Teaching information safety protection system based on cloud platform

An information security and protection system technology, applied in the field of teaching information security protection system based on cloud platform, can solve the problems of malicious data theft, intentional leakage, and insufficient security of teaching information storage, so as to improve security and prevent malicious data The effect of stealing and not easily leaking information

Active Publication Date: 2020-07-28
HANGZHOU YUNTI TECH CO LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of development, users are accustomed to storing some important teaching information on the cloud platform, but due to the limitations of the cloud platform itself, the storage of teaching information is not safe enough, because users who enter the cloud platform for data download cannot be downloaded. More effective identity verification and operation restrictions, prone to malicious theft of data and intentional disclosure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Teaching information safety protection system based on cloud platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Such as figure 1 A teaching information security protection system based on a cloud platform is shown, including a cloud platform, a system terminal and multiple personal modules;

[0020] An intelligent gateway is connected between the cloud platform, the system terminal and the personal module, and the intelligent gateway is used to connect the cloud platform, the system terminal and the personal module for data exchange and transmission, and to control the connection between the cloud platform and the system terminal. On and off of the connection;

[0021] The personal module is used to log into the cloud platform, and is configured with login authentication, including ID verification, fingerprint verification and face verification, and sends data requests and transmits data instructions to the cloud platform;

[0022] The system terminal includes a storage unit and a protection unit, the storage unit is used to store teaching information in the system, the protecti...

Embodiment 2

[0031] Including a cloud platform, a system terminal, a plurality of personal modules and a recording module, the cloud platform is specifically a computing cloud platform focusing on data processing, and the system terminal is specifically a storage cloud platform mainly focusing on data storage;

[0032] An intelligent gateway is connected between the cloud platform, the system terminal and the personal module, and the intelligent gateway is used to connect the cloud platform, the system terminal and the personal module for data exchange and transmission, and to control the connection between the cloud platform and the system terminal. On and off of the connection;

[0033] The personal module is used to log into the cloud platform, and is configured with login authentication, including ID verification, fingerprint verification and face verification, and sends data requests and transmits data instructions to the cloud platform;

[0034] The system terminal includes a storage...

Embodiment 3

[0039] On the basis of Embodiment 1, the system terminal is also connected with a protection key, and the protection key is used to encrypt the entire system terminal. The encrypted key is multi-segment, and the specific number is the number of the personal modules. The key is uniformly input by the holder of the personal module, and the protection key is used for security verification of data modification in the storage unit;

[0040] When the data in the storage unit is modified, the protection key needs to be verified, and the protection key is uniformly generated for all personal modules in the system, which is different from the randomly generated key when downloading. It remains unchanged before the system is modified;

[0041] When modifying data, all personal modules in the system need to be online at the same time, and the keys of all personal modules must be obtained. After the cloud platform obtains all the keys, it will summarize the keys according to the order of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a teaching information safety protection system based on a cloud platform, and particularly relates to the technical field of teaching information safety systems, which comprises a cloud platform, a system terminal and a plurality of personal modules. An intelligent gateway is connected between the cloud platform and the system terminal as well as the personal module, and the intelligent gateway is used for connecting the cloud platform and the system terminal with the personal module, carrying out data exchange and transmission and controlling connection and disconnection between the cloud platform and the system terminal; and each personal module is used for logging in the cloud platform and is configured with login identity verification including ID verification,fingerprint verification and face verification. A limited range is set for normal operation of the system. When a third party proves that the number of units is insufficient, corresponding data operation cannot be performed, so that the security of data in the system is improved.

Description

technical field [0001] The invention relates to the technical field of teaching information security systems, and more specifically, the invention relates to a teaching information security protection system based on a cloud platform. Background technique [0002] Network security refers to the normal operation of the network system by adopting various technical and management measures, so as to ensure the availability, integrity and confidentiality of network data. The exact meaning of cybersecurity changes with the "perspective". For example: From the perspective of users (individuals, enterprises, etc.), they hope that information related to personal privacy or commercial interests will be protected by confidentiality, integrity and authenticity when transmitted on the network. [0003] Cloud platform refers to services based on hardware resources and software resources, providing computing, network and storage capabilities. Today's education industry is increasingly bi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G09B5/02
CPCH04L63/0876H04L63/0861H04L63/10H04L63/065H04L63/0464H04L67/10G09B5/02
Inventor 周伟孙肇博陈立
Owner HANGZHOU YUNTI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products