CN109922045B - Control method of information processing device - Google Patents

Control method of information processing device Download PDF

Info

Publication number
CN109922045B
CN109922045B CN201910088432.5A CN201910088432A CN109922045B CN 109922045 B CN109922045 B CN 109922045B CN 201910088432 A CN201910088432 A CN 201910088432A CN 109922045 B CN109922045 B CN 109922045B
Authority
CN
China
Prior art keywords
data
module
storage module
processor
information processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910088432.5A
Other languages
Chinese (zh)
Other versions
CN109922045A (en
Inventor
赵东升
马艺恺
王芳
赵晓萌
范洪丽
李嵇
刘子轩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910088432.5A priority Critical patent/CN109922045B/en
Publication of CN109922045A publication Critical patent/CN109922045A/en
Application granted granted Critical
Publication of CN109922045B publication Critical patent/CN109922045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a control method of an information processing device, relating to the technical field of information security; the method comprises the following steps: 1) the data temporary storage module temporarily stores data and sends signals to the processor; 2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor; 3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal. The invention not only ensures the safety of the data, but also is convenient for the targeted processing of the abnormal data.

Description

Control method of information processing device
Technical Field
The invention relates to the technical field of information security, in particular to a control method of an information processing device.
Background
The information security mainly comprises the following five aspects of ensuring the confidentiality, authenticity, integrity, unauthorized copying and security of a parasitic system. The information security itself includes a wide range, including how to prevent the leakage of the secret of the business enterprise, prevent the browsing of bad information by teenagers, the leakage of personal information, etc. An information security system under a network environment is a key for ensuring information security, and comprises a computer security operating system, various security protocols and security mechanisms, such as UniNAC (unified computer network application technology), DLP (digital light processing) and the like, and the global security can be threatened as long as security vulnerabilities exist. Information security means that information processing devices (including hardware, software, data, people, physical environments and infrastructures thereof) are protected from being damaged, changed and leaked due to accidental or malicious reasons, a system continuously, reliably and normally operates, information service is not interrupted, and finally service continuity is achieved.
The existing information processing mode is to scan and process data and then directly delete abnormal data, and the processing mode has the phenomenon of mistaken deletion caused by system faults, and when the data is deleted, a user cannot perform targeted processing on the same subsequent abnormal data.
Disclosure of Invention
An object of the present invention is to provide an information processing apparatus and a control method thereof, which solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
an information processing apparatus includes a data temporary storage module for temporarily storing data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing the suspicious data in the data temporary storage module;
the alarm module is used for sending out an alarm signal;
and the identity authentication module is used for logging in the system by the user.
As a further scheme of the invention: the scanning module further comprises a virus updating unit for updating virus data.
As a still further scheme of the invention: the isolation module also includes a firewall.
As a still further scheme of the invention: the information processing device also comprises a wireless module for realizing wireless transmission.
As a still further scheme of the invention: the information processing device also comprises a 4G network module used for generating the alarm signal to the appointed mobile phone user through the 4G network.
As a still further scheme of the invention: the identity authentication module comprises an identity input unit and a login unit.
The other technical scheme provided by the invention is as follows:
a control method of an information processing apparatus, comprising the steps of:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
Compared with the prior art, the invention has the beneficial effects that: the invention is convenient for processing abnormal data in the later period by arranging the isolation module, prevents abnormal deletion caused by system problems, is convenient for making targeted measures aiming at the abnormal data in the later period, and is convenient for sending an alarm signal to a specified mobile phone user by arranging the 4G network module.
Drawings
Fig. 1 is a block configuration diagram of an information processing apparatus embodiment 1.
Fig. 2 is a schematic block configuration diagram of an information processing apparatus according to embodiment 2.
Fig. 3 is a schematic block configuration diagram of an information processing apparatus according to embodiment 3.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1, in embodiment 1 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data.
And the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor.
And the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules.
The isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system problems can be prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
And the alarm module is used for sending out an alarm signal.
The identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor.
2) The processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor.
3) If the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
Example 2
Referring to fig. 2, in embodiment 2 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the scanning module also comprises a virus updating unit, which is convenient for updating viruses and ensures the safe processing of data.
The processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system faults is prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
The alarm module is used for sending out an alarm signal;
the identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives abnormal signals, the processor sends instructions to the isolation module and the alarm module, the isolation module isolates the temporary storage module to prevent suspicious data from damaging other data, and the alarm module sends alarm signals to designated users according to the signals.
Example 3
Referring to fig. 3, in embodiment 3 of the present invention, an information processing apparatus includes a data temporary storage module, configured to temporarily store data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the scanning module also comprises a virus updating unit, which is convenient for updating viruses and ensures the safe processing of data.
The processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing part of suspicious data in the data temporary storage module so as to be convenient for analyzing the data at the later stage; the isolation module further comprises a firewall, and the firewall is arranged to facilitate data isolation.
The isolation module is arranged, so that abnormal data can be conveniently processed in the later stage, abnormal deletion caused by system problems can be prevented, and targeted measures can be conveniently made for the abnormal data in the later stage.
The alarm module is used for sending out an alarm signal;
the identity authentication module comprises an identity input unit and a login unit, a user inputs personal information into the storage module through the identity input unit, and the user logs in through the login unit during login, so that data can be conveniently checked.
And the wireless module is used for realizing wireless transmission and facilitating the remote control of the user to refer to the data.
And the 4G network module is used for generating the alarm signal to the appointed mobile phone user through the 4G network.
A control method of an information processing apparatus:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
The invention is convenient for processing abnormal data in the later period by arranging the isolation module, prevents abnormal deletion caused by system problems, is convenient for making targeted measures aiming at the abnormal data in the later period, and is convenient for sending an alarm signal to a specified mobile phone user by arranging the 4G network module.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "top", "bottom", "inner", "outer", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed in a particular orientation, and be operated, and thus are not to be construed as limiting the present invention. Furthermore, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, in the description of the present invention, "a plurality" means two or more unless otherwise specified. A feature defined as "first," "second," etc. may explicitly or implicitly include one or more of the feature.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.
Furthermore, it should be understood that although the present description refers to embodiments, not every embodiment may contain only a single embodiment, and such description is for clarity only, and those skilled in the art should integrate the description, and the embodiments may be combined as appropriate to form other embodiments understood by those skilled in the art.

Claims (7)

1. A method of controlling an information processing apparatus, comprising the steps of:
1) the data temporary storage module temporarily stores data and sends signals to the processor;
2) the processor sends a scanning instruction to the scanning module according to the received signal, and the scanning module scans the data in the data temporary storage module after receiving the instruction and sends the signal to the processor;
3) if the processor receives a normal signal, sending an instruction to the storage module, and storing the data of the data temporary storage module by the storage module; if the processor receives an abnormal signal, the processor sends an instruction to the isolation module and the alarm module, and the isolation module isolates the temporary storage module to prevent the suspicious data from damaging other data; the alarm module sends an alarm signal to an appointed user according to the signal.
2. The method of controlling an information processing apparatus according to claim 1, wherein the information processing apparatus includes a data temporary storage module for temporarily storing data;
the scanning module is used for scanning the data in the data temporary storage module and transmitting the scanning result to the processor;
the processor is used for receiving the signals sent by the modules and sending instructions according to the signals of the modules;
the isolation module is used for storing the suspicious data in the data temporary storage module;
the alarm module is used for sending out an alarm signal;
and the identity authentication module is used for logging in the system by the user.
3. The information processing apparatus control method according to claim 2, wherein the scanning module further includes a virus update unit that updates virus data.
4. The method of controlling an information processing apparatus according to claim 3, wherein the isolation module further includes a firewall.
5. The method of controlling an information processing apparatus according to claim 4, wherein the information processing apparatus further includes a wireless module for realizing wireless transmission.
6. The information processing apparatus control method according to claim 5, wherein the information processing apparatus further comprises a 4G network module for transmitting an alarm signal to a specified handset user through a 4G network.
7. The method of controlling an information processing apparatus according to claim 6, wherein the identity authentication module includes an identity entry unit and a login unit.
CN201910088432.5A 2019-01-30 2019-01-30 Control method of information processing device Active CN109922045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910088432.5A CN109922045B (en) 2019-01-30 2019-01-30 Control method of information processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910088432.5A CN109922045B (en) 2019-01-30 2019-01-30 Control method of information processing device

Publications (2)

Publication Number Publication Date
CN109922045A CN109922045A (en) 2019-06-21
CN109922045B true CN109922045B (en) 2021-07-02

Family

ID=66961098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910088432.5A Active CN109922045B (en) 2019-01-30 2019-01-30 Control method of information processing device

Country Status (1)

Country Link
CN (1) CN109922045B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101002156B (en) * 2004-07-20 2010-05-05 联想(新加坡)私人有限公司 Method and apparatus for speeding scan to undesirable or malicious code
CN102436560A (en) * 2011-08-22 2012-05-02 高振宇 Computer self-defending system and method
CN106131072A (en) * 2016-08-28 2016-11-16 姜俊 A kind of computer information safe system
CN206638990U (en) * 2017-02-28 2017-11-14 伍玉秀 A kind of network security controller of computer
CN107483404A (en) * 2017-07-14 2017-12-15 太仓诚泽网络科技有限公司 Network data base verifies system
CN107832613A (en) * 2017-11-25 2018-03-23 四川兴昌盛科技有限公司 A kind of computer virus processing method
CN109063476A (en) * 2018-07-13 2018-12-21 江苏慧学堂系统工程有限公司 A kind of computer system to ensure information security

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101002156B (en) * 2004-07-20 2010-05-05 联想(新加坡)私人有限公司 Method and apparatus for speeding scan to undesirable or malicious code
CN102436560A (en) * 2011-08-22 2012-05-02 高振宇 Computer self-defending system and method
CN106131072A (en) * 2016-08-28 2016-11-16 姜俊 A kind of computer information safe system
CN206638990U (en) * 2017-02-28 2017-11-14 伍玉秀 A kind of network security controller of computer
CN107483404A (en) * 2017-07-14 2017-12-15 太仓诚泽网络科技有限公司 Network data base verifies system
CN107832613A (en) * 2017-11-25 2018-03-23 四川兴昌盛科技有限公司 A kind of computer virus processing method
CN109063476A (en) * 2018-07-13 2018-12-21 江苏慧学堂系统工程有限公司 A kind of computer system to ensure information security

Also Published As

Publication number Publication date
CN109922045A (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN101496025B (en) System and method for providing network security to mobile devices
US8826441B2 (en) Event-based security state assessment and display for mobile devices
US8732827B1 (en) Smartphone security system
US7549168B1 (en) Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
KR101359324B1 (en) System for enforcing security policies on mobile communications devices
US20070117593A1 (en) System and method for detection and notification of improper access of a wireless device
KR101534307B1 (en) Caused by the use of smart device internal confidential data leakage prevention & trace system and method
CN105830477A (en) Operating system integrated domain management
US9608973B2 (en) Security management system including multiple relay servers and security management method
JP2002063140A (en) Method for managing access on network, and system for the same
JP2018533864A (en) Remote control method, device and portable terminal
US20070112512A1 (en) Methods and systems for locating source of computer-originated attack based on GPS equipped computing device
BalaGanesh et al. Smart devices threats, vulnerabilities and malware detection approaches: a survey
JP2005523508A (en) Method and apparatus for automatically controlling access between a computer and a communication network
US11457046B2 (en) Distributed network resource security access management system and user portal
CN109922045B (en) Control method of information processing device
CN113365277A (en) Wireless network safety protection system
Androulidakis et al. Industrial espionage and technical surveillance counter measurers
KR20140099389A (en) System for detecting and preventing a phishing message of banking and method for detecting and preventing a phishing message of banking thereof
CN115623013A (en) Strategy information synchronization method, system and related product
CN115002779B (en) Pseudo base station prevention and control method and system based on block chain and security chip
Anwar et al. Guess who is listening in to the board meeting: on the use of mobile device applications as roving spy bugs
Salaria et al. Cyber Security Enhancement with an Intelligent Android Prototype
CN115758371A (en) Container mirror image deployment method
CN116954693A (en) State coordination method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant