Computer network safety control method

A computer network and security control technology, applied in data exchange networks, hardware monitoring, digital transmission systems, etc., can solve the problems of inability to warn and block, low security, inconvenient use, etc., to improve monitoring efficiency, shorten length, The effect of reducing the amount of data transferred

Inactive Publication Date: 2017-11-24
SUZHOU SICHUANGYUANBO ELECTRONICS TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing computer network information security control devices have problems such as insufficient functions, inconvenient use, low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network safety control method
  • Computer network safety control method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0052] figure 1 It is a block diagram showing a computer network security control system of the present invention. The monitoring system includes multiple computer monitoring terminals 1 and monitoring servers 2.

[0053] Wherein, the computer monitoring terminal 1 includes: a data acquisition module 11 for acquiring the operating data of the monitored network computer; a conversion module 12 for converting the acquired computer operating data into numbers according to a preset strategy to obtain the data to be encrypted; The terminal encryption / decryption module 13 is used to encrypt the data to be encrypted according to a preset encryption algorithm to obtain encrypted data, which can also be used to encrypt request information; the terminal control module 14 is connected to the data acquisition module 11 and the conversion module 12 And the terminal encryption / decryption module 13 is used to control the various modules of the computer monitoring terminal, and store encrypted ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a computer network safety control method; in network safety control, the method can set a computer monitoring terminal, and sends a monitoring request to a monitoring server; the monitoring server verifies the request information so as to determine whether to have the request information processing authority or not, thus preventing a computer outside a computer network from having data exchange with the monitoring server; the request information is encrypted by the computer monitoring terminal; if the monitoring server cannot decrypt the request information, the request information is considered to come from a place outside the computer network, thus safely and simply discriminating the computer; the method also converts the data obtained from a computer with authority into digits according to a preset strategy, and uses a preset encryption algorithm to encrypt the digits, thus providing the digits to the server, and allowing the server to determine the operation conditions of a monitored network computer according to the encryption data.

Description

technical field [0001] The invention relates to the field of computer monitoring, in particular to a computer network security control method. Background technique [0002] Computer network security refers to the use of network management control and technical measures to ensure that the confidentiality, integrity and usability of data are protected in a network environment. Computer network security includes two aspects, namely physical security and logical security. Physical security refers to the physical protection of system equipment and related facilities from damage and loss. Logical security includes the integrity, confidentiality and availability of information. [0003] With the rapid development of Internet technology, users can access the Internet at any time, which brings great convenience to users, but also increases the risk of sensitive data leakage. In order to understand the status of network computers in a timely manner and provide better network servic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26G06F11/30
CPCH04L63/08G06F11/30H04L43/00H04L63/0428
Inventor 不公告发明人
Owner SUZHOU SICHUANGYUANBO ELECTRONICS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products