CN109905378A - A kind of network information security monitoring method, system and computer storage medium - Google Patents

A kind of network information security monitoring method, system and computer storage medium Download PDF

Info

Publication number
CN109905378A
CN109905378A CN201910104414.1A CN201910104414A CN109905378A CN 109905378 A CN109905378 A CN 109905378A CN 201910104414 A CN201910104414 A CN 201910104414A CN 109905378 A CN109905378 A CN 109905378A
Authority
CN
China
Prior art keywords
network
code key
area network
connect
wide area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910104414.1A
Other languages
Chinese (zh)
Inventor
谭佳
梁俊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University
Original Assignee
Hubei University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University filed Critical Hubei University
Priority to CN201910104414.1A priority Critical patent/CN109905378A/en
Publication of CN109905378A publication Critical patent/CN109905378A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention discloses a kind of network information security monitor system, comprising: Network Isolation module, the Network Isolation module include: 1 gateway and 2 network interface cards;One end of gateway is connect by 1 network interface card with firewall, and firewall is connect with wide area network, and the other end of gateway is connect by another network interface card with permission server;Network monitoring module, Network monitoring module include: CPU, network code key generator, network code key controller and netkey decipher;Network code key generator, network code key controller and netkey decipher are connect with CPU, and CPU is connect with permission server.Wide area network and local area network are effectively isolated by the Network Isolation module of setting by the present invention, influence user, in comparatively safe environment, from the insecurity factor in heterogeneous networks when using computer;Meanwhile the Network monitoring module of setting detects server, further improves the safety of network system.

Description

A kind of network information security monitoring method, system and computer storage medium
Technical field
The present invention relates to field of computer technology more particularly to a kind of network information security monitoring method, system and Computer storage medium.
Background technique
The network information security is one and is related to computer science, network technology, the communication technology, cryptographic technique, information security The multi-disciplinary comprehensive branch of learning such as technology, applied mathematics, number theory, information theory.It is primarily referred to as the hardware of network system, software And its data in system are protected, not by the reason of accidental or malice and by destroying, changing, revealing, system connects Continuous reliably normally to run, network service is not interrupted.
In recent years, it is grown rapidly along with Internet technology in the whole world, people are providing great convenience, however, letter For breathization while bringing various substances and culture is enjoyed, we are also just by the safety for carrying out automatic network got worse Threaten, the data burglar of such as network, the invasion of hacker, virus distribution person or even internal system blabber.Although we are just In the software technology that various complexity are widely used, such as firewall, proxy server invade detector, channel controlling mechanism, but It is that no matter in developed country, or in developing country (including China), activities of hacker is more and more savage, they are all-pervasive, Serious harm is caused to society.At the same time, more allow people uneasy, hacker website is also being continuously increased on internet, Study hacking technique, acquisition hacking tool become easy.In this way, making originally that just very fragile internet is more aobvious It obtains dangerous.
Summary of the invention
The present invention provides a kind of network information security monitoring method, system and computer storage medium, existing to solve Above-mentioned technical problem in technology
In a first aspect, the embodiment of the invention provides a kind of network information security monitor system, the system comprises: network Isolation module, the Network Isolation module include: 1 gateway and 2 network interface cards;Wherein, one end of the gateway passes through described in 1 The connection of the output end of network interface card and firewall, the input terminal of the firewall are connect with wide area network, and the other end of the gateway passes through Another network interface card is connect with permission server;Network monitoring module, the Network monitoring module include: CPU, the generation of network code key Device, network code key controller and netkey decipher;Wherein, the network code key generator, the network code key controller It is connect with the CPU with the netkey decipher, the CPU is connect with the permission server.
Optionally, the system also includes: alarm, the alarm are connect with the netkey decipher;Wherein, The alarm includes at least one of following types: display lamp or buzzer.
Optionally, the system also includes face recognition module, the face recognition module and the permission servers to connect It connects.
Optionally, the system also includes fingerprint identification module, the fingerprint identification module and the permission servers to connect It connects.
Optionally, the system also includes: radiator, the radiator are connect with the CPU.
Optionally, the system also includes: data compressor and database, the data compressor and the database are equal It is connect with the permission server.
Second aspect, the embodiment of the invention also provides a kind of network information security monitoring method, the method is applied to System described above;The described method includes: isolation step, in wide area network and/or the request of data of local area network transmission, The wide area network and the local area network are isolated;Step is guarded, for generating and using when detecting to permission server Family encryption and decryption code key, and verified to whether the generation of the code key legal, and judge whether the code key correct; Alarming step, the verification information for inputting user are compared with encryption code key, if mismatching, are alarmed.
Optionally, the method also includes compression step, for when sending request of data, to incoming data progress Compression generates several compressed packages, and in the database by compressed package storage, and each database is equipped with different passwords.
The third aspect, the embodiment of the invention also provides a kind of network information security monitor devices, including memory, processing On a memory and the computer program that can run on a processor, when processor execution described program, is realized for device and storage Following steps: isolation step, in wide area network and/or the request of data of local area network transmission, by the wide area network and described Local area network is isolated;Step is guarded, for when detecting to permission server, generating user encryption and decryption code key, And it is verified to whether the generation of the code key is legal, and judge whether the code key is correct;Alarming step, for that will use The verification information of family input is compared with encryption code key, if mismatching, is alarmed.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program, the program perform the steps of isolation step when being executed by processor, for what is sent in wide area network and/or local area network When request of data, the wide area network and the local area network are isolated;Step is guarded, for examining to permission server When survey, user encryption and decryption code key are generated, and verify to whether the generation of the code key is legal, and judge described secret Whether key is correct;Alarming step, the verification information for inputting user are compared with encryption code key, if mismatching, are reported It is alert.
The one or more technical solutions provided in the embodiment of the present invention, have at least the following technical effects or advantages:
Wide area network and local area network are effectively isolated by the Network Isolation module of setting, user are made to exist by the present invention Using in comparatively safe environment, being influenced from the insecurity factor in heterogeneous networks when computer;Meanwhile the network of setting Monitoring module detects server, further increases the safety of network system.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 is the flow chart of the method for multistage list page sequence in the embodiment of the present application;
Fig. 2 is the structural schematic diagram of device in the embodiment of the present application;
Fig. 3 is the structural schematic diagram of server in the embodiment of the present application;
Fig. 4 is the structural schematic diagram of computer readable storage medium 400 in the embodiment of the present application.
Specific embodiment
The embodiment of the present invention mention for a kind of network information security monitor system, to solve the network information in the prior art The technical problem of security protection deficiency, has reached the technical effect for further increasing the safety of network system.
Technical solution in the embodiment of the present invention, general thought are as follows:
Network Isolation module, the Network Isolation module include: 1 gateway and 2 network interface cards;Wherein, the one of the gateway End is connected by the output end of 1 network interface card and firewall, and the input terminal of the firewall is connect with wide area network, the gateway The other end connect with permission server by another network interface card;
Network monitoring module, the Network monitoring module include: CPU, network code key generator, network code key controller and Netkey decipher;Wherein, the network code key generator, the network code key controller and the netkey decipher It is connect with the CPU, the CPU is connect with the permission server.
In above system, by the Network Isolation module of setting, wide area network and local area network are effectively isolated, used Family, in comparatively safe environment, is influenced when using computer from the insecurity factor in heterogeneous networks;Meanwhile setting Network monitoring module detects server, further increases the safety of network system.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Term " includes " in description and claims of this specification and above-mentioned attached drawing and " having " and they Any deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, being System, product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or For the intrinsic other step or units of these process, methods, product or equipment.
Term "and/or" in description and claims of this specification and above-mentioned attached drawing, only a kind of description is closed Join the incidence relation of object, indicates may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A is deposited simultaneously In A and B, these three situations of individualism B.In addition, character "/" herein, typicallying represent forward-backward correlation object is a kind of "or" Relationship.
Embodiment one
A kind of network information security monitor system that the embodiment of the present invention one provides, referring to Fig. 1, the system comprises wide Domain net 1, firewall 2, permission server 3, data compressor 4 and database 5, wide area network 1 are connect with the input terminal of firewall 2, The output end of permission server 3 is connect with the input terminal of data compressor 4 and database 5 respectively, and system further includes Network Isolation Module and Network monitoring module, Network Isolation module is by circuit board 6 and two network interface cards, the 7, gateways 8 being located on circuit board 6 Composition, 8 both ends of gateway are connect with two network interface cards 7 respectively, and 8 one end of gateway is connect by network interface card 7 with 2 output end of firewall, net It closes 8 other ends to connect by network interface card 7 with 3 input terminal of permission server, Network monitoring module is connect with permission server 3, and net Network monitoring module is made of CPU 9, netkey generator 10, netkey controller 11 and netkey decipher 12, net Network key generator 10, netkey controller 11 and 12 output end of netkey decipher are connect with the input terminal of CPU9.
In embodiments of the present invention, 3 inner end of permission server is passed through into internal layer firewall and interchanger and end hosts Connection.In use, after wide area network 1 receives network data, by firewall 2, firewall 2 intercepts it to end hosts In virus and network attack;It is combined by gateway 8 with network interface card 7 in Network Isolation module, either wide area network or local area network When sending request of data, it can be effectively isolated with local area network with wide area network 1, locate end hosts in use In comparatively safe environment, influenced from the insecurity factor in heterogeneous networks;When sending request of data, data can be stored in In database 5, and data compressor 4 compresses incoming data, and data compressor 4 compresses data into multiple compressions Packet, is then store in database 5, each database 5 is designed with different passwords, improves the safety of network system.
Meanwhile Network monitoring module is mainly used for detecting permission server 3, specifically, netkey generator Using the unique Product sequence number of AT05SC card microcontroller as seed, and 128 users are generated according to certain rules and are added Key, the intelligent chip are 8 smart card microcontrollers of Atmel company production, and it can be used to store to execute password calculation Key needed for method includes 40kb read-only memory, 2kb Electrically Erasable Programmable Read-Only Memory, has 64 product IDs, When initialization, 64 it is product ID as seed using this, 128 user encryptions and decruption key can be generated, with very High security performance.Whether generation of the netkey controller for authentication secret be legal, and judges that inputted key is No correct, netkey decipher is used to decrypt the verification information that user inputs and compare with encryption key.
Structure as one embodiment, the model EXZB-WJ-V of gateway 8, the model DM9161BIEP of network interface card 7.
Structure as one embodiment, netkey decipher 12 are connected with alarm 13, and alarm 13 includes display lamp And buzzer is issued by alarm 13 and is warned when 12 comparing result of netkey decipher is mismatched.
Structure as one embodiment, permission server 3 can be connected with face recognition module 14, and face recognition module 14 is adopted With the video special DSP of model TMS320DM642, the dominant frequency of the DSP is up to 720MHz, and operational capability is up to 5400MIPS.Permission server 3 can be connected with fingerprint identification module 15, and fingerprint arranging sets module 15 uses model ATK-AS608 Optical finger print identifier.Face recognition module 14 and fingerprint arranging sets module 15 are used equally for user identity authentication, further plus Strong information security.
Structure as one embodiment, CPU 9 are connected with radiator 16, and the model 2R11S180L of radiator 16 is used for Heat spreading function to CPU guarantees its job stability.
Based on the same inventive concept, the embodiment of the invention also provides method corresponding with system in embodiment one, see reality Apply example two.
Embodiment two
Second embodiment of the present invention provides a kind of methods, referring to FIG. 2, the described method includes:
Isolation step 101, for wide area network and/or local area network transmission request of data when, by the wide area network and institute Local area network is stated to be isolated;
Step 102 is guarded, for when detecting to permission server, generating user encryption and decryption code key, and it is right Whether the generation of the code key is legal to be verified, and judges whether the code key is correct;
Alarming step 103, the verification information for inputting user are compared with encryption code key, if mismatching, are reported It is alert.
In the embodiment of the present invention two, further includes: compression step 104 is used for when sending request of data, to incoming data It carries out compression and generates several compressed packages, in the database by compressed package storage, and each database is equipped with different Password.
By the method that the embodiment of the present invention two is introduced, dress side used by the system to implement the embodiment of the present invention one Method, so based on the system that the embodiment of the present invention one is introduced, the affiliated personnel in this field can understand the specific steps of this method And deformation, so details are not described herein.Method used by the system of all embodiment of the present invention one belongs to the present invention and is intended to The range of protection.
Embodiment three
It should be noted that one, the same inventive concept of embodiment two, the embodiment of the present invention three mention based on the above embodiment A kind of device is supplied, comprising: radio frequency (Radio Frequency, RF) circuit 310, memory 320, input unit 330, display The components such as unit 340, voicefrequency circuit 350, WiFi module 360, processor 370 and power supply 380.Wherein, on memory 320 It is stored with the computer program that can be run on processor 370, processor 370 realizes embodiment when executing the computer program Step 101 described in two, 102,103.
In the specific implementation process, when processor executes computer program, any reality in embodiment one, two may be implemented Apply mode.
It will be understood by those skilled in the art that the restriction of the not structure twin installation of apparatus structure shown in Fig. 3 itself, it can To include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 4 to computer equipment:
RF circuit 310 can be used for sending and receiving for signal, particularly, after the downlink information of base station is received, to processing The processing of device 370.In general, RF circuit 310 includes but is not limited at least one amplifier, transceiver, coupler, low noise amplification Device (Low Noise Amplifier, LNA), duplexer etc..
Memory 320 can be used for storing software program and module, and processor 370 is stored in memory 320 by operation Software program and module, thereby executing the various function application and data processing of computer equipment.Memory 320 can be led It to include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function Application program etc.;Storage data area, which can be stored, uses created data etc. according to computer equipment.In addition, memory 320 May include high-speed random access memory, can also include nonvolatile memory, a for example, at least disk memory, Flush memory device or other volatile solid-state parts.
Input unit 330 can be used for receiving the number or character information of input, and generate the user with computer equipment Setting and the related key signals input of function control.Specifically, input unit 330 may include keyboard 331 and other inputs Equipment 332.Keyboard 331 collects the input operation of user on it, and drives corresponding connection according to preset formula Device.Keyboard 331 gives processor 370 after collecting output information again.In addition to keyboard 331, input unit 330 can also include Other input equipments 332.Specifically, other input equipments 332 can include but is not limited to touch panel, function key (such as sound Measure control button, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 340 can be used for showing information input by user or the information and computer equipment that are supplied to user Various menus.Display unit 340 may include display panel 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 341.Further, keyboard 331 can cover display panel 341, when keyboard 331 detect it is on it or attached After close touch operation, processor 370 is sent to determine the type of touch event, is followed by subsequent processing device 370 according to incoming event Type corresponding visual output is provided on display panel 341.Although keyboard 331 and display panel 341 are conducts in Fig. 3 Two independent components realize the input and input function of computer equipment, but in some embodiments it is possible to by keyboard 331 is integrated with display panel 341 and that realizes computer equipment output and input function.
Voicefrequency circuit 350, loudspeaker 351, microphone 352 can provide the audio interface between user and computer equipment. Electric signal after the audio data received conversion can be transferred to loudspeaker 351, be converted by loudspeaker 351 by voicefrequency circuit 350 For voice signal output;
WiFi belongs to short range wireless transmission technology, and computer equipment can help user to receive and dispatch by WiFi module 360 Email, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 4 WiFi module 360 is shown, but it is understood that, and it is not belonging to must be configured into for computer equipment, it completely can root It is omitted within the scope of not changing the essence of the invention according to needs.
Processor 370 is the control centre of computer equipment, utilizes various interfaces and the entire computer equipment of connection Various pieces, by running or execute the software program and/or module that are stored in memory 320, and call and be stored in Data in memory 320 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole Monitoring.Optionally, processor 370 may include one or more processing units;Preferably, processor 370 can be integrated using processing Device, wherein the main processing operation system of application processor, user interface and application program etc..
Computer equipment further includes the power supply 380 (such as power supply adaptor) powered to all parts, it is preferred that power supply can With logically contiguous by power-supply management system and processor 370.
Example IV
Based on the same inventive concept, as shown in figure 4, the present embodiment five provides a kind of computer readable storage medium 400, The step of being stored thereon with computer program 411, being realized described in embodiment one when which is executed by processor 101、102、103、104。
In the specific implementation process, when which is executed by processor, embodiment one, two and may be implemented Any embodiment in three.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The technical solution provided in the embodiment of the present invention, has at least the following technical effects or advantages:
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of network information security monitor system, which is characterized in that the system comprises:
Network Isolation module, the Network Isolation module include: 1 gateway and 2 network interface cards;Wherein, one end of the gateway is logical The output end for crossing 1 network interface card and firewall connects, and the input terminal of the firewall is connect with wide area network, the gateway it is another One end is connect by another network interface card with permission server;
Network monitoring module, the Network monitoring module include: CPU, network code key generator, network code key controller and network Key decipher;Wherein, the network code key generator, the network code key controller and the netkey decipher with The CPU connection, the CPU are connect with the permission server.
2. the system as claimed in claim 1, which is characterized in that the system also includes:
Alarm, the alarm are connect with the netkey decipher;Wherein, the alarm includes at least following types One of: display lamp or buzzer.
3. the system as claimed in claim 1, which is characterized in that the system also includes:
Face recognition module, the face recognition module are connect with the permission server.
4. the system as claimed in claim 1, which is characterized in that the system also includes:
Fingerprint identification module, the fingerprint identification module are connect with the permission server.
5. the system as claimed in claim 1, which is characterized in that the system also includes:
Radiator, the radiator are connect with the CPU.
6. the system as claimed in claim 1, which is characterized in that the system also includes:
Data compressor and database, the data compressor and the database are connect with the permission server.
7. a kind of network information security monitoring method, it is characterised in that:
The method is applied to the described in any item systems of claim 1-5;
The described method includes:
Isolation step, for wide area network and/or local area network transmission request of data when, by the wide area network and the local area network It is isolated;
Step is guarded, for when detecting to permission server, generating user encryption and decryption code key, and to the code key Generation it is whether legal verified, and judge whether the code key correct;
Alarming step, the verification information for inputting user are compared with encryption code key, if mismatching, are alarmed.
8. the method for claim 7, which is characterized in that further include:
Compression step will be described for carrying out compression to incoming data and generating several compressed packages when sending request of data Compressed package stores in the database, and each database is equipped with different passwords.
9. a kind of network information security monitor device, including memory, processor and storage are on a memory and can be in processor The computer program of upper operation, which is characterized in that the processor performs the steps of when executing described program
Isolation step, for wide area network and/or local area network transmission request of data when, by the wide area network and the local area network It is isolated;
Step is guarded, for when detecting to permission server, generating user encryption and decryption code key, and to the code key Generation it is whether legal verified, and judge whether the code key correct;
Alarming step, the verification information for inputting user are compared with encryption code key, if mismatching, are alarmed.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor It is performed the steps of when execution
Isolation step, for wide area network and/or local area network transmission request of data when, by the wide area network and the local area network It is isolated;
Step is guarded, for when detecting to permission server, generating user encryption and decryption code key, and to the code key Generation it is whether legal verified, and judge whether the code key correct;
Alarming step, the verification information for inputting user are compared with encryption code key, if mismatching, are alarmed.
CN201910104414.1A 2019-02-01 2019-02-01 A kind of network information security monitoring method, system and computer storage medium Pending CN109905378A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910104414.1A CN109905378A (en) 2019-02-01 2019-02-01 A kind of network information security monitoring method, system and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910104414.1A CN109905378A (en) 2019-02-01 2019-02-01 A kind of network information security monitoring method, system and computer storage medium

Publications (1)

Publication Number Publication Date
CN109905378A true CN109905378A (en) 2019-06-18

Family

ID=66944698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910104414.1A Pending CN109905378A (en) 2019-02-01 2019-02-01 A kind of network information security monitoring method, system and computer storage medium

Country Status (1)

Country Link
CN (1) CN109905378A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742740A (en) * 2020-05-29 2021-12-03 华为技术有限公司 Equipment behavior monitoring method and device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201966927U (en) * 2010-12-31 2011-09-07 深圳市索科特智能设备有限公司 Network isolation device
CN104751036A (en) * 2015-04-10 2015-07-01 陕西理工学院 Computer information security system
US9571411B1 (en) * 2014-12-29 2017-02-14 Juniper Networks, Inc. Using a firewall filter to select a member link of a link aggregation group
CN207070092U (en) * 2017-08-01 2018-03-02 上海岂安信息科技有限公司 A kind of information security of computer network system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201966927U (en) * 2010-12-31 2011-09-07 深圳市索科特智能设备有限公司 Network isolation device
US9571411B1 (en) * 2014-12-29 2017-02-14 Juniper Networks, Inc. Using a firewall filter to select a member link of a link aggregation group
CN104751036A (en) * 2015-04-10 2015-07-01 陕西理工学院 Computer information security system
CN207070092U (en) * 2017-08-01 2018-03-02 上海岂安信息科技有限公司 A kind of information security of computer network system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马燕: "《计算机系统与网络维护教程》", 31 October 2003 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742740A (en) * 2020-05-29 2021-12-03 华为技术有限公司 Equipment behavior monitoring method and device and storage medium

Similar Documents

Publication Publication Date Title
Miloslavskaya et al. Internet of Things: information security challenges and solutions
Heartfield et al. A taxonomy of cyber-physical threats and impact in the smart home
Kanuparthi et al. Hardware and embedded security in the context of internet of things
CN103491056B (en) The control method and device of application permission
CN109729180A (en) Entirety is intelligence community platform
CN109472166A (en) A kind of electronic signature method, device, equipment and medium
CN106888087B (en) A kind of method and apparatus of management certificate
CN106656476A (en) Password protecting method and device
CN104767713B (en) Account binding method, server and system
Pal et al. IoT technical challenges and solutions
CN102842001A (en) System and method for detecting computer security information based on U disc authentication
CN110024347A (en) Safety building network structure
CN106506491B (en) Network safety system
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN104065648B (en) A kind of data processing method of voice call
CN108306739A (en) A kind of method, server and computer equipment for detecting subscriber identity information
CN101741826A (en) Method and system for realizing encryption unloading on virtualized platform
Bindroo et al. A wearable NFC wristband for remote home automation system
CN110535881A (en) Industrial network attack traffic detection method and server
CN106209918A (en) The method of a kind of internet security management and terminal
CN106302519A (en) The method of a kind of internet security management and terminal
CN109905378A (en) A kind of network information security monitoring method, system and computer storage medium
CN109510711A (en) A kind of network communication method, server, client and system
Mannilthodi et al. Secure IoT: An Improbable Reality.
CN115118751B (en) Blockchain-based supervision system, method, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190618

RJ01 Rejection of invention patent application after publication