[go: up one dir, main page]

CN112269993A - Method for protecting computer system safety - Google Patents

Method for protecting computer system safety Download PDF

Info

Publication number
CN112269993A
CN112269993A CN202011204693.8A CN202011204693A CN112269993A CN 112269993 A CN112269993 A CN 112269993A CN 202011204693 A CN202011204693 A CN 202011204693A CN 112269993 A CN112269993 A CN 112269993A
Authority
CN
China
Prior art keywords
unit
output end
central processing
electrically connected
virus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011204693.8A
Other languages
Chinese (zh)
Inventor
贾英霞
孙光懿
贾宇龙
李振宇
贾宁
陈伟丽
苗伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shangqiu Economic And Trade School
Original Assignee
Shangqiu Economic And Trade School
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shangqiu Economic And Trade School filed Critical Shangqiu Economic And Trade School
Priority to CN202011204693.8A priority Critical patent/CN112269993A/en
Publication of CN112269993A publication Critical patent/CN112269993A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Virology (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for protecting the safety of a computer system, which relates to the technical field of monitoring modules, in particular to a method for protecting the safety of a computer system. According to the method for protecting the safety of the computer system, information after virus searching and killing is transmitted and circularly detected through the feedback unit, remote signal transmission and remote signal control are achieved through the wireless communication module, the reverse protection unit can avoid reverse invasion in the virus searching and killing process, and the circuit cutting-off unit can temporarily cut off a transmission route between the central processing unit and the virus.

Description

Method for protecting computer system safety
Technical Field
The invention relates to the technical field of computer protection systems, in particular to a method for protecting the safety of a computer system.
Background
Computer system i.e. computer operating system: is a system software in a computer system, which is a collection of program modules that manage and control software resources in the computer system, properly organize computer workflows to efficiently utilize these resources to provide a powerful, easy-to-use and extensible work environment for users, thereby serving as an interface between the computer and its users, several general-purpose conventional operating systems existing as unix, linux, mac, os/2, GUN, dos, windows, etc., in addition to application-specific operating systems, system protections which are functions to periodically create and save computer system files and related information for settings, system protections which also save previous versions of modified files, which save these files in restore points, which are created before major system events occur.
The traditional computer protection system has the defects that the internal flow is simple, the flow operation in the using process is obviously not comprehensive enough, the virus searching and killing mode is single, the circulating virus searching and killing effect cannot be realized, the data recording effect on the searching and killing process is realized, the use requirements of people cannot be well met, and the like.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for protecting the safety of a computer system, and solves the problems that the prior computer protection system provided in the background art has simpler internal flow, obviously incomplete flow operation in the using process, single virus searching and killing mode, incapability of realizing circulating virus searching and killing effect, realization of data recording effect on the searching and killing process, incapability of well meeting the use requirements of people and the like.
In order to achieve the purpose, the invention is realized by the following technical scheme: a method for protecting the safety of a computer system comprises an identity verification unit and a central processing unit, wherein the output end of the identity verification unit is connected with a virtual system, the output end of the virtual system is connected with the central processing unit, the input end of the central processing unit is connected with a standby power supply, the input end of the standby power supply is connected with a power protection unit, the output end of the central processing unit is connected with an authority authorization unit, the output end of the authority authorization unit is connected with a microprocessor, the output end of the authority authorization unit is connected with a desktop safety module, the output end of the desktop safety module is connected with a buffering and cleaning unit, the output end of the central processing unit is connected with a virus identification unit, the output end of the virus identification unit is connected with a virus searching and killing unit, the output end of the virus searching and killing unit is, and the output of the virus library unit is connected with a feedback unit, the output of the feedback unit is connected with a wireless communication module, the output of the feedback unit is connected with a storage unit, the output of the storage unit is connected with a reverse protection unit, and the output of the reverse protection unit is connected with a circuit cut-off unit.
Optionally, the identity authentication unit, the virtual system and the central processing unit are electrically connected in series through a wire, and the power protection unit, the standby power supply and the central processing unit are electrically connected in series through a wire.
Optionally, the central processing unit is electrically connected with the virus identification unit through a wire, and the central processing unit, the authority authorization unit, the microprocessor and the identity verification unit are sequentially electrically connected in series through wires.
Optionally, the central processing unit, the authority authorization unit, the desktop security module and the buffering and cleaning unit are electrically connected in series through a wire, and the central processing unit, the virus identification unit, the virus killing unit and the feedback unit are electrically connected in series through a wire.
Optionally, the desktop security module includes an application security service, a network address conversion, an external network card and an internal network card, an output end of the application security service is connected with the network security service, an output end of the network security service is connected with the network address conversion, an output end of the network address conversion is connected with the external network card, and an output end of the network address conversion is connected with the internal network card.
Optionally, the application security service, the network security service, and the network address conversion are electrically connected in series through a wire, and the network address conversion is electrically connected in series with the external network card and the internal network card through wires, respectively, and the external network card and the internal network card are electrically connected in parallel through a wire.
Optionally, the virus searching and killing unit, the feedback unit and the wireless communication module are electrically connected in series through a wire, and the feedback unit, the reverse protection unit, the circuit cutting unit and the central processing unit are electrically connected in series through a wire.
Optionally, the wireless communication module includes a signal transmission unit, a monitoring center and a mobile client, an output end of the signal transmission unit is connected to the monitoring center, and an output end of the signal transmission unit is connected to the mobile client.
Optionally, the monitoring center and the mobile client are electrically connected in parallel through a wire, and the signal transmission unit is electrically connected in series with the monitoring center and the mobile client through wires respectively.
The invention provides a method for protecting the safety of a computer system, which has the following beneficial effects: .
1. The method for protecting the safety of the computer system can audit and input the personal identity information of a user by means of the identity verification unit, so that the corresponding coincidence degree of the identity of the user and the system is kept, the virtual system and the central processing unit can realize diversification in the system, the authority authorization unit is utilized to control the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, and the microprocessor can perform secondary serious rechecking function on the identity information, so that the accuracy of the identity information is kept.
2. The method for protecting the computer system safety realizes the basic software safety maintenance function on the computer by the desktop safety module, and realizes the deletion and cleaning function on the computer software residue by the buffer cleaning unit at any time, wherein the computer virus is circularly checked and killed by the virus identification unit and the virus checking and killing unit, and the real-time feedback of the virus processing information is realized by the feedback unit.
3. The method for protecting the safety of the computer system realizes the real-time monitoring effect on all applications of the computer by depending on the application safety service so as to obtain the information feedback of the applications of the computer in the using process, and the network safety service can realize the network monitoring effect while monitoring the applications so as to avoid the invasion of network end viruses, wherein the flexibility of network interface data is kept by utilizing network address conversion, and an external network card and an internal network card are respectively adopted for distinguishing effects.
4. According to the method for protecting the safety of the computer system, information after virus searching and killing is transmitted and circularly detected through the feedback unit, remote signal transmission and remote signal control are achieved through the wireless communication module, the reverse protection unit can avoid reverse invasion in the virus searching and killing process, and the circuit cutting-off unit can temporarily cut off a transmission route between the central processing unit and the virus.
5. The method for protecting the safety of the computer system can realize real-time recording and storage of virus checking and killing data by using the signal transmission unit, thereby providing a use record for the next virus checking and killing, wherein a monitoring center can be used for monitoring the internal integral system of the computer, and a user can also keep remote control through a mobile client.
Drawings
FIG. 1 is a schematic view of the main flow of the present invention;
FIG. 2 is a schematic view of an internal flow of a desktop security module according to the present invention;
fig. 3 is a schematic diagram of an internal flow of a wireless communication module according to the present invention.
In the figure: 1. an identity verification unit; 2. a virtual system; 3. a central processing unit; 4. a standby power supply; 5. a power supply protection unit; 6. an authority authorization unit; 7. a microprocessor; 8. a desktop security module; 801. applying a security service; 802. a network security service; 803. network address translation; 804. an external network card; 805. an intranet card; 9. a buffer cleaning unit; 10. a virus identification unit; 11. a virus searching and killing unit; 12. an intrusion early warning unit; 13. a virus library unit; 14. a feedback unit; 15. a storage unit; 16. a reverse protection unit; 17. a wireless communication module; 1701. a signal transmission unit; 1702. a monitoring center; 1703. a mobile client; 18. a circuit breaking unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1 to 3, the present invention provides a technical solution: a method for protecting the safety of a computer system comprises that the output end of an identity authentication unit 1 is connected with a virtual system 2, the output end of the virtual system 2 is connected with a central processing unit 3, the input end of the central processing unit 3 is connected with a standby power supply 4, the input end of the standby power supply 4 is connected with a power protection unit 5, the output end of the central processing unit 3 is connected with an authority authorization unit 6, the output end of the authority authorization unit 6 is connected with a microprocessor 7, the output end of the authority authorization unit 6 is connected with a desktop safety module 8, the output end of the desktop safety module 8 is connected with a buffer cleaning unit 9, the output end of the central processing unit 3 is connected with a virus identification unit 10, the output end of the virus identification unit 10 is connected with a virus checking and killing unit 11, the output end of the virus checking and killing unit 11 is connected, and the output end of the virus library unit 13 is connected with a feedback unit 14, the output end of the feedback unit 14 is connected with a wireless communication module 17, the output end of the feedback unit 14 is connected with a storage unit 15, the output end of the storage unit 15 is connected with a reverse protection unit 16, and the output end of the reverse protection unit 16 is connected with a circuit cut-off unit 18.
In the invention: the identity authentication unit 1, the virtual system 2 and the central processing unit 3 are electrically connected in series through a lead, and the power protection unit 5, the standby power supply 4 and the central processing unit 3 are electrically connected in series through a lead; the identity authentication unit 1 can be used for auditing and inputting the personal identity information of the user, so that the corresponding matching degree of the user identity and the system is kept, and the virtual system 2 and the central processing unit 3 can realize the diversification in the system.
In the invention: the central processing unit 3 is electrically connected with the virus identification unit 10 through a lead, and the central processing unit 3, the authority authorization unit 6, the microprocessor 7 and the identity verification unit 1 are sequentially and electrically connected in series through leads; the authority authorization unit 6 is used for controlling the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, and the microprocessor 7 can perform secondary serious rechecking function on the identity information, so that the accuracy of the identity information is kept.
In the invention: the central processor 3, the authority authorization unit 6, the desktop security module 8 and the buffering and cleaning unit 9 are electrically connected in series through a wire, and the central processor 3, the virus identification unit 10, the virus checking and killing unit 11 and the feedback unit 14 are electrically connected in series through a wire; the desktop security module 8 is used for realizing basic software security maintenance effect on the computer, and the buffer cleaning unit 9 is used for deleting and cleaning the computer software residues all the time, wherein the virus identification unit 10 and the virus searching and killing unit 11 are used for circularly searching and killing computer viruses, and the feedback unit 14 is used for realizing real-time feedback of virus processing information.
In the invention: the desktop security module 8 comprises an application security service 801, a network security service 802, a network address conversion 803, an external network card 804 and an internal network card 805, wherein the output end of the application security service 801 is connected with the network security service 802, the output end of the network security service 802 is connected with the network address conversion 803, the output end of the network address conversion 803 is connected with the external network card 804, the output end of the network address conversion 803 is connected with the internal network card 805, the application security service 801, the network security service 802 and the network address conversion 803 are electrically connected in series through wires, the network address conversion 803 is respectively electrically connected with the external network card 804 and the internal network card 805 in series through wires, and the external network card 804 and the internal network card 805 are electrically connected in parallel through wires; the application security service 801 is used for realizing real-time monitoring of all applications of the computer, so that information feedback of the applications of the computer in the using process is obtained, the network security service 802 can realize network monitoring while monitoring the applications, and the intrusion of network end viruses is avoided, wherein the flexibility of network interface data is kept by utilizing network address conversion 803, and an external network card 804 and an internal network card 805 are respectively used for distinguishing.
In the invention: the virus checking and killing unit 11, the feedback unit 14 and the wireless communication module 17 are electrically connected in series through a lead, and the feedback unit 14, the reverse protection unit 16, the circuit cutting unit 18 and the central processing unit 3 are electrically connected in series through a lead; the information after virus killing is transmitted and cyclically detected by the feedback unit 14, and remote signal transmission and remote signal control are realized by the wireless communication module 17, wherein the reverse protection unit 16 can avoid reverse invasion in the virus killing process, and the circuit cutting unit 18 can temporarily cut off a transmission route between the central processing unit 3 and the virus.
In the invention: the wireless communication module 17 includes a signal transmission unit 1701, a monitoring center 1702 and a mobile client 1703, wherein the output end of the signal transmission unit 1701 is connected with the monitoring center 1702, the output end of the signal transmission unit 1701 is connected with the mobile client 1703, the monitoring center 1702 and the mobile client 1703 are electrically connected in parallel by a conducting wire, and the signal transmission unit 1701 is electrically connected with the monitoring center 1702 and the mobile client 1703 in series by a conducting wire respectively; the signal transmission unit 1701 can record and store the virus killing data in real time, so as to provide a use record for the next virus killing, wherein the monitoring center 1702 can be used for monitoring the whole system inside the computer, and the user can also keep remote control through the mobile client 1703.
In summary, when the method for protecting the security of the computer system is used, firstly, the personal identity information of the user can be checked and entered by the identity authentication unit 1, so that the corresponding matching degree of the identity of the user and the system is kept, and the virtual system 2 and the central processing unit 3 can realize the diversification of the interior of the system; the authority authorization unit 6 is used for controlling the operation of the user after the identity information is judged, the use authority of the computer is kept in a controlled state, the identity information can be subjected to secondary serious rechecking action through the microprocessor 7, the accuracy of the identity information is kept, the basic software safety maintenance action is realized on the computer by virtue of the desktop safety module 8, the deletion and cleaning action is realized on the computer software residue through the buffer cleaning unit 9 at any time, wherein the computer viruses are circularly checked and killed by virtue of the virus identification unit 10 and the virus checking and killing unit 11, the real-time feedback is realized on the virus processing information by virtue of the feedback unit 14, the real-time monitoring action on all applications of the computer is realized by virtue of the application safety service 801, so that the information feedback of the applications of the computer in the use process is obtained, and the network safety service 802 can realize the network monitoring action while the application monitoring, the intrusion of network end viruses is avoided, wherein the flexibility of network interface data is maintained by utilizing network address conversion 803, wherein an external network card 804 and an internal network card 805 are respectively adopted for distinguishing functions, and virus checking and killing data can be recorded and stored in real time by utilizing a signal transmission unit 1701, so that a use record is provided for the next virus checking and killing, wherein the monitoring center 1702 can be utilized for monitoring the whole internal system of the computer, and a user can also keep remote control through a mobile client 1703.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be able to cover the technical scope of the present invention and the equivalent alternatives or modifications according to the technical solution and the inventive concept of the present invention within the technical scope of the present invention.

Claims (9)

1. A method of securing a computer system comprising an authentication unit (1) and a central processing unit (3), characterized by: the output end of the identity authentication unit (1) is connected with a virtual system (2), the output end of the virtual system (2) is connected with a central processing unit (3), the input end of the central processing unit (3) is connected with a standby power supply (4), the input end of the standby power supply (4) is connected with a power protection unit (5), the output end of the central processing unit (3) is connected with an authority authorization unit (6), the output end of the authority authorization unit (6) is connected with a microprocessor (7), the output end of the authority authorization unit (6) is connected with a desktop security module (8), the output end of the desktop security module (8) is connected with a buffer cleaning unit (9), the output end of the central processing unit (3) is connected with a virus identification unit (10), and the output end of the virus identification unit (10) is connected with a virus checking, the output of unit (11) is killed in virus checking is connected with invasion early warning unit (12), the output of virus identification unit (10) is connected with virus storehouse unit (13), and the output of virus storehouse unit (13) is connected with feedback unit (14), the output of feedback unit (14) is connected with wireless communication module (17), the output of feedback unit (14) is connected with storage unit (15), and the output of storage unit (15) is connected with reverse protection unit (16), the output of reverse protection unit (16) is connected with circuit and cuts off unit (18).
2. A method of securing a computer system according to claim 1, wherein: the identity authentication unit (1), the virtual system (2) and the central processing unit (3) are electrically connected in series through a wire, and the power protection unit (5), the standby power supply (4) and the central processing unit (3) are electrically connected in series through a wire.
3. A method of securing a computer system according to claim 1, wherein: the central processing unit (3) is electrically connected with the virus identification unit (10) through a wire, and the central processing unit (3), the authority authorization unit (6), the microprocessor (7) and the identity verification unit (1) are sequentially and electrically connected in series through wires.
4. A method of securing a computer system according to claim 1, wherein: the central processing unit (3), the authority authorization unit (6), the desktop security module (8) and the buffering and cleaning unit (9) are electrically connected in series through wires, and the central processing unit (3), the virus identification unit (10), the virus checking and killing unit (11) and the feedback unit (14) are electrically connected in series through wires.
5. A method of securing a computer system according to claim 1, wherein: the desktop security module (8) comprises an application security service (801), a network security service (802), a network address conversion (803), an external network card (804) and an internal network card (805), the output end of the application security service (801) is connected with the network security service (802), the output end of the network security service (802) is connected with the network address conversion (803), the output end of the network address conversion (803) is connected with the external network card (804), and the output end of the network address conversion (803) is connected with the internal network card (805).
6. The method of claim 5, wherein the step of securing the computer system comprises: the application security service (801), the network security service (802) and the network address conversion (803) are electrically connected in series through wires, the network address conversion (803) is electrically connected in series with the external network card (804) and the internal network card (805) through wires respectively, and the external network card (804) and the internal network card (805) are electrically connected in parallel through wires.
7. A method of securing a computer system according to claim 1, wherein: the virus checking and killing unit (11), the feedback unit (14) and the wireless communication module (17) are electrically connected in series through conducting wires, and the feedback unit (14), the reverse protection unit (16), the circuit cutting unit (18) and the central processing unit (3) are electrically connected in series through conducting wires.
8. A method of securing a computer system according to claim 1, wherein: the wireless communication module (17) comprises a signal transmission unit (1701), a monitoring center (1702) and a mobile client (1703), wherein the monitoring center (1702) is connected to the output end of the signal transmission unit (1701), and the mobile client (1703) is connected to the output end of the signal transmission unit (1701).
9. The method of claim 8, wherein the step of securing the computer system comprises: the monitoring center (1702) and the mobile client (1703) are electrically connected in parallel through a conducting wire, and the signal transmission unit (1701) is electrically connected with the monitoring center (1702) and the mobile client (1703) in series through conducting wires respectively.
CN202011204693.8A 2020-11-02 2020-11-02 Method for protecting computer system safety Pending CN112269993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011204693.8A CN112269993A (en) 2020-11-02 2020-11-02 Method for protecting computer system safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011204693.8A CN112269993A (en) 2020-11-02 2020-11-02 Method for protecting computer system safety

Publications (1)

Publication Number Publication Date
CN112269993A true CN112269993A (en) 2021-01-26

Family

ID=74344738

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011204693.8A Pending CN112269993A (en) 2020-11-02 2020-11-02 Method for protecting computer system safety

Country Status (1)

Country Link
CN (1) CN112269993A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632096A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 Method and device for carrying out safety detection on equipment
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107944302A (en) * 2017-11-29 2018-04-20 滁州市华晨软件科技有限公司 A kind of security of computer software guard system
CN109165508A (en) * 2018-07-25 2019-01-08 安徽三实信息技术服务有限公司 A kind of external device access safety control system and its control method
CN109543388A (en) * 2018-11-30 2019-03-29 沈阳师范大学 A kind of computer system to ensure information security
CN110321704A (en) * 2019-07-08 2019-10-11 温州中壹技术研究院有限公司 A kind of computer information safe stocking system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103632096A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 Method and device for carrying out safety detection on equipment
CN106603517A (en) * 2016-12-03 2017-04-26 新乡学院 Computer network information security monitoring system
CN107944302A (en) * 2017-11-29 2018-04-20 滁州市华晨软件科技有限公司 A kind of security of computer software guard system
CN109165508A (en) * 2018-07-25 2019-01-08 安徽三实信息技术服务有限公司 A kind of external device access safety control system and its control method
CN109543388A (en) * 2018-11-30 2019-03-29 沈阳师范大学 A kind of computer system to ensure information security
CN110321704A (en) * 2019-07-08 2019-10-11 温州中壹技术研究院有限公司 A kind of computer information safe stocking system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孙光懿: "网络安全设备在校园网中的应用研究", 《电脑知识与技术》 *

Similar Documents

Publication Publication Date Title
CN101605074B (en) Method and system for monitoring Trojan Horse based on network communication behavior characteristic
US10027679B2 (en) Secondary asynchronous background authorization (SABA)
CN105550073A (en) Database backup method and system thereof
CN106503524B (en) A kind of computer network security guard system
CN113497786B (en) Evidence collection and tracing method, device and storage medium
CN110888778A (en) Cloud desktop-based log file monitoring system and method
CN113098980B (en) Portable safety operation and maintenance system for power monitoring system
US8468596B2 (en) Work support apparatus for information processing device
WO2015039562A1 (en) Method and device for account information processing
CN109474510B (en) Mailbox safety cross audit method, system and storage medium
CN112269993A (en) Method for protecting computer system safety
CN113110980B (en) Method and device for identifying and intercepting brute force cracking behavior
CN111147427A (en) Management system for computer network security
CN104284153A (en) Distribution room safety and synchronous operation monitoring intercom system and operation method thereof
CN108933678A (en) O&M auditing system
CN114462038B (en) Security protection method, device, equipment and computer readable storage medium
CN114466035A (en) Cloud storage system capable of realizing simultaneous operation of multiple user terminals
CN115632879B (en) Log management method, system, electronic device and storage medium
CN113656793A (en) Method and device for monitoring instant messaging program on terminal, storage medium and terminal
CN113132379A (en) Intelligent security system of warehousing system
CN112838570A (en) A relay protection debugging system and debugging method
CN107343274A (en) The processing method of address list information
CN115237872A (en) Log maintenance method, device, equipment and storage medium
CN112600686B (en) Terminal control method, device, computer equipment and computer readable storage medium
CN103347061B (en) Based on the strange land electronic data recovery system of corporate intranet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210126

RJ01 Rejection of invention patent application after publication