Security protection system of a computer information network

An information network and security protection technology, applied in the field of information security, can solve problems such as insufficient storage and hard disk loss in the database, and achieve the effect of ensuring security and preventing data leakage

Inactive Publication Date: 2019-05-14
广州破折号信息科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the development of the network, people rely more and more on the computer information network, which further deepens the demand for computer information network security. The

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection system of a computer information network
  • Security protection system of a computer information network
  • Security protection system of a computer information network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] see figure 1 In Embodiment 1 of the present invention, a security protection system for a computer information network includes a video module, a video analysis module, a password module, a database module, a hard disk self-destruct module, and a processor, the video module is connected to the video analysis module, The video analysis module, password module, hard disk self-destruction module and database module are all connected to the processor.

[0032] The video module is used to record the video of the database module area, and the recorded video data is transmitted to the video analysis module, so as to observe whether there is any suspicious situation near the data module.

[0033] The video analysis module analyzes the video data transmitted by the video module. The result of the analysis is that there is suspicious person active in the database module area, or there is no suspicious person in the data module area, and the database module is in a safe state; and...

Embodiment 2

[0043] see figure 2 The main difference between the second embodiment and the first embodiment is that a security protection system for a computer information network also includes a data scanning module and a power-off module. The data scanning module is connected to the processor; the power-off module is connected between the processor and the database module.

[0044] The data scanning module is used to scan the data in the system and send the scanning result to the processor.

[0045] The power-off module is used to control the power supply of the database module, and the power-off module controls whether the database module is powered off according to the processor signal.

[0046] The power-off module and the hard disk destruction module are powered independently.

[0047] The processor is also used to receive the signal from the data scanning module. If the signal is safe, it will process it. If the signal is dangerous, the processor will send a power-off signal to t...

Embodiment 3

[0049] see image 3 The main difference between the second embodiment and the first embodiment is that a security protection system for a computer information network also includes an encryption module. The encryption module is connected to the processor.

[0050] The encryption module is used to encrypt data.

[0051] The working principle of the present invention is:

[0052] The system sets up a video module and a video analysis module to record the area near the database module to determine whether the database module is safe. The processor controls the hard disk destruction module to destroy the hard disk in the database module according to the signal from the database video analysis module. This setting prevents Data leakage; at the same time, a power-off module is set to prevent data leakage through the network; at the same time, an encryption module is set to further ensure data security.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security protection system of a computer information network, and relates to the technical field of information security. The system comprises a video module, a video analysis module, a database module, a hard disk self-destruction module and a processor, the video module is connected with the video analysis module, and the video analysis module, a password module, the hard disk self-destruction module and the database module are all connected with the processor; The video module is used for recording a video of a database module area and transmitting video data to the video analysis module in a recording manner; The video analysis module is used for analyzing the video data transmitted by the video module, the analysis result is that suspicious persons move in the area of the database module or no suspicious persons exist in the area of the data module, and the database module is in a safe state; The analysis data is sent to the processor; The system preventsa person from removing the hard disk in the database to prevent data leakage.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a security protection system for a computer information network. Background technique [0002] Data information security means that the hardware, software, and data of data information are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system operates continuously and reliably, and information services are not interrupted. It is a comprehensive discipline involving computer science, network technology, communication technology, cryptography technology, information security technology, applied mathematics, number theory, information theory and other disciplines. [0003] With the development of the network, people rely more and more on the computer information network, which further deepens the demand for computer information network security. The existing security protection system generally only considers the risk of dat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06F21/60G06F21/79H04N7/18
Inventor 徐章峰
Owner 广州破折号信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products