Unlock instant, AI-driven research and patent intelligence for your innovation.

Information protection system for network big data

A technology of information protection and protection system, which is applied in the direction of digital data protection, digital data authentication, electronic digital data processing, etc., and can solve problems such as few types of protection, low ability to protect information, and irretrievable accounts

Inactive Publication Date: 2021-01-12
浙江麦远文化科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the deficiencies of the prior art, the present invention provides an information protection system for network big data, which has the advantages of user self-protection, structure level protection, access verification protection, security mark protection and system audit protection, and solves the problem of traditional data There are few types of protection in the information protection system, and only passwords are used to protect the information. When the password of the user account is forgotten, the account is likely to be irretrievable. The protection measures in the information protection system of traditional data are simple, and often only have a separate user self Conservation, the problem of low ability to protect information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection system for network big data
  • Information protection system for network big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0022] see Figure 1-2 , an information protection system for network big data, including a protection system, the protection system 1 includes user self-protection 2, structure level protection 3, access verification protection 4, security mark protection 5 and system audit protection 6, user self-protection 2 includes Binding communication 17, binding communication 2 8 and binding communication 3 9, system audit protection 6 includes 3 wrong passwords 10, 5 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of intelligent accessories, and discloses an information protection system for network big data, which comprises a protection system including user self-protection, structure level protection, access verification protection, security mark protection and system auditing protection. wherein the user self-protection comprises third binding communication, second binding communication and third binding communication; the system auditing protection comprises three times of password mistakes, five times of password mistakes and ten times of password mistakes, the security mark protection comprises frequent login, remote login and conflict login, and the structure level protection comprises high level, medium level and low level; access verification protection comprises password verification, fingerprint verification and face verification, and protection for preventing others from invading information is achieved through user self-protection and access verification protection in direct protection. Through system auditing protection, safety mark protection and structure grade protection in indirect protection, protection for preventing others from stealing information is realized.

Description

technical field [0001] The invention relates to the technical field of information protection, in particular to an information protection system for network big data. Background technique [0002] With the rapid development of science and technology, high-tech products such as computers and mobile phones are gradually appearing in people's daily life. You can know what's happening around the world in real time without leaving your home. [0003] Although high-tech products have many advantages, their disadvantages are also quite terrible. Since it is the information age, the protection of information is particularly important. Traditional data information protection systems have fewer types of protection, and only passwords are available to protect information. When using When the user forgets the password of the account, the account is likely to be irretrievable. The protection measures in the traditional data information protection system are simple, and often only have i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31G06F21/32G06F21/45G06F21/60G06F21/62
CPCG06F21/31G06F21/32G06F21/45G06F21/604G06F21/6218G06F2221/2135
Inventor 陈璐露吕宏程程淑华陆春光余佳波翁梦宁
Owner 浙江麦远文化科技有限公司