Information security system based on cloud computing

An information security system and cloud computing technology, applied in the field of cloud computing-based information security systems, can solve the problems of increasing data storage security, lack of data collection and storage data analysis, etc., to save time consumed, increase persuasion, and improve The effect of work efficiency

Inactive Publication Date: 2021-02-09
智粤云(广州)数字信息科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the existing information security relationship is to increase the security of the data by performing some encryption operations on the data. However, there is no data analysis on the collection and storage of the data, thereby increasing the security of the data storage, and when the data query security, for this reason, we propose a cloud computing-based information security system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security system based on cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0042] see figure 1 As shown, the present invention is an information security system based on cloud computing, including a data input module, a processor, an information analysis module, an information storage module, a data query module and a registration module;

[0043] The data input module is used for the user to input data information and the category of the data information through the intelligent terminal and send it to the information analysis module thro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security system based on cloud computing. The information security system comprises a data input module, a processor, an information analysis module, an information storage module, a data query module, a database and a registration and login module, and the data input module is used for inputting data information and the category of the data information by auser through the intelligent terminal and sending the data information and the category of the data information to the information analysis module through the processor. The data query module is usedfor a user to query data information stored in the information storage module, the registration and login module logs in to query user account information and password information, and performs storage security and storage space data analysis on input and recognized data, so that data accuracy is improved and data persuasion is enhanced. The time consumed by data analysis is saved, and the workingefficiency is improved.

Description

technical field [0001] The invention relates to the technical field of information security management, in particular to an information security system based on cloud computing. Background technique [0002] For network security, it includes two aspects: on the one hand, it includes physical security, which refers to the protection of tangible items such as communications, computer equipment and related facilities in the network system, so that they will not be wet by rain. On the other hand, it also includes what we usually call logical security. Including information integrity, confidentiality and availability, etc. Both physical security and logical security are very important. If any aspect is not protected, network security will be affected. Therefore, reasonable arrangements must be made for security protection while taking these two aspects into consideration. [0003] At present, the existing information security relationship is to increase the security of the data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/71G06F21/31
CPCG06F21/31G06F21/71G06F2221/2141
Inventor 梁亚正
Owner 智粤云(广州)数字信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products