Network security monitoring equipment

A technology for monitoring equipment and network security, applied in the field of network security to achieve the effect of improving user information

Pending Publication Date: 2020-08-25
DALIAN JIAOTONG UNIVERSITY
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, there are more and more user information leakage incidents. Many people pay attention to network security. How to protect database network security is the focus of research by more and more people. For the existing database network security monitoring equipment There are many loopholes in the monitoring system, so a more secure network security monitoring and processing system is needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security monitoring equipment
  • Network security monitoring equipment
  • Network security monitoring equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the examples.

[0027] The following examples are used to illustrate the present invention, but cannot be used to limit the protection scope of the present invention. The conditions in the embodiment can be further adjusted according to the specific conditions, and the simple improvement of the method of the present invention under the premise of the concept of the present invention belongs to the protection scope of the present invention.

[0028] It should be noted that, in the description of the invention, terms such as "upper", "lower", "left", "right", "inner", "outer" and other indicated directions or positional relationships are based on the terms shown in the accompanying drawings. Orientation or positional relationship, which is only for convenience of description, and does not indicate or imply that the device or element must have a specific orientation, be constructed and operated in a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses network security monitoring equipment, which comprises a database, a terminal data system, a type identification system, a processing system, a power supply system and a display system. The terminal data system comprises a user terminal data module, a data marking module and a data classification module; the type identification system comprises a data type identification module and a user type identification module, and the data type identification module is used for classifying the information in the database according to importance and identifying the type of the database access user by utilizing the user type identification module; the processing system comprises an automatic defense module, an alarm module, an artificial defense module and a hard disk self-destruction module. Wherein the automatic defense module is a first-level defense system of the database, the artificial defense module is a second-level defense system of the database, and the hard disk self-destruction module is a third-level defense system of the database. According to the network security monitoring system, the network security of the data is greatly improved.

Description

technical field [0001] The invention belongs to the field of network security, and in particular relates to a network security monitoring device. Background technique [0002] Network security means that the hardware and software of the network system and the data in the system are protected from being damaged, changed, or leaked due to accidental or malicious reasons, the system runs continuously and reliably, and the network service is not interrupted. From the perspective of network operation and administrators, it is hoped that access to local network information, reading and writing, and other operations are protected and controlled to avoid "trapdoors", viruses, illegal access, denial of service, illegal occupation and illegal control of network resources, etc. Threats, deters and defends against attacks by cyber hackers. For security and confidentiality departments, they hope to filter and prevent illegal, harmful or state secret information to avoid leakage of confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/79G06F16/21G06F16/22
CPCG06F21/554G06F21/79G06F16/21G06F16/2291
Inventor 王洪智
Owner DALIAN JIAOTONG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products