Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Data Security Monitoring System

A monitoring system and data security technology, applied in the field of network security, can solve the problems of accessible IP addresses and user name restrictions, and achieve the effect of ensuring data security

Inactive Publication Date: 2018-12-28
安徽云图信息技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system has the characteristics of intelligence, reliability, and convenient operation. Through real-time dynamic authorization management of foreign visitors in the office building, strict monitoring and related data records of foreign visitors entering and leaving the office building are realized, ensuring the normal work and personal safety of the office building staff. , property security, but the system does not restrict access to IP addresses and user names

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Security Monitoring System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] Such as figure 1 As shown, a data security monitoring system includes a data storage center, an access terminal, a protection center and a display terminal, the data storage center is used to store important data files; the protection center includes a protection database and an authentication terminal for The data storage center is protected to prevent illegal access from reading and writing data; the access terminal includes a request sending end for sending access request instructions during access; the display terminal is used for displaying data and interface frames.

[0018] It is worth noting that the protection database is used to store the IP range of the visitors and the username of the visitors, and the IP range of the visitors includes the red IP list and the black IP list.

[0019] In addition, the authentication terminal includes an IP verifier and an identity card issuing end, the IP verifying end is used to verify whether the visitor's IP meets the IP re...

Embodiment 2

[0021] Such as figure 1 As shown, a data security monitoring system includes a data storage center, an access terminal, a protection center and a display terminal, the data storage center is used to store important data files; the protection center includes a protection database and an authentication terminal for The data storage center is protected to prevent illegal access from reading and writing data; the access terminal includes a request sending end for sending access request instructions during access; the display terminal is used for displaying data and interface frames.

[0022] It is worth noting that the protection database is used to store the IP range of the visitors and the username of the visitors, and the IP range of the visitors includes the red IP list and the black IP list.

[0023] In this embodiment, the authentication terminal includes an IP verifier and an identity card issuer, the IP verifier is used to verify whether the visitor's IP meets the IP requi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security monitoring system, which relates to the network security field, comprising a data storage center, an access terminal, a protection center and a display terminal. The data storage center is used for storing important data files. The protection center comprises a protection database and an authentication terminal, which are used for protecting the data storagecenter from illegal access to read and write data; the access terminal comprises a request sending end for issuing an access request instruction when accessing; the display terminal is used for displaying data and interface frame. The data security monitoring system effectively monitors the database through the protection center and effectively prevents strangers from illegally accessing the database through the restriction of the IP address, thereby ensuring the data security in the database.

Description

technical field [0001] The invention relates to the field of network security, in particular to a data security monitoring system. Background technique: [0002] Network security is a hot topic nowadays. In today's era when the network is so developed, everyone cannot work without the network. While the network brings convenience to people, it also brings danger to people. Some lawbreakers The theft and sale of data through the network often brings huge losses to some enterprises. Therefore, in order to ensure the security of the database, a monitoring system is needed to protect the database. [0003] For example, the application number is CN201711047168.8, which discloses a cloud platform-oriented data security monitoring method and system; in the system, the network monitoring module is used to collect monitoring data at all levels of the cloud platform system and store them persistently in the knowledge base; The analysis module is used to analyze and store the data inp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/10
Inventor 郑美惠
Owner 安徽云图信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products