CN109246087A - A kind of information storage system based on network security - Google Patents

A kind of information storage system based on network security Download PDF

Info

Publication number
CN109246087A
CN109246087A CN201810941369.0A CN201810941369A CN109246087A CN 109246087 A CN109246087 A CN 109246087A CN 201810941369 A CN201810941369 A CN 201810941369A CN 109246087 A CN109246087 A CN 109246087A
Authority
CN
China
Prior art keywords
module
user
data
storage system
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810941369.0A
Other languages
Chinese (zh)
Inventor
顾健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Mesa Software Technology Co Ltd
Original Assignee
Suzhou Mesa Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Mesa Software Technology Co Ltd filed Critical Suzhou Mesa Software Technology Co Ltd
Priority to CN201810941369.0A priority Critical patent/CN109246087A/en
Publication of CN109246087A publication Critical patent/CN109246087A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of information storage systems based on network security, including login module, memory module, acquisition module, authentication module, defense module and processing module, login module is for registering and uploading storing data, memory module is for arranging, save and back up the data of user, acquisition module is used to obtain the identity information of user, authentication module carries out the verifying of identity by the unlock instruction and mode of setting for user and carries out checking and retrieving for storage content by the change of data, defense module includes resisting module, cancellation module and logging modle, module is resisted for when suffering from extraneous signal attack, carry out the protection and defence of data, cancellation module carries out erasing for data when encountering the signal to attack that can not be resisted, logging modle is used to record the process for meeting with attack and search the signal source of attack, processing The recovery of the problem of when module is for handling user browse data and data.

Description

A kind of information storage system based on network security
Technical field
The present invention relates to network safety fileds, and in particular to a kind of information storage system based on network security.
Background technique
Network security refers to that the data in the hardware, software and its system of network system are protected, not because accidental or The reason of person's malice and by destruction, change, leakage, system is continuously reliably normally run, and network service is not interrupted.
With the development of society and the progress of science and technology, the popularization degree of network is higher and higher, and people store weight by network Want the specific gravity of information increasing, still, during data storage, network security cannot be ensured, number can occur often The case where according to loss and damage, it is now desired to which a kind of information storage system can ensure the information security of user.
Summary of the invention
Goal of the invention:
The present invention be directed to present information storage system cannot intelligence protection storing data and ask what data were restored Topic, a kind of information storage system based on network security proposed, the information storage system that can have effective solution present is not Can intelligence protection storing data and the problem of restore to data, improve the safety of information storage and protect user Personal property.
Technical solution:
A kind of information storage system based on network security, including it is login module, memory module, acquisition module, authentication module, anti- Imperial module and processing module, the login module include registration module and transmission module, and the registration module passes through for user Personal information and trip record carry out the registering and logging of account, and the transmission module uploads the information for needing to store for user And select the mode of storage;
The memory module includes sorting module, preserving module and backup module, what the sorting module was used to upload user Data carries out the classification processing of purposes and format, and the data that the preserving module is used to upload user carries out on local and line Storage, the data that the backup module is used to upload user carry out back-up processing;
The acquisition module includes actively obtaining module and passive acquisition module, and the module that actively obtains is for user's active Pass own characteristic information, the passive physical trait and operating characteristics for obtaining module and being used to actively obtain user;
The authentication module for user by the unlock instruction and mode of setting carries out the verifying of identity and by the change of data More carry out checking and retrieving for storage content;
The defense module includes resisting module, cancellation module and logging modle, it is described resist module for suffer from it is external When signal is attacked, the protection and defence of data are carried out, the cancellation module is counted when encountering the signal to attack that can not be resisted According to erase, the logging modle be used for record meet with attack process and search attack signal source;
The recovery of the problem of when the processing module is for handling user browse data and data.
Further, the passive acquisition module includes screen recording device, capturing apparatus and acquisition device, the screen Recording device is used to record operating procedure and time interval of the user when using data terminal, and the capturing apparatus is for obtaining The macroscopic features and expression shape change of user, the acquisition device is for obtaining user's body feature.
Further, the authentication module includes that instruction module, sending module and change module, described instruction module are used for User is actively entered the instruction type for unlocking storing data, and the sending module is used to send relevant certification letter to user Breath and method of adjustment, the change module for user according to the information of the sending module come to storing data carry out editor with Adjustment.
Further, the module of resisting includes monitoring submodule and deletes submodule, and the monitoring submodule is for supervising The situation of change that control customer flow uses, the browsing record and cutting network share deleted submodule and be used to delete user.
Further, the processing module includes recovery module and management module, and the recovery module is for passing through local The data of storage carry out the reparation of data, and the management module is used to cut off the company of network in real time when the data in user's browsing It connects.
Further, the information storage system is additionally provided with timing module, for the time according to user setting, carries out line The browsing of removing and the timing of upper data.
Further, the information storage system is additionally provided with conversion module, for according to time and user's browsing time into The transformation of row data storage terminal.
Further, the information storage system is additionally provided with recommending module, and the data for being uploaded according to user carry out phase The recommendation of same type data.
The present invention realize it is following the utility model has the advantages that
The present invention carries out the acquisition of user characteristics by acquisition module, carries out user identity using login module and authentication module The data of certification and upload user is carried out the protection of user data by memory module, defense module, can not resisted suffering from Network attack when, by delete data and increase extraneous data carry out the protection to data, data are carried out by processing module Recovery and safety browsing, data are further protected using timing module and conversion module, prevent losing for data It loses, increases the safety of data storage, ensured the individual interest of user.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and consistent with the instructions for explaining the principles of this disclosure.
Fig. 1 is information storage system structural block diagram of the present invention;
Fig. 2 is login module structural block diagram of the present invention;
Fig. 3 is memory module configuration block diagram of the present invention;
Fig. 4 is acquisition module structural block diagram of the present invention;
Fig. 5 is authentication module structural block diagram of the present invention;
Fig. 6 is defense module structural block diagram of the present invention;
Fig. 7 is processing module structural block diagram of the present invention.
Appended drawing reference:
Login module 010;Memory module 020;Acquisition module 030;Authentication module 040;Defense module 050;Processing module 060; Timing module 070;Conversion module 080;Recommending module 090;Registration module 011;Transmission module 012;Sorting module 021;It saves Module 022;Backup module 023;Actively obtain module 031;It is passive to obtain module 032;Instruction module 041;Sending module 042; Change module 043;Resist module 051;Cancellation module 052;Logging modle 053;Recovery module 061;Management module 062.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig. 1-7, the present invention provides a kind of technical solution, a kind of information storage system based on network security, including Login module 010, memory module 020, acquisition module 030, authentication module 040, defense module 050 and processing module 060, In, the login module 010 includes registration module 011 and transmission module 012, and the registration module 011 passes through a for user People's information and trip record carry out account registering and logging, the personal information of user include the identity card of user, occupation and often Debarkation point, trip record the when and where for speculating user browse data, carry out account by the verifying of information and address Number login, the transmission module 012 uploads the mode for needing the information that stores and selecting storage, the information of upload for user Including text, audio, picture and video, the mode of storage include global storage and segment storage, user by self delete into The zonal segment storage of row, avoids the leakage of data;
The memory module 020 includes sorting module 021, preserving module 022 and backup module 023, and the sorting module 021 is used The classification processing of purposes and format is carried out in the data for uploading user, user can be ranked up by self editor or be System automatically arranges, when system automatic arranging by obtain user reading authorization carry out data reading classifying or According to the title that user names, the data that the preserving module 022 is used to upload user carries out the storage on local and line, User store on line when deleting, the elimination that system is locally stored, and printing including papery, storage dish is locally stored The preservation of copy and primary server, the data that the backup module 023 is used to upload user carries out back-up processing, in user When deletion data, the temporary storage of data is carried out, can be recovered by backup information;
The acquisition module 030 includes actively obtaining module 031 and passive acquisition module 032, described actively to obtain the use of module 031 In user's active upload own characteristic information, habit and common expressions including user, the passive acquisition module 032 is for leading The dynamic physical trait and operating characteristics for obtaining user, the verifying and unlock of account are carried out according to information the characteristics of user;
The authentication module 040 carries out the verifying of identity by the unlock instruction and mode of setting for user and passes through data Change carries out storage content and checking and retrieving, and after authentication, general materials can carry out checking at any time, and user marks The capsule information of note need the conversion that user is cooperated, and just can normally browse, and user no longer connects during conversion Connect network;
The defense module 050 includes resisting module 051, cancellation module 052 and logging modle 053, described to resist the use of module 051 In when suffering from extraneous signal attack, the protection and defence of data are carried out, according to different degrees of network attack information, is carried out The part migration of signal to attack and data is eliminated, the cancellation module 052 is counted when encountering the signal to attack that can not be resisted According to erase, the addition of false content is carried out while erasing, upsets other people acquisition content, the logging modle 053 is used The process of attack is met in record and searches the signal source of attack, and the overall process by analyzing attack is on the defensive module 050 Optimization, according to the inquiry in signal to attack source, is further protected;
The recovery of the problem of when the processing module 060 is for handling user browse data and data, according to the loss feelings of data The information being locally stored is carried out timely data and poured by condition, restores data on the line of user.
Wherein, the passive acquisition module 032 includes screen recording device, capturing apparatus and acquisition device, the screen Recording device is used to record operating procedure and time interval of the user when using data terminal, and data terminal includes that hand is mechanical, electrical The time of brain and plate, the click habit and browsing that record user carries out the unlock of data, guarantees the safety of user data, described Capturing apparatus is used to obtain the macroscopic features and expression shape change of user, is shot and is compared by camera in unlock, institute Acquisition device is stated to be used to obtain user's body feature, including fingerprint acquisition device, iris acquisition device and vocal print acquisition device, The unlock of data is carried out when verifying by the auxiliary of above-mentioned different characteristic.
Wherein, the authentication module 040 includes instruction module 041, sending module 042 and change module 043, described instruction Module 041 is actively entered the instruction type for unlocking storing data, including common sentence for user, the cooperation of movement and The collocation of color, the sending module 042 are used to send relevant authentication information and method of adjustment, the change module to user 043 edits storing data and adjusts for user according to the information of the sending module 042, and important data are under The acquisition of right is downloaded when load by the Change Password that system is arranged, is that form or the arrangement of messy code are suitable when downloading Sequence is chaotic, and user carries out the arrangement of data by the method for adjustment that system provides, and the method for adjustment includes that each text is corresponding The format change of picture corresponding frame number position and file in position, video.
Wherein, the module 051 of resisting includes monitoring submodule and deletes submodule, and the monitoring submodule is for monitoring The situation of change that customer flow uses carries out the cutting of subscriber network, and carry out data when customer flow exceeds conventional amounts Deletion, it is described delete submodule be used for delete user browsing record and cutting network share.
Wherein, the processing module 060 includes recovery module 061 and management module 062, and the recovery module 061 is used for The reparation of data is carried out by the data being locally stored, the management module 062 is used to cut in real time when the data in user's browsing The connection of circuit network carries out the cutting of network when user checks data after the completion of page load, close browser interface in user When, carry out the connection of network.
Wherein, the information storage system is additionally provided with timing module 070, for the time according to user setting, carries out line The browsing of removing and the timing of upper data, self setting holding time of user, beyond the deletion for carrying out data after the time, in user The access of data is not available for except the browsing data time of setting.
Wherein, the information storage system is additionally provided with conversion module 080, for being carried out according to time and user's browsing time The transformation of data storage terminal when data save a period of time or browsing time beyond setting value, carries out data storage terminal Transformation.
Wherein, the information storage system is additionally provided with recommending module 090, and the data for being uploaded according to user carry out identical The recommendation of categorical data.
The above embodiments merely illustrate the technical concept and features of the present invention, and the purpose is to allow the skill for being familiar with the technical field Art personnel can understand the content of the present invention and implement it accordingly, and can not be limited the scope of the invention with this.All bases Equivalent changes or modifications made by spirit of the invention, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of information storage system based on network security, including login module, memory module, acquisition module, authentication module, Defense module and processing module, it is characterised in that: the login module includes registration module and transmission module, the registration module The registering and logging of account is carried out by personal information and trip record for user, the transmission module is uploaded for user and needed The information to be stored and the mode for selecting storage;
The memory module includes sorting module, preserving module and backup module, what the sorting module was used to upload user Data carries out the classification processing of purposes and format, and the data that the preserving module is used to upload user carries out on local and line Storage, the data that the backup module is used to upload user carry out back-up processing;
The acquisition module includes actively obtaining module and passive acquisition module, and the module that actively obtains is for user's active Pass own characteristic information, the passive physical trait and operating characteristics for obtaining module and being used to actively obtain user;
The authentication module for user by the unlock instruction and mode of setting carries out the verifying of identity and by the change of data More carry out checking and retrieving for storage content;
The defense module includes resisting module, cancellation module and logging modle, it is described resist module for suffer from it is external When signal is attacked, the protection and defence of data are carried out, the cancellation module is counted when encountering the signal to attack that can not be resisted According to erase, the logging modle be used for record meet with attack process and search attack signal source;
The recovery of the problem of when the processing module is for handling user browse data and data.
2. a kind of information storage system based on network security according to claim 1, it is characterised in that: described passively to obtain Modulus block includes screen recording device, capturing apparatus and acquisition device, and the screen recording device is being used for recording user Operating procedure and time interval when data terminal, the capturing apparatus are used to obtain the macroscopic features and expression shape change of user, The acquisition device is for obtaining user's body feature.
3. a kind of information storage system based on network security according to claim 1, it is characterised in that: the verifying mould Block includes instruction module, sending module and change module, and described instruction module is actively entered for user for unlocking storage number According to instruction type, the sending module is used to send relevant authentication information and method of adjustment, the change module to user Storing data is edited and is adjusted according to the information of the sending module for user.
4. a kind of information storage system based on network security according to claim 1, it is characterised in that: described to resist mould Block includes monitoring submodule and deletes submodule, and the monitoring submodule is for monitoring the situation of change that customer flow uses, institute It states and deletes browsing record and cutting network share that submodule is used to delete user.
5. a kind of information storage system based on network security according to claim 1, it is characterised in that: the processing mould Block includes recovery module and management module, and the recovery module is used to carry out the reparation of data, institute by the data being locally stored Management module is stated for cutting off the connection of network when data in real time in user's browsing.
6. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited Storage system is additionally provided with timing module, for the time according to user setting, carries out the browsing of removing and the timing of data on line.
7. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited Storage system is additionally provided with conversion module, for carrying out the transformation of data storage terminal according to time and user's browsing time.
8. a kind of information storage system based on network security according to claim 1, it is characterised in that: the information is deposited Storage system is additionally provided with recommending module, and the data for being uploaded according to user carry out the recommendation of same type data.
CN201810941369.0A 2018-08-17 2018-08-17 A kind of information storage system based on network security Pending CN109246087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810941369.0A CN109246087A (en) 2018-08-17 2018-08-17 A kind of information storage system based on network security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810941369.0A CN109246087A (en) 2018-08-17 2018-08-17 A kind of information storage system based on network security

Publications (1)

Publication Number Publication Date
CN109246087A true CN109246087A (en) 2019-01-18

Family

ID=65071439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810941369.0A Pending CN109246087A (en) 2018-08-17 2018-08-17 A kind of information storage system based on network security

Country Status (1)

Country Link
CN (1) CN109246087A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511983A (en) * 2020-11-24 2021-03-16 周口师范学院 Privacy protection system and protection method based on position of Internet of vehicles
CN113329029A (en) * 2021-06-18 2021-08-31 上海纽盾科技股份有限公司 Situation awareness node defense method and system for APT attack
CN114513336A (en) * 2022-01-18 2022-05-17 国家广播电视总局广播电视规划院 Network security platform construction method based on threat intelligence and intelligent identification algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403993A (en) * 2008-07-28 2009-04-08 清华大学深圳研究生院 Data security safekeeping equipment and method
CN201274047Y (en) * 2008-07-29 2009-07-15 清华大学深圳研究生院 Data security keeping device
CN205594622U (en) * 2016-04-28 2016-09-21 李春燕 Computer storage system
US20170250984A1 (en) * 2013-06-28 2017-08-31 Bmc Software, Inc. Authentication proxy agent

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101403993A (en) * 2008-07-28 2009-04-08 清华大学深圳研究生院 Data security safekeeping equipment and method
CN201274047Y (en) * 2008-07-29 2009-07-15 清华大学深圳研究生院 Data security keeping device
US20170250984A1 (en) * 2013-06-28 2017-08-31 Bmc Software, Inc. Authentication proxy agent
CN205594622U (en) * 2016-04-28 2016-09-21 李春燕 Computer storage system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112511983A (en) * 2020-11-24 2021-03-16 周口师范学院 Privacy protection system and protection method based on position of Internet of vehicles
CN113329029A (en) * 2021-06-18 2021-08-31 上海纽盾科技股份有限公司 Situation awareness node defense method and system for APT attack
CN113329029B (en) * 2021-06-18 2022-10-14 上海纽盾科技股份有限公司 Situation awareness node defense method and system for APT attack
CN114513336A (en) * 2022-01-18 2022-05-17 国家广播电视总局广播电视规划院 Network security platform construction method based on threat intelligence and intelligent identification algorithm

Similar Documents

Publication Publication Date Title
CN109246087A (en) A kind of information storage system based on network security
CN104063473B (en) A kind of database audit monitoring system and its method
US6687703B2 (en) Information filtering system and information filtering method
CN104540123B (en) The method and system of mobile terminal significant data encrypted backup and safety deleting
CN101833624B (en) Information machine and access control method thereof
JP6403784B2 (en) Surveillance camera system
US20080301207A1 (en) Systems and methods for cascading destruction of electronic data in electronic evidence management
CN107832196A (en) A kind of monitoring device and monitoring method for real-time logs anomalous content
CN101589379A (en) A system and method for managing data across multiple environments
WO2021145565A1 (en) Method, apparatus, and system for managing image captured by drone
CN107563192A (en) A kind of means of defence for extorting software, device, electronic equipment and storage medium
JPWO2007135871A1 (en) Information management system
WO2020158078A1 (en) System for face authentication and method for face authentication
CN108694246A (en) A kind of mask method and system of video-with-audio recording instrument record file
CN113794777A (en) Safety file ferrying system
CN116383693A (en) Data issuing method based on data security automatic classification grading result
CN111047729A (en) Attendance system and method based on intelligent access control
CN107315974A (en) A kind of image-forming media protection device based on Internet of Things
JP2022176383A (en) Face authentication system, face authentication management device, face authentication management method, and face authentication management program
CN109885994A (en) A kind of offline identity authorization system, equipment and computer readable storage medium
CN109189467A (en) Software version control method under a kind of distributed environment
Rahman et al. Framework Analysis of IDFIF V2 in WhatsApp Investigation Process on Android Smartphones
CN107633411A (en) Authentication administrative system
Zaenuddin et al. National Institute of Standards And Technology (NINST) Method for Cyber Crime Using Forensic Data on Smartphone
TWI430130B (en) File usage permission management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118