Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Computer information security system

An information security system and computer technology, which is applied in the field of computer information security systems, can solve problems such as poor smoothing effect, insufficient definition of image details, and large time-consuming

Pending Publication Date: 2019-03-19
平顶山工业职业技术学院
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) With the development of computer technology and the enhancement of the computing power of the processor, the existing cryptographic algorithm becomes easier to be cracked, and the security is low; the risk value assessment is not accurate, which increases the probability of facing the risk, and the risk cannot be identified, and the risk cannot be identified. Put forward corresponding measures; the calculation of abnormal traffic is inaccurate, and no corresponding measures are taken to cause viruses in the computer; at the same time, the traditional host configuration security hardening method is to check and check the configuration items one by one manually, and manually check the configuration items that do not meet the requirements. Modify to an appropriate safe value
This security hardening method requires a lot of manpower and material resources to operate, is time-consuming and labor-intensive, and requires high costs
[0005] (2) Existing data mining has low mining precision, slow convergence speed, and weak generalization ability
[0006] (3) The smoothing effect of the existing technology on the image denoising is not very good, the image details are not clear enough, and even pseudo-Gibbs phenomenon may occur
[0007] (4) In the prior art, the tracking speed of information in the information tracking system is slow and time-consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security system
  • Computer information security system
  • Computer information security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] In order to further understand the content, features and effects of the present invention, the following examples are given, and detailed descriptions are given below with reference to the accompanying drawings.

[0101] The structure of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0102] Such as figure 1As shown, the computer information security system provided by the present invention includes: identity verification module 1, operation monitoring module 2, port control module 3, main control module 4, information tracking module 5, network cut-off module 6, virus simulation isolation module 7, data An encryption module 8 , a risk assessment module 9 , a security hardening module 10 , and a display module 11 .

[0103] The identity verification module 1 is connected with the main control module 4, and is used to verify the legitimacy of the login information through the identity verification program;

[010...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security. The invention discloses a computer information security system. The computer information security system comprises an identity verification module, an operation monitoring module, a port control module, a main control module, an information tracking module, a network cutoff module, a virus simulation isolation module, a data encryption module, a risk assessment module, a security reinforcement module and a display module. The data encryption module adopts a mode of converting serial data into a parallel data matrix to perform encryption operation, original data sequence and relation are effectively disrupted through matrix operation, the data mixing effect is well achieved, and the data integrity is guaranteed; Meanwhile, the original security configuration value is modified into the preset security configuration standard value through the security reinforcement module, reinforcement of computer security configuration is achieved, the whole method is automatically completed through a computer program, manual operation is not needed, time and labor are saved, and the computer security reinforcement efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a computer information security system. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and security systems, such as UniNAC, DLP, etc., as long as A security breach can threaten global sec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/60G06F21/62G06F21/57
CPCG06F21/56G06F21/577G06F21/602G06F21/6227
Inventor 苏楷刘田珦门飞蒋欣高倩
Owner 平顶山工业职业技术学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products