Unlock instant, AI-driven research and patent intelligence for your innovation.

Data security access system

A technology for accessing the system and data security. It is applied in the field of data security and can solve problems such as frequent occurrence of system loopholes and inability to detect abnormal data in time.

Active Publication Date: 2019-06-07
BEIJING GUOWANG FUDA SCI & TECH DEV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the untimely maintenance of the backend server of the manufacturer, system vulnerabilities frequently occur, and abnormal data cannot be found in time, which brings certain security risks to the safe operation of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security access system
  • Data security access system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] In view of the fact that the existing data access methods cannot detect abnormal data and system loopholes in time, which brings certain security risks to the safe operation of the system, the embodiment of the present invention provides a data security access system to detect abnormal data in time and solve the problem of System vulnerabilities. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data security access system. The data security access system comprises a plurality of monitoring devices, intelligent electronic equipment and a security access server. Each monitored device is connected with a plurality of monitoring devices, and the monitoring devices are used for obtaining various real-time data from the monitored devices, Packaging the real-time data conforming to a preset security rule, and obtaining and uploading various real-time data messages to the intelligent electronic equipment; The intelligent electronic equipment is connected with the plurality of monitoring devices and is used for receiving the plurality of real-time data messages and uploading the plurality of real-time data messages to the security access server; The security access server is connected with the intelligent electronic equipment and is used for receiving various real-time data messages, and performing unpacking processing on the various real-time data messages toobtain various real-time data according to various preset model files corresponding to the various real-time data messages; When one kind of real-time data is not in the preset range, the data abnormity alarm data is output, the abnormal data can be found in time, and the system vulnerability is solved.

Description

technical field [0001] The present invention relates to the field of data security, in particular to a data security access system. Background technique [0002] At present, the existing data access method is: the data obtained by the manufacturer's monitoring device is uploaded to the manufacturer's background server through the protocol converter, and each manufacturer's background server pushes the above data to the upper system. Due to the untimely maintenance of the backend server of the manufacturer, system vulnerabilities frequently occur, and abnormal data cannot be found in time, which brings certain security risks to the safe operation of the system. Contents of the invention [0003] The main purpose of the embodiments of the present invention is to provide a data security access system to discover abnormal data in time and solve system loopholes. [0004] In order to achieve the above purpose, an embodiment of the present invention provides a data security acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/26
Inventor 何卫锋张培红何红太李红旗杜学月何宁辉张涛周秀萍韩旭王方
Owner BEIJING GUOWANG FUDA SCI & TECH DEV