Computer information safety controlling method and device

An information security and control device technology, applied in computer security devices, computing, protection of internal/peripheral computer components, etc., can solve the problems of low security of information transmission, single security verification method of data hard disk, single security defense method, etc.

Inactive Publication Date: 2018-05-29
HUNAN UNIV OF FINANCE & ECONOMICS
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problems existing in the existing technology are: the existing information security system has a single security defense method, and the security of information transmission is low; at the same time, the data hard disk is opened with a single security verification method, resulting in data leakage and other risks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information safety controlling method and device
  • Computer information safety controlling method and device
  • Computer information safety controlling method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0060] The application principle of the present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0061] Such as figure 1 As shown, the computer information security control device provided by the present invention includes: an external interface module 1, an intrusion detection module 2, a login authentication module 3, a central control module 4, a network information security module 5, a port security control module 6, and an information tracking module 7. Data backup module 8, hard disk 9. The external interface module 1, the intrusion detection module ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of computer information safety, and discloses a computer information safety controlling method and device. The controlling device comprises an external interface module, an intrusion detection module, a log-in identity verification module, a center control module, a network information safety module, an end safety control module, an information tracingmodule, a data backup module and a hard disk. Through the arrangement of the network information safety module, the end safety control module, the information tracing module and the data backup module, the information of a computer information safety system is monitored and protected from multiple angles and aspects; meanwhile, the invasion detection module is additionally arranged, through dual combination, the safety of data in a computer terminal is effectively ensured, and data leakage is avoided. Besides, the computer terminal can be in wireless communication with a mobile terminal, a person who logs in conveniently knows whether the computer terminal is illegally intruded or not, and the safety is further guaranteed.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and in particular relates to a computer information security control method and device. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and security systems, such as UniNAC, DLP, etc., as long as A security br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/60G06F21/78
CPCG06F21/56G06F21/606G06F21/78
Inventor 黄大足戴淑君
Owner HUNAN UNIV OF FINANCE & ECONOMICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products