CN112269993A - Method for protecting computer system safety - Google Patents
Method for protecting computer system safety Download PDFInfo
- Publication number
- CN112269993A CN112269993A CN202011204693.8A CN202011204693A CN112269993A CN 112269993 A CN112269993 A CN 112269993A CN 202011204693 A CN202011204693 A CN 202011204693A CN 112269993 A CN112269993 A CN 112269993A
- Authority
- CN
- China
- Prior art keywords
- unit
- output end
- central processing
- electrically connected
- virus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method for protecting the safety of a computer system, which relates to the technical field of monitoring modules, in particular to a method for protecting the safety of a computer system. According to the method for protecting the safety of the computer system, information after virus searching and killing is transmitted and circularly detected through the feedback unit, remote signal transmission and remote signal control are achieved through the wireless communication module, the reverse protection unit can avoid reverse invasion in the virus searching and killing process, and the circuit cutting-off unit can temporarily cut off a transmission route between the central processing unit and the virus.
Description
Technical Field
The invention relates to the technical field of computer protection systems, in particular to a method for protecting the safety of a computer system.
Background
Computer system i.e. computer operating system: is a system software in a computer system, which is a collection of program modules that manage and control software resources in the computer system, properly organize computer workflows to efficiently utilize these resources to provide a powerful, easy-to-use and extensible work environment for users, thereby serving as an interface between the computer and its users, several general-purpose conventional operating systems existing as unix, linux, mac, os/2, GUN, dos, windows, etc., in addition to application-specific operating systems, system protections which are functions to periodically create and save computer system files and related information for settings, system protections which also save previous versions of modified files, which save these files in restore points, which are created before major system events occur.
The traditional computer protection system has the defects that the internal flow is simple, the flow operation in the using process is obviously not comprehensive enough, the virus searching and killing mode is single, the circulating virus searching and killing effect cannot be realized, the data recording effect on the searching and killing process is realized, the use requirements of people cannot be well met, and the like.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for protecting the safety of a computer system, and solves the problems that the prior computer protection system provided in the background art has simpler internal flow, obviously incomplete flow operation in the using process, single virus searching and killing mode, incapability of realizing circulating virus searching and killing effect, realization of data recording effect on the searching and killing process, incapability of well meeting the use requirements of people and the like.
In order to achieve the purpose, the invention is realized by the following technical scheme: a method for protecting the safety of a computer system comprises an identity verification unit and a central processing unit, wherein the output end of the identity verification unit is connected with a virtual system, the output end of the virtual system is connected with the central processing unit, the input end of the central processing unit is connected with a standby power supply, the input end of the standby power supply is connected with a power protection unit, the output end of the central processing unit is connected with an authority authorization unit, the output end of the authority authorization unit is connected with a microprocessor, the output end of the authority authorization unit is connected with a desktop safety module, the output end of the desktop safety module is connected with a buffering and cleaning unit, the output end of the central processing unit is connected with a virus identification unit, the output end of the virus identification unit is connected with a virus searching and killing unit, the output end of the virus searching and killing unit is, and the output of the virus library unit is connected with a feedback unit, the output of the feedback unit is connected with a wireless communication module, the output of the feedback unit is connected with a storage unit, the output of the storage unit is connected with a reverse protection unit, and the output of the reverse protection unit is connected with a circuit cut-off unit.
Optionally, the identity authentication unit, the virtual system and the central processing unit are electrically connected in series through a wire, and the power protection unit, the standby power supply and the central processing unit are electrically connected in series through a wire.
Optionally, the central processing unit is electrically connected with the virus identification unit through a wire, and the central processing unit, the authority authorization unit, the microprocessor and the identity verification unit are sequentially electrically connected in series through wires.
Optionally, the central processing unit, the authority authorization unit, the desktop security module and the buffering and cleaning unit are electrically connected in series through a wire, and the central processing unit, the virus identification unit, the virus killing unit and the feedback unit are electrically connected in series through a wire.
Optionally, the desktop security module includes an application security service, a network address conversion, an external network card and an internal network card, an output end of the application security service is connected with the network security service, an output end of the network security service is connected with the network address conversion, an output end of the network address conversion is connected with the external network card, and an output end of the network address conversion is connected with the internal network card.
Optionally, the application security service, the network security service, and the network address conversion are electrically connected in series through a wire, and the network address conversion is electrically connected in series with the external network card and the internal network card through wires, respectively, and the external network card and the internal network card are electrically connected in parallel through a wire.
Optionally, the virus searching and killing unit, the feedback unit and the wireless communication module are electrically connected in series through a wire, and the feedback unit, the reverse protection unit, the circuit cutting unit and the central processing unit are electrically connected in series through a wire.
Optionally, the wireless communication module includes a signal transmission unit, a monitoring center and a mobile client, an output end of the signal transmission unit is connected to the monitoring center, and an output end of the signal transmission unit is connected to the mobile client.
Optionally, the monitoring center and the mobile client are electrically connected in parallel through a wire, and the signal transmission unit is electrically connected in series with the monitoring center and the mobile client through wires respectively.
The invention provides a method for protecting the safety of a computer system, which has the following beneficial effects: .
1. The method for protecting the safety of the computer system can audit and input the personal identity information of a user by means of the identity verification unit, so that the corresponding coincidence degree of the identity of the user and the system is kept, the virtual system and the central processing unit can realize diversification in the system, the authority authorization unit is utilized to control the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, and the microprocessor can perform secondary serious rechecking function on the identity information, so that the accuracy of the identity information is kept.
2. The method for protecting the computer system safety realizes the basic software safety maintenance function on the computer by the desktop safety module, and realizes the deletion and cleaning function on the computer software residue by the buffer cleaning unit at any time, wherein the computer virus is circularly checked and killed by the virus identification unit and the virus checking and killing unit, and the real-time feedback of the virus processing information is realized by the feedback unit.
3. The method for protecting the safety of the computer system realizes the real-time monitoring effect on all applications of the computer by depending on the application safety service so as to obtain the information feedback of the applications of the computer in the using process, and the network safety service can realize the network monitoring effect while monitoring the applications so as to avoid the invasion of network end viruses, wherein the flexibility of network interface data is kept by utilizing network address conversion, and an external network card and an internal network card are respectively adopted for distinguishing effects.
4. According to the method for protecting the safety of the computer system, information after virus searching and killing is transmitted and circularly detected through the feedback unit, remote signal transmission and remote signal control are achieved through the wireless communication module, the reverse protection unit can avoid reverse invasion in the virus searching and killing process, and the circuit cutting-off unit can temporarily cut off a transmission route between the central processing unit and the virus.
5. The method for protecting the safety of the computer system can realize real-time recording and storage of virus checking and killing data by using the signal transmission unit, thereby providing a use record for the next virus checking and killing, wherein a monitoring center can be used for monitoring the internal integral system of the computer, and a user can also keep remote control through a mobile client.
Drawings
FIG. 1 is a schematic view of the main flow of the present invention;
FIG. 2 is a schematic view of an internal flow of a desktop security module according to the present invention;
fig. 3 is a schematic diagram of an internal flow of a wireless communication module according to the present invention.
In the figure: 1. an identity verification unit; 2. a virtual system; 3. a central processing unit; 4. a standby power supply; 5. a power supply protection unit; 6. an authority authorization unit; 7. a microprocessor; 8. a desktop security module; 801. applying a security service; 802. a network security service; 803. network address translation; 804. an external network card; 805. an intranet card; 9. a buffer cleaning unit; 10. a virus identification unit; 11. a virus searching and killing unit; 12. an intrusion early warning unit; 13. a virus library unit; 14. a feedback unit; 15. a storage unit; 16. a reverse protection unit; 17. a wireless communication module; 1701. a signal transmission unit; 1702. a monitoring center; 1703. a mobile client; 18. a circuit breaking unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1 to 3, the present invention provides a technical solution: a method for protecting the safety of a computer system comprises that the output end of an identity authentication unit 1 is connected with a virtual system 2, the output end of the virtual system 2 is connected with a central processing unit 3, the input end of the central processing unit 3 is connected with a standby power supply 4, the input end of the standby power supply 4 is connected with a power protection unit 5, the output end of the central processing unit 3 is connected with an authority authorization unit 6, the output end of the authority authorization unit 6 is connected with a microprocessor 7, the output end of the authority authorization unit 6 is connected with a desktop safety module 8, the output end of the desktop safety module 8 is connected with a buffer cleaning unit 9, the output end of the central processing unit 3 is connected with a virus identification unit 10, the output end of the virus identification unit 10 is connected with a virus checking and killing unit 11, the output end of the virus checking and killing unit 11 is connected, and the output end of the virus library unit 13 is connected with a feedback unit 14, the output end of the feedback unit 14 is connected with a wireless communication module 17, the output end of the feedback unit 14 is connected with a storage unit 15, the output end of the storage unit 15 is connected with a reverse protection unit 16, and the output end of the reverse protection unit 16 is connected with a circuit cut-off unit 18.
In the invention: the identity authentication unit 1, the virtual system 2 and the central processing unit 3 are electrically connected in series through a lead, and the power protection unit 5, the standby power supply 4 and the central processing unit 3 are electrically connected in series through a lead; the identity authentication unit 1 can be used for auditing and inputting the personal identity information of the user, so that the corresponding matching degree of the user identity and the system is kept, and the virtual system 2 and the central processing unit 3 can realize the diversification in the system.
In the invention: the central processing unit 3 is electrically connected with the virus identification unit 10 through a lead, and the central processing unit 3, the authority authorization unit 6, the microprocessor 7 and the identity verification unit 1 are sequentially and electrically connected in series through leads; the authority authorization unit 6 is used for controlling the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, and the microprocessor 7 can perform secondary serious rechecking function on the identity information, so that the accuracy of the identity information is kept.
In the invention: the central processor 3, the authority authorization unit 6, the desktop security module 8 and the buffering and cleaning unit 9 are electrically connected in series through a wire, and the central processor 3, the virus identification unit 10, the virus checking and killing unit 11 and the feedback unit 14 are electrically connected in series through a wire; the desktop security module 8 is used for realizing basic software security maintenance effect on the computer, and the buffer cleaning unit 9 is used for deleting and cleaning the computer software residues all the time, wherein the virus identification unit 10 and the virus searching and killing unit 11 are used for circularly searching and killing computer viruses, and the feedback unit 14 is used for realizing real-time feedback of virus processing information.
In the invention: the desktop security module 8 comprises an application security service 801, a network security service 802, a network address conversion 803, an external network card 804 and an internal network card 805, wherein the output end of the application security service 801 is connected with the network security service 802, the output end of the network security service 802 is connected with the network address conversion 803, the output end of the network address conversion 803 is connected with the external network card 804, the output end of the network address conversion 803 is connected with the internal network card 805, the application security service 801, the network security service 802 and the network address conversion 803 are electrically connected in series through wires, the network address conversion 803 is respectively electrically connected with the external network card 804 and the internal network card 805 in series through wires, and the external network card 804 and the internal network card 805 are electrically connected in parallel through wires; the application security service 801 is used for realizing real-time monitoring of all applications of the computer, so that information feedback of the applications of the computer in the using process is obtained, the network security service 802 can realize network monitoring while monitoring the applications, and the intrusion of network end viruses is avoided, wherein the flexibility of network interface data is kept by utilizing network address conversion 803, and an external network card 804 and an internal network card 805 are respectively used for distinguishing.
In the invention: the virus checking and killing unit 11, the feedback unit 14 and the wireless communication module 17 are electrically connected in series through a lead, and the feedback unit 14, the reverse protection unit 16, the circuit cutting unit 18 and the central processing unit 3 are electrically connected in series through a lead; the information after virus killing is transmitted and cyclically detected by the feedback unit 14, and remote signal transmission and remote signal control are realized by the wireless communication module 17, wherein the reverse protection unit 16 can avoid reverse invasion in the virus killing process, and the circuit cutting unit 18 can temporarily cut off a transmission route between the central processing unit 3 and the virus.
In the invention: the wireless communication module 17 includes a signal transmission unit 1701, a monitoring center 1702 and a mobile client 1703, wherein the output end of the signal transmission unit 1701 is connected with the monitoring center 1702, the output end of the signal transmission unit 1701 is connected with the mobile client 1703, the monitoring center 1702 and the mobile client 1703 are electrically connected in parallel by a conducting wire, and the signal transmission unit 1701 is electrically connected with the monitoring center 1702 and the mobile client 1703 in series by a conducting wire respectively; the signal transmission unit 1701 can record and store the virus killing data in real time, so as to provide a use record for the next virus killing, wherein the monitoring center 1702 can be used for monitoring the whole system inside the computer, and the user can also keep remote control through the mobile client 1703.
In summary, when the method for protecting the security of the computer system is used, firstly, the personal identity information of the user can be checked and entered by the identity authentication unit 1, so that the corresponding matching degree of the identity of the user and the system is kept, and the virtual system 2 and the central processing unit 3 can realize the diversification of the interior of the system; the authority authorization unit 6 is used for controlling the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, the identity information can be subjected to secondary serious rechecking action through the microprocessor 7, the accuracy of the identity information is kept, the basic software safety maintenance action is realized on the computer by virtue of the desktop safety module 8, the deletion and cleaning action is realized on the computer software residue through the buffer cleaning unit 9 at any time, wherein the computer viruses are circularly checked and killed by virtue of the virus identification unit 10 and the virus checking and killing unit 11, the real-time feedback is realized on the virus processing information by virtue of the feedback unit 14, the real-time monitoring action on all applications of the computer is realized by virtue of the application safety service 801, so that the information feedback of the applications of the computer in the use process is obtained, and the network safety service 802 can realize the network monitoring action while the application monitoring, the intrusion of network end viruses is avoided, wherein the flexibility of network interface data is maintained by utilizing network address conversion 803, wherein an external network card 804 and an internal network card 805 are respectively adopted for distinguishing functions, and virus checking and killing data can be recorded and stored in real time by utilizing a signal transmission unit 1701, so that a use record is provided for the next virus checking and killing, wherein the monitoring center 1702 can be utilized for monitoring the whole internal system of the computer, and a user can also keep remote control through a mobile client 1703.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be able to cover the technical scope of the present invention and the equivalent alternatives or modifications according to the technical solution and the inventive concept of the present invention within the technical scope of the present invention.
Claims (9)
1. A method of securing a computer system comprising an authentication unit (1) and a central processing unit (3), characterized by: the output end of the identity authentication unit (1) is connected with a virtual system (2), the output end of the virtual system (2) is connected with a central processing unit (3), the input end of the central processing unit (3) is connected with a standby power supply (4), the input end of the standby power supply (4) is connected with a power protection unit (5), the output end of the central processing unit (3) is connected with an authority authorization unit (6), the output end of the authority authorization unit (6) is connected with a microprocessor (7), the output end of the authority authorization unit (6) is connected with a desktop security module (8), the output end of the desktop security module (8) is connected with a buffer cleaning unit (9), the output end of the central processing unit (3) is connected with a virus identification unit (10), and the output end of the virus identification unit (10) is connected with a virus checking, the output of unit (11) is killed in virus checking is connected with invasion early warning unit (12), the output of virus identification unit (10) is connected with virus storehouse unit (13), and the output of virus storehouse unit (13) is connected with feedback unit (14), the output of feedback unit (14) is connected with wireless communication module (17), the output of feedback unit (14) is connected with storage unit (15), and the output of storage unit (15) is connected with reverse protection unit (16), the output of reverse protection unit (16) is connected with circuit and cuts off unit (18).
2. A method of securing a computer system according to claim 1, wherein: the identity authentication unit (1), the virtual system (2) and the central processing unit (3) are electrically connected in series through a wire, and the power protection unit (5), the standby power supply (4) and the central processing unit (3) are electrically connected in series through a wire.
3. A method of securing a computer system according to claim 1, wherein: the central processing unit (3) is electrically connected with the virus identification unit (10) through a wire, and the central processing unit (3), the authority authorization unit (6), the microprocessor (7) and the identity verification unit (1) are sequentially and electrically connected in series through wires.
4. A method of securing a computer system according to claim 1, wherein: the central processing unit (3), the authority authorization unit (6), the desktop security module (8) and the buffering and cleaning unit (9) are electrically connected in series through wires, and the central processing unit (3), the virus identification unit (10), the virus checking and killing unit (11) and the feedback unit (14) are electrically connected in series through wires.
5. A method of securing a computer system according to claim 1, wherein: the desktop security module (8) comprises an application security service (801), a network security service (802), a network address conversion (803), an external network card (804) and an internal network card (805), the output end of the application security service (801) is connected with the network security service (802), the output end of the network security service (802) is connected with the network address conversion (803), the output end of the network address conversion (803) is connected with the external network card (804), and the output end of the network address conversion (803) is connected with the internal network card (805).
6. The method of claim 5, wherein the step of securing the computer system comprises: the application security service (801), the network security service (802) and the network address conversion (803) are electrically connected in series through wires, the network address conversion (803) is electrically connected in series with the external network card (804) and the internal network card (805) through wires respectively, and the external network card (804) and the internal network card (805) are electrically connected in parallel through wires.
7. A method of securing a computer system according to claim 1, wherein: the virus checking and killing unit (11), the feedback unit (14) and the wireless communication module (17) are electrically connected in series through conducting wires, and the feedback unit (14), the reverse protection unit (16), the circuit cutting unit (18) and the central processing unit (3) are electrically connected in series through conducting wires.
8. A method of securing a computer system according to claim 1, wherein: the wireless communication module (17) comprises a signal transmission unit (1701), a monitoring center (1702) and a mobile client (1703), wherein the monitoring center (1702) is connected to the output end of the signal transmission unit (1701), and the mobile client (1703) is connected to the output end of the signal transmission unit (1701).
9. The method of claim 8, wherein the step of securing the computer system comprises: the monitoring center (1702) and the mobile client (1703) are electrically connected in parallel through a conducting wire, and the signal transmission unit (1701) is electrically connected with the monitoring center (1702) and the mobile client (1703) in series through conducting wires respectively.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011204693.8A CN112269993A (en) | 2020-11-02 | 2020-11-02 | Method for protecting computer system safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011204693.8A CN112269993A (en) | 2020-11-02 | 2020-11-02 | Method for protecting computer system safety |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112269993A true CN112269993A (en) | 2021-01-26 |
Family
ID=74344738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011204693.8A Pending CN112269993A (en) | 2020-11-02 | 2020-11-02 | Method for protecting computer system safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112269993A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632096A (en) * | 2013-11-29 | 2014-03-12 | 北京奇虎科技有限公司 | Method and device for carrying out safety detection on equipment |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN107944302A (en) * | 2017-11-29 | 2018-04-20 | 滁州市华晨软件科技有限公司 | A kind of security of computer software guard system |
CN109165508A (en) * | 2018-07-25 | 2019-01-08 | 安徽三实信息技术服务有限公司 | A kind of external device access safety control system and its control method |
CN109543388A (en) * | 2018-11-30 | 2019-03-29 | 沈阳师范大学 | A kind of computer system to ensure information security |
CN110321704A (en) * | 2019-07-08 | 2019-10-11 | 温州中壹技术研究院有限公司 | A kind of computer information safe stocking system |
-
2020
- 2020-11-02 CN CN202011204693.8A patent/CN112269993A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103632096A (en) * | 2013-11-29 | 2014-03-12 | 北京奇虎科技有限公司 | Method and device for carrying out safety detection on equipment |
CN106603517A (en) * | 2016-12-03 | 2017-04-26 | 新乡学院 | Computer network information security monitoring system |
CN107944302A (en) * | 2017-11-29 | 2018-04-20 | 滁州市华晨软件科技有限公司 | A kind of security of computer software guard system |
CN109165508A (en) * | 2018-07-25 | 2019-01-08 | 安徽三实信息技术服务有限公司 | A kind of external device access safety control system and its control method |
CN109543388A (en) * | 2018-11-30 | 2019-03-29 | 沈阳师范大学 | A kind of computer system to ensure information security |
CN110321704A (en) * | 2019-07-08 | 2019-10-11 | 温州中壹技术研究院有限公司 | A kind of computer information safe stocking system |
Non-Patent Citations (1)
Title |
---|
孙光懿: "网络安全设备在校园网中的应用研究", 《电脑知识与技术》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101605074B (en) | Method and system for monitoring Trojan Horse based on network communication behavior characteristic | |
US10027679B2 (en) | Secondary asynchronous background authorization (SABA) | |
CN105550073A (en) | Database backup method and system thereof | |
CN106503524B (en) | A kind of computer network security guard system | |
CN113497786B (en) | Evidence collection and tracing method, device and storage medium | |
CN110888778A (en) | Cloud desktop-based log file monitoring system and method | |
CN113098980B (en) | Portable safety operation and maintenance system for power monitoring system | |
US8468596B2 (en) | Work support apparatus for information processing device | |
WO2015039562A1 (en) | Method and device for account information processing | |
CN109474510B (en) | Mailbox safety cross audit method, system and storage medium | |
CN112269993A (en) | Method for protecting computer system safety | |
CN113110980B (en) | Method and device for identifying and intercepting brute force cracking behavior | |
CN111147427A (en) | Management system for computer network security | |
CN104284153A (en) | Distribution room safety and synchronous operation monitoring intercom system and operation method thereof | |
CN108933678A (en) | O&M auditing system | |
CN114462038B (en) | Security protection method, device, equipment and computer readable storage medium | |
CN114466035A (en) | Cloud storage system capable of realizing simultaneous operation of multiple user terminals | |
CN115632879B (en) | Log management method, system, electronic device and storage medium | |
CN113656793A (en) | Method and device for monitoring instant messaging program on terminal, storage medium and terminal | |
CN113132379A (en) | Intelligent security system of warehousing system | |
CN112838570A (en) | A relay protection debugging system and debugging method | |
CN107343274A (en) | The processing method of address list information | |
CN115237872A (en) | Log maintenance method, device, equipment and storage medium | |
CN112600686B (en) | Terminal control method, device, computer equipment and computer readable storage medium | |
CN103347061B (en) | Based on the strange land electronic data recovery system of corporate intranet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210126 |
|
RJ01 | Rejection of invention patent application after publication |