CN115296874A - Computer network security system, method, medium, equipment and terminal - Google Patents
Computer network security system, method, medium, equipment and terminal Download PDFInfo
- Publication number
- CN115296874A CN115296874A CN202210883993.6A CN202210883993A CN115296874A CN 115296874 A CN115296874 A CN 115296874A CN 202210883993 A CN202210883993 A CN 202210883993A CN 115296874 A CN115296874 A CN 115296874A
- Authority
- CN
- China
- Prior art keywords
- data
- module
- user
- computer
- behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title abstract description 11
- 238000001514 detection method Methods 0.000 claims abstract description 67
- 238000012795 verification Methods 0.000 claims abstract description 39
- 230000005540 biological transmission Effects 0.000 claims abstract description 9
- 230000006399 behavior Effects 0.000 claims description 87
- 238000012545 processing Methods 0.000 claims description 28
- 230000002159 abnormal effect Effects 0.000 claims description 6
- 238000004590 computer program Methods 0.000 claims description 6
- 238000005516 engineering process Methods 0.000 abstract description 4
- 238000003491 array Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention belongs to the technical field of computer network security, and discloses a computer network security system, a computer network security method, a computer network security medium, computer network equipment and a computer network terminal. The invention carries out account verification by various account identity information verification modes, thereby ensuring the safety of the user account; meanwhile, the security detection of the computer network can be comprehensively, accurately and effectively carried out through user behavior security detection, computer security detection and security protection technologies, and the security of the network is improved. And meanwhile, data can be safely and effectively protected by carrying out encryption storage and encryption transmission on the data.
Description
Technical Field
The invention belongs to the technical field of computer network security, and particularly relates to a computer network security system, a computer network security method, a computer network security medium, computer network security equipment and a computer network security terminal.
Background
At present, computers and computer networks have become important information carriers and transmission channels of enterprises, governments and other organizations, so that the working efficiency is greatly improved, and the storage and processing of mass information are realized. Computers and computer networks bring great convenience to the work and life of people, but the information security problem which is widely concerned also comes with.
The computer network security means that the confidentiality, integrity and usability of data are protected in a network environment by using network management control and technical measures. Although the prior art has various safety protection measures, the data security is not enough, and the comprehensive safety detection can not be realized.
Through the above analysis, the problems and defects of the prior art are as follows: the existing computer network security technology has insufficient data security and cannot realize comprehensive security detection.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a computer network security system, a computer network security method, a computer network security medium, computer network security equipment and a computer network security terminal.
The present invention is thus implemented, a computer network security system comprising:
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
and the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result.
Further, the computer network security system further comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classifying module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of external equipment connected with the current computer;
the user behavior acquisition module is connected with the central control module and is used for acquiring the behavior data of the user on the current computer;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which does not exceed the authority;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
Further, the identity verification of the collected current login account data of the user by the account verification module comprises:
(1) Acquiring account data of a user currently logged in, and verifying whether the account data conforms to an account naming rule of a current computer; if the account naming rule is met, turning to the step (2), otherwise, judging that the identity verification fails;
(2) Acquiring dynamic verification information input by a user for logging in an account, and judging whether the dynamic verification information is accurate or not, if so, turning to the step (3), otherwise, judging that the identity verification fails;
(3) Acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step (4), otherwise, judging that the identity authentication fails;
(4) Randomly extracting other user information stored in the database, verifying the other user information, and judging that the identity verification is passed if the verification is passed; otherwise, the authentication is judged to be failed.
Further, the other user information includes: user face images, user privacy questions, user fingerprint information, or other information.
Further, the computer security detection module performing network security detection of the computer includes:
firstly, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists based on the external interface data and the connection data;
secondly, acquiring protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
and finally, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
Further, the behavior data classification module classifies the user behavior data that does not exceed the authority, including:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
Further, the behavior safety detection module performs safety detection of different behaviors based on the behavior data classification result, including:
firstly, for the data processing behavior of a user, carrying out security detection on processing data and legality and security detection on processing operation;
secondly, security detection of access objects, network access data, access interfaces and other contents is carried out on the network access behaviors of the users.
It is a further object of the invention to provide a computer arrangement comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to implement the computer network security system.
It is a further object of the present invention to provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the computer network security system.
Another object of the present invention is to provide an information data processing terminal for implementing the computer network security system.
In combination with the technical solutions and the technical problems to be solved, please analyze the advantages and positive effects of the technical solutions to be protected in the present invention from the following aspects:
first, aiming at the technical problems existing in the prior art and the difficulty in solving the problems, the technical problems to be solved by the technical scheme of the present invention are closely combined with results, data and the like in the research and development process, and some creative technical effects are brought after the problems are solved. The specific description is as follows:
the invention carries out account verification by various account identity information verification modes, thereby ensuring the safety of the user account; meanwhile, the security detection of the computer network can be comprehensively, accurately and effectively carried out through user behavior security detection, computer security detection and security protection technologies, and the security of the network is improved. Meanwhile, data can be safely and effectively protected by carrying out encryption storage and encryption transmission on the data.
Secondly, considering the technical scheme as a whole or from the perspective of products, the technical effect and advantages of the technical scheme to be protected by the invention are specifically described as follows:
the invention has high safety factor and convenient use, and can effectively maintain the network safety of users.
Drawings
Fig. 1 is a flowchart of a method for authenticating an account verification module according to the present invention, where the method is used for authenticating the identity of the collected current login account data of a user;
FIG. 2 is a flowchart of a method for detecting network security of a computer by a computer security detection module according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for performing security detection of different behaviors by the behavior security detection module based on a classification result of behavior data according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
1. Illustrative embodiments are explained. This section is an explanatory embodiment expanding on the claims so as to fully understand how the present invention is embodied by those skilled in the art.
The computer network security system provided by the embodiment of the invention comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring current login account data of the user;
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classification module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of external equipment connected with the current computer;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the user behavior acquisition module is connected with the central control module and is used for acquiring the behavior data of the user on the current computer;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which do not exceed the authority limit;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
As shown in fig. 1, the authentication of the account verification module for verifying the identity of the collected current login account data of the user according to the embodiment of the present invention includes:
s101, obtaining account data of a user currently logged in, and verifying whether the account data accords with an account naming rule of a current computer; if the account naming rule is met, the step S102 is turned to, otherwise, the identity verification is judged to be failed;
s102, acquiring dynamic verification information input by a user for logging in an account, judging whether the dynamic verification information is accurate or not, if so, turning to S103, otherwise, judging that the identity verification fails;
s103, acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step S104, otherwise, judging that the identity authentication is not passed;
s104, randomly extracting information of other users stored in the database, verifying the information of the other users, and if the information passes the verification, judging that the identity verification passes; otherwise, the authentication is judged to be failed.
The other user information provided by the embodiment of the invention comprises: user face images, user privacy questions, user fingerprint information, or other information.
As shown in fig. 2, the computer security detection module provided in the embodiment of the present invention for performing network security detection on a computer includes:
s201, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists based on the external interface data and the connection data;
s202, obtaining protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
s203, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
The behavior data classification module provided by the embodiment of the invention classifies the user behavior data which does not exceed the authority, and the classification comprises the following steps:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
As shown in fig. 3, the security detection module for performing security detection on different behaviors based on the classification result of the behavior data according to the embodiment of the present invention includes:
s301, for the data processing behavior of the user, the security detection of the processing data and the validity and security detection of the processing operation are carried out;
s302, for the network access behavior of the user, security detection of access objects, network access data, access interfaces and other contents is carried out.
2. Application examples. In order to prove the creativity and the technical value of the technical scheme of the invention, the part is the application example of the technical scheme of the claims on specific products or related technologies.
The invention applies the computer network security system to a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to execute the computer network security system.
The present invention applies the computer network security system to a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to execute the computer network security system.
The invention applies the computer network security system to an information data processing terminal.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. It will be appreciated by those skilled in the art that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, for example such code provided on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware) or a data carrier such as an optical or electronic signal carrier. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.
Claims (10)
1. A computer network security system, comprising:
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
and the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result.
2. The computer network security system of claim 1, wherein the computer network security system further comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring the current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classification module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of the external equipment connected with the current computer;
the user behavior acquisition module is connected with the central control module and is used for acquiring behavior data of a user on a current computer;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which does not exceed the authority;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
3. The computer network security system of claim 1, wherein the account verification module authenticating the collected current login account data of the user comprises:
(1) Acquiring account data of a user currently logged in, and verifying whether the account data conforms to an account naming rule of a current computer; if the account naming rule is met, turning to the step (2), otherwise, judging that the identity verification fails;
(2) Acquiring dynamic verification information input by a user for logging in an account, and judging whether the dynamic verification information is accurate or not, if so, turning to the step (3), otherwise, judging that the identity verification fails;
(3) Acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step (4), otherwise, judging that the identity authentication fails;
(4) Randomly extracting other user information stored in the database, verifying the other user information, and judging that the identity verification is passed if the verification is passed; otherwise, the authentication is judged to be failed.
4. The computer network security system of claim 1, wherein the other user information comprises: user face images, user privacy questions, user fingerprint information, or other information.
5. The computer network security system of claim 1, wherein the computer security detection module performing network security detection of the computer comprises:
firstly, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists or not based on the external interface data and the connection data;
secondly, acquiring protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
and finally, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
6. The computer network security system of claim 2, wherein the behavior data classification module classifying user behavior data that does not exceed privileges comprises:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
7. The computer network security system of claim 1, wherein the behavior security detection module to perform security detection of different behaviors based on the classification of behavior data comprises:
firstly, for the data processing behavior of a user, carrying out security detection on processing data and legality and security of processing operation;
secondly, security detection of access objects, network access data, access interfaces and other contents is carried out on the network access behaviors of the users.
8. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to implement the computer network security system of any one of claims 1-7.
9. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the computer network security system of any one of claims 1-7.
10. An information data processing terminal for implementing a computer network security system according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210883993.6A CN115296874A (en) | 2022-07-26 | 2022-07-26 | Computer network security system, method, medium, equipment and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210883993.6A CN115296874A (en) | 2022-07-26 | 2022-07-26 | Computer network security system, method, medium, equipment and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115296874A true CN115296874A (en) | 2022-11-04 |
Family
ID=83824356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210883993.6A Pending CN115296874A (en) | 2022-07-26 | 2022-07-26 | Computer network security system, method, medium, equipment and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115296874A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116886406A (en) * | 2023-08-04 | 2023-10-13 | 广州市博立信息科技有限公司 | Computer network data safety intelligent protection system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851819A (en) * | 2019-11-20 | 2020-02-28 | 杭州安恒信息技术股份有限公司 | Multi-application access authority control method and device and electronic equipment |
CN111274583A (en) * | 2020-01-17 | 2020-06-12 | 湖南城市学院 | A kind of big data computer network security protection device and its control method |
US10904259B1 (en) * | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Graphical user interface and console management system for distributed terminal network |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN112651021A (en) * | 2020-12-23 | 2021-04-13 | 湖南工学院 | Information security defense system based on big data |
CN112769823A (en) * | 2021-01-07 | 2021-05-07 | 北京码牛科技有限公司 | Information management-based secure network auditing method and system |
CN113918945A (en) * | 2021-10-20 | 2022-01-11 | 龚珣 | Big data computer network safety protection system |
-
2022
- 2022-07-26 CN CN202210883993.6A patent/CN115296874A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110851819A (en) * | 2019-11-20 | 2020-02-28 | 杭州安恒信息技术股份有限公司 | Multi-application access authority control method and device and electronic equipment |
US10904259B1 (en) * | 2019-12-09 | 2021-01-26 | Evan Chase Rose | Graphical user interface and console management system for distributed terminal network |
CN111274583A (en) * | 2020-01-17 | 2020-06-12 | 湖南城市学院 | A kind of big data computer network security protection device and its control method |
CN112487383A (en) * | 2020-11-17 | 2021-03-12 | 重庆第二师范学院 | Computer system for ensuring information safety and control method thereof |
CN112651021A (en) * | 2020-12-23 | 2021-04-13 | 湖南工学院 | Information security defense system based on big data |
CN112769823A (en) * | 2021-01-07 | 2021-05-07 | 北京码牛科技有限公司 | Information management-based secure network auditing method and system |
CN113918945A (en) * | 2021-10-20 | 2022-01-11 | 龚珣 | Big data computer network safety protection system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116886406A (en) * | 2023-08-04 | 2023-10-13 | 广州市博立信息科技有限公司 | Computer network data safety intelligent protection system |
CN116886406B (en) * | 2023-08-04 | 2024-01-30 | 广州市博立信息科技有限公司 | Computer network data safety intelligent protection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110414268B (en) | Access control method, device, equipment and storage medium | |
CN108347361B (en) | Application program testing method and device, computer equipment and storage medium | |
JP5852676B2 (en) | Method, computer program, and system for determining vulnerability of a computer software application to an elevation of privilege attack | |
US20090158385A1 (en) | Apparatus and method for automatically generating SELinux security policy based on selt | |
Song et al. | An analysis of technical security control requirements for digital I&C systems in nuclear power plants | |
CN111984975B (en) | Vulnerability attack detection system, method and medium based on mimicry defense mechanism | |
CN109062965B (en) | Big data analysis system, server, data processing method and storage medium | |
Li et al. | A novel approach for software vulnerability classification | |
CN111683047A (en) | Unauthorized vulnerability detection method and device, computer equipment and medium | |
US9910994B1 (en) | System for assuring security of sensitive data on a host | |
CN110324416B (en) | Download path tracking method, device, server, terminal and medium | |
US20210243206A1 (en) | Detection of security intrusion in a computing system | |
CN112464176B (en) | Authority management method and device, electronic equipment and storage medium | |
CN119442320A (en) | A data governance method and system based on data resource security identification level | |
CN117454420A (en) | Cloud computing encryption storage service system and method | |
CN117272308A (en) | Software security test method, device, equipment, storage medium and program product | |
CN115296874A (en) | Computer network security system, method, medium, equipment and terminal | |
CN113496024B (en) | Web page login method and device, storage medium and electronic equipment | |
CN115146283A (en) | Information security testing method and device for vehicle-mounted information interaction system | |
CN115329315A (en) | Service authentication method, device, storage medium and electronic equipment | |
CN113268743A (en) | Method for improving safety of dynamic loop monitoring system | |
CN117786724A (en) | Rule-based network sensitive data encryption method and system | |
CN114257404B (en) | Abnormal external connection statistical alarm method, device, computer equipment and storage medium | |
CN112799914B (en) | Method and system for dynamically supervising codes and data in computer operation in full time | |
CN115374430A (en) | Information leakage detection method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221104 |