CN109063476A - A kind of computer system to ensure information security - Google Patents

A kind of computer system to ensure information security Download PDF

Info

Publication number
CN109063476A
CN109063476A CN201810769303.8A CN201810769303A CN109063476A CN 109063476 A CN109063476 A CN 109063476A CN 201810769303 A CN201810769303 A CN 201810769303A CN 109063476 A CN109063476 A CN 109063476A
Authority
CN
China
Prior art keywords
module
virus
unit
resistance
computer system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201810769303.8A
Other languages
Chinese (zh)
Inventor
王红林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hui Yang School System Engineering Co Ltd
Original Assignee
Jiangsu Hui Yang School System Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hui Yang School System Engineering Co Ltd filed Critical Jiangsu Hui Yang School System Engineering Co Ltd
Priority to CN201810769303.8A priority Critical patent/CN109063476A/en
Publication of CN109063476A publication Critical patent/CN109063476A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of computer systems to ensure information security, including central processing unit, login authentication module, memory module, risk evaluation module, internet worm scan module and viral isolation module, central processing unit is separately connected login authentication module, memory module, risk evaluation module, internet worm scan module, viral isolation module, alarm module, database module, hard disk power-supply controller of electric and monitoring unit, central processing unit connects background monitoring server by wireless transmission unit, it is safe that the present invention can effectively ensure that computer uses, prevent leaking data and internet worm from invading, the information security of user is effectively guaranteed.

Description

A kind of computer system to ensure information security
Technical field
The present invention relates to field of computer technology, specially a kind of computer system to ensure information security.
Background technique
Information security mainly includes the content of following five aspect, i.e., need to guarantee the confidentiality of information, authenticity, integrality, The safety of unauthorised copies and institute's parasitic system.The range that information security itself includes is very big, wherein includes how prevention quotient Leakage etc. of the teenager to the browsing, personal information of flame is taken precautions against in the leakage of industry enterprise secret.Information peace under network environment Entirety system is the key that ensure information security, including computer security operating system, various security protocols, security mechanism are (digital Signature, message authentication, data encryption etc.), information security refers to information system (including hardware, software, data, people, physical environment And its infrastructure) be protected, not by the reason of accidental or malice and by destroy, change, reveal, system continuously may be used By normally running, information service do not interrupt, finally realize business continuance.
Current computer system is encrypted by simple encryption system, and cipher round results are poor, can not effectively really Protect the safety of user information.
Summary of the invention
The purpose of the present invention is to provide a kind of computer systems to ensure information security, to solve in above-mentioned background technique The problem of proposition.
To achieve the above object, the invention provides the following technical scheme: a kind of computer system to ensure information security, packet Include central processing unit, login authentication module, memory module, risk evaluation module, internet worm scan module and viral isolation mode Block, the central processing unit be separately connected login authentication module, memory module, risk evaluation module, internet worm scan module, Viral isolation module, alarm module, database module, hard disk power-supply controller of electric and monitoring unit, the central processing unit pass through Wireless transmission unit connects background monitoring server;The monitoring unit includes mobile memory medium monitoring module, file operation Monitoring module, Network Data Control module and internal detection module.
Preferably, the login authentication module includes that face characteristic recognition unit, fingerprint identification unit and Password Input are tested Demonstrate,prove unit.
It preferably, further include encryption unit, the encryption unit connects memory module, and the encrypting module includes encryption core Piece, the end VPP of the encryption chip are separately connected the end VCC, the one end resistance A, the one end capacitor A, the end SDA point of the encryption chip Not Lian Jie the resistance A other end, the one end resistance B, the resistance B other end is grounded by capacitor B, the end the GND ground connection of the encryption chip, The end SCL is separately connected the one end resistance C, the one end resistance E, and the resistance E other end is grounded by capacitor C, and the resistance C other end connects resistance The one end D, the resistance D other end connect power end.
Preferably, the wireless transmission unit uses the monolithic wireless transceiver chip of model nRF24L01.
Preferably, the viral isolation module detection partition method is as follows;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, after parsing collected network data package-restructuring, using the disease in multi-pattern matching algorithm and virus characteristic library Malicious feature is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether to form One or more complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to next time new Continue to judge after virus characteristic;
C, collected Virus Info is saved into off-limit file folder.
Preferably, application method the following steps are included:
A, user separately verifies face characteristic information, finger print information and the login of user by login authentication module first Password, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, simultaneously Monitoring unit monitors computer in real time;
C, once collect internet worm signal, internet worm is identified first, if it is possible to identify, then carry out every From simultaneously killing, if cannot identify, starts hard disk power-supply controller of electric and close hard disk, and unidentified internet worm is temporarily stored into disease Malicious isolation module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to backstage prison Control server.
Compared with prior art, the beneficial effects of the present invention are:
(1) it is safe can effectively to ensure that computer uses by the present invention, prevents leaking data and internet worm from invading, effectively The information security that ensure that user.
(2) the encryption unit performance that the present invention uses is stablized, strong antijamming capability, and can prevent encryption chip from number occur According to fault, it is ensured that the cryptographic security of hard disc data.
(3) the viral isolation module detection partition method that the present invention uses can handle a virus and contain a plurality of virus spy The case where sign, is suitble to use in a high-speed network, and detection efficiency is high.
Detailed description of the invention
Fig. 1 is present system functional block diagram;
Fig. 2 is encryption unit schematic diagram of the present invention;
Fig. 3 is flow chart of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Fig. 1-3 is please referred to, the present invention provides a kind of technical solution: a kind of computer system to ensure information security, including Central processing unit 1, login authentication module 2, memory module 3, risk evaluation module 4, internet worm scan module 5 and virus isolation Module 6, the central processing unit 1 are separately connected login authentication module 2, memory module 3, risk evaluation module 4, internet worm and sweep Module 5, viral isolation module 6, alarm module 7, database module 8, hard disk power-supply controller of electric 9 and monitoring unit 10 are retouched, is logged in Authentication module 2 includes face characteristic recognition unit 17, fingerprint identification unit 18 and Password Input authentication unit 19;The centre It manages device 1 and background monitoring server 12 is connected by wireless transmission unit 11;The monitoring unit 10 is supervised including mobile memory medium Control module 13, file operation monitoring module 14, Network Data Control module 15 and internal detection module 16;Wherein, it is wirelessly transferred Unit 11 uses the monolithic wireless transceiver chip of model nRF24L01.
It further include encryption unit 20 in the present invention, the encryption unit 20 connects memory module 3, and encrypting module 720 includes Encryption chip 21, the end VPP of encryption chip 21 are separately connected the end VCC, the one end resistance A1a, the one end capacitor A1b, the encryption core The end SDA of piece 21 is separately connected the resistance A1a other end, the one end resistance B2a, and the resistance B2a other end is grounded by capacitor B2b, institute The end the GND ground connection of encryption chip 21 is stated, the end SCL is separately connected the one end resistance C3a, the one end resistance E5a, and the resistance E5a other end is logical Capacitor C3b ground connection is crossed, the resistance C3a other end connects the one end resistance D4a, and the resistance D4a other end connects power end;Encryption chip 21 Model uses ALPU-C-10B or ALPU-C-139.The encryption unit performance that the present invention uses is stablized, strong antijamming capability, and energy Enough prevent encryption chip from error in data failure occur, it is ensured that the cryptographic security of hard disc data.
In the present invention, viral isolation module detection partition method is as follows;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, after parsing collected network data package-restructuring, using the disease in multi-pattern matching algorithm and virus characteristic library Malicious feature is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether to form One or more complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to next time new Continue to judge after virus characteristic;
C, collected Virus Info is saved into off-limit file folder.
The viral isolation module detection partition method that the present invention uses can handle a virus and contain a plurality of virus characteristic The case where, it is suitble to use in a high-speed network, detection efficiency is high.
In the present invention, a kind of application method of the computer system to ensure information security the following steps are included:
A, user separately verifies face characteristic information, finger print information and the login of user by login authentication module first Password, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, simultaneously Monitoring unit monitors computer in real time;
C, once collect internet worm signal, internet worm is identified first, if it is possible to identify, then carry out every From simultaneously killing, if cannot identify, starts hard disk power-supply controller of electric and close hard disk, and unidentified internet worm is temporarily stored into disease Malicious isolation module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to backstage prison Control server.
In conclusion the present invention can effectively ensure that computer using safe, prevents leaking data and internet worm from invading Enter, the information security of user is effectively guaranteed.
It although an embodiment of the present invention has been shown and described, for the ordinary skill in the art, can be with A variety of variations, modification, replacement can be carried out to these embodiments without departing from the principles and spirit of the present invention by understanding And modification, the scope of the present invention is defined by the appended.

Claims (6)

1. a kind of computer system to ensure information security, it is characterised in that: including central processing unit (1), login authentication module (2), memory module (3), risk evaluation module (4), internet worm scan module (5) and viral isolation module (6), the center Processor (1) is separately connected login authentication module (2), memory module (3), risk evaluation module (4), internet worm scan module (5), viral isolation module (6), alarm module (7), database module (8), hard disk power-supply controller of electric (9) and monitoring unit (10), the central processing unit (1) passes through wireless transmission unit (11) connection background monitoring server (12);The monitoring unit (10) include mobile memory medium monitoring module (13), file operation monitoring module (14), Network Data Control module (15) and Internal detection module (16).
2. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the login authentication Module (2) includes face characteristic recognition unit (17), fingerprint identification unit (18) and Password Input authentication unit (19).
3. a kind of computer system to ensure information security according to claim 1, it is characterised in that: further include that encryption is single First (20), the encryption unit (20) connect memory module (3), and the encryption unit (20) includes encryption chip (21), described The end VPP of encryption chip (21) is separately connected the end VCC, the one end resistance A (1a), the one end capacitor A (1b), the encryption chip (21) The end SDA be separately connected resistance A (1a) other end, the one end resistance B (2a), resistance B (2a) other end is connect by capacitor B (2b) Ground, the end the GND ground connection of the encryption chip (21), the end SCL is separately connected the one end resistance C (3a), the one end resistance E (5a), resistance E (5a) other end is grounded by capacitor C (3b), and resistance C (3a) other end connects the one end resistance D (4a), resistance D (4a) other end Connect power end.
4. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the wireless transmission Unit (11) uses the monolithic wireless transceiver chip of model nRF24L01.
5. a kind of computer system to ensure information security according to claim 1, it is characterised in that: the virus isolation It is as follows that module detects partition method;
A, virus characteristic library, the corresponding one or more Virus Infos of each virus characteristic are created;
B, special using the virus in multi-pattern matching algorithm and virus characteristic library after parsing collected network data package-restructuring Sign is matched, and when being matched to a virus characteristic, in conjunction with the virus characteristic being matched to, judges whether that one can be formed Or a plurality of complete Virus Info, if it is then otherwise Virus Info successful match waits be matched to new virus next time Continue to judge after feature;
C, collected Virus Info is saved into off-limit file folder.
6. realizing a kind of application method of the computer system to ensure information security described in claim 1, it is characterised in that: its Application method the following steps are included:
A, user separately verifies the face characteristic information of user, finger print information by login authentication module and logs in close first Code, three kinds of verification modes then enter computer system after passing through simultaneously;
B, in computer system use process, internet worm scan module is in real time scanned computer network, monitors simultaneously Unit monitors computer in real time;
C, once collecting internet worm signal, internet worm is identified first, if it is possible to identify, be then isolated simultaneously Killing, if cannot identify, start hard disk power-supply controller of electric close hard disk, and by unidentified internet worm be temporarily stored into virus every It from module, is assessed by risk evaluation module, and issues alarm signal, by being confirmed from the background;
D, in user's use process, the use state information of computer passes through wireless transmission unit in real time and is sent to background monitoring clothes Business device.
CN201810769303.8A 2018-07-13 2018-07-13 A kind of computer system to ensure information security Withdrawn CN109063476A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810769303.8A CN109063476A (en) 2018-07-13 2018-07-13 A kind of computer system to ensure information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810769303.8A CN109063476A (en) 2018-07-13 2018-07-13 A kind of computer system to ensure information security

Publications (1)

Publication Number Publication Date
CN109063476A true CN109063476A (en) 2018-12-21

Family

ID=64816450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810769303.8A Withdrawn CN109063476A (en) 2018-07-13 2018-07-13 A kind of computer system to ensure information security

Country Status (1)

Country Link
CN (1) CN109063476A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922045A (en) * 2019-01-30 2019-06-21 赵东升 A kind of control method of information processing unit
CN110489956A (en) * 2019-08-26 2019-11-22 顺德职业技术学院 A kind of security protection method and system of computer data
CN111241542A (en) * 2020-01-03 2020-06-05 广州集韵信息科技有限公司 Novel computer cloud security service platform all-in-one
CN111414593A (en) * 2020-03-17 2020-07-14 林家豪 Computer information protection method based on mobile internet
CN112328998A (en) * 2020-11-30 2021-02-05 扬州大自然网络信息有限公司 Computer information security monitoring method
CN112381557A (en) * 2020-12-08 2021-02-19 集商网络科技(上海)有限公司 Information management service system for background
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN112507269A (en) * 2020-12-10 2021-03-16 中国农业科学院农业信息研究所 Website background risk assessment system
CN113821774A (en) * 2021-09-07 2021-12-21 安徽继远软件有限公司 Terminal security risk module matching and verifying system
CN114283566A (en) * 2021-12-31 2022-04-05 重庆特斯联智慧科技股份有限公司 Be used for all-round intelligent safety early warning equipment of garden energizing platform
CN116089961A (en) * 2023-02-14 2023-05-09 哈尔滨晨亿科技有限公司 Big data-based computer intelligent image management system and method
CN116151755A (en) * 2022-11-18 2023-05-23 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243486A (en) * 2014-09-28 2014-12-24 中国联合网络通信集团有限公司 Virus detection method and system
CN105787324A (en) * 2016-02-03 2016-07-20 周口师范学院 Computer information security system
CN106951794A (en) * 2017-04-28 2017-07-14 成都布林特信息技术有限公司 A kind of network data encryption device
CN107527280A (en) * 2017-10-12 2017-12-29 北京军秀咨询有限公司 A kind of financial data processing method based on cloud computing
CN107766715A (en) * 2017-11-24 2018-03-06 天津中德应用技术大学 The shared security protection system of finance
CN107944302A (en) * 2017-11-29 2018-04-20 滁州市华晨软件科技有限公司 A kind of security of computer software guard system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243486A (en) * 2014-09-28 2014-12-24 中国联合网络通信集团有限公司 Virus detection method and system
CN105787324A (en) * 2016-02-03 2016-07-20 周口师范学院 Computer information security system
CN106951794A (en) * 2017-04-28 2017-07-14 成都布林特信息技术有限公司 A kind of network data encryption device
CN107527280A (en) * 2017-10-12 2017-12-29 北京军秀咨询有限公司 A kind of financial data processing method based on cloud computing
CN107766715A (en) * 2017-11-24 2018-03-06 天津中德应用技术大学 The shared security protection system of finance
CN107944302A (en) * 2017-11-29 2018-04-20 滁州市华晨软件科技有限公司 A kind of security of computer software guard system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109922045B (en) * 2019-01-30 2021-07-02 赵东升 Control method of information processing device
CN109922045A (en) * 2019-01-30 2019-06-21 赵东升 A kind of control method of information processing unit
CN110489956A (en) * 2019-08-26 2019-11-22 顺德职业技术学院 A kind of security protection method and system of computer data
CN111241542A (en) * 2020-01-03 2020-06-05 广州集韵信息科技有限公司 Novel computer cloud security service platform all-in-one
CN111414593A (en) * 2020-03-17 2020-07-14 林家豪 Computer information protection method based on mobile internet
CN112487383B (en) * 2020-11-17 2023-08-08 重庆第二师范学院 Computer system for guaranteeing information security and control method thereof
CN112487383A (en) * 2020-11-17 2021-03-12 重庆第二师范学院 Computer system for ensuring information safety and control method thereof
CN112328998A (en) * 2020-11-30 2021-02-05 扬州大自然网络信息有限公司 Computer information security monitoring method
CN112381557A (en) * 2020-12-08 2021-02-19 集商网络科技(上海)有限公司 Information management service system for background
CN112507269A (en) * 2020-12-10 2021-03-16 中国农业科学院农业信息研究所 Website background risk assessment system
CN112507269B (en) * 2020-12-10 2023-08-08 中国农业科学院农业信息研究所 Website background risk assessment system
CN113821774A (en) * 2021-09-07 2021-12-21 安徽继远软件有限公司 Terminal security risk module matching and verifying system
CN114283566A (en) * 2021-12-31 2022-04-05 重庆特斯联智慧科技股份有限公司 Be used for all-round intelligent safety early warning equipment of garden energizing platform
CN114283566B (en) * 2021-12-31 2024-04-05 重庆特斯联智慧科技股份有限公司 Be used for all-round intelligent safety precaution equipment of garden enabling platform
CN116151755A (en) * 2022-11-18 2023-05-23 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system
CN116151755B (en) * 2022-11-18 2024-02-02 深圳市东宝信息技术有限公司 Personnel information intelligent evaluation analysis system
CN116089961A (en) * 2023-02-14 2023-05-09 哈尔滨晨亿科技有限公司 Big data-based computer intelligent image management system and method

Similar Documents

Publication Publication Date Title
CN109063476A (en) A kind of computer system to ensure information security
US8566934B2 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
US9064114B2 (en) Method and device for scanning data for signatures prior to storage in a storage device
Ou et al. The design and implementation of host-based intrusion detection system
KR101377014B1 (en) System and Method of Malware Diagnosis Mechanism Based on Immune Database
CN112217835B (en) Message data processing method and device, server and terminal equipment
US20090064326A1 (en) Method and a system for advanced content security in computer networks
US20070198420A1 (en) Method and a system for outbound content security in computer networks
US20090220088A1 (en) Autonomic defense for protecting data when data tampering is detected
JP2008541273A5 (en)
CN112487383A (en) Computer system for ensuring information safety and control method thereof
CN108881298A (en) A kind of network safety system and implementation method based on big data platform
CN102316449A (en) Security terminal system and authentication and interruption method thereof
Ali et al. Data loss prevention by using MRSH-v2 algorithm
CN108710793A (en) A kind of computer network means of defence and system
CN112637172A (en) Novel data security and confidentiality method
CN111898167A (en) External terminal protection equipment and protection system including identity information verification
KR101872605B1 (en) Network recovery system in advanced persistent threat
CN113704061A (en) Secret-related computer protection system
TWI656454B (en) Method and system for preventing password file leakage detection
KR101153115B1 (en) Method, server and device for detecting hacking tools
CN111898105A (en) External terminal protection equipment with user tracing function and protection system
CN110059469A (en) A kind of safe U disc system and its application method
US20230254308A1 (en) Real-time analysis plugin for cyber defense
Oujezsky et al. Data Backup System with Integrated Active Protection Against Ransomware

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20181221

WW01 Invention patent application withdrawn after publication