Data security monitoring system

A monitoring system and data security technology, applied in the field of network security, can solve problems such as restrictions on accessible IP addresses and user names, and achieve the effects of avoiding adverse effects, ensuring running speed, and avoiding occupation

Inactive Publication Date: 2020-11-03
李垚俊
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system has the characteristics of intelligence, reliability, and convenient operation. Through real-time dynamic authorization management of foreign visitors in the office building, strict monitoring and related data records of foreign visitors entering and leaving the office building are realized, ensuring the normal work and personal safety of the office building staff. , property security, but the system does not restrict access to IP addresses and user names

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security monitoring system
  • Data security monitoring system
  • Data security monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be further described below in conjunction with specific inventions.

[0052] Such as figure 1 As shown, the data security monitoring system of the present application includes an acquisition module, a storage module, a monitoring module, a processing module, an encryption module and a central control module.

[0053] Such as figure 2 As shown, the acquisition module is used to collect the basic data from the server; the data acquisition module includes: a channel selection unit, which is used to divide the input analog signal into two channels of signals. The first and second conditioning circuits connected to the output terminals of the unit, the output terminals of the first and second conditioning circuits are connected to the input terminals of the AD unit. The connection relationship between the acquisition module and other modules is as follows: the acquisition module is connected to the storage module through a first-level gateway, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data security monitoring system, and relates to the technical field of network security. The system comprises an acquisition module used for acquiring basic data from a server; a storage module which is used for storing the basic data from the acquisition module; a monitoring module which is used for establishing a data monitoring rule and judging potential risks according to the rule; a processing module which is used for processing a judgment result of the monitoring module and feeding back the judgment result to the central control module; an encryption module which is used for encrypting basic data from a server; a central control module which is used for controlling the acquisition module, the storage module, the monitoring module, the processing module and the encryption module, wherein the central control module is connected with the acquisition module, the storage module, the monitoring module, the processing module and the encryption module. Data of the server is effectively monitored through the monitoring module, and the IP address can be effectively limited through the processing module, so strangers are prevented from illegally intruding intoa database of the server to access.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data security monitoring system. Background technique [0002] With the large-scale popularization of telecommuting in all walks of life, more and more users need to be able to use any terminal computer to access business servers that could only be accessed in the office intranet anytime, anywhere. When accessing business data stored in business servers remotely (through various VPN technologies), users have two typical needs: on the one hand, users have the need to store data for subsequent use; on the other hand, users also have to prevent data leaked requirements. Therefore, it is urgent to design a monitoring system suitable for the field of data security. [0003] For example, the application number is CN201711047168.8, which discloses a cloud platform-oriented data security monitoring method and system; in the system, the network monitoring module is used to co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L29/08
CPCH04L63/1408H04L63/1425H04L9/0643H04L63/0428H04L63/0236H04L67/10
Inventor 李垚俊
Owner 李垚俊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products