Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security audit system and method based on cloud computing

A security auditing and cloud computing technology, applied in the information field, can solve problems such as increasing the difficulty of public security law enforcement, polluting the Internet environment, etc., and achieve the effects of multiple data access methods, improved processing efficiency, and good data sharing.

Active Publication Date: 2018-05-22
GREATER BAY AREA STAR BIOTECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the openness and complexity of the network, coupled with increasingly advanced network encryption and defense technologies, more and more illegal exchanges and illegal information dissemination are now carried out through the Internet, which not only greatly increases the difficulty of public security law enforcement, but also It also pollutes the entire Internet environment to a large extent
In the past, network information was filtered and shielded by means of data restoration, analysis and auditing of network communication messages on network links, which has gradually failed to keep up with the ever-changing means of illegal elements. This passive defense method has its major flaws

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security audit system and method based on cloud computing
  • Security audit system and method based on cloud computing
  • Security audit system and method based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] see figure 1 , The present invention relates to a security audit system and method based on cloud computing, which is mainly composed of a client, a cloud audit center and a monitoring terminal. The client is loaded on the monitoring target system, the client and the cloud audit center establish a connection through the communication network, and use the Internet to communicate, a one-to-many connection mode is formed between the client and the cloud audit center, and the monitoring terminal and the cloud audit center Establish communication connections between the centers, and use the Internet or 3G wireless network to communicate, also forming a one-to-many connection mode.

[0044] The client is used to complete the monitoring data collection of the monitoring target system by obtaining the current running status of the monitoring target system, behavior operation trigger events, underlying hardware instructions, and data protocol and process analysis and analysis, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a security audit system and method based on cloud computing. The security audit system comprises a plurality of clients, a plurality of cloud audit centers and a plurality of monitoring terminals, wherein the plurality of clients are used for acquiring current data of monitored targets, processing the current data and uploading the processed current data to the cloud audit centers; the plurality of cloud audit centers are used for auditing and processing the monitored data and responding to instructions of the monitoring terminals; and the plurality of monitoring terminals are used for checking states of all the monitored targets, uniformly monitoring and managing the cloud audit centers and the monitored targets, sending remote control instructions and receiving alarm information. By the security audit system and the security audit method, illegal information sources can be caught directly and intuitively, transmission of a large amount of data is realized and the transmission efficiency is guaranteed; furthermore, the illegal data sources can be positioned quickly and corresponding measures can be taken.

Description

technical field [0001] The invention relates to a cloud computing-based security audit system and method, which are mainly used for monitoring illegal and criminal acts in Internet cafes and the like. It belongs to the field of information technology. Background technique [0002] With the rapid development of Internet applications, today's people have gradually transformed the interpersonal communication and information release platform from the previous physical platform and satellite platform into a network platform. Due to the openness and complexity of the network, coupled with increasingly advanced network encryption and defense technologies, more and more illegal exchanges and illegal information dissemination are now carried out through the Internet, which not only greatly increases the difficulty of public security law enforcement, but also It also pollutes the entire Internet environment to a large extent. In the past, network information was filtered and shielde...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/26
Inventor 丁远彤丁贤根
Owner GREATER BAY AREA STAR BIOTECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products