Information safety monitoring system based on big data

An information security and monitoring system technology, applied in the direction of digital transmission system, transmission system, data exchange network, etc., can solve the problems of increasing data information security, difficult text data security monitoring, difficult account password security guarantee, etc., to increase security Effect of monitoring results, increasing safety, avoiding unhealthy effects

Inactive Publication Date: 2020-02-21
GUANGXI UNIVERSITY OF TECHNOLOGY
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an information security monitoring system based on big data. The identification module is used for character data, input time data, key depression data, key force coefficient, actual key depression degree, key standard force coefficient and actual input time. The data is identified and processed to solve the problem that it is difficult to guarantee the security of account password input in the prior art. The information security calculation module is used to calculate the text Wj, the number of occurrences of keyword combinations Cp, the occurrence of keyword combinations Hc and the number of characters Sc performs safe calculation operations to solve the problem that it is difficult to judge the occurrence rate of sensitive words in the prior art. The safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information safety monitoring system based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] see figure 1 As shown, the present invention is an information security monitoring system based on big data, including a data acquisition module, an identification module, a data analysis module, a processor, an information security calculation module, a security judgment module, an alarm unit and an intelligent device;

[0041] The data collection module is used to collect data information, and the data information includes text data and account input data,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information safety monitoring system based on big data. The system comprises a data collection module, an recognition module, a data analysis module, a processor, an information safety calculation module, a safety judgment module, an alarm unit and intelligent equipment, the data collection module is used for acquiring data information; wherein the data information comprises text data and account input data; wherein the account input data comprises input time data, key sinking data and a key strength coefficient; the data collection module transmits the text data, the input time data, the key sinking data and the key strength coefficient to the recognition module; input time data, key sinking data and a key strength coefficient are collected through the data collection module, the operation force of each key and the average input time are calculated according to the input time data, the calculation result and data detected in the detection module are comparedand analyzed again, and therefore the safety of account password input is obtained.

Description

technical field [0001] The invention relates to the technical field of information security monitoring, in particular to an information security monitoring system based on big data. Background technique [0002] Information security mainly includes the following five aspects, that is, the need to ensure the confidentiality, authenticity, integrity, unauthorized copying of information and the security of the parasitic system. Information security itself covers a wide range, including how to prevent the leakage of commercial enterprise secrets, prevent teenagers from browsing bad information, and the leakage of personal information. The information security system in the network environment is the key to ensuring information security, including computer security operating systems, various security protocols, security mechanisms, and even security systems. As long as there are security loopholes, it can threaten the overall security. Information security means that the informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/04H04L43/08H04L63/1408H04L63/205
Inventor 黄镇谨葛祥友王智文阳树洪黄力何柏灵
Owner GUANGXI UNIVERSITY OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products