A computer information security management system and method

An information security and management system technology, applied in the direction of platform integrity maintenance, digital data authentication, etc., can solve problems such as low security and lack of more accurate identification of user identities, and achieve the effect of improving security

Pending Publication Date: 2019-05-03
HUANGHE S & T COLLEGE
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] When logging in, the existing computer information security management system often only use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A computer information security management system and method
  • A computer information security management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] see figure 1 In an embodiment of the present invention, a computer information security management system includes a password login module 1, a fingerprint identification module 2, a fingerprint input module 3, an abnormal login monitoring module 4, an alarm module 5, a central processing unit 6, and a biometric identification module 7 , camera module 8, facial recognition module 9, iris recognition module 10, information management module 11, information storage module 12, information transmission module 13, monitoring module 14 and virus killing module 15, the user logs in this system by password login module 1, Log in to the system by entering a preset password. At the same time, a fingerprint identification module 2 is integrated on the password login module 1. Using the fingerprint identification module 2, the fingerprint is identified while entering the password. The fingerprint input module 3 is used to advance Input fingerprints for comparison and identification...

Embodiment 2

[0034] On the basis of Embodiment 1, the computer information security management system also includes a monitoring module 14 and a virus killing module 15, and the monitoring module 14 is used for real-time monitoring of the management process of the information management module 11, and creates a management log, which is convenient for consulting the management log later The virus checking and killing module 15 is used for checking and killing the system to prevent computer viruses from invading the system.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of Internet. More specifically, the invention relates to a computer information security management system and method. The system comprises a password login module, a fingerprint identification module, a fingerprint input module, an abnormal login monitoring module, an alarm module, a central processing unit, a biometric identification module, a cameramodule, a facial recognition module, an iris recognition module, an information management module, an information storage module, an information transmission module, a monitoring module and a virus searching and killing module. According to the invention, the password login module is arranged; combined with the fingerprint identification module, when the user inputs a password, the fingerprint ofthe user is identified to confirm the identity of the user, the safety is greatly improved, the safety is further improved by arranging the biological identification module, dynamically monitoring theuser and identifying the identity of the user, and the virus searching and killing module is independently arranged to search and kill the system, so that the safety is further improved.

Description

technical field [0001] The present invention relates to the field of Internet technology, more specifically, a computer information security management system and method. Background technique [0002] Computer information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying and security of the parasitic system of information. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms (digital signatures, message authentication, data encryption, etc.), and even security systems. [0003] When logging in, the existing computer information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F21/32G06F21/56
Inventor 焦军宁张广富杨亚丽白跃伟
Owner HUANGHE S & T COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products