Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A teaching information security protection system based on cloud platform

An information security and protection system technology, which is applied in the field of teaching information security protection system based on cloud platform, can solve problems such as intentional leakage, malicious data theft, and insufficient security of teaching information storage, so as to prevent malicious data theft and improve The effect of security and difficulty in information leakage

Active Publication Date: 2022-05-03
HANGZHOU YUNTI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of development, users are accustomed to storing some important teaching information on the cloud platform, but due to the limitations of the cloud platform itself, the storage of teaching information is not safe enough, because users who enter the cloud platform for data download cannot be downloaded. More effective identity verification and operation restrictions, prone to malicious theft of data and intentional disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A teaching information security protection system based on cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Such as figure 1 A teaching information security protection system based on a cloud platform is shown, including a cloud platform, a system terminal and multiple personal modules;

[0020] An intelligent gateway is connected between the cloud platform, the system terminal and the personal module, and the intelligent gateway is used to connect the cloud platform, the system terminal and the personal module for data exchange and transmission, and to control the connection between the cloud platform and the system terminal. On and off of the connection;

[0021] The personal module is used to log into the cloud platform, and is configured with login authentication, including ID verification, fingerprint verification and face verification, and sends data requests and transmits data instructions to the cloud platform;

[0022] The system terminal includes a storage unit and a protection unit, the storage unit is used to store teaching information in the system, the protecti...

Embodiment 2

[0031] Including a cloud platform, a system terminal, a plurality of personal modules and a recording module, the cloud platform is specifically a computing cloud platform focusing on data processing, and the system terminal is specifically a storage cloud platform mainly focusing on data storage;

[0032] An intelligent gateway is connected between the cloud platform, the system terminal and the personal module, and the intelligent gateway is used to connect the cloud platform, the system terminal and the personal module for data exchange and transmission, and to control the connection between the cloud platform and the system terminal. On and off of the connection;

[0033] The personal module is used to log into the cloud platform, and is configured with login authentication, including ID verification, fingerprint verification and face verification, and sends data requests and transmits data instructions to the cloud platform;

[0034] The system terminal includes a storage...

Embodiment 3

[0039] On the basis of Embodiment 1, the system terminal is also connected with a protection key, and the protection key is used to encrypt the entire system terminal. The encrypted key is multi-segment, and the specific number is the number of the personal modules. The key is uniformly input by the holder of the personal module, and the protection key is used for security verification of data modification in the storage unit;

[0040] When the data in the storage unit is modified, the protection key needs to be verified, and the protection key is uniformly generated for all personal modules in the system, which is different from the randomly generated key when downloading. It remains unchanged before the system is modified;

[0041] When modifying data, all personal modules in the system need to be online at the same time, and the keys of all personal modules must be obtained. After the cloud platform obtains all the keys, it will summarize the keys according to the order of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a teaching information security protection system based on a cloud platform, specifically relates to the technical field of teaching information security systems, including a cloud platform, a system terminal and a plurality of personal modules; the cloud platform is connected to the system terminal and the personal modules There is an intelligent gateway, which is used to connect the cloud platform and the system terminal with the personal module for data exchange and transmission, and to control the connection between the cloud platform and the system terminal; the personal module is used to log into the cloud platform, and configured with login authentication, including ID verification, fingerprint verification and face verification. The present invention sets a limited range for the normal operation of the system, and when the third party proves that the number of units is insufficient, corresponding data operations cannot be performed, thereby improving the security of data in the system.

Description

technical field [0001] The invention relates to the technical field of teaching information security systems, and more specifically, the invention relates to a teaching information security protection system based on a cloud platform. Background technique [0002] Network security refers to the normal operation of the network system by adopting various technical and management measures, so as to ensure the availability, integrity and confidentiality of network data. The exact meaning of cybersecurity changes with the "perspective". For example: From the perspective of users (individuals, enterprises, etc.), they hope that information related to personal privacy or commercial interests will be protected by confidentiality, integrity and authenticity when transmitted on the network. [0003] Cloud platform refers to services based on hardware resources and software resources, providing computing, network and storage capabilities. Today's education industry is increasingly bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/10G09B5/02
CPCH04L63/0876H04L63/0861H04L63/10H04L63/065H04L63/0464H04L67/10G09B5/02
Inventor 周伟孙肇博陈立
Owner HANGZHOU YUNTI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products