Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe monitoring and access control method of information system

An information system and security monitoring technology, applied in the field of information security, can solve problems such as high cost, system crash, and low efficiency, and achieve the effect of improving reliability and security

Active Publication Date: 2015-04-08
山东汉鑫科技股份有限公司
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Because of the above-mentioned advantages of distributed computing, how to ensure safe and stable communication and data management among distributed units and with the central unit is becoming more and more critical, and at present, distributed computer systems are often faced with massive node attacks on servers that cause the entire System crash scenario
However, most of the existing distributed computing systems are protected by simple verification and multi-machine backup, which is low in efficiency and high in cost, which is not conducive to the future development of distributed computing systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe monitoring and access control method of information system
  • Safe monitoring and access control method of information system
  • Safe monitoring and access control method of information system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0041] According to an embodiment of the present invention, a method for security monitoring and access control of an information system is proposed, as shown in the attached figure 1As shown, the information system includes a central processing unit, multiple distributed computer clusters (a detailed cluster is shown in the drawing), multiple cluster network connectors, a reliability factor calculator, an interactive data security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a safe monitoring and access control method of an information system; the method comprises the steps: executing safe communication among a plurality of analog machines of a plurality of distributed computer clusters by using a cluster internetwork connector; executing safe verification between the analog machines of the plurality of distributed computer clusters and a central processing unit by using a reliable factor arithmetic unit; performing safety management of interactive data between the distributed computers and the central processing unit by using an interactive data safety management unit; and detecting and preventing high-resource loss attack to a whole distributed system by using a high-resource loss attack prevention unit. Therefore, the reliability and safety of the entire information can be improved greatly.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information system security monitoring and access control method. Background technique [0002] Distributed computing technology is to automatically split the huge computing processing program into countless smaller subroutines through the network, and then send the processing results back to the user after searching, computing and analyzing the huge system composed of multiple servers . Through this technology, network service providers can process tens of millions or even billions of information in a few seconds, and achieve network services with the same powerful performance as "supercomputers". [0003] Because of the above-mentioned advantages of distributed computing, how to ensure safe and stable communication and data management among distributed units and with the central unit is becoming more and more critical, and at present, distributed computer systems are oft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/08
Inventor 唐海龙
Owner 山东汉鑫科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products