Computer information security management system

A management system and information security technology, applied in the field of computer information security management system, can solve problems such as poor computer information network security, and achieve the effects of preventing intranet information leakage, improving security, and strengthening network security protection control

Inactive Publication Date: 2017-05-10
郑州理工职业学院
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a computer information security management system to solve the problem of poor computer information network security in the above-mentioned background technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer information security management system
  • Computer information security management system
  • Computer information security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0020] see Figure 1-6 , the present invention provides a technical solution: a computer information security management system, including an administrator control terminal 1 and a computer terminal 2, the administrator control terminal 1 and the computer terminal 2 are both electrically output and connected to an identity authentication unit 3, so The electrical output of the identity authentication unit 3 is connected to the master control center 4, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer information security management system in the network security technology field. The system comprises a manager control terminal and a computer terminal. The manager control terminal and the computer terminal are both in electrical output connection with an identity authentication unit. An omnibearing technical means is adopted, a host monitors a core, and a monitoring engine automatically adjusts the sampling frequency of information and priority levels of threads of the engine itself according to changes of utilization of host system resources. In this way, a control center is prevented from losing response to users, behaviors of private network users can be unified, and network security protection and control can be enhanced. Distributed multi-point monitoring and centralized management prevents private network information from leaking, and computer networks and user behaviors are comprehensively monitored and checked in terms of monitoring terminal illegal external link, equipment network access management or the like. Therefore, trusted access of computer networks is achieved, and security of computer information is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a computer information security management system. Background technique [0002] The wide application of computers and networks has brought great convenience to people's life and work. Enterprises, institutions and all walks of life have adopted a large number of computers, making the degree of informatization higher and higher, and bringing convenience to production and management. . In many economically developed areas, computers and networks are necessary tools, widely used and extended. Computer information is an important resource for enterprises and institutions. Security has brought great hidden dangers. The intrusion of hackers and viruses on the network has brought great trouble to the computer network of enterprises and institutions. The information security of computers has gradually become an important factor restricting the development of enterprises. For t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F11/30
CPCH04L63/02G06F11/3006G06F2201/875H04L63/08H04L63/14
Inventor 郑海龙徐磊
Owner 郑州理工职业学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products