CN109934010A - A kind of computer information safe stocking system - Google Patents
A kind of computer information safe stocking system Download PDFInfo
- Publication number
- CN109934010A CN109934010A CN201910196358.9A CN201910196358A CN109934010A CN 109934010 A CN109934010 A CN 109934010A CN 201910196358 A CN201910196358 A CN 201910196358A CN 109934010 A CN109934010 A CN 109934010A
- Authority
- CN
- China
- Prior art keywords
- module
- data
- information
- unit
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 claims abstract description 18
- 238000012550 audit Methods 0.000 claims abstract description 11
- 230000006835 compression Effects 0.000 claims abstract description 5
- 238000007906 compression Methods 0.000 claims abstract description 5
- 238000004891 communication Methods 0.000 claims description 27
- 230000002265 prevention Effects 0.000 claims description 20
- 241000700605 Viruses Species 0.000 claims description 12
- 238000001514 detection method Methods 0.000 claims description 12
- 238000012544 monitoring process Methods 0.000 claims description 11
- 238000007405 data analysis Methods 0.000 claims description 9
- 230000004224 protection Effects 0.000 claims description 9
- 238000013508 migration Methods 0.000 claims description 8
- 230000005012 migration Effects 0.000 claims description 8
- 230000009545 invasion Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000012546 transfer Methods 0.000 claims description 4
- 238000004458 analytical method Methods 0.000 claims description 3
- 230000002155 anti-virotic effect Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000000034 method Methods 0.000 claims description 3
- 238000007639 printing Methods 0.000 claims description 2
- 230000007123 defense Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000009172 bursting Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000009415 formwork Methods 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 235000015170 shellfish Nutrition 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to field of computer technology, especially a kind of computer information safe stocking system, including security management center, security management center is by being electrically connected separately with login authentication module, sharp eyes Data Audit unit, put on record administrative unit website, access-in resource administrative unit, information safety management unit, priority assignation unit and secure storage unit, login authentication module is used for the Login Register of user, and input characteristic for verifying its identity, it is also used to the control of input data and data, call instruction, sharp eyes Data Audit unit can be operated by the daily behavior of employee, generate corresponding trend chart, company manager is allowed to learn which sensitive document enterprise has in time, there is which employee to possess sensitive document, whom has done screenshotss to sensitive document, compression, the violation of copy and outgoing is grasped Make.Structure of the invention is reasonable, have the function of it is good it is anti-leak, effectively raise the storage safety of information data.
Description
Technical field
The present invention relates to field of computer technology more particularly to a kind of computer information safe stocking systems.
Background technique
Currently, with the fast development of computer become increasingly popular with internet, explosive increasing is presented in digital information
Long, this growth is not only embodied on data capacity, but also is shown in the diversity of data.The problem of information security, is with meter
Universal being valued by the people gradually of calculation machine and internet;Existing enterprise is handled official business using computer, simultaneously
Office document is stored in computer in a manner of electronic document, using electronic document mode storing data have it is high-efficient,
The advantages that at low cost, convenient transfer, but store data using electronic document mode and increase the risk that information is leaked.It is mentioned with this
A kind of computer information safe stocking system out.
Summary of the invention
The purpose of the present invention is to solve the shortcomings that storing data information is easy leakage exists in the prior art, and propose
A kind of computer information safe stocking system.
To achieve the goals above, present invention employs following technical solutions:
A kind of computer information safe stocking system, including security management center are designed, the security management center passes through electrical property
It is connected separately with login authentication module, sharp eyes Data Audit unit, website are put on record administrative unit, access-in resource administrative unit, letter
Security managing unit, priority assignation unit and secure storage unit are ceased, login authentication module is used for the Login Register of user, and
The characteristic for verifying its identity is inputted, control, the call instruction of input data and data are also used to, sharp eyes data are examined
Counting unit can be operated by the daily behavior of employee, generate corresponding trend chart, allow company manager timely
Know which sensitive document enterprise has, there is which employee to possess sensitive document, whom has done screenshotss to sensitive document, compressed, copy
The violation operation of shellfish and outgoing, and the leakage whom has had resulted in enterprise's sensitive data, website administrative unit of putting on record are available
In the information data that employee submits is acquired, typing, just more, nullify and blacklist processing, access-in resource administrative unit can
For the distribution of access-in resource, the record of use information, and to the routine use of access-in resource carry out discovery, analysis, monitoring and
Processing makes the states such as access-in resource distribution, change, release have good grounds, and information safety management unit can be to the information of storage
Data carry out security management and control, and information is avoided the phenomenon that leaks occur, and secure storage unit is used for the secure storage of data, priority assignation
Unit is used to be arranged the permission of viewing secure storage unit internal storage information data personnel.
Preferably, the secure storage unit includes first database, and the first database is by being electrically separately connected
There are data backup module and data migration module, the data migration module is electrically connected with the second database, described first
Database includes Primary database, second databases and three-level database, and first database can store information data,
And it simultaneously can will be in different types of information data classification storage to Primary database, second databases and three-level database
Portion, convenient for management, data backup module can be protected data when the hardware or storage media of system break down, and be kept away
From unexpectedly damaging or losing, while when the initial data on hard disk is accidentally deleted or covers, or not because of hard disk failure
The data that can be accessed effectively reduce loss, database then the data can be restored very easily from record copy
Deciphering module and database encrypting module are the data protections to data store internal, avoid the leakage of data, and data turn
It, can be by its internal data fast transfer to the second data store internal when shifting formwork block when first database is by external attack
It is stored, effectively ensures to store the safety of information data.
Preferably, the Primary database, second databases and three-level database by being electrically connected with encryption mould jointly
Block and deciphering module, the encrypting module and deciphering module include Password Input module, fingerprint identification module, recognition of face mould
Block and acoustic control identification module, encrypting module and deciphering module are for preventing the information data inside first database
Shield, avoids information data from leakage phenomenon occur.
Preferably, the access-in resource administrative unit includes prevention and cure of viruses module, and the prevention and cure of viruses module passes through conducting wire
It is connected with data recordin module, the data recordin module is connected with data monitoring module, the data monitoring mould by conducting wire
Block has data analysis module by network connection, and the data analysis module has data categorization module by network connection, described
By network connection between data categorization module and security management center, prevention and cure of viruses module be used for the information data of access into
Row antivirus protection avoids Virus entry secure storage unit, damages to other information data, and data recordin module is for remembering
The situation of access information data is recorded, data monitoring module is used to monitor the exception of the information data of access, and data analysis module is used
It is analyzed and processed in the information data of access, while being classified using data categorization module to data.
Preferably, the information safety management unit includes intrusion detection module, the intrusion detection module and bursting tube
By network connection between reason center, the intrusion detection module is by being electrically connected separately with intrusion prevention module and alarm mould
Block, the intrusion prevention module have remote control module by network connection, and the remote control module has by network connection
Network cuts off module, and the alarm module has wireless communication module by network connection, and the wireless communication module passes through net
Network is connected with mobile terminal, and the mobile terminal is connected to the network remote control module, and intrusion detection module is for detecting whether there is outside
Personnel invade the information of secure storage unit, and intrusion prevention module can be on the defensive for outside invasion personnel, with alarm mould
Invasion information by wireless communication module can be conveyed to mobile terminal by block, remind staff to be on the defensive work, remote control
Module remotely operates convenient for remote personnel, and network cuts off module can be in the case where intrusion prevention module defends not living to net
Network is cut off in time.
Preferably, the wireless communication module includes WiFi communication module, 4G communication module, 3G communication module and 2G communication
Module, by a variety of communication modules ensure that dtr signal can free switching, thus increase data transmission stability.
Preferably, the sharp eyes Data Audit unit includes compression control module, outgoing control module, screenshotss control mould
Block, printing control model and USB control module.
A kind of computer information safe stocking system proposed by the present invention, beneficial effect are: by sharp eyes Data Audit
Unit, so as to effectively avoid information data leakage phenomenon, by access-in resource administrative unit, so as to routine use
Implementation finds, analyzes, monitoring and processing, and so that the states such as the distribution, change, release of access-in resource is had good grounds, is pacified by information
Full administrative unit carries out effective protection so as to the information data to secure storage unit.Structure of the invention is reasonable, has good
The good anti-function that leaks effectively raises the storage safety of information data.
Detailed description of the invention
Fig. 1 is a kind of structural schematic diagram of computer information safe stocking system proposed by the present invention;
Fig. 2 is a kind of sharp eyes Data Audit cellular construction schematic diagram of computer information safe stocking system proposed by the present invention;
Fig. 3 is a kind of wireless communication module structural schematic diagram of computer information safe stocking system proposed by the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.
Referring to Fig.1-3, a kind of computer information safe stocking system, including security management center, security management center are logical
Cross and be electrically connected separately with login authentication module, put on record administrative unit, the access-in resource management of sharp eyes Data Audit unit, website it is single
Member, information safety management unit, priority assignation unit and secure storage unit, login of the login authentication module for user are infused
Volume, and the characteristic for verifying its identity is inputted, it is also used to control, the call instruction of input data and data, sharp eyes
Data Audit unit can be operated by the daily behavior of employee, generate corresponding trend chart, so that company manager can be with
It learns which sensitive document enterprise has in time, there is which employee to possess sensitive document, whom has done screenshotss, pressure to sensitive document
Contracting, the violation operation of copy and outgoing, and the leakage whom has had resulted in enterprise's sensitive data, website are put on record administrative unit
Can be used for being acquired the information data that employee submits, typing, just more, nullify and blacklist processing, access-in resource management are single
Member can be used for the record of the distribution of access-in resource, use information, and carry out discovery, analysis, prison to the routine use of access-in resource
Control and processing make the states such as access-in resource distribution, change, release have good grounds, and information safety management unit can be to storage
Information data carries out security management and control, and information is avoided the phenomenon that leaks occur, and secure storage unit is used for the secure storage of data, permission
Setting unit is used to be arranged the permission of viewing secure storage unit internal storage information data personnel.
Secure storage unit includes first database, first database by be electrically connected separately with data backup module and
Data migration module, data migration module are electrically connected with the second database, include Primary database, second level in first database
Database and three-level database, first database can store information data, and simultaneously can be by different types of letter
Breath data classification is stored to Primary database, second databases and three-level data store internal, and convenient for management, data backup module can
To protect data when the hardware of system or storage media break down, avoid unexpectedly being damaged or being lost, simultaneously
When the initial data on hard disk is accidentally deleted or covers, or because of the data that hard disk failure cannot access, then can be very
The data are easily restored from record copy, effectively reduce loss, database deciphering module and database encrypting module
Be the data protection to data store internal, avoid the leakage of data, when data migration module first database by
When external attack, its internal data fast transfer to the second data store internal can be stored, effectively ensure to store
The safety of information data.
Primary database, second databases and three-level database by being electrically connected with encrypting module and decryption mould jointly
Block, encrypting module and deciphering module include Password Input module, fingerprint identification module, face recognition module and acoustic control identification mould
Block, encrypting module and deciphering module are to avoid information data for protecting the information data inside first database
There is leakage phenomenon.
Access-in resource administrative unit includes prevention and cure of viruses module, and prevention and cure of viruses module is connected with data record mould by conducting wire
Block, data recordin module are connected with data monitoring module by conducting wire, and data monitoring module has data analysis by network connection
Module, data analysis module have data categorization module by network connection, lead between data categorization module and security management center
Network connection is crossed, prevention and cure of viruses module is used to carry out antivirus protection to the information data of access, avoids Virus entry secure storage
Unit damages other information data, and data recordin module is used to record the situation of access information data, data monitoring mould
Block is used to monitor the exception of the information data of access, and data analysis module is used to be analyzed and processed the information data of access,
Classified simultaneously using data categorization module to data.
Information safety management unit includes intrusion detection module, passes through net between intrusion detection module and security management center
Network connection, by being electrically connected separately with intrusion prevention module and alarm module, intrusion prevention module passes through intrusion detection module
Network connection has remote control module, and remote control module has network to cut off module by network connection, and alarm module passes through
Network connection has wireless communication module, and wireless communication module has mobile terminal, the long-range behaviour of mobile terminal network connection by network connection
Module is controlled, intrusion detection module is for detecting whether the information for having external staff to invade secure storage unit, intrusion prevention module
It can be on the defensive for outside invasion personnel, while invasion information can be conveyed to movement by wireless communication module by alarm module
End reminds staff to be on the defensive work, and remote control module remotely operates convenient for remote personnel, and network cuts off module
Network can be cut off in time in the case where intrusion prevention module is defendd and do not lived.
Wireless communication module includes WiFi communication module, 4G communication module, 3G communication module and 2G communication module, through excessive
Kind of communication module ensure that dtr signal can free switching, to increase the stability of data transmission.
Sharp eyes Data Audit unit includes compression control module, outgoing control module, screenshotss control module, print control mould
Block and USB control module.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its
Inventive concept is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.
Claims (7)
1. a kind of computer information safe stocking system, including security management center, which is characterized in that the security management center
By being electrically connected separately with login authentication module, sharp eyes Data Audit unit, website put on record administrative unit, access-in resource management
Unit, information safety management unit, priority assignation unit and secure storage unit, login authentication module are used for the login of user
Registration, and the characteristic for verifying its identity is inputted, it is also used to control, the call instruction of input data and data, it is sharp
Eye Data Audit unit can be operated by the daily behavior of employee, corresponding trend chart be generated, so that company manager can
To learn which sensitive document enterprise has in time, there is which employee to possess sensitive document, have who to sensitive document done screenshotss,
Compression, the violation operation of copy and outgoing, and the leakage whom has had resulted in enterprise's sensitive data, website, which is put on record, manages list
Member can be used for employee submit information data be acquired, typing, just more, nullify and blacklist processing, access-in resource management
Unit can be used for the record of the distribution of access-in resource, use information, and the routine use of access-in resource is carried out and is found, is analyzed,
It monitors and processes, so that the states such as access-in resource distribution, change, release is had good grounds, information safety management unit can be to storage
Information data carry out security management and control, avoid information from the phenomenon that leaks occur, secure storage unit is used for the secure storage of data, power
Limit setting unit is used to be arranged the permission of viewing secure storage unit internal storage information data personnel.
2. a kind of computer information safe stocking system according to claim 1, which is characterized in that the secure storage list
Member includes first database, and the first database is connected separately with data backup module and data migration module by electrical,
The data migration module is electrically connected with the second database, includes Primary database, secondary data in the first database
Library and three-level database, first database can store information data, and simultaneously can be by different types of Information Number
According to classification storage to Primary database, second databases and three-level data store internal, convenient for management, data backup module can be
The hardware or storage media of system protect data when breaking down, and avoid unexpectedly being damaged or being lost, while hard
When initial data on disk is accidentally deleted or covers, or because of the data that hard disk failure cannot access, then can be very convenient
Slave record copy in restore the data, effectively reduce loss, database deciphering module and database encrypting module are
To the data protection of data store internal, the leakage of data is avoided, in first database by outside when data migration module
When attack, its internal data fast transfer to the second data store internal can be stored, effectively ensure to store information
The safety of data.
3. a kind of computer information safe stocking system according to claim 2, which is characterized in that the level one data
Library, second databases and three-level database by being electrically connected with encrypting module and deciphering module jointly, the encrypting module and
Deciphering module includes Password Input module, fingerprint identification module, face recognition module and acoustic control identification module, encrypting module and
Deciphering module is to avoid information data from leakage phenomenon occur for protecting the information data inside first database.
4. a kind of computer information safe stocking system according to claim 1, which is characterized in that the access-in resource pipe
Managing unit includes prevention and cure of viruses module, and the prevention and cure of viruses module is connected with data recordin module, the data note by conducting wire
Record module is connected with data monitoring module by conducting wire, and the data monitoring module has data analysis module by network connection,
The data analysis module has data categorization module by network connection, between the data categorization module and security management center
By network connection, prevention and cure of viruses module is used to carry out antivirus protection to the information data of access, and Virus entry is avoided to deposit safely
Storage unit damages other information data, and data recordin module is used to record the situation of access information data, data monitoring
Module is used to monitor the exception of the information data of access, and data analysis module is for carrying out at analysis the information data of access
Reason, while being classified using data categorization module to data.
5. a kind of computer information safe stocking system according to claim 1, which is characterized in that the information security pipe
Manage unit include intrusion detection module, between the intrusion detection module and security management center by network connection, it is described enter
It invades detection module and is connected by being electrically connected separately with intrusion prevention module and alarm module, the intrusion prevention module by network
It is connected to remote control module, the remote control module has network to cut off module by network connection, and the alarm module is logical
Crossing network connection has wireless communication module, and the wireless communication module has mobile terminal, the mobile terminal network by network connection
Connect remote control module, intrusion detection module for detecting whether have external staff invade secure storage unit information, enter
Invading defense module can be on the defensive for outside invasion personnel, while invasion information can be passed through wireless communication module by alarm module
It is conveyed to mobile terminal, staff is reminded to be on the defensive work, remote control module remotely operates convenient for remote personnel, net
Network cutting module can cut off in time network in the case where intrusion prevention module is defendd and do not lived.
6. a kind of computer information safe stocking system according to claim 5, which is characterized in that the wireless telecommunications mould
Block includes WiFi communication module, 4G communication module, 3G communication module and 2G communication module, be ensure that by a variety of communication modules
Dtr signal can free switching, thus increase data transmission stability.
7. a kind of computer information safe stocking system according to claim 1, which is characterized in that the sharp eyes data are examined
Counting unit includes compression control module, outgoing control module, screenshotss control module, printing control model and USB control module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910196358.9A CN109934010A (en) | 2019-03-15 | 2019-03-15 | A kind of computer information safe stocking system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910196358.9A CN109934010A (en) | 2019-03-15 | 2019-03-15 | A kind of computer information safe stocking system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109934010A true CN109934010A (en) | 2019-06-25 |
Family
ID=66987150
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910196358.9A Pending CN109934010A (en) | 2019-03-15 | 2019-03-15 | A kind of computer information safe stocking system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109934010A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112149090A (en) * | 2020-09-16 | 2020-12-29 | 山东大学 | Computer network safety protection system based on data cloud |
CN112866231A (en) * | 2021-01-13 | 2021-05-28 | 南方电网数字电网研究院有限公司 | Information security operation remote situation sensing system |
CN113483470A (en) * | 2021-06-08 | 2021-10-08 | 杭州裕达自动化科技有限公司 | Intelligent control method for refrigeration host in central air-conditioning monitoring system |
CN114157462A (en) * | 2021-11-23 | 2022-03-08 | 四川邮电职业技术学院 | Computer network information safety control system and method |
CN114564710A (en) * | 2022-03-28 | 2022-05-31 | 国网山东省电力公司信息通信公司 | Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286850A (en) * | 2007-04-10 | 2008-10-15 | 深圳职业技术学院 | Defensive installation for security of router, defense system and method |
CN103440465A (en) * | 2013-08-29 | 2013-12-11 | 成都卫士通信息安全技术有限公司 | Mobile storage medium safety control method |
CN104618353A (en) * | 2015-01-16 | 2015-05-13 | 河南机电高等专科学校 | Computer security network |
CN106656987A (en) * | 2016-11-03 | 2017-05-10 | 郑州理工职业学院 | Computer information security management system |
CN107818261A (en) * | 2017-09-12 | 2018-03-20 | 王振铎 | A kind of computer information safe stocking system |
CN108090357A (en) * | 2017-12-14 | 2018-05-29 | 湖南财政经济学院 | A kind of computer information safe control method and device |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
-
2019
- 2019-03-15 CN CN201910196358.9A patent/CN109934010A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286850A (en) * | 2007-04-10 | 2008-10-15 | 深圳职业技术学院 | Defensive installation for security of router, defense system and method |
CN103440465A (en) * | 2013-08-29 | 2013-12-11 | 成都卫士通信息安全技术有限公司 | Mobile storage medium safety control method |
CN104618353A (en) * | 2015-01-16 | 2015-05-13 | 河南机电高等专科学校 | Computer security network |
CN106656987A (en) * | 2016-11-03 | 2017-05-10 | 郑州理工职业学院 | Computer information security management system |
CN107818261A (en) * | 2017-09-12 | 2018-03-20 | 王振铎 | A kind of computer information safe stocking system |
CN108090357A (en) * | 2017-12-14 | 2018-05-29 | 湖南财政经济学院 | A kind of computer information safe control method and device |
CN108256321A (en) * | 2018-01-16 | 2018-07-06 | 吉林财经大学 | A kind of big data safety precaution supervision and aware platform |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112149090A (en) * | 2020-09-16 | 2020-12-29 | 山东大学 | Computer network safety protection system based on data cloud |
CN112866231A (en) * | 2021-01-13 | 2021-05-28 | 南方电网数字电网研究院有限公司 | Information security operation remote situation sensing system |
CN112866231B (en) * | 2021-01-13 | 2023-09-01 | 南方电网数字电网研究院有限公司 | Information security operation remote situation awareness system |
CN113483470A (en) * | 2021-06-08 | 2021-10-08 | 杭州裕达自动化科技有限公司 | Intelligent control method for refrigeration host in central air-conditioning monitoring system |
CN114157462A (en) * | 2021-11-23 | 2022-03-08 | 四川邮电职业技术学院 | Computer network information safety control system and method |
CN114564710A (en) * | 2022-03-28 | 2022-05-31 | 国网山东省电力公司信息通信公司 | Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109934010A (en) | A kind of computer information safe stocking system | |
CN112217835B (en) | Message data processing method and device, server and terminal equipment | |
CN110298196A (en) | A kind of electronic information security storage system and storage method | |
WO2012100079A2 (en) | Apparatus and method for enhancing security of data on a host computing device and a peripheral device | |
CN101237353A (en) | A method and system for monitoring mobile storage device based on USBKEY | |
CN102799539A (en) | Safe USB flash disk and data active protection method thereof | |
CN109672689A (en) | A kind of big data network security monitoring equipment | |
CN108810035A (en) | A kind of Network Security Device monitored in real time | |
CN105205581A (en) | Power-supply-enterprise electronic file safety risk evaluation system | |
CN201854302U (en) | Active anti-disclosure based network security system | |
CN103902922B (en) | A kind of method and system for preventing file from stealing | |
CN105868625B (en) | Method and device for intercepting restart deletion of file | |
CN109948342A (en) | A kind of Information Security Management System | |
Jadhav et al. | Data leak prevention system: A survey | |
Pagura | Law report:'Small business and'cyber security | |
CN108768996A (en) | A kind of detection guard system of SQL injection attack | |
JP2020086978A (en) | Information processing system and information processing method | |
Lock | Five steps to beating ransomware's five-minute warning | |
CN111885179B (en) | External terminal protection device and protection system based on file monitoring service | |
CN108924129A (en) | One kind being based on computer network instrument system of defense and intrusion prevention method | |
CN203350883U (en) | Computer data information anti-stealing device | |
CN111898105A (en) | External terminal protection equipment with user tracing function and protection system | |
CN111859434A (en) | External terminal protection device and protection system for providing confidential file transmission | |
Zhang et al. | Application strategy of data encryption technology in computer network security | |
CN205451074U (en) | Information anti -theft device of computer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190625 |
|
RJ01 | Rejection of invention patent application after publication |