[go: up one dir, main page]

CN115296874A - Computer network security system, method, medium, equipment and terminal - Google Patents

Computer network security system, method, medium, equipment and terminal Download PDF

Info

Publication number
CN115296874A
CN115296874A CN202210883993.6A CN202210883993A CN115296874A CN 115296874 A CN115296874 A CN 115296874A CN 202210883993 A CN202210883993 A CN 202210883993A CN 115296874 A CN115296874 A CN 115296874A
Authority
CN
China
Prior art keywords
data
module
user
computer
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210883993.6A
Other languages
Chinese (zh)
Inventor
刘庆
王继超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Connected Information Technology Co ltd
Original Assignee
Beijing Connected Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Connected Information Technology Co ltd filed Critical Beijing Connected Information Technology Co ltd
Priority to CN202210883993.6A priority Critical patent/CN115296874A/en
Publication of CN115296874A publication Critical patent/CN115296874A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention belongs to the technical field of computer network security, and discloses a computer network security system, a computer network security method, a computer network security medium, computer network equipment and a computer network terminal. The invention carries out account verification by various account identity information verification modes, thereby ensuring the safety of the user account; meanwhile, the security detection of the computer network can be comprehensively, accurately and effectively carried out through user behavior security detection, computer security detection and security protection technologies, and the security of the network is improved. And meanwhile, data can be safely and effectively protected by carrying out encryption storage and encryption transmission on the data.

Description

Computer network security system, method, medium, equipment and terminal
Technical Field
The invention belongs to the technical field of computer network security, and particularly relates to a computer network security system, a computer network security method, a computer network security medium, computer network security equipment and a computer network security terminal.
Background
At present, computers and computer networks have become important information carriers and transmission channels of enterprises, governments and other organizations, so that the working efficiency is greatly improved, and the storage and processing of mass information are realized. Computers and computer networks bring great convenience to the work and life of people, but the information security problem which is widely concerned also comes with.
The computer network security means that the confidentiality, integrity and usability of data are protected in a network environment by using network management control and technical measures. Although the prior art has various safety protection measures, the data security is not enough, and the comprehensive safety detection can not be realized.
Through the above analysis, the problems and defects of the prior art are as follows: the existing computer network security technology has insufficient data security and cannot realize comprehensive security detection.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a computer network security system, a computer network security method, a computer network security medium, computer network security equipment and a computer network security terminal.
The present invention is thus implemented, a computer network security system comprising:
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
and the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result.
Further, the computer network security system further comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classifying module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of external equipment connected with the current computer;
the user behavior acquisition module is connected with the central control module and is used for acquiring the behavior data of the user on the current computer;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which does not exceed the authority;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
Further, the identity verification of the collected current login account data of the user by the account verification module comprises:
(1) Acquiring account data of a user currently logged in, and verifying whether the account data conforms to an account naming rule of a current computer; if the account naming rule is met, turning to the step (2), otherwise, judging that the identity verification fails;
(2) Acquiring dynamic verification information input by a user for logging in an account, and judging whether the dynamic verification information is accurate or not, if so, turning to the step (3), otherwise, judging that the identity verification fails;
(3) Acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step (4), otherwise, judging that the identity authentication fails;
(4) Randomly extracting other user information stored in the database, verifying the other user information, and judging that the identity verification is passed if the verification is passed; otherwise, the authentication is judged to be failed.
Further, the other user information includes: user face images, user privacy questions, user fingerprint information, or other information.
Further, the computer security detection module performing network security detection of the computer includes:
firstly, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists based on the external interface data and the connection data;
secondly, acquiring protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
and finally, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
Further, the behavior data classification module classifies the user behavior data that does not exceed the authority, including:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
Further, the behavior safety detection module performs safety detection of different behaviors based on the behavior data classification result, including:
firstly, for the data processing behavior of a user, carrying out security detection on processing data and legality and security detection on processing operation;
secondly, security detection of access objects, network access data, access interfaces and other contents is carried out on the network access behaviors of the users.
It is a further object of the invention to provide a computer arrangement comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to implement the computer network security system.
It is a further object of the present invention to provide a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the computer network security system.
Another object of the present invention is to provide an information data processing terminal for implementing the computer network security system.
In combination with the technical solutions and the technical problems to be solved, please analyze the advantages and positive effects of the technical solutions to be protected in the present invention from the following aspects:
first, aiming at the technical problems existing in the prior art and the difficulty in solving the problems, the technical problems to be solved by the technical scheme of the present invention are closely combined with results, data and the like in the research and development process, and some creative technical effects are brought after the problems are solved. The specific description is as follows:
the invention carries out account verification by various account identity information verification modes, thereby ensuring the safety of the user account; meanwhile, the security detection of the computer network can be comprehensively, accurately and effectively carried out through user behavior security detection, computer security detection and security protection technologies, and the security of the network is improved. Meanwhile, data can be safely and effectively protected by carrying out encryption storage and encryption transmission on the data.
Secondly, considering the technical scheme as a whole or from the perspective of products, the technical effect and advantages of the technical scheme to be protected by the invention are specifically described as follows:
the invention has high safety factor and convenient use, and can effectively maintain the network safety of users.
Drawings
Fig. 1 is a flowchart of a method for authenticating an account verification module according to the present invention, where the method is used for authenticating the identity of the collected current login account data of a user;
FIG. 2 is a flowchart of a method for detecting network security of a computer by a computer security detection module according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for performing security detection of different behaviors by the behavior security detection module based on a classification result of behavior data according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
1. Illustrative embodiments are explained. This section is an explanatory embodiment expanding on the claims so as to fully understand how the present invention is embodied by those skilled in the art.
The computer network security system provided by the embodiment of the invention comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring current login account data of the user;
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classification module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of external equipment connected with the current computer;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the user behavior acquisition module is connected with the central control module and is used for acquiring the behavior data of the user on the current computer;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which do not exceed the authority limit;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
As shown in fig. 1, the authentication of the account verification module for verifying the identity of the collected current login account data of the user according to the embodiment of the present invention includes:
s101, obtaining account data of a user currently logged in, and verifying whether the account data accords with an account naming rule of a current computer; if the account naming rule is met, the step S102 is turned to, otherwise, the identity verification is judged to be failed;
s102, acquiring dynamic verification information input by a user for logging in an account, judging whether the dynamic verification information is accurate or not, if so, turning to S103, otherwise, judging that the identity verification fails;
s103, acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step S104, otherwise, judging that the identity authentication is not passed;
s104, randomly extracting information of other users stored in the database, verifying the information of the other users, and if the information passes the verification, judging that the identity verification passes; otherwise, the authentication is judged to be failed.
The other user information provided by the embodiment of the invention comprises: user face images, user privacy questions, user fingerprint information, or other information.
As shown in fig. 2, the computer security detection module provided in the embodiment of the present invention for performing network security detection on a computer includes:
s201, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists based on the external interface data and the connection data;
s202, obtaining protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
s203, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
The behavior data classification module provided by the embodiment of the invention classifies the user behavior data which does not exceed the authority, and the classification comprises the following steps:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
As shown in fig. 3, the security detection module for performing security detection on different behaviors based on the classification result of the behavior data according to the embodiment of the present invention includes:
s301, for the data processing behavior of the user, the security detection of the processing data and the validity and security detection of the processing operation are carried out;
s302, for the network access behavior of the user, security detection of access objects, network access data, access interfaces and other contents is carried out.
2. Application examples. In order to prove the creativity and the technical value of the technical scheme of the invention, the part is the application example of the technical scheme of the claims on specific products or related technologies.
The invention applies the computer network security system to a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to execute the computer network security system.
The present invention applies the computer network security system to a computer readable storage medium storing a computer program which, when executed by a processor, causes the processor to execute the computer network security system.
The invention applies the computer network security system to an information data processing terminal.
It should be noted that the embodiments of the present invention can be realized by hardware, software, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. It will be appreciated by those skilled in the art that the apparatus and methods described above may be implemented using computer executable instructions and/or embodied in processor control code, for example such code provided on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware) or a data carrier such as an optical or electronic signal carrier. The apparatus and its modules of the present invention may be implemented by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., or by software executed by various types of processors, or by a combination of hardware circuits and software, e.g., firmware.
The above description is only for the purpose of illustrating the present invention and the appended claims are not to be construed as limiting the scope of the invention, which is intended to cover all modifications, equivalents and improvements that are within the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A computer network security system, comprising:
the account verification module is connected with the central control module and is used for verifying the identity of the collected current login account data of the user;
the equipment information checking module is connected with the central control module and is used for carrying out safety checking on the connected external equipment information;
the behavior data auditing module is connected with the central control module and is used for auditing whether the behavior data of the user exceeds the authority corresponding to the current login account; if the authority is exceeded, corresponding processing is not executed; if the authority is not exceeded, corresponding processing is executed;
the behavior safety detection module is connected with the central control module and is used for carrying out safety detection on different behaviors based on the behavior data classification result;
the computer security detection module is connected with the central control module and is used for carrying out network security detection on the computer;
and the safety protection module is connected with the central control module and used for calling corresponding protection measures to perform safety protection processing based on the computer network safety detection result and the behavior safety detection result.
2. The computer network security system of claim 1, wherein the computer network security system further comprises:
the account identity information acquisition module is connected with the central control module and is used for acquiring the current login account data of the user;
the authority determining module is connected with the central control module and used for determining the authority corresponding to the current login account of the user based on the account verification result;
the central control module is connected with the account identity information acquisition module, the account verification module, the authority determination module, the equipment information acquisition module, the equipment information verification module, the user behavior acquisition module, the behavior data auditing module, the behavior data classification module, the behavior safety detection module, the computer safety detection module, the safety protection module, the data encryption transmission module, the data encryption storage module and the alarm module and is used for controlling each module to normally work by utilizing a single chip microcomputer or a controller;
the equipment information acquisition module is connected with the central control module and is used for acquiring the information of the external equipment connected with the current computer;
the user behavior acquisition module is connected with the central control module and is used for acquiring behavior data of a user on a current computer;
the behavior data classification module is connected with the central control module and is used for classifying the user behavior data which does not exceed the authority;
the data encryption transmission module is connected with the central control module and is used for encrypting and transmitting corresponding data of the computer;
the data encryption storage module is connected with the central control module and is used for encrypting and storing related data and access data or other data of the computer;
and the alarm module is connected with the central control module and used for generating alarm information and organizing corresponding behaviors or processing when the computer security detection is abnormal or the behavior security detection is abnormal.
3. The computer network security system of claim 1, wherein the account verification module authenticating the collected current login account data of the user comprises:
(1) Acquiring account data of a user currently logged in, and verifying whether the account data conforms to an account naming rule of a current computer; if the account naming rule is met, turning to the step (2), otherwise, judging that the identity verification fails;
(2) Acquiring dynamic verification information input by a user for logging in an account, and judging whether the dynamic verification information is accurate or not, if so, turning to the step (3), otherwise, judging that the identity verification fails;
(3) Acquiring user input account data, comparing the user input account data with user account data stored in a database, judging whether the account data input by the user is consistent with data stored in the database, if so, turning to the step (4), otherwise, judging that the identity authentication fails;
(4) Randomly extracting other user information stored in the database, verifying the other user information, and judging that the identity verification is passed if the verification is passed; otherwise, the authentication is judged to be failed.
4. The computer network security system of claim 1, wherein the other user information comprises: user face images, user privacy questions, user fingerprint information, or other information.
5. The computer network security system of claim 1, wherein the computer security detection module performing network security detection of the computer comprises:
firstly, acquiring external interface data and connection data of a computer network, and judging whether a network intrusion behavior exists or not based on the external interface data and the connection data;
secondly, acquiring protection data of a computer network, and detecting whether vulnerability information exists in the computer network based on the protection data of the computer network;
and finally, outputting a corresponding computer network security detection result based on the network intrusion behavior and the vulnerability information detection result.
6. The computer network security system of claim 2, wherein the behavior data classification module classifying user behavior data that does not exceed privileges comprises:
and dividing the user behavior into a data processing behavior and a network access behavior according to whether the user is connected with an external network or not.
7. The computer network security system of claim 1, wherein the behavior security detection module to perform security detection of different behaviors based on the classification of behavior data comprises:
firstly, for the data processing behavior of a user, carrying out security detection on processing data and legality and security of processing operation;
secondly, security detection of access objects, network access data, access interfaces and other contents is carried out on the network access behaviors of the users.
8. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to implement the computer network security system of any one of claims 1-7.
9. A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to implement the computer network security system of any one of claims 1-7.
10. An information data processing terminal for implementing a computer network security system according to any one of claims 1 to 7.
CN202210883993.6A 2022-07-26 2022-07-26 Computer network security system, method, medium, equipment and terminal Pending CN115296874A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210883993.6A CN115296874A (en) 2022-07-26 2022-07-26 Computer network security system, method, medium, equipment and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210883993.6A CN115296874A (en) 2022-07-26 2022-07-26 Computer network security system, method, medium, equipment and terminal

Publications (1)

Publication Number Publication Date
CN115296874A true CN115296874A (en) 2022-11-04

Family

ID=83824356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210883993.6A Pending CN115296874A (en) 2022-07-26 2022-07-26 Computer network security system, method, medium, equipment and terminal

Country Status (1)

Country Link
CN (1) CN115296874A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116886406A (en) * 2023-08-04 2023-10-13 广州市博立信息科技有限公司 Computer network data safety intelligent protection system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851819A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Multi-application access authority control method and device and electronic equipment
CN111274583A (en) * 2020-01-17 2020-06-12 湖南城市学院 A kind of big data computer network security protection device and its control method
US10904259B1 (en) * 2019-12-09 2021-01-26 Evan Chase Rose Graphical user interface and console management system for distributed terminal network
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data
CN112769823A (en) * 2021-01-07 2021-05-07 北京码牛科技有限公司 Information management-based secure network auditing method and system
CN113918945A (en) * 2021-10-20 2022-01-11 龚珣 Big data computer network safety protection system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851819A (en) * 2019-11-20 2020-02-28 杭州安恒信息技术股份有限公司 Multi-application access authority control method and device and electronic equipment
US10904259B1 (en) * 2019-12-09 2021-01-26 Evan Chase Rose Graphical user interface and console management system for distributed terminal network
CN111274583A (en) * 2020-01-17 2020-06-12 湖南城市学院 A kind of big data computer network security protection device and its control method
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN112651021A (en) * 2020-12-23 2021-04-13 湖南工学院 Information security defense system based on big data
CN112769823A (en) * 2021-01-07 2021-05-07 北京码牛科技有限公司 Information management-based secure network auditing method and system
CN113918945A (en) * 2021-10-20 2022-01-11 龚珣 Big data computer network safety protection system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116886406A (en) * 2023-08-04 2023-10-13 广州市博立信息科技有限公司 Computer network data safety intelligent protection system
CN116886406B (en) * 2023-08-04 2024-01-30 广州市博立信息科技有限公司 Computer network data safety intelligent protection system

Similar Documents

Publication Publication Date Title
CN110414268B (en) Access control method, device, equipment and storage medium
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
JP5852676B2 (en) Method, computer program, and system for determining vulnerability of a computer software application to an elevation of privilege attack
US20090158385A1 (en) Apparatus and method for automatically generating SELinux security policy based on selt
Song et al. An analysis of technical security control requirements for digital I&C systems in nuclear power plants
CN111984975B (en) Vulnerability attack detection system, method and medium based on mimicry defense mechanism
CN109062965B (en) Big data analysis system, server, data processing method and storage medium
Li et al. A novel approach for software vulnerability classification
CN111683047A (en) Unauthorized vulnerability detection method and device, computer equipment and medium
US9910994B1 (en) System for assuring security of sensitive data on a host
CN110324416B (en) Download path tracking method, device, server, terminal and medium
US20210243206A1 (en) Detection of security intrusion in a computing system
CN112464176B (en) Authority management method and device, electronic equipment and storage medium
CN119442320A (en) A data governance method and system based on data resource security identification level
CN117454420A (en) Cloud computing encryption storage service system and method
CN117272308A (en) Software security test method, device, equipment, storage medium and program product
CN115296874A (en) Computer network security system, method, medium, equipment and terminal
CN113496024B (en) Web page login method and device, storage medium and electronic equipment
CN115146283A (en) Information security testing method and device for vehicle-mounted information interaction system
CN115329315A (en) Service authentication method, device, storage medium and electronic equipment
CN113268743A (en) Method for improving safety of dynamic loop monitoring system
CN117786724A (en) Rule-based network sensitive data encryption method and system
CN114257404B (en) Abnormal external connection statistical alarm method, device, computer equipment and storage medium
CN112799914B (en) Method and system for dynamically supervising codes and data in computer operation in full time
CN115374430A (en) Information leakage detection method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221104