Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network data protection system

A protection system and network data technology, which is applied in the field of network security, can solve the problems of easy leakage or tampering of data information, achieve the effect of preventing malicious tampering, expanding the scope of monitoring and alarming, and improving security

Active Publication Date: 2018-12-07
江苏政采数据科技有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned data information is downloaded and stored on the operating computer, but the downloaded data information on the operating computer is easy to leak or be tampered with. How to prevent the downloaded core data from being leaked and tampered has become a technology to be solved in the future. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network data protection system
  • Network data protection system
  • Network data protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] Such as figure 1As shown, this embodiment provides a network data protection system, including hardware and software, and the hardware includes several clients 1 . Client 1 accesses a biometric device and / or a password device, verifies the identity and position of the person, and authorizes the user to operate. In addition, an identity verification module 31 is also provided in the software system to verify the identity of the user who will log in when no external verification device is connected. In this way, one or more of the three methods can be selected for verification, so as to achieve the integration of people, terminal equipment, positions, and use rights.

[0048] Such as figure 2 As shown, the software is installed on each client 1, and the software includes an information system entrance security management system 4 and a business system 3. Information system entrance security management system 4 receives files from business system 3 .

[0049] Such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, in particular to a network data protection system, which comprises hardware and software, wherein the hardware comprises a plurality of clients; the software comprises an information system entrance safety management system and a business system; the information system entrance safety management system receives files from the business system; the hardware is connected to an identity verification device or the software is provided with an identity verification module; the identity verification device or the identity verificationmodule controls the start of the information system entrance safety management system and the business system; the information system entrance safety management system comprises a data safety area anda cloud storage; the data safety area is used for storing the files downloaded from the business system; and the cloud storage is used for transferring the files stored in the data safety area. The business system comprises an on-line management module, a query module, an alarm module, a device management module, a safety control module and a task pushing module. According to the system, an effect of preventing downloaded core data from being leaked and tampered is achieved, and the system is evidence-based.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network data protection system. Background technique [0002] With the comprehensive and in-depth development of the tax information construction of the local taxation bureau, and the online operation of important systems such as the Golden Tax Phase III, various tax business information systems store a large amount of data, which play an important role in tax management and services. effect. Against the background of the wave of "Internet + taxation" and "big data taxation", data has increasingly become the core of taxation work and technical management. [0003] The Chinese patent with the existing notification number CN107248975A discloses an APT monitoring and defense system based on big data analysis, which includes a data collection layer, an information preprocessing layer, a comprehensive analysis and data storage layer, and a presentation layer; the data coll...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08G06F21/78G06Q40/00
CPCG06F21/78G06Q40/10H04L63/0428H04L63/0853H04L63/0861H04L63/0876H04L67/06H04L67/1097
Inventor 赵亮
Owner 江苏政采数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products