, the netkey generator, netkey controller and network
Key decipher output end is connect with central processing unit input terminal.
As a kind of preferred embodiment of the utility model, the information tracking module controls unit and data by resource
Follow-up auditing unit is constituted, and the resource controls the output end that unit and data follow-up auditing unit are constituted and central processing unit is defeated
Enter end connection.
As a kind of preferred embodiment of the utility model, the Network Abnormal evaluation module input terminal and timing inspection
Module is connected with port security control module output end, and the timing polling module input terminal is connect with timer output end.
As a kind of preferred embodiment of the utility model, the output end of the virus real time scan module and external end
Mouth input terminal connection.
As a kind of preferred embodiment of the utility model, face recognition module, number built in the authentication module
According to evaluation module and data memory module, the authentication module connection ordinary user port and particular port.
Compared with prior art, the beneficial effects of the utility model are as follows:
1. the novel computer network information security monitor system, passes through the network information security guarded for the network information
Module, viral real time scan module, timing polling module and port security control module, carry out the authentication list of authentication
Member, network information security module, viral real time scan module, timing polling module, port security control module and authentication
Unit is assessed with central processing unit and central processing unit, information tracking module, viral real time scan module, Network Abnormal
Module, CPU, emergency module, data migration module, data backup module, storage module and recovery module are equipped with, and are solved
Digital information itself has the characteristic for being easy to replicate, and using this characteristic, information is susceptible to the robber for being difficult to control and tracing
The case where taking prestige knee is monitored and protects to the information of computer information safe system from multiple angles, many aspects, identity
Authentication module can identify fingerprint to judge ordinary user and specific user, substantially increase the use of computer information safe
With the security performance of transmission.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other spies of the utility model
Sign, objects and advantages will become more apparent upon:
Fig. 1 is the overall structure diagram of the utility model information security of computer network monitor system;
Fig. 2 is that the network information security modular structure of the utility model information security of computer network monitor system is illustrated
Figure;
Fig. 3 is the information tracking module schematic diagram of the utility model information security of computer network monitor system;
In figure:Computer -1, server -2, warning device -3, camera -4, information resource database -5, information tracking module -
6, viral real time scan module -7, authentication module -8, network information security module -9, central processing unit -10, reduction mould
Block -11, storage module -12, timer -13, timing polling module -14, Network Abnormal evaluation module -15, port security control
Module -16, emergency module -17, data migration module -18, CPU19, data backup module -20, netkey generator -21,
Netkey controller -22, netkey decipher -23, resource control unit -24, data tracking auditable unit -25, external
Port -71.
Specific embodiment
To be easy to understand the technical means, creative features, achievement of purpose, and effectiveness of the utility model, below
In conjunction with specific embodiment, the utility model is further described.
Fig. 1-3 is please referred to, the utility model provides a kind of technical solution:Information security of computer network monitor system,
Structure includes:Computer 1, server 2, central processing unit 10 and CPU19, the computer 1 are connect with server 2, the clothes
Business 2 one end of device is connected with warning device 3 and camera 4, and 2 other end of server is connected with information resource database 5, the information
Resources bank 5 connects central processing unit 10,10 input terminal of central processing unit and information tracking module 6, viral real time scan mould
Block 7, authentication module 8, network information security module 9 are connected with the output end of Network Abnormal evaluation module 15, the center
Processor 10 and CPU19 is bi-directionally connected, the CPU19 output end and 20 input terminal of data migration module 18 and data backup module
Connection, the CPU19 input terminal are connect with emergency 17 output end of module, the data migration module 18 and data backup module 20
Output end is connect with 12 input terminal of storage module, and the output end of the storage module 12 is connect with the input terminal of recovery module 11,
The output end of the recovery module 11 and the input terminal of CPU19 connect.
Referring to Fig. 2, the network information security module 9 is by netkey generator 21,22 and of netkey controller
Netkey decipher 23 is constituted, the netkey generator 21, netkey controller 22 and netkey decipher 23
Output end is connect with 10 input terminal of central processing unit, the monitoring for network security.
Referring to Fig. 3, the information tracking module 6 controls unit 24 by resource and data follow-up auditing unit 25 is constituted,
The resource is controlled the output end that unit 24 and data follow-up auditing unit 25 are constituted and is connect with 10 input terminal of central processing unit, uses
In the monitoring of information security.
Referring to Fig. 1,15 input terminal of Network Abnormal evaluation module and timing polling module 14 and port security control
The connection of 16 output end of module, 14 input terminal of timing polling module is connect with 13 output end of timer, for periodically guarding.
Referring to Fig. 1, the output end of the virus real time scan module 7 is connect with external 71 input terminal of port, it is used for pair
The scanning of external device is guarded.
Referring to Fig. 1, face recognition module, data evaluation module and data store mould built in the authentication module 8
Block, the authentication module 8 connect ordinary user port and particular port, for identification specific user.
Information security of computer network monitor system described in the utility model is needed to first pass through identity when users use and be tested
Module 8 is demonstrate,proved, there is data evaluation module and data memory module in authentication module 8, user carries out face knowledge by camera 4
Not, when by when enter particular port, when identification occurs abnormal, into ordinary user port, network information security module 9 is set
Netkey generator 21, netkey controller 22 and the netkey decipher 23 set detect server, virus
Real time scan module 7 is scanned server and external port 71, and Network Abnormal evaluation module 15 is by timer 13 and timing
Polling module 14 controls timing inspection scanning server;When computer 1 receives attack display exception, emergency module 17 starts,
Data are shifted and are stored by data migration module 18, data backup module 20, storage module 12, when computer 1 restores normal, also
Former module 11 restores data, and in operation, information tracking module 6 is to data information spotting scaming, to realize many-sided multi-angle
Network monitoring.
The utility model, computer -1, server -2, warning device -3, camera -4, information resource database -5, information
Tracking module -6, viral real time scan module -7, authentication module -8, network information security module -9, central processing unit -
10, recovery module -11, storage module -12, timer -13, timing polling module -14, Network Abnormal evaluation module -15, port
Safety control module -16, emergency module -17, data migration module -18, CPU19, data backup module -20, netkey are raw
- 21, netkey controller -22, netkey decipher -23, the resource of growing up to be a useful person control unit -24, data tracking auditable unit -
25, external -71 component of port is universal standard part or component as known to those skilled in the art, and structure and principle are all this
Technical staff can learn by technical manual or know by routine experiment method that the utility model passes through many-sided multi-angle
Monitoring, improve the safety of computerized information and network
The basic principles and main features of the present invention and the advantages of the present invention have been shown and described above, for
For those skilled in the art, it is clear that the present invention is not limited to the details of the above exemplary embodiments, and without departing substantially from this
In the case where the spirit or essential attributes of utility model, the utility model can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the utility model is by institute
Attached claim rather than above description limit, it is intended that will fall within the meaning and scope of the equivalent elements of the claims
All changes are embraced therein.It should not treat any reference in the claims as limiting related right
It is required that.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (6)
1. information security of computer network monitor system, structure include:Computer(1), server(2), central processing unit
(10)And CPU(19), it is characterised in that:The computer(1)With server(2)Connection, the server(2)One end is connected with
Warning device(3)And camera(4), the server(2)The other end is connected with information resource database(5), the information resource database
(5)Connect central processing unit(10), the central processing unit(10)Input terminal and information tracking module(6), viral real time scan
Module(7), authentication module(8), network information security module(9)With Network Abnormal evaluation module(15)Output end connect
It connects, the central processing unit(10)With CPU(19)It is bi-directionally connected, the CPU(19)Output end and data migration module(18)With
Data backup module(20)Input terminal connection, the CPU(19)Input terminal and emergency module(17)Output end connection, the data
Shift module(18)And data backup module(20)Output end and storage module(12)Input terminal connection, the storage module(12)
Output end and recovery module(11)Input terminal connection, the recovery module(11)Output end and CPU(19)Input terminal
Connection.
2. information security of computer network monitor system according to claim 1, it is characterised in that:The network information peace
Full module(9)By netkey generator(21), netkey controller(22)With netkey decipher(23)It constitutes, it is described
Netkey generator(21), netkey controller(22)With netkey decipher(23)Output end and central processing unit
(10)Input terminal connection.
3. information security of computer network monitor system according to claim 1, it is characterised in that:The information trace mould
Block(6)Unit is controlled by resource(24)With data follow-up auditing unit(25)It constitutes, the resource controls unit(24)And data
Follow-up auditing unit(25)The output end and central processing unit of composition(10)Input terminal connection.
4. information security of computer network monitor system according to claim 1, it is characterised in that:The Network Abnormal is commented
Estimate module(15)Input terminal and timing polling module(14)With port security control module(16)Output end connection, the timing are patrolled
Examine module(14)Input terminal and timer(13)Output end connection.
5. information security of computer network monitor system according to claim 1, it is characterised in that:The virus is swept in real time
Retouch module(7)Output end and external port(71)Input terminal connection.
6. information security of computer network monitor system according to claim 1, it is characterised in that:The authentication mould
Block(8)Built-in face recognition module, data evaluation module and data memory module, the authentication module(8)Connection is common
User port and particular port.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820529316.3U CN208128283U (en) | 2018-04-15 | 2018-04-15 | Information security of computer network monitor system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201820529316.3U CN208128283U (en) | 2018-04-15 | 2018-04-15 | Information security of computer network monitor system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN208128283U true CN208128283U (en) | 2018-11-20 |
Family
ID=64191361
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201820529316.3U Expired - Fee Related CN208128283U (en) | 2018-04-15 | 2018-04-15 | Information security of computer network monitor system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN208128283U (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175458A (en) * | 2019-04-18 | 2019-08-27 | 上海马小修智能科技有限公司 | A kind of Computer Data Security management system |
CN112597462A (en) * | 2020-12-30 | 2021-04-02 | 上海磐御网络科技有限公司 | Industrial network safety system |
CN112804212A (en) * | 2020-12-31 | 2021-05-14 | 上海磐御网络科技有限公司 | Information security assessment system |
CN114513333A (en) * | 2022-01-07 | 2022-05-17 | 深圳比特耐特信息技术股份有限公司 | Computer network information safety monitoring system and method |
-
2018
- 2018-04-15 CN CN201820529316.3U patent/CN208128283U/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175458A (en) * | 2019-04-18 | 2019-08-27 | 上海马小修智能科技有限公司 | A kind of Computer Data Security management system |
CN112597462A (en) * | 2020-12-30 | 2021-04-02 | 上海磐御网络科技有限公司 | Industrial network safety system |
CN112804212A (en) * | 2020-12-31 | 2021-05-14 | 上海磐御网络科技有限公司 | Information security assessment system |
CN112804212B (en) * | 2020-12-31 | 2023-02-28 | 上海磐御网络科技有限公司 | Information security assessment system |
CN114513333A (en) * | 2022-01-07 | 2022-05-17 | 深圳比特耐特信息技术股份有限公司 | Computer network information safety monitoring system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN208128283U (en) | Information security of computer network monitor system | |
US10055559B2 (en) | Security device, methods, and systems for continuous authentication | |
KR101689297B1 (en) | Automated verification method of security event and automated verification apparatus of security event | |
KR100966073B1 (en) | Apparatus and method for managing terminal users | |
CN101252439A (en) | System and method for increasing information safety equipment security | |
US20120254947A1 (en) | Distributed Real-Time Network Protection for Authentication Systems | |
CN109165507A (en) | Cross-site scripting attack leak detection method, device and terminal device | |
Bitton et al. | Evaluating the information security awareness of smartphone users | |
CN107147627A (en) | A kind of network safety protection method and system based on big data platform | |
CN107122685A (en) | A kind of big data method for secure storing and equipment | |
CN106529291B (en) | Malware detection method | |
Adhikary et al. | Battering keyloggers and screen recording software by fabricating passwords | |
Muwardi et al. | Network security monitoring system via notification alert | |
CN109271772A (en) | A kind of multi-action computer network guard system | |
CN108959860A (en) | Whether a kind of detection android system is cracked and cracks record acquisition methods | |
Čisar et al. | General vulnerability aspects of Internet of Things | |
CN104660480B (en) | A kind of method, apparatus and system of account number abnormality processing | |
Pfrang et al. | Automated security testing for web applications on industrial automation and control systems | |
Lei et al. | Self-recovery Service Securing Edge Server in IoT Network against Ransomware Attack. | |
CN105933356A (en) | Method and device for detecting DNS (Domain Name System) hijacking of client | |
CN114189387B (en) | Alliance chain safety detection method and device | |
SRIDEVI et al. | Dynamic Malware Attack Detection and Prevention in Real TIME Iot with Hybridsignature Free Method | |
CN106951777B (en) | The estimating method of user interface when Android application operation | |
Soni et al. | Security requirements in internet of things: Challenges and methods | |
Alkhamisi | An Analysis of Security Attacks on IoT Applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20181120 Termination date: 20210415 |