CN109246087A - A kind of information storage system based on network security - Google Patents
A kind of information storage system based on network security Download PDFInfo
- Publication number
- CN109246087A CN109246087A CN201810941369.0A CN201810941369A CN109246087A CN 109246087 A CN109246087 A CN 109246087A CN 201810941369 A CN201810941369 A CN 201810941369A CN 109246087 A CN109246087 A CN 109246087A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- data
- storage system
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of information storage systems based on network security, including login module, memory module, acquisition module, authentication module, defense module and processing module, login module is for registering and uploading storing data, memory module is for arranging, save and back up the data of user, acquisition module is used to obtain the identity information of user, authentication module carries out the verifying of identity by the unlock instruction and mode of setting for user and carries out checking and retrieving for storage content by the change of data, defense module includes resisting module, cancellation module and logging modle, module is resisted for when suffering from extraneous signal attack, carry out the protection and defence of data, cancellation module carries out erasing for data when encountering the signal to attack that can not be resisted, logging modle is used to record the process for meeting with attack and search the signal source of attack, processing The recovery of the problem of when module is for handling user browse data and data.
Description
Technical field
The present invention relates to network safety fileds, and in particular to a kind of information storage system based on network security.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or
The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
With the development of society and the progress of science and technology, the popularization degree of network is higher and higher, and people store weight by network
Want the specific gravity of information increasing, still, during data storage, network security cannot be ensured, number can occur often
The case where according to loss and damage, it is now desired to which a kind of information storage system can ensure the information security of user.
Summary of the invention
Goal of the invention:
The present invention be directed to present information storage system cannot intelligence protection storing data and ask what data were restored
Topic, a kind of information storage system based on network security proposed, the information storage system that can have effective solution present is not
Can intelligence protection storing data and the problem of restore to data, improve the safety of information storage and protect user
Personal property.
Technical solution:
A kind of information storage system based on network security, including it is login module, memory module, acquisition module, authentication module, anti-
Imperial module and processing module, the login module include registration module and transmission module, and the registration module passes through for user
Personal information and trip record carry out the registering and logging of account, and the transmission module uploads the information for needing to store for user
And select the mode of storage;
The memory module includes sorting module, preserving module and backup module, what the sorting module was used to upload user
Data carries out the classification processing of purposes and format, and the data that the preserving module is used to upload user carries out on local and line
Storage, the data that the backup module is used to upload user carry out back-up processing;
The acquisition module includes actively obtaining module and passive acquisition module, and the module that actively obtains is for user's active
Pass own characteristic information, the passive physical trait and operating characteristics for obtaining module and being used to actively obtain user;
The authentication module for user by the unlock instruction and mode of setting carries out the verifying of identity and by the change of data
More carry out checking and retrieving for storage content;
The defense module includes resisting module, cancellation module and logging modle, it is described resist module for suffer from it is external
When signal is attacked, the protection and defence of data are carried out, the cancellation module is counted when encountering the signal to attack that can not be resisted
According to erase, the logging modle be used for record meet with attack process and search attack signal source;
The recovery of the problem of when the processing module is for handling user browse data and data.
Further, the passive acquisition module includes screen recording device, capturing apparatus and acquisition device, the screen
Recording device is used to record operating procedure and time interval of the user when using data terminal, and the capturing apparatus is for obtaining
The macroscopic features and expression shape change of user, the acquisition device is for obtaining user's body feature.
Further, the authentication module includes that instruction module, sending module and change module, described instruction module are used for
User is actively entered the instruction type for unlocking storing data, and the sending module is used to send relevant certification letter to user
Breath and method of adjustment, the change module for user according to the information of the sending module come to storing data carry out editor with
Adjustment.
Further, the module of resisting includes monitoring submodule and deletes submodule, and the monitoring submodule is for supervising
The situation of change that control customer flow uses, the browsing record and cutting network share deleted submodule and be used to delete user.
Further, the processing module includes recovery module and management module, and the recovery module is for passing through local
The data of storage carry out the reparation of data, and the management module is used to cut off the company of network in real time when the data in user's browsing
It connects.
Further, the information storage system is additionally provided with timing module, for the time according to user setting, carries out line
The browsing of removing and the timing of upper data.
Further, the information storage system is additionally provided with conversion module, for according to time and user's browsing time into
The transformation of row data storage terminal.
Further, the information storage system is additionally provided with recommending module, and the data for being uploaded according to user carry out phase
The recommendation of same type data.
The present invention realize it is following the utility model has the advantages that
The present invention carries out the acquisition of user characteristics by acquisition module, carries out user identity using login module and authentication module
The data of certification and upload user is carried out the protection of user data by memory module, defense module, can not resisted suffering from
Network attack when, by delete data and increase extraneous data carry out the protection to data, data are carried out by processing module
Recovery and safety browsing, data are further protected using timing module and conversion module, prevent losing for data
It loses, increases the safety of data storage, ensured the individual interest of user.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is information storage system structural block diagram of the present invention;
Fig. 2 is login module structural block diagram of the present invention;
Fig. 3 is memory module configuration block diagram of the present invention;
Fig. 4 is acquisition module structural block diagram of the present invention;
Fig. 5 is authentication module structural block diagram of the present invention;
Fig. 6 is defense module structural block diagram of the present invention;
Fig. 7 is processing module structural block diagram of the present invention.
Appended drawing reference:
Login module 010;Memory module 020;Acquisition module 030;Authentication module 040;Defense module 050;Processing module 060;
Timing module 070;Conversion module 080;Recommending module 090;Registration module 011;Transmission module 012;Sorting module 021;It saves
Module 022;Backup module 023;Actively obtain module 031;It is passive to obtain module 032;Instruction module 041;Sending module 042;
Change module 043;Resist module 051;Cancellation module 052;Logging modle 053;Recovery module 061;Management module 062.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig. 1-7, the present invention provides a kind of technical solution, a kind of information storage system based on network security, including
Login module 010, memory module 020, acquisition module 030, authentication module 040, defense module 050 and processing module 060,
In, the login module 010 includes registration module 011 and transmission module 012, and the registration module 011 passes through a for user
People's information and trip record carry out account registering and logging, the personal information of user include the identity card of user, occupation and often
Debarkation point, trip record the when and where for speculating user browse data, carry out account by the verifying of information and address
Number login, the transmission module 012 uploads the mode for needing the information that stores and selecting storage, the information of upload for user
Including text, audio, picture and video, the mode of storage include global storage and segment storage, user by self delete into
The zonal segment storage of row, avoids the leakage of data;
The memory module 020 includes sorting module 021, preserving module 022 and backup module 023, and the sorting module 021 is used
The classification processing of purposes and format is carried out in the data for uploading user, user can be ranked up by self editor or be
System automatically arranges, when system automatic arranging by obtain user reading authorization carry out data reading classifying or
According to the title that user names, the data that the preserving module 022 is used to upload user carries out the storage on local and line,
User store on line when deleting, the elimination that system is locally stored, and printing including papery, storage dish is locally stored
The preservation of copy and primary server, the data that the backup module 023 is used to upload user carries out back-up processing, in user
When deletion data, the temporary storage of data is carried out, can be recovered by backup information;
The acquisition module 030 includes actively obtaining module 031 and passive acquisition module 032, described actively to obtain the use of module 031
In user's active upload own characteristic information, habit and common expressions including user, the passive acquisition module 032 is for leading
The dynamic physical trait and operating characteristics for obtaining user, the verifying and unlock of account are carried out according to information the characteristics of user;
The authentication module 040 carries out the verifying of identity by the unlock instruction and mode of setting for user and passes through data
Change carries out storage content and checking and retrieving, and after authentication, general materials can carry out checking at any time, and user marks
The capsule information of note need the conversion that user is cooperated, and just can normally browse, and user no longer connects during conversion
Connect network;
The defense module 050 includes resisting module 051, cancellation module 052 and logging modle 053, described to resist the use of module 051
In when suffering from extraneous signal attack, the protection and defence of data are carried out, according to different degrees of network attack information, is carried out
The part migration of signal to attack and data is eliminated, the cancellation module 052 is counted when encountering the signal to attack that can not be resisted
According to erase, the addition of false content is carried out while erasing, upsets other people acquisition content, the logging modle 053 is used
The process of attack is met in record and searches the signal source of attack, and the overall process by analyzing attack is on the defensive module 050
Optimization, according to the inquiry in signal to attack source, is further protected;
The recovery of the problem of when the processing module 060 is for handling user browse data and data, according to the loss feelings of data
The information being locally stored is carried out timely data and poured by condition, restores data on the line of user.
Wherein, the passive acquisition module 032 includes screen recording device, capturing apparatus and acquisition device, the screen
Recording device is used to record operating procedure and time interval of the user when using data terminal, and data terminal includes that hand is mechanical, electrical
The time of brain and plate, the click habit and browsing that record user carries out the unlock of data, guarantees the safety of user data, described
Capturing apparatus is used to obtain the macroscopic features and expression shape change of user, is shot and is compared by camera in unlock, institute
Acquisition device is stated to be used to obtain user's body feature, including fingerprint acquisition device, iris acquisition device and vocal print acquisition device,
The unlock of data is carried out when verifying by the auxiliary of above-mentioned different characteristic.
Wherein, the authentication module 040 includes instruction module 041, sending module 042 and change module 043, described instruction
Module 041 is actively entered the instruction type for unlocking storing data, including common sentence for user, the cooperation of movement and
The collocation of color, the sending module 042 are used to send relevant authentication information and method of adjustment, the change module to user
043 edits storing data and adjusts for user according to the information of the sending module 042, and important data are under
The acquisition of right is downloaded when load by the Change Password that system is arranged, is that form or the arrangement of messy code are suitable when downloading
Sequence is chaotic, and user carries out the arrangement of data by the method for adjustment that system provides, and the method for adjustment includes that each text is corresponding
The format change of picture corresponding frame number position and file in position, video.
Wherein, the module 051 of resisting includes monitoring submodule and deletes submodule, and the monitoring submodule is for monitoring
The situation of change that customer flow uses carries out the cutting of subscriber network, and carry out data when customer flow exceeds conventional amounts
Deletion, it is described delete submodule be used for delete user browsing record and cutting network share.
Wherein, the processing module 060 includes recovery module 061 and management module 062, and the recovery module 061 is used for
The reparation of data is carried out by the data being locally stored, the management module 062 is used to cut in real time when the data in user's browsing
The connection of circuit network carries out the cutting of network when user checks data after the completion of page load, close browser interface in user
When, carry out the connection of network.
Wherein, the information storage system is additionally provided with timing module 070, for the time according to user setting, carries out line
The browsing of removing and the timing of upper data, self setting holding time of user, beyond the deletion for carrying out data after the time, in user
The access of data is not available for except the browsing data time of setting.
Wherein, the information storage system is additionally provided with conversion module 080, for being carried out according to time and user's browsing time
The transformation of data storage terminal when data save a period of time or browsing time beyond setting value, carries out data storage terminal
Transformation.
Wherein, the information storage system is additionally provided with recommending module 090, and the data for being uploaded according to user carry out identical
The recommendation of categorical data.
The above embodiments merely illustrate the technical concept and features of the present invention, and the purpose is to allow the skill for being familiar with the technical field
Art personnel can understand the content of the present invention and implement it accordingly, and can not be limited the scope of the invention with this.All bases
Equivalent changes or modifications made by spirit of the invention, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of information storage system based on network security, including login module, memory module, acquisition module, authentication module,
Defense module and processing module, it is characterised in that: the login module includes registration module and transmission module, the registration module
The registering and logging of account is carried out by personal information and trip record for user, the transmission module is uploaded for user and needed
The information to be stored and the mode for selecting storage;
The memory module includes sorting module, preserving module and backup module, what the sorting module was used to upload user
Data carries out the classification processing of purposes and format, and the data that the preserving module is used to upload user carries out on local and line
Storage, the data that the backup module is used to upload user carry out back-up processing;
The acquisition module includes actively obtaining module and passive acquisition module, and the module that actively obtains is for user's active
Pass own characteristic information, the passive physical trait and operating characteristics for obtaining module and being used to actively obtain user;
The authentication module for user by the unlock instruction and mode of setting carries out the verifying of identity and by the change of data
More carry out checking and retrieving for storage content;
The defense module includes resisting module, cancellation module and logging modle, it is described resist module for suffer from it is external
When signal is attacked, the protection and defence of data are carried out, the cancellation module is counted when encountering the signal to attack that can not be resisted
According to erase, the logging modle be used for record meet with attack process and search attack signal source;
The recovery of the problem of when the processing module is for handling user browse data and data.
2. a kind of information storage system based on network security according to claim 1, it is characterised in that: described passively to obtain
Modulus block includes screen recording device, capturing apparatus and acquisition device, and the screen recording device is being used for recording user
Operating procedure and time interval when data terminal, the capturing apparatus are used to obtain the macroscopic features and expression shape change of user,
The acquisition device is for obtaining user's body feature.
3. a kind of information storage system based on network security according to claim 1, it is characterised in that: the verifying mould
Block includes instruction module, sending module and change module, and described instruction module is actively entered for user for unlocking storage number
According to instruction type, the sending module is used to send relevant authentication information and method of adjustment, the change module to user
Storing data is edited and is adjusted according to the information of the sending module for user.
4. a kind of information storage system based on network security according to claim 1, it is characterised in that: described to resist mould
Block includes monitoring submodule and deletes submodule, and the monitoring submodule is for monitoring the situation of change that customer flow uses, institute
It states and deletes browsing record and cutting network share that submodule is used to delete user.
5. a kind of information storage system based on network security according to claim 1, it is characterised in that: the processing mould
Block includes recovery module and management module, and the recovery module is used to carry out the reparation of data, institute by the data being locally stored
Management module is stated for cutting off the connection of network when data in real time in user's browsing.
6. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited
Storage system is additionally provided with timing module, for the time according to user setting, carries out the browsing of removing and the timing of data on line.
7. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited
Storage system is additionally provided with conversion module, for carrying out the transformation of data storage terminal according to time and user's browsing time.
8. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited
Storage system is additionally provided with recommending module, and the data for being uploaded according to user carry out the recommendation of same type data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810941369.0A CN109246087A (en) | 2018-08-17 | 2018-08-17 | A kind of information storage system based on network security |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810941369.0A CN109246087A (en) | 2018-08-17 | 2018-08-17 | A kind of information storage system based on network security |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246087A true CN109246087A (en) | 2019-01-18 |
Family
ID=65071439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810941369.0A Pending CN109246087A (en) | 2018-08-17 | 2018-08-17 | A kind of information storage system based on network security |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246087A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112511983A (en) * | 2020-11-24 | 2021-03-16 | 周口师范学院 | Privacy protection system and protection method based on position of Internet of vehicles |
CN113329029A (en) * | 2021-06-18 | 2021-08-31 | 上海纽盾科技股份有限公司 | Situation awareness node defense method and system for APT attack |
CN114513336A (en) * | 2022-01-18 | 2022-05-17 | 国家广播电视总局广播电视规划院 | Network security platform construction method based on threat intelligence and intelligent identification algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101403993A (en) * | 2008-07-28 | 2009-04-08 | 清华大学深圳研究生院 | Data security safekeeping equipment and method |
CN201274047Y (en) * | 2008-07-29 | 2009-07-15 | 清华大学深圳研究生院 | Data security keeping device |
CN205594622U (en) * | 2016-04-28 | 2016-09-21 | 李春燕 | Computer storage system |
US20170250984A1 (en) * | 2013-06-28 | 2017-08-31 | Bmc Software, Inc. | Authentication proxy agent |
-
2018
- 2018-08-17 CN CN201810941369.0A patent/CN109246087A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101403993A (en) * | 2008-07-28 | 2009-04-08 | 清华大学深圳研究生院 | Data security safekeeping equipment and method |
CN201274047Y (en) * | 2008-07-29 | 2009-07-15 | 清华大学深圳研究生院 | Data security keeping device |
US20170250984A1 (en) * | 2013-06-28 | 2017-08-31 | Bmc Software, Inc. | Authentication proxy agent |
CN205594622U (en) * | 2016-04-28 | 2016-09-21 | 李春燕 | Computer storage system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112511983A (en) * | 2020-11-24 | 2021-03-16 | 周口师范学院 | Privacy protection system and protection method based on position of Internet of vehicles |
CN113329029A (en) * | 2021-06-18 | 2021-08-31 | 上海纽盾科技股份有限公司 | Situation awareness node defense method and system for APT attack |
CN113329029B (en) * | 2021-06-18 | 2022-10-14 | 上海纽盾科技股份有限公司 | Situation awareness node defense method and system for APT attack |
CN114513336A (en) * | 2022-01-18 | 2022-05-17 | 国家广播电视总局广播电视规划院 | Network security platform construction method based on threat intelligence and intelligent identification algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246087A (en) | A kind of information storage system based on network security | |
CN104063473B (en) | A kind of database audit monitoring system and its method | |
US6687703B2 (en) | Information filtering system and information filtering method | |
CN104540123B (en) | The method and system of mobile terminal significant data encrypted backup and safety deleting | |
CN101833624B (en) | Information machine and access control method thereof | |
JP6403784B2 (en) | Surveillance camera system | |
US20080301207A1 (en) | Systems and methods for cascading destruction of electronic data in electronic evidence management | |
CN107832196A (en) | A kind of monitoring device and monitoring method for real-time logs anomalous content | |
CN101589379A (en) | A system and method for managing data across multiple environments | |
WO2021145565A1 (en) | Method, apparatus, and system for managing image captured by drone | |
CN107563192A (en) | A kind of means of defence for extorting software, device, electronic equipment and storage medium | |
JPWO2007135871A1 (en) | Information management system | |
WO2020158078A1 (en) | System for face authentication and method for face authentication | |
CN108694246A (en) | A kind of mask method and system of video-with-audio recording instrument record file | |
CN113794777A (en) | Safety file ferrying system | |
CN116383693A (en) | Data issuing method based on data security automatic classification grading result | |
CN111047729A (en) | Attendance system and method based on intelligent access control | |
CN107315974A (en) | A kind of image-forming media protection device based on Internet of Things | |
JP2022176383A (en) | Face authentication system, face authentication management device, face authentication management method, and face authentication management program | |
CN109885994A (en) | A kind of offline identity authorization system, equipment and computer readable storage medium | |
CN109189467A (en) | Software version control method under a kind of distributed environment | |
Rahman et al. | Framework Analysis of IDFIF V2 in WhatsApp Investigation Process on Android Smartphones | |
CN107633411A (en) | Authentication administrative system | |
Zaenuddin et al. | National Institute of Standards And Technology (NINST) Method for Cyber Crime Using Forensic Data on Smartphone | |
TWI430130B (en) | File usage permission management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |