Computer information security monitoring system

An information security and monitoring system technology, applied in computing, hardware monitoring, instruments, etc., can solve problems such as potential safety hazards, achieve the effects of reducing necessity, ensuring reliability, and preventing illegal personnel from evading authentication and identification

Pending Publication Date: 2021-07-23
上海有大信息科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In actual use, the security monitoring of computer networks is mainly through software monitoring and manual monitoring. Although software monitoring is efficient, it can only handle some simple monitoring tasks. Manual monitoring requires monitoring personnel to check the status information sent by the network server in real time to judge Whether there is a security risk, and it is actually impossible for the monitoring personnel to stay at a fixed work place all the time, resulting in the network server running in an unmanaged state, which poses a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security monitoring system
  • Computer information security monitoring system
  • Computer information security monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] Such as Figure 1 to Figure 6 As shown, the present invention discloses a computer information security monitoring system, adopting a technical solution comprising a monitoring module 1, a computer 2, a power supply module 10, a display module 13, and an identity authentication module, the monitoring module 1 and the computer 2. The power supply module 10, the display module 13, and the identity authentication module are electrically connected, and the monitoring module 1 is provided with a safety monitoring unit, an operation monitoring unit, a log storage unit, and an alarm unit, which can monitor the The computer 2 carries out overall monitoring, and saves the monitoring log, is convenient to find the cause when a problem occurs, and also performs an alarm operation for abnormal operation, which improves the safety of the entire system. The stability of the system operation in the case of a mains power failure, the identity authentication module also includes a finge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security monitoring system, which comprises a monitoring module, a computer, a power supply module, a display module and an identity authentication module, and the invention is characterized in that all-weather monitoring is carried out on the computer by arranging the monitoring module, the omnibearing monitoring of the computer is ensured, and personnel can be verified through a portrait recognition unit; the fingerprint identification unit is combined with the USB interface, so that information on a computer can be prevented from being copied and copied by randomly using USB storage equipment; the computer is prevented from being used by unauthorized personnel by setting multiple identity identification modes, and all related authentication and identification information can be stored in the log storage unit; the alarm unit can give an alarm for violent damage or non-standard authentication and recognition behaviors and transmit the alarm to security personnel, and the power supply module can ensure the operation reliability of the system, so that monitoring interruption caused by power failure is avoided.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a computer information security monitoring system. Background technique [0002] A computer, commonly known as a computer, is an electronic computing machine used for high-speed calculations. It can perform numerical calculations, logic calculations, and storage and memory functions. It is a modern intelligent electronic device that can run according to programs and process massive amounts of data automatically and at high speed. , consists of hardware system and software system. A computer without any software installed is called bare metal. Computers can be divided into five categories: supercomputers, industrial control computers, network computers, personal computers, and embedded computers. More advanced computers include biological computers. , photonic computers, quantum computers, etc. [0003] A computer network is a collection of computer systems ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F11/32G06F21/32G06F21/46
CPCG06F11/3055G06F11/327G06F21/32G06F21/46
Inventor 李红云
Owner 上海有大信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products