CN112153075A - Safety monitoring system for computer wireless communication - Google Patents

Safety monitoring system for computer wireless communication Download PDF

Info

Publication number
CN112153075A
CN112153075A CN202011086231.0A CN202011086231A CN112153075A CN 112153075 A CN112153075 A CN 112153075A CN 202011086231 A CN202011086231 A CN 202011086231A CN 112153075 A CN112153075 A CN 112153075A
Authority
CN
China
Prior art keywords
module
network
computer terminal
monitoring module
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011086231.0A
Other languages
Chinese (zh)
Other versions
CN112153075B (en
Inventor
傅仕琛
陈铮
杨威
黄秋瑜
张壬寅
曾子建
张坤三
傅昱
范琳芳
黄凤珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Fujian Electric Power Co Ltd
Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd
Original Assignee
State Grid Fujian Electric Power Co Ltd
Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Fujian Electric Power Co Ltd, Zhangzhou Power Supply Co of State Grid Fujian Electric Power Co Ltd filed Critical State Grid Fujian Electric Power Co Ltd
Priority to CN202011086231.0A priority Critical patent/CN112153075B/en
Publication of CN112153075A publication Critical patent/CN112153075A/en
Application granted granted Critical
Publication of CN112153075B publication Critical patent/CN112153075B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The invention relates to a security monitoring system for computer wireless communication, which comprises a computer terminal, a signal transmission module, a security monitoring module, a firewall and a router, wherein the computer terminal is used for generating an operation command and transmitting the operation command to the signal transmission module, the signal transmission module is used for transmitting the operation command generated by the computer terminal and transmitting the operation command to the security monitoring module, and the security monitoring module is used for identifying and blocking sensitive words and domains requested to be networked by the computer terminal and can also be used for judging, monitoring and clearing login information input by the computer terminal. The invention can limit the website accessed by the local network, the searched information or the network use time, and can monitor the safety of the webpage login.

Description

Safety monitoring system for computer wireless communication
Technical Field
The invention relates to the technical field of network monitoring systems, in particular to a security monitoring system for computer wireless communication.
Background
Network security is relative, on one hand, hardware, software and data in the system of the network system are protected, and are not damaged, changed and leaked due to accidental or malicious reasons, the system can continuously, reliably and normally operate, and network service is not interrupted, and on the other hand, a local network is protected to a certain extent and cannot access dangerous websites or domain names, so that the purpose of network security is achieved.
The active protection of the local network is widely applied to places such as schools, companies and the like, can protect the safety of the local network, and can enable students or employees to learn and work more intensely. However, in practical applications, it is found that the conventional network security monitoring system related to active protection still has certain disadvantages, and the network security monitoring system has great limitations, and can only detect and monitor the problem of network hardware access, but cannot limit the websites accessed in the local network, the searched information, or the time for using the network.
Disclosure of Invention
Accordingly, the present invention is directed to a security monitoring system for computer wireless communication, which can limit the website accessed by a local network, the searched information, or the time of using the network, and can monitor the security of web page login.
The invention is realized by adopting the following scheme: a security monitoring system for computer wireless communication comprises a plurality of computer terminals, a signal transmission module, a security monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
Further, the operation instructions comprise webpage login, network search, software downloading, resource downloading, game downloading and online payment operation.
Furthermore, the safety monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
Further, the step of identifying, blocking and clearing the operation instruction of the computer terminal by the security monitoring module specifically comprises the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module.
Compared with the prior art, the invention has the following beneficial effects:
(1) the invention can limit the website accessed by the local network, the searched information or the network use time, and can monitor the safety of the webpage login.
(2) The invention can limit the network using time of the computer terminal through the time management module, the network is smooth when the network is used in the specified time, and the network can be blocked by the network blocking module when the network is not used in the specified time, thereby preventing the user from indulging the network.
(3) The invention can identify the sensitive words of the information searched by the user through the sensitive information monitoring module and the sensitive information database, if the information contains the sensitive words, the network access of the computer terminal is blocked through the network blocking module, and the alarm is given through the alarm module, if the information does not contain the sensitive words, the network is smooth, and the safety of the network is ensured.
(4) According to the invention, through the domain name monitoring module and the domain name database, whether the request data of the computer terminal contains dangerous domain names can be judged, if the request data contains dangerous domain names, the network access of the computer terminal is blocked through the network blocking module, and the alarm is carried out through the alarm module, and if the request data does not contain dangerous domain names, the network is smooth, so that the local network can be prevented from accessing some dangerous domain names, and the safety of the local network is further ensured.
(5) The login judging module can judge whether the request data of the computer terminal is login operation, and meanwhile, the data clearing module can clear the monitoring information in the login information monitoring module, so that the safety of the data is ensured, and the login information is prevented from being left.
Drawings
Fig. 1 is a schematic system architecture diagram according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a security monitoring module according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of time determination according to an embodiment of the invention.
Fig. 4 is a schematic diagram of sensitive word determination according to an embodiment of the present invention.
Fig. 5 is a schematic diagram illustrating a dangerous domain name determination according to an embodiment of the present invention.
Fig. 6 is a schematic view illustrating login information determination according to an embodiment of the present invention.
Detailed Description
The invention is further explained below with reference to the drawings and the embodiments.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
As shown in fig. 1, the security monitoring system for computer wireless communication in the present embodiment includes a plurality of computer terminals, a signal transmission module, a security monitoring module, a router, and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
In this embodiment, the operation instruction includes a web login, a web search, a software download, a resource download, a game download, and an online payment operation.
As shown in fig. 2, in this embodiment, the security monitoring module includes a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module, and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
As shown in fig. 3 to 6, in this embodiment, the identifying, blocking and clearing, by the security monitoring module, the operation instruction of the computer terminal specifically includes the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, the data clearing module is used for clearing the monitoring information in the login information monitoring module, the monitoring information comprises all the information in the login information monitoring module, and the safety of the computer terminal is further ensured.
Preferably, in this embodiment, a legal web page and a legal login user name can be set in the login information monitoring module, and the login information monitoring module can determine that the web page is legal only when the legal login user name logs in the legal web page.
Preferably, in this embodiment: the firewall is used for generating a protection barrier and blocking unsafe network factors of the computer terminal;
the router is used for connecting the network of the computer terminal to the Internet;
the security monitoring module is used for identifying and blocking sensitive words and domain names which are requested to be networked by the computer terminal, and also can be used for judging, monitoring and clearing login information input by the computer terminal;
the safety monitoring module comprises a network blocking module and an alarm module, wherein the network blocking module is used for blocking a network access of the computer terminal, the alarm module comprises an alarm lamp and a buzzer, and when the safety monitoring module detects abnormity, the alarm module is used for generating an alarm.
The safety monitoring module further comprises a time management module, and the output end of the time management module is in signal connection with the sensitive information monitoring module and the network blocking module. The time management module comprises a control panel and a processor, the time can be set through the control panel, the network can be used within the set time, and the network can be blocked by the network blocking module when the time limit is exceeded.
The output end of the sensitive information monitoring module is in signal connection with a domain name monitoring module and a network blocking module, and the output end of the domain name monitoring module is in signal connection with a login judging module and a network blocking module. The output end of the login judgment module is in signal connection with a login information monitoring module, and the output end of the login information monitoring module is in signal connection with a network blocking module and a firewall. The input end of the sensitive information monitoring module is in signal connection with a sensitive information database, the input end of the domain name monitoring module is in signal connection with a domain name database, various sensitive words, sensitive names or other sensitive information are stored in the sensitive information database, and various dangerous domain names are stored in the domain name database. The input end of the login information monitoring module is in signal connection with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module, so that the safety of data is ensured, and the login information is prevented from being left.
Preferably, in this embodiment, the sensitive information database and the sensitive information monitoring module can monitor the sensitive information in the computer terminal request data to prevent the computer terminal from searching for some sensitive information, and the domain name database and the domain name monitoring module can monitor the domain name in the computer terminal request data to prevent the computer terminal from accessing some domain names with dangerousness, thereby ensuring the security of the computer terminal network.
The above description is only a preferred embodiment of the present invention, and all equivalent changes and modifications made in accordance with the claims of the present invention should be covered by the present invention.

Claims (4)

1. A security monitoring system for computer wireless communication, characterized by: the system comprises a plurality of computer terminals, a signal transmission module, a safety monitoring module, a router and a firewall module; each computer terminal is connected with the signal transmission module and is used for transmitting the generated operation instruction to the signal transmission module; the signal transmission module is connected with the safety monitoring module and used for transmitting an operation instruction to the safety monitoring module through the signal transmission module, and the safety monitoring module identifies, blocks and clears the operation instruction of the computer terminal; each computer terminal is also connected with the router and is used for being connected with a network through the router; the firewall module is also connected with the network through the router; the firewall module is connected with the safety monitoring module and used for blocking unsafe network factors of the computer terminal.
2. A security monitoring system for computer wireless communication according to claim 1, characterized in that: the operation instructions comprise webpage login, network search, software downloading, resource downloading, game downloading and online payment operation.
3. A security monitoring system for computer wireless communication according to claim 1, characterized in that: the safety monitoring module comprises a time management module, a sensitive information database, a sensitive information monitoring module, a domain name database, a domain name monitoring module, a network blocking module, an alarm module, a login judgment module, a login information monitoring module and a data clearing module; the time management module is respectively connected with the signal transmission module, the sensitive information monitoring module and the network blocking module; the sensitive information monitoring module is respectively connected with the sensitive information database, the domain name monitoring module and the network blocking module; the domain name database is connected with the domain name monitoring module; the domain name monitoring module is respectively connected with the network blocking module and the login judging module; the login judgment module is respectively connected with the login information monitoring module and the firewall module; the login information monitoring module is also respectively connected with the data clearing module, the network blocking module and the firewall module; the network blocking module is also connected with the alarm module.
4. A security monitoring system for computer wireless communication according to claim 3, characterized in that: the steps of identifying, blocking and clearing the operation instruction of the computer terminal by the safety monitoring module specifically comprise the following steps:
step S1: the signal transmission module transmits the operation instruction of each computer terminal to the time management module, the time management module judges whether the network utilization time of the computer terminal is in the set time, if not, the network access of the computer terminal is blocked by the network blocking module, the alarm module gives an alarm, and if so, the data is transmitted to the sensitive information monitoring module;
step S2: the sensitive information monitoring module judges whether an operation instruction of the computer terminal contains sensitive words or not according to various sensitive words, sensitive names or sensitive information stored in the sensitive information database, if the operation instruction contains the sensitive words, a network access of the computer terminal is blocked through the network blocking module, an alarm is given through the alarm module, and if the operation instruction does not contain the sensitive words, data are transmitted to the domain name monitoring module;
step S3: the domain name monitoring module judges whether an operation instruction of the computer terminal comprises a dangerous domain name according to various dangerous domain names stored in the domain name database, if so, a network access of the computer terminal is blocked by the network blocking module, an alarm is given by the alarm module, and if not, data are transmitted to the login judging module;
step S4: the login judging module judges whether the request data of the computer terminal is login operation, if not, the data is directly transmitted to the Internet through a firewall, if yes, the login information monitoring module judges whether the login information is legal or not, if the login information is illegal, the network access of the computer terminal is blocked through the network blocking module, the alarm module gives an alarm, if the login information is legal, the data is transmitted to the Internet through the firewall, the input end of the login information monitoring module is also connected with a data clearing module, and the data clearing module is used for clearing the monitoring information in the login information monitoring module.
CN202011086231.0A 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication Active CN112153075B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011086231.0A CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011086231.0A CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Publications (2)

Publication Number Publication Date
CN112153075A true CN112153075A (en) 2020-12-29
CN112153075B CN112153075B (en) 2023-05-05

Family

ID=73953001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011086231.0A Active CN112153075B (en) 2020-10-12 2020-10-12 Safety monitoring system for computer wireless communication

Country Status (1)

Country Link
CN (1) CN112153075B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647425A (en) * 2012-04-20 2012-08-22 汉柏科技有限公司 Method and system for realizing anti-trojan function of firewall
CN103491108A (en) * 2013-10-15 2014-01-01 浙江中控研究院有限公司 Method and system for security protection of industrial control network
CN104821943A (en) * 2015-04-27 2015-08-05 西北工业大学 Method for enhancing security of access of Linux hosts to network system
US20170339177A1 (en) * 2016-05-06 2017-11-23 SecuLore Solutions, LLC System, method, and apparatus for data loss prevention
CN108931968A (en) * 2018-07-25 2018-12-04 安徽三实信息技术服务有限公司 A kind of network security protection system and its means of defence applied in industrial control system
CN109450945A (en) * 2018-12-26 2019-03-08 成都西维数码科技有限公司 A kind of web page access method for safety monitoring based on SNI
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102647425A (en) * 2012-04-20 2012-08-22 汉柏科技有限公司 Method and system for realizing anti-trojan function of firewall
CN103491108A (en) * 2013-10-15 2014-01-01 浙江中控研究院有限公司 Method and system for security protection of industrial control network
CN104821943A (en) * 2015-04-27 2015-08-05 西北工业大学 Method for enhancing security of access of Linux hosts to network system
US20170339177A1 (en) * 2016-05-06 2017-11-23 SecuLore Solutions, LLC System, method, and apparatus for data loss prevention
CN108931968A (en) * 2018-07-25 2018-12-04 安徽三实信息技术服务有限公司 A kind of network security protection system and its means of defence applied in industrial control system
CN109450945A (en) * 2018-12-26 2019-03-08 成都西维数码科技有限公司 A kind of web page access method for safety monitoring based on SNI
CN109977661A (en) * 2019-04-09 2019-07-05 福建奇点时空数字科技有限公司 A kind of network safety protection method and system based on big data platform

Also Published As

Publication number Publication date
CN112153075B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
KR101042246B1 (en) USB connector and intrusion prevention system using the same
CN102301373B (en) Health-based Access To Network Resources
US20040103200A1 (en) Method and system for improved internet security via HTTP-only cookies
US20010025311A1 (en) Access control system
US20220217169A1 (en) Malware detection at endpoint devices
US20090048997A1 (en) Method and apparatus for rule-based masking of data
US20080307529A1 (en) Method and Apparatus for Protecting Internet Privacy
US20090119745A1 (en) System and method for preventing private information from leaking out through access context analysis in personal mobile terminal
CN106899549B (en) Network security detection method and device
US20170353434A1 (en) Methods for detection of reflected cross site scripting attacks
WO2002078293A1 (en) Method and system for securely permitting mobile code to access network resources
KR20080044145A (en) Anomaly detection system and method of web application attacks using web log correlation
KR101996471B1 (en) Network Securing Device and Securing method Using The Same
CN111614624A (en) Risk detection method, device, system and storage medium
CN113518077A (en) Malicious web crawler detection method, device, equipment and storage medium
US20190238544A1 (en) Tracking and whitelisting third-party domains
US9230105B1 (en) Detecting malicious tampering of web forms
EP1455500A1 (en) Methods and devices relating to distributed computing environments
KR100916324B1 (en) The method, apparatus and system for managing malicious code spreading site using fire wall
KR20020027702A (en) Method for intercepting the harmfulness site connection on the Internet
US8904487B2 (en) Preventing information theft
CN112153075B (en) Safety monitoring system for computer wireless communication
CN111931236A (en) Data communication monitoring method, system and computer readable storage medium
CN102664913A (en) Method and device for webpage access control
KR101775518B1 (en) Method of prividing browser using browser process for each access permission and apparatus using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant