A network data protection system

A protection system and network data technology, applied in the field of network security, can solve the problems of easy leakage or tampering of data information, and achieve the effect of intelligent supervision and early warning, less leakage and tampering, and prevention of illegal operations

Active Publication Date: 2021-09-24
江苏政采数据科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned data information is downloaded and stored on the operating computer, but the downloaded data information on the operating computer is easy to leak or be tampered with. How to prevent the downloaded core data from being leaked and tampered has become a technology to be solved in the future. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network data protection system
  • A network data protection system
  • A network data protection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] Such as figure 1As shown, this embodiment provides a network data protection system, including hardware and software, and the hardware includes several clients 1 . Client 1 accesses a biometric device and / or a password device, verifies the identity and position of the person, and authorizes the user to operate. In addition, an identity verification module 31 is also provided in the software system to verify the identity of the user who will log in when no external verification device is connected. In this way, one or more of the three methods can be selected for verification, so as to achieve the integration of people, terminal equipment, positions, and use rights.

[0048] Such as figure 2 As shown, the software is installed on each client 1, and the software includes an information system entrance security management system 4 and a business system 3. Information system entrance security management system 4 receives files from business system 3 .

[0049] Such as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to the technical field of network security, in particular to a network data protection system, including hardware and software, the hardware includes several clients, the software includes an information system entrance security management system and a business system, and the information system entrance security management system receives information from business systems documents; the hardware is connected with an identity verification device or the software is provided with an identity verification module, and the identity verification device or identity verification module controls the startup of the information system entrance security management system and business system; the information system entrance security management system includes a data security area and a cloud The data security area is used to store files downloaded from the business system, and the cloud disk is used to transfer files stored in the data security area. The business system includes an online management module, a query module, an alarm module, a device management module, a security control module and a task push module. The invention has the effect of preventing the downloaded core data from being leaked and tampered with, and has evidence to follow.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network data protection system. Background technique [0002] With the comprehensive and in-depth development of the tax information construction of the local taxation bureau, and the online operation of important systems such as the Golden Tax Phase III, various tax business information systems store a large amount of data, which play an important role in tax management and services. effect. Against the background of the wave of "Internet + taxation" and "big data taxation", data has increasingly become the core of taxation work and technical management. [0003] The Chinese patent with the existing notification number CN107248975A discloses an APT monitoring and defense system based on big data analysis, which includes a data collection layer, an information preprocessing layer, a comprehensive analysis and data storage layer, and a presentation layer; the data coll...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08G06F21/78G06Q40/00
CPCG06F21/78G06Q40/10H04L63/0428H04L63/0853H04L63/0861H04L63/0876H04L67/06H04L67/1097
Inventor 赵亮
Owner 江苏政采数据科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products