Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A control method of an information processing device

A technology of an information processing device and a control method, which is applied in the field of information security, can solve problems such as the inability of users to process abnormal data in a targeted manner, and achieve the effect of preventing abnormal deletion

Active Publication Date: 2021-07-02
赵东升
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing information processing method is to scan and process the data, and then delete the abnormal data directly. This processing method has the phenomenon of accidental deletion due to system failure. When the data is deleted, the user cannot follow up the same abnormal data. make targeted treatment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A control method of an information processing device
  • A control method of an information processing device
  • A control method of an information processing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] see figure 1 , in Embodiment 1 of the present invention, an information processing device includes a data temporary storage module for temporarily storing data.

[0029] The scanning module is configured to scan the data in the temporary data storage module, and deliver the scanning result to the processor.

[0030] The processor is used for receiving signals sent by each module, and issuing instructions according to the signals of each module.

[0031] The isolation module is used to save part of the suspicious data in the data temporary storage module, so as to facilitate the analysis of the data in the later stage; the isolation module also includes a firewall, and the firewall is set to facilitate the isolation of the data.

[0032] Setting up the isolation module facilitates the processing of abnormal data in the later stage, prevents abnormal deletion caused by system problems, and facilitates targeted measures for the abnormal data in the later stage.

[0033] ...

Embodiment 2

[0040] see figure 2 , in Embodiment 2 of the present invention, an information processing device includes a data temporary storage module for temporarily storing data;

[0041] A scanning module, configured to scan the data in the data temporary storage module, and pass the scanning result to the processor;

[0042] The scanning module also includes a virus update unit, which is convenient for virus update and ensures safe processing of data.

[0043] The processor is used for receiving the signals sent by each module, and issuing instructions according to the signals of each module;

[0044] The isolation module is used to save part of the suspicious data in the data temporary storage module, so as to facilitate the analysis of the data in the later stage; the isolation module also includes a firewall, and the firewall is set to facilitate the isolation of the data.

[0045] Setting up the isolation module facilitates the processing of abnormal data in the later stage, pre...

Embodiment 3

[0053] see image 3 , in Embodiment 3 of the present invention, an information processing device includes a data temporary storage module for temporarily storing data;

[0054] A scanning module, configured to scan the data in the data temporary storage module, and pass the scanning result to the processor;

[0055] The scanning module also includes a virus update unit, which is convenient for virus update and ensures safe processing of data.

[0056] The processor is used for receiving the signals sent by each module, and issuing instructions according to the signals of each module;

[0057] The isolation module is used to save part of the suspicious data in the data temporary storage module, so as to facilitate the analysis of the data in the later stage; the isolation module also includes a firewall, and the firewall is set to facilitate the isolation of the data.

[0058] Setting up the isolation module facilitates the processing of abnormal data in the later stage, prev...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a control method of an information processing device, which relates to the technical field of information security; it comprises the following steps: 1) a data temporary storage module temporarily stores data and sends a signal to a processor; 2) the processor according to the received signal , send the scanning instruction to the scanning module, scan the data in the data temporary storage module after the scanning module receives the instruction, and send the signal to the processor; 3) If the processor receives the normal signal, send the instruction to the storage module, the storage module Store the data of the data temporary storage module; if the processor receives an abnormal signal, the processor sends instructions to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from causing damage to other data; the alarm module According to the signal, the alarm signal is sent to the designated user. The invention not only ensures the safety of data, but also facilitates targeted processing of abnormal data.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a control method of an information processing device. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms, and even security systems, such as UniNAC, DLP, etc. As long as there are security holes, they can threaten the overall security. Information security means that infor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W12/06
Inventor 赵东升马艺恺王芳赵晓萌范洪丽李嵇刘子轩
Owner 赵东升
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products