CN109922045B - Control method of information processing device - Google Patents
Control method of information processing device Download PDFInfo
- Publication number
- CN109922045B CN109922045B CN201910088432.5A CN201910088432A CN109922045B CN 109922045 B CN109922045 B CN 109922045B CN 201910088432 A CN201910088432 A CN 201910088432A CN 109922045 B CN109922045 B CN 109922045B
- Authority
- CN
- China
- Prior art keywords
- data
- module
- storage module
- processor
- information processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a control method of an information processing device, relating to the technical field of information security; the method comprises the following steps: 1) the data temporary storage module temporarily stores data and sends signals to the processor; 2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor; 3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal. The invention not only ensures the safety of the data, but also is convenient for the targeted processing of the abnormal data.
Description
Technical Field
The invention relates to the technical field of information security, in particular to a control method of an information processing device.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system. The information security itself includes a wide range, including how to prevent the leakage of the secret of the business enterprise, prevent the browsing of bad information by teenagers, the leakage of personal information, etc. An information security system under a network environment is a key for ensuring information security, and comprises a computer security operating system, various security protocols and security mechanisms, such as UniNAC (unified computer network application technology), DLP (digital light processing) and the like, and the global security can be threatened as long as security vulnerabilities exist. Information security means that information processing devices (including hardware, software, data, people, physical environments and infrastructures thereof) are protected from being damaged, changed and leaked due to accidental or malicious reasons, a system continuously, reliably and normally operates, information service is not interrupted, and finally service continuity is achieved.
The existing information processing mode is to scan and process data and then directly delete abnormal data, and the processing mode has the phenomenon of mistaken deletion caused by system faults, and when the data is deleted, a user cannot perform targeted processing on the same subsequent abnormal data.
Disclosure of Invention
An object of the present invention is to provide an information processing apparatus and a control method thereof, which solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an information processing apparatus includes a data temporary storage module for temporarily storing data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing the suspicious data in the data temporary storage module;
the alarm module is used for sending out an alarm signal;
and the identity authentication module is used for logging in the system by the user.
As a further scheme of the invention: the scanning module further comprises a virus updating unit for updating virus data.
As a still further scheme of the invention: the isolation module also includes a firewall.
As a still further scheme of the invention: the information processing device also comprises a wireless module for realizing wireless transmission.
As a still further scheme of the invention: the information processing device also comprises a 4G network module used for generating the alarm signal to the appointed mobile phone user through the 4G network.
As a still further scheme of the invention: the identity authentication module comprises an identity input unit and a login unit.
The other technical scheme provided by the invention is as follows:
a control method of an information processing apparatus, comprising the steps of:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
Compared with the prior art, the invention has the beneficial effects that: the invention is convenient for processing abnormal data in the later period by arranging the isolation module, prevents abnormal deletion caused by system problems, is convenient for making targeted measures aiming at the abnormal data in the later period, and is convenient for sending an alarm signal to a specified mobile phone user by arranging the 4G network module.
Drawings
Fig. 1 is a block configuration diagram of an information processing apparatus embodiment 1.
Fig. 2 is a schematic block configuration diagram of an information processing apparatus according to embodiment 2.
Fig. 3 is a schematic block configuration diagram of an information processing apparatus according to embodiment 3.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1, in embodiment 1 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data.
And the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor.
And the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules.
The isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system problems can be prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
And the alarm module is used for sending out an alarm signal.
The identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor.
2) The processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor.
3) If the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
Example 2
Referring to fig. 2, in embodiment 2 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the scanning module also comprises a virus updating unit, which is convenient for updating viruses and ensures the safe processing of data.
The processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system faults is prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
The alarm module is used for sending out an alarm signal;
the identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives abnormal signals, the processor sends instructions to the isolation module and the alarm module, the isolation module isolates the temporary storage module to prevent suspicious data from damaging other data, and the alarm module sends alarm signals to designated users according to the signals.
Example 3
Referring to fig. 3, in embodiment 3 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the scanning module also comprises a virus updating unit, which is convenient for updating viruses and ensures the safe processing of data.
The processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system problems can be prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
The alarm module is used for sending out an alarm signal;
the identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
And the wireless module is used for realizing wireless transmission and facilitating the remote control of the user to refer to the data.
And the 4G network module is used for generating the alarm signal to the appointed mobile phone user through the 4G network.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
The invention is convenient for processing abnormal data in the later period by arranging the isolation module, prevents abnormal deletion caused by system problems, is convenient for making targeted measures aiming at the abnormal data in the later period, and is convenient for sending an alarm signal to a specified mobile phone user by arranging the 4G network module.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "top", "bottom", "inner", "outer", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus are not to be construed as limiting the present invention. Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, in the description of the present invention, "a plurality" means two or more unless otherwise specified. A feature defined as "first," "second," etc. may explicitly or implicitly include one or more of the feature.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.
Claims (7)
1. A method of controlling an information processing apparatus, comprising the steps of:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the suspicious data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
2. The method of controlling an information processing apparatus according to claim 1, wherein the information processing apparatus includes a data temporary storage module for temporarily storing data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing the suspicious data in the data temporary storage module;
the alarm module is used for sending out an alarm signal;
and the identity authentication module is used for logging in the system by the user.
3. The information processing apparatus control method according to claim 2, wherein the scanning module further includes a virus update unit that updates virus data.
4. The method of controlling an information processing apparatus according to claim 3, wherein the isolation module further includes a firewall.
5. The method of controlling an information processing apparatus according to claim 4, wherein the information processing apparatus further includes a wireless module for realizing wireless transmission.
6. The information processing apparatus control method according to claim 5, wherein the information processing apparatus further comprises a 4G network module for transmitting an alarm signal to a specified handset user through a 4G network.
7. The method of controlling an information processing apparatus according to claim 6, wherein the identity authentication module includes an identity entry unit and a login unit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088432.5A CN109922045B (en) | 2019-01-30 | 2019-01-30 | Control method of information processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910088432.5A CN109922045B (en) | 2019-01-30 | 2019-01-30 | Control method of information processing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109922045A CN109922045A (en) | 2019-06-21 |
CN109922045B true CN109922045B (en) | 2021-07-02 |
Family
ID=66961098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910088432.5A Active CN109922045B (en) | 2019-01-30 | 2019-01-30 | Control method of information processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109922045B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101002156B (en) * | 2004-07-20 | 2010-05-05 | 联想(新加坡)私人有限公司 | Method and apparatus for speeding scan to undesirable or malicious code |
CN102436560A (en) * | 2011-08-22 | 2012-05-02 | 高振宇 | Computer self-defending system and method |
CN106131072A (en) * | 2016-08-28 | 2016-11-16 | 姜俊 | A kind of computer information safe system |
CN206638990U (en) * | 2017-02-28 | 2017-11-14 | 伍玉秀 | A kind of network security controller of computer |
CN107483404A (en) * | 2017-07-14 | 2017-12-15 | 太仓诚泽网络科技有限公司 | Network data base verifies system |
CN107832613A (en) * | 2017-11-25 | 2018-03-23 | 四川兴昌盛科技有限公司 | A kind of computer virus processing method |
CN109063476A (en) * | 2018-07-13 | 2018-12-21 | 江苏慧学堂系统工程有限公司 | A kind of computer system to ensure information security |
-
2019
- 2019-01-30 CN CN201910088432.5A patent/CN109922045B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101002156B (en) * | 2004-07-20 | 2010-05-05 | 联想(新加坡)私人有限公司 | Method and apparatus for speeding scan to undesirable or malicious code |
CN102436560A (en) * | 2011-08-22 | 2012-05-02 | 高振宇 | Computer self-defending system and method |
CN106131072A (en) * | 2016-08-28 | 2016-11-16 | 姜俊 | A kind of computer information safe system |
CN206638990U (en) * | 2017-02-28 | 2017-11-14 | 伍玉秀 | A kind of network security controller of computer |
CN107483404A (en) * | 2017-07-14 | 2017-12-15 | 太仓诚泽网络科技有限公司 | Network data base verifies system |
CN107832613A (en) * | 2017-11-25 | 2018-03-23 | 四川兴昌盛科技有限公司 | A kind of computer virus processing method |
CN109063476A (en) * | 2018-07-13 | 2018-12-21 | 江苏慧学堂系统工程有限公司 | A kind of computer system to ensure information security |
Also Published As
Publication number | Publication date |
---|---|
CN109922045A (en) | 2019-06-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101496025B (en) | System and method for providing network security to mobile devices | |
US8826441B2 (en) | Event-based security state assessment and display for mobile devices | |
US8732827B1 (en) | Smartphone security system | |
US7549168B1 (en) | Network-based risk-assessment tool for remotely detecting local computer vulnerabilities | |
KR101359324B1 (en) | System for enforcing security policies on mobile communications devices | |
US20070117593A1 (en) | System and method for detection and notification of improper access of a wireless device | |
KR101534307B1 (en) | Caused by the use of smart device internal confidential data leakage prevention & trace system and method | |
CN105830477A (en) | Operating system integrated domain management | |
US9608973B2 (en) | Security management system including multiple relay servers and security management method | |
JP2002063140A (en) | Method for managing access on network, and system for the same | |
JP2018533864A (en) | Remote control method, device and portable terminal | |
US20070112512A1 (en) | Methods and systems for locating source of computer-originated attack based on GPS equipped computing device | |
BalaGanesh et al. | Smart devices threats, vulnerabilities and malware detection approaches: a survey | |
JP2005523508A (en) | Method and apparatus for automatically controlling access between a computer and a communication network | |
US11457046B2 (en) | Distributed network resource security access management system and user portal | |
CN109922045B (en) | Control method of information processing device | |
CN113365277A (en) | Wireless network safety protection system | |
Androulidakis et al. | Industrial espionage and technical surveillance counter measurers | |
KR20140099389A (en) | System for detecting and preventing a phishing message of banking and method for detecting and preventing a phishing message of banking thereof | |
CN115623013A (en) | Strategy information synchronization method, system and related product | |
CN115002779B (en) | Pseudo base station prevention and control method and system based on block chain and security chip | |
Anwar et al. | Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs | |
Salaria et al. | Cyber Security Enhancement with an Intelligent Android Prototype | |
CN115758371A (en) | Container mirror image deployment method | |
CN116954693A (en) | State coordination method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |