Unlock instant, AI-driven research and patent intelligence for your innovation.

A computer information security real-time monitoring system

A real-time monitoring and information security technology, applied in computing, image data processing, instruments, etc., can solve problems such as information leakage, inability to effectively identify user information, and damage to the interests of computer users, so as to improve identification accuracy and ensure computer information security , to reduce the effect of misjudgment

Inactive Publication Date: 2018-12-07
CHANGZHOU UNIV
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, computer information security mainly relies on traditional methods such as setting passwords for computers to protect its contents, or using an electronic signature method called "digital signature" to protect computers by identifying the identity of the signer. This method not only cannot effectively identify user information, but also easily causes information leakage, and the security of computer information cannot be effectively guaranteed, which seriously damages the interests of computer users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer information security real-time monitoring system
  • A computer information security real-time monitoring system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The computer information security real-time monitoring system provided by the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0034] like figure 1 As shown, the computer information security real-time monitoring system provided by the present invention includes a computer processor (1), a computer camera (2), an image processing module (3), a computer hard disk (4), a computer power box (5), a computer memory ( 6), alarm module (7), monitoring module (8) and remote data storage (9);

[0035] Among them, the computer camera (2), the image processing module (3), the computer processor (1), the computer hard disk (4) and the remote data storage (9) are connected sequentially, the computer power supply box (5), the computer memory (6), The alarm module (7) and the monitoring module (8) are respectively connected with the computer processor (1);

[0036] The signal output end of the computer camera (2) is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer information security real-time monitoring system. A computer processor, a computer camera, an image processing module, a computer hard disk, a computer power box, a computer memory, an alarm module, a monitor module and a remote data storage device are utilized to carry out security monitoring of computer information, so computer information security can be guaranteed, and when computer security is threatened, the image information of the person who steals the computer information can be obtained. The image processing module includes an image enhancement unit,an image smoothing unit, an image sharpening unit and a gradation conversion unit. The signal output end of the computer camera is connected with the input end of the image enhancement unit, the output end of the image intensifying unit is connected with the input end of the image smoothing unit, the output end of the image smoothing unit is connected with the input end of the image sharpening unit, the output end of the image sharpening unit is connected with the input end of the gray level conversion unit, and the output end of the gray level conversion unit is connected with the input endof the computer processor.

Description

technical field [0001] The invention relates to the field of information security monitoring, in particular to a computer information security real-time monitoring system. Background technique [0002] Now is the era of rapid development of scientific information, and information must be timely and effective, so information all over the world depends on the network, because the network makes it easier for enterprises to manage and communicate, expands it, and connects people all over the world , when running key businesses on the network, when the business operations of enterprises are increasingly dependent on the network, and when the activities of government departments are becoming increasingly networked, computer network security and correct management become a problem that cannot be ignored. [0003] At present, computer information security mainly relies on traditional methods such as setting passwords for computers to protect its contents, or using an electronic sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/50G06T5/00
CPCG06F21/50G06T5/73G06T5/90G06T5/70
Inventor 朱轮翟羽佳马庆功王峰
Owner CHANGZHOU UNIV