CN111832071A - Information security system and information security method - Google Patents

Information security system and information security method Download PDF

Info

Publication number
CN111832071A
CN111832071A CN202010619215.7A CN202010619215A CN111832071A CN 111832071 A CN111832071 A CN 111832071A CN 202010619215 A CN202010619215 A CN 202010619215A CN 111832071 A CN111832071 A CN 111832071A
Authority
CN
China
Prior art keywords
information
module
input
grade
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010619215.7A
Other languages
Chinese (zh)
Other versions
CN111832071B (en
Inventor
刘文成
刘丽伟
赵红超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou University of Industrial Technology
Original Assignee
Zhengzhou University of Industrial Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou University of Industrial Technology filed Critical Zhengzhou University of Industrial Technology
Priority to CN202010619215.7A priority Critical patent/CN111832071B/en
Publication of CN111832071A publication Critical patent/CN111832071A/en
Application granted granted Critical
Publication of CN111832071B publication Critical patent/CN111832071B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information security system and an information security method, wherein the information security system comprises an information viewing module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, and relates to the technical field of information security. According to the information safety system and the information safety method, the level information storage module is divided into the open level information storage unit, the secret level information storage unit and the secret level information storage unit, an operator checks the information files with the corresponding levels according to the key levels of the operator, and only the files can be transferred to the storage unit with the corresponding automatic levels, so that the files are prevented from being interfered by viruses, the information files are divided according to the important levels through the structure, and the condition that the important information files are leaked is reduced to a great extent.

Description

Information security system and information security method
Technical Field
The invention relates to the technical field of information security, in particular to an information security system and an information security method.
Background
The information security subject can be divided into two levels of narrow security and generalized security, the narrow security is established in the field of computer security based on cryptography, the information security profession usually takes the narrow security as a reference and is supplemented with contents in the aspects of computer technology, communication network technology, programming and the like, with the development and popularization of computer technology, many enterprise units and management organizations establish own information security systems, in the process of developing and designing the information security systems, the security performance is always placed at the primary position and becomes the key for the survival of the information systems, and usually, the enterprise units place important information files in the information security systems to prevent information leakage.
The information security system at present locks a storage module in the information security system through a commercial password to ensure the security of information, and when a plurality of enterprises know the commercial password, the commercial file is difficult to avoid leakage to cause the stealing of important information files, so that the invention provides the information security system and the information security method.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an information security system and an information security method, which solve the problem that information is difficult to avoid leakage after a plurality of people know a password.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: an information security system comprises an information security system, wherein the information security system comprises an information viewing module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, the user operation module is in bidirectional connection with the key identification module, the output end of the information viewing module is connected with the input end of the key identification module, the output end of the key identification module is connected with the input end of the grade information storage module, the grade information storage module is in bidirectional connection with the backup recovery system, the grade information storage module is in bidirectional connection with the information monitoring system, the output end of the user operation module is connected with the input end of the information transfer module, and the output end of the user operation module is connected with the input end of the information uploading system, and the output end of the information transfer module is connected with the input end of the grade information storage module.
Preferably, the level information storage module includes a secret level information storage unit, a secret level information storage unit and an open level information storage unit, an output end of the secret level information storage unit is electrically connected with the secret level information storage unit, and an output end of the secret level information storage unit is electrically connected with an input end of the open level information storage unit.
Preferably, the information monitoring system comprises an information acquisition module, an information analysis module, an abnormal information isolation module and an abnormal information processing module, wherein the output end of the information acquisition module is electrically connected with the input end of the information analysis module, and the information acquisition module is in bidirectional connection with the abnormal information isolation module.
Preferably, the output end of the information analysis module is electrically connected with the input end of the abnormal information isolation module, and the abnormal information isolation module is in bidirectional connection with the abnormal information processing module.
Preferably, the information uploading system comprises a key detection module, a firewall system, an information input module and an information transmission module, wherein the output end of the key detection module is connected with the input end of the information input module, the output end of the information input module is connected with the input end of the firewall system, and the firewall system is connected with the input end of the information transmission module.
Preferably, the information delivery module includes an open-level information delivery unit, a sealed-level information delivery unit, and a confidential-level information delivery unit.
Preferably, the backup and recovery system comprises a cloud uploading module, a log recording module, a cloud storage module and an information recovery module, wherein the output end of the cloud uploading module is electrically connected with the input end of the log recording module, the output end of the cloud uploading module is connected with the input end of the cloud storage module, and the output end of the information recovery module is connected with the input end of the log recording module.
The invention also discloses an information security method, which specifically comprises the following steps:
s1, firstly, a user inputs a key through a user operation module, a key identification module detects whether the key input by the user is correct, the user operation module operates again after the correct key is input, the key detection module in the information uploading system is used for detecting the grade of the user, the information input module and the information transmission module are used for transmitting, and the firewall system detects whether the input information file is in the safety grade information storage module or not;
s2, transmitting information to a corresponding grade information storage module according to the grade of a detected user, monitoring an information file in real time through an information monitoring system, acquiring the information file from the grade information storage module through an information acquisition module, detecting the file according to an information analysis module, and if the information file is found to be abnormal, transmitting the file to an abnormal information isolation module through the information acquisition module and processing the abnormal file through an abnormal information processing module;
and S3, after the file in the level information storage module is uploaded, the information is transmitted to the cloud storage module through the cloud uploading module, the detailed condition is recorded through the log recording module, after the operator carries out misoperation on the information in the level information storage module, the information in the cloud storage module is recovered through the information recovery module, the detailed condition is recorded through the log recording module, and the higher-level operator can transfer the partial information of the level into the storage unit of the lower level of the operator through the information transfer module.
(III) advantageous effects
The invention provides an information security system and an information security method. Compared with the prior art, the method has the following beneficial effects:
(1) the information safety system and the information safety method, through the information safety system comprising an information checking module, a key identification module, a grade information storage module, a user operation module, an information transfer module, an information uploading system, a backup recovery system and an information monitoring system, the user operation module and the key identification module realize two-way connection, the output end of the information checking module is connected with the input end of the key identification module, the output end of the key identification module is connected with the input end of the grade information storage module, the grade information storage module realizes two-way connection with the backup recovery system, the grade information storage module realizes two-way connection with the information monitoring system, the output end of the user operation module is connected with the input end of the information transfer module, the output end of the user operation module is connected with the input end of the information uploading system, the output end of the information transfer module is connected with the input end of the grade, the level information storage module comprises an absolute security level information storage unit, a secret level information storage unit and an open level information storage unit, the output end of the absolute security level information storage unit is electrically connected with the secret level information storage unit, the level information storage module is divided into the open level information storage unit, the secret level information storage unit and the absolute security level information storage unit, an operator can check information files of own corresponding levels according to own key levels and only can transmit the files to the storage unit corresponding to the automatic level, virus interference is prevented, the information files are divided according to important levels through the structure, and the condition that the important information files are leaked is reduced to a large extent.
(2) The information security system and the information security method, through the information monitoring system comprising an information acquisition module, an information analysis module, an abnormal information isolation module and an abnormal information processing module, the output end of the information acquisition module is electrically connected with the input end of the information analysis module, and the information acquisition module is in bidirectional connection with the abnormal information isolation module, the output end of the information analysis module is electrically connected with the input end of the abnormal information isolation module, the abnormal information isolation module is in bidirectional connection with the abnormal information processing module, the information analysis module in the information monitoring system is arranged to monitor the change of the types and the like of the files in real time, when the files are found to be abnormal, the abnormal files are isolated, and the files are deleted through the abnormal information processing module, thereby preventing viruses from being disguised as common files to damage the system to a certain degree, further enhancing the safety thereof.
Drawings
FIG. 1 is a schematic block diagram of the construction of an information security system of the present invention;
FIG. 2 is a schematic block diagram of the structure of an information monitoring system according to the present invention;
FIG. 3 is a schematic block diagram of the structure of the information uploading system of the present invention;
FIG. 4 is a schematic block diagram of the structure of a hierarchical information storage module according to the present invention;
fig. 5 is a schematic block diagram of the structure of the backup-restore system of the present invention.
In the figure, 1-information security system, 11-information viewing module, 12-key identification module, 13-level information storage module, 131-secret information storage unit, 132-secret information storage unit, 133-open information storage unit, 14-user operation module, 15-information transfer module, 16-information upload system, 161-key detection module, 162-firewall system, 163-information input module, 164-information delivery module, 1641-open information delivery unit, 1642-seal information delivery unit, 1643-secret information delivery unit, 17-backup recovery system, 171-cloud upload module, 172-log recording module, 173-cloud storage module, 174-information recovery module, 18-an information monitoring system, 181-an information acquisition module, 182-an information analysis module, 183-an abnormal information isolation module and 184-an abnormal information processing module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-5, an embodiment of the present invention provides a technical solution: an information security system and an information security method, comprising an information security system 1, wherein the information security system 1 comprises an information viewing module 11, a key identification module 12, a level information storage module 13, a user operation module 14, an information releasing module 15, an information uploading system 16, a backup recovery system 17 and an information monitoring system 18, the user operation module 14 is in bidirectional connection with the key identification module 12, the output end of the information viewing module 11 is connected with the input end of the key identification module 12, the output end of the key identification module 12 is connected with the input end of the level information storage module 13, the level information storage module 13 is in bidirectional connection with the backup recovery system 17, the level information storage module 13 is in bidirectional connection with the information monitoring system 18, the output end of the user operation module 14 is connected with the input end of the information releasing module 15, and the output end of the user operation module 14 is connected with the input end of the information uploading system 16, the output end of the information transfer module 15 is connected with the input end of the level information storage module 13, the level information storage module 13 comprises a secret information storage unit 131, a secret information storage unit 132 and an open information storage unit 133, the output end of the secret information storage unit 131 is connected with the secret information storage unit 132, the output end of the secret information storage unit 132 is electrically connected with the input end of the open information storage unit 133, the information monitoring system 18 comprises an information acquisition module 181, an information analysis module 182, an abnormal information isolation module 183 and an abnormal information processing module 184, the output end of the information acquisition module 181 is electrically connected with the input end of the information analysis module 182, the information acquisition module 181 is in bidirectional connection with the abnormal information isolation module 183, the output end of the information analysis module 182 is electrically connected with the input end of the abnormal information isolation module 183, the abnormal information isolation module 183 is in bidirectional connection with the abnormal information processing module 184, the information uploading system 16 includes a key detection module 161, a firewall system 162, an information input module 163 and an information delivery module 164, the firewall system 162 is configured to perform preliminary detection on the type of a file, an output end of the key detection module 161 is connected to an input end of the information input module 163, an output end of the information input module 163 is connected to an input end of the firewall system 162, the firewall system 162 is connected to an input end of the information delivery module 164, the information delivery module 164 includes an open-level information delivery unit 1641, a sealed-level information delivery unit 1642 and a confidential-level information delivery unit 1643, the backup and recovery system 17 includes a cloud uploading module 171, a log recording module 172, a cloud storage module 173 and an information recovery module 174, an output end of the cloud uploading module 171 is electrically connected to an input end of the log recording module 172, the output end of the cloud uploading module 171 is connected to the input end of the cloud storage module 173, and the output end of the information recovery module 174 is connected to the input end of the logging module 172, and the contents not described in detail in this specification all belong to the prior art known to those skilled in the art.
The invention also discloses an information security method, which specifically comprises the following steps:
s1, firstly, the user inputs the key through the user operation module 14, the key identification module 12 detects whether the key input by the user is correct, the user operation module 14 operates again after the correct key is input, the key detection module 161 in the information uploading system 16 is used for detecting the grade of the user, the information input module 163 and the information transmission module 164 are used for transmitting, and the firewall system 162 is used for detecting the input information file to determine whether the input information file is in the safety grade information storage module 13;
s2, sending information to the corresponding grade information storage module 13 according to the grade of the detected user, monitoring the information file in real time through the information monitoring system 18, acquiring the information file from the grade information storage module 13 through the information acquisition module 181, detecting the file according to the information analysis module 182, if the information file is found to be abnormal, sending the file to the abnormal information isolation module 183 through the information acquisition module 181, and processing the abnormal file through the abnormal information processing module 184;
s3, after the file in the level information storage module 13 is uploaded, the information is transmitted to the cloud storage module 173 through the cloud uploading module 171, and the details are recorded through the log recording module 172, when the operator performs a misoperation on the information in the level information storage module 13, the information in the cloud storage module 173 is recovered through the information recovery module 174, and the details are recorded through the log recording module 172, and the higher-level operator can transfer part of the information of his level to the storage unit of his lower level through the information transfer module 15.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. An information security system comprising an information security system (1), characterized in that: the information security system (1) comprises an information checking module (11), a key identification module (12), a level information storage module (13), a user operation module (14), an information releasing module (15), an information uploading system (16), a backup and recovery system (17) and an information monitoring system (18), wherein the user operation module (14) is in bidirectional connection with the key identification module (12), the output end of the information checking module (11) is connected with the input end of the key identification module (12), the output end of the key identification module (12) is connected with the input end of the level information storage module (13), the level information storage module (13) is in bidirectional connection with the backup and recovery system (17), the level information storage module (13) is in bidirectional connection with the information monitoring system (18), and the output end of the user operation module (14) is connected with the input end of the information releasing module (15), and the output end of the user operation module (14) is connected with the input end of the information uploading system (16), and the output end of the information transferring module (15) is connected with the input end of the grade information storage module (13).
2. An information security system according to claim 1, wherein: the grade information storage module (13) comprises a secret grade information storage unit (131), a secret grade information storage unit (132) and an open grade information storage unit (133), wherein the output end of the secret grade information storage unit (131) is electrically connected with the secret grade information storage unit (132), and the output end of the secret grade information storage unit (132) is electrically connected with the input end of the open grade information storage unit (133).
3. An information security system according to claim 1, wherein: the information monitoring system (18) comprises an information acquisition module (181), an information analysis module (182), an abnormal information isolation module (183) and an abnormal information processing module (184), wherein the output end of the information acquisition module (181) is electrically connected with the input end of the information analysis module (182), and the information acquisition module (181) is in bidirectional connection with the abnormal information isolation module (183).
4. An information security system according to claim 3, wherein: the output end of the information analysis module (182) is electrically connected with the input end of the abnormal information isolation module (183), and the abnormal information isolation module (183) is in bidirectional connection with the abnormal information processing module (184).
5. An information security system according to claim 1, wherein: the information uploading system (16) comprises a key detection module (161), a firewall system (162), an information input module (163) and an information transmission module (164), wherein the output end of the key detection module (161) is connected with the input end of the information input module (163), the output end of the information input module (163) is connected with the input end of the firewall system (162), and the firewall system (162) is connected with the input end of the information transmission module (164).
6. An information security system according to claim 5, wherein: the information delivery module (164) comprises an open-level information delivery unit (1641), a sealed-level information delivery unit (1642) and a confidential-level information delivery unit (1643).
7. An information security system according to claim 1, wherein: backup and recovery system (17) are including high in the clouds upload module (171), logging module (172), high in the clouds storage module (173) and information recovery module (174), the output of high in the clouds upload module (171) and the input electric connection of logging module (172) to the output of high in the clouds upload module (171) is connected with the input of high in the clouds storage module (173), the output of information recovery module (174) and the input of logging module (172).
8. An information security method, characterized by: the method specifically comprises the following steps:
s1, firstly, a user inputs a key through a user operation module (14), whether the key input by the user is correct is detected through a key identification module (12), the correct key is input and then is operated through the user operation module (14), the grade of the user is detected through a key detection module (161) in an information uploading system (16), then the grade is transmitted through an information input module (163) and an information transmission module (164), and whether the input information file is detected in a safety grade information storage module (13) through a firewall system (162);
s2, information is transmitted to a corresponding grade information storage module (13) according to the grade of a detected user, an information file is monitored in real time through an information monitoring system (18), an information acquisition module (181) acquires the information file from the grade information storage module (13), the file is detected according to an information analysis module (182), if the information file is found to be abnormal, the file is transmitted to an abnormal information isolation module (183) through the information acquisition module (181), and the abnormal file is processed through an abnormal information processing module (184);
s3, after the file in the level information storage module (13) is uploaded, the information is transmitted to the cloud storage module (173) through the cloud uploading module (171), the detailed condition is recorded through the log recording module (172), after the operator carries out misoperation on the information in the level information storage module (13), the information in the cloud storage module (173) is recovered through the information recovery module (174), the detailed condition is recorded through the log recording module (172), and the higher-level operator can transfer part of the information of the level into the storage unit of the lower level through the information transfer module (15).
CN202010619215.7A 2020-06-30 2020-06-30 Information security system and information security method Active CN111832071B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010619215.7A CN111832071B (en) 2020-06-30 2020-06-30 Information security system and information security method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010619215.7A CN111832071B (en) 2020-06-30 2020-06-30 Information security system and information security method

Publications (2)

Publication Number Publication Date
CN111832071A true CN111832071A (en) 2020-10-27
CN111832071B CN111832071B (en) 2024-04-16

Family

ID=72901103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010619215.7A Active CN111832071B (en) 2020-06-30 2020-06-30 Information security system and information security method

Country Status (1)

Country Link
CN (1) CN111832071B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114401105A (en) * 2021-11-30 2022-04-26 北京基智科技有限公司 Internet personal privacy information safety protection system

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
US20120072723A1 (en) * 2010-09-20 2012-03-22 Security First Corp. Systems and methods for secure data sharing
US20150205979A1 (en) * 2012-06-19 2015-07-23 Beijing Qihoo Technology Company Limited Method and system for repairing file at user terminal
US20160275303A1 (en) * 2015-03-19 2016-09-22 Netskope, Inc. Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (ccs)
CN106131072A (en) * 2016-08-28 2016-11-16 姜俊 A kind of computer information safe system
CN107135211A (en) * 2017-04-25 2017-09-05 山东管理学院 A kind of Compositive Information Security Audit System and method
CN109242383A (en) * 2018-08-27 2019-01-18 合肥工业大学 Goods transportation method and system
CN109711126A (en) * 2019-01-03 2019-05-03 黄河科技学院 A kind of computer information safe management system and method
CN208922209U (en) * 2018-12-17 2019-05-31 郑州工业应用技术学院 A kind of laptop external connection keyboard support frame
CN110874483A (en) * 2019-09-26 2020-03-10 合肥触点传媒有限公司 Method and device for preventing personal information from being leaked
CN111131151A (en) * 2019-11-15 2020-05-08 苏州浪潮智能科技有限公司 Method and equipment for controlling security level of storage system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020010679A1 (en) * 2000-07-06 2002-01-24 Felsher David Paul Information record infrastructure, system and method
US20120072723A1 (en) * 2010-09-20 2012-03-22 Security First Corp. Systems and methods for secure data sharing
US20150205979A1 (en) * 2012-06-19 2015-07-23 Beijing Qihoo Technology Company Limited Method and system for repairing file at user terminal
US20160275303A1 (en) * 2015-03-19 2016-09-22 Netskope, Inc. Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (ccs)
CN106131072A (en) * 2016-08-28 2016-11-16 姜俊 A kind of computer information safe system
CN107135211A (en) * 2017-04-25 2017-09-05 山东管理学院 A kind of Compositive Information Security Audit System and method
CN109242383A (en) * 2018-08-27 2019-01-18 合肥工业大学 Goods transportation method and system
CN208922209U (en) * 2018-12-17 2019-05-31 郑州工业应用技术学院 A kind of laptop external connection keyboard support frame
CN109711126A (en) * 2019-01-03 2019-05-03 黄河科技学院 A kind of computer information safe management system and method
CN110874483A (en) * 2019-09-26 2020-03-10 合肥触点传媒有限公司 Method and device for preventing personal information from being leaked
CN111131151A (en) * 2019-11-15 2020-05-08 苏州浪潮智能科技有限公司 Method and equipment for controlling security level of storage system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
ASIF等: ""Impact of storage of mobile on quality of experience (QoE) at user level accessing cloud"", PROCEEDINGS OF 2017 IEEE 9TH ICCSN, pages 1402 - 1409 *
刘芳,刘文成: ""计算机网络信息安全思考"", 信息与电脑(理论版), pages 36 *
朱修阳;吴圣杰;: "检察信息系统分级保护研究和体会", 信息网络安全, no. 12, 10 December 2009 (2009-12-10), pages 32 - 33 *
赵红超等: ""网络应用系统的信息安全模型设计和应用"", 硅谷, pages 129 *
陈丹伟等: ""基于动态信用等级的密文访问控制方案"", 计算机应用, pages 1587 - 1592 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114401105A (en) * 2021-11-30 2022-04-26 北京基智科技有限公司 Internet personal privacy information safety protection system

Also Published As

Publication number Publication date
CN111832071B (en) 2024-04-16

Similar Documents

Publication Publication Date Title
CN101626368A (en) Device, method and system for preventing web page from being distorted
US9854000B2 (en) Method and apparatus for detecting malicious software using handshake information
CN106503524B (en) A kind of computer network security guard system
CN103914899A (en) Alarm entrance guard controller and control system and method thereof
CN103441926A (en) Security gateway system of numerically-controlled machine tool network
CN103593616A (en) System and method for preventing and controlling USB flash disk viruses in enterprise information network
CN105205581A (en) Power-supply-enterprise electronic file safety risk evaluation system
CN111832071A (en) Information security system and information security method
US10721135B1 (en) Edge computing system for monitoring and maintaining data center operations
CN110826094A (en) Information leakage monitoring method and device
CN113810366A (en) Website uploaded file safety identification system and method
CN109753410A (en) O&M service system based on big data
CN101699456A (en) Computer security system and method thereof
CN101122988B (en) Safe treatment method of network tax-control system
JP2020086978A (en) Information processing system and information processing method
EP4199390A1 (en) Computer network hacking prevention system and method
CN214627029U (en) File transmission system based on virus prevention and traceability
CN209897087U (en) VPN technology-based whole network management monitoring system
KR102024148B1 (en) An access control system of monitoring the file data during file transferring
KR100265978B1 (en) Method and apparatus for communication controlling between terminal equipment and branch processor
CN207490952U (en) A kind of Maintenance of Computer Network system
CN111970348B (en) Cloud desktop management platform
KR20200071793A (en) Block Chain Solution Providing System to Ensure Data Integrity of Private Data-set, and Process Method thereof
CN103729921A (en) Door control data processing method and device based on data monitoring
CN117077227B (en) Abnormality monitoring method and system based on USB level signal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information

Inventor after: Liu Liwei

Inventor after: Zhao Hongchao

Inventor after: Liu Wencheng

Inventor before: Liu Wencheng

Inventor before: Liu Liwei

Inventor before: Zhao Hongchao

CB03 Change of inventor or designer information
GR01 Patent grant
GR01 Patent grant