Computer network security early warning system

A security early warning system and computer network technology, applied in computer security devices, calculations, instruments, etc., can solve the problems that information security cannot be guaranteed, computers are easy to be illegally started by others, and documents are easy to be illegally tampered or stolen by others. safety effect

Active Publication Date: 2021-01-12
CHONGQING RADIO & TV UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the verification password is known by others, the computer is easily started illegally by others. When the computer is started, the current

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer network security early warning system
  • Computer network security early warning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] Basic as attached figure 1 Shown: computer network security early warning system, including storage module, is used for storing multiple sets of standard password information, and standard password information includes sequence number and password plaintext, and ten sets of standard password information are stored in this embodiment, then the sequence number is set There are ten numerical values, and the ten numerical values ​​of the serial numbers are set to be 0-9 in this embodiment. If the plain text of the password is set to four characters, then a group of standard password information includes five characters, then the standard password information of the first group can be expressed as 0****, and * is any character set.

[0030] The storage module includes an ordinary storage area for storing ordinary files and an encrypted storage area for storing confidential files. The storage module also stores the number of thresholds and the authority allocation table. The ...

Embodiment 2

[0056] The difference with Embodiment 1 is that in this embodiment, when the comparison module fails to compare, the comparison module sends prompt information, and the alarm module prompts according to the prompt information, and the statistical module is also used to count the number of failures of comparison failure; the storage module stores The failure threshold, the comparison module also compares the number of failures and the failure threshold, and when the number of failures is equal to the failure threshold, the comparison module sends an alarm message; when the comparison module sends startup information or alarm information, the statistics module clears the number of failures.

[0057] Considering that when inputting the verification information, wrong verification information may be entered due to manual mistakes, so in this embodiment, when the comparison module fails to compare, the comparison module will first send a prompt message, such as "Verification failed, ...

Embodiment 3

[0061] The difference from Embodiment 1 and Embodiment 2 is that the authority allocation table in this embodiment also includes the operation time limit corresponding to the authority matching code, the authority matching code includes the temporary authority code, and the authority allocation scheme corresponding to the temporary authority code also includes Permission allocation duration; it also includes a timing module. When the comparison module compares the temporary permission code that matches the permission code from the permission distribution table, the timing module starts timing and obtains the operation duration. The comparison module is also used to match the corresponding The duration of authority distribution is compared with the duration of operation, and when it is compared that the duration of operation is equal to the duration of authority, the control module controls the computer to freeze the current access operation.

[0062] Considering that when askin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computer security management, and provides a computer network security early warning system so as to solve the problem of low security of a computer dueto password leakage in the prior art. The system comprises an input module for inputting verification information, a storage module which is used for storing standard password information, sending starting information when comparison succeeds, and sending alarm information when comparison fails, and a control module which is used for controlling the computer to be normally started according to the received starting information, wherein the standard password information comprises a sequence number and a password plaintext; the system further comprises a receiving module which is used for acquiring verification request information of a request terminal, a password selection module which is used for randomly selecting a group of standard password information from the storage module, and a sending module which is used for sending the sequence number of the selected standard password information to the request terminal; the input module inputs verification information according to the sequence number, and the comparison module compares the verification information with the password plaintext of the selected standard password information during comparison.

Description

technical field [0001] The invention relates to the technical field of computer safety management, in particular to a computer network safety early warning system. Background technique [0002] Computer network is also called computer communication network. Computer network security refers to network management control and technical measures to ensure that the confidentiality, integrity and usability of data in computers are protected in a network environment. At present, one means of realizing computer network security is to verify the user's identity before the computer is started. At present, password verification is usually used, that is, before the computer is started, the user is required to enter a verification password. Only then can it be started normally, and the user can operate the computer. Using this authentication method can prevent your computer from being illegally operated by others. [0003] However, sometimes because I am not near the computer and need ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/44G06F21/46G06F21/60
CPCG06F21/44G06F21/46G06F21/604G06F2221/2133G06F2221/2141
Inventor 荆于勤
Owner CHONGQING RADIO & TV UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products