CN113704061A - Secret-related computer protection system - Google Patents

Secret-related computer protection system Download PDF

Info

Publication number
CN113704061A
CN113704061A CN202110968592.6A CN202110968592A CN113704061A CN 113704061 A CN113704061 A CN 113704061A CN 202110968592 A CN202110968592 A CN 202110968592A CN 113704061 A CN113704061 A CN 113704061A
Authority
CN
China
Prior art keywords
computer
information
confidential
network
safety
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110968592.6A
Other languages
Chinese (zh)
Inventor
赵玉兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Agricultural Science and Technology College
Original Assignee
Jilin Agricultural Science and Technology College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Agricultural Science and Technology College filed Critical Jilin Agricultural Science and Technology College
Priority to CN202110968592.6A priority Critical patent/CN113704061A/en
Publication of CN113704061A publication Critical patent/CN113704061A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computer Security & Cryptography (AREA)
  • Mathematical Physics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a confidential computer protection system, which comprises a hardware safety protection module, a software safety protection module, an abnormity monitoring response module and a management terminal, wherein the system can send out alarm information of networking abnormity in time after a network monitoring unit monitors malicious networking information of an operator through a networking alarm, so that the information of the confidential computer can make an alarm response in time when leakage occurs, the alarm sound is detected through the relay circuit in the sound relay, thereby activating the sound relay through the alarm sound to cut off the connection power supply of the confidential computer in time, therefore, the system can make a targeted means in time to prevent information from being stolen when the information data of the confidential computer is threatened by leakage, the system can improve the security protection capability of the security computer by adding response measures on the basis of software and hardware protection.

Description

Secret-related computer protection system
Technical Field
The invention relates to the technical field of computer protection, in particular to a confidential computer protection system.
Background
With the rapid development of the current society, China's electronic government makes great progress, and business processing and government office have achieved informatization, but with the continuous development of electronic government, the security problem of computer information systems is increasingly prominent, and the risk caused by the security problem of computer information systems becomes an important factor influencing stable security, so how to construct a safe and efficient secret-related computer information system application environment becomes a key problem of the informatization of the current government;
however, in the process of security protection, when it is found that an illegal person maliciously operates a computer to steal security information, and after the illegal action is detected, the existing protection system cannot timely and effectively respond to the action, so that the security information is easy to leak, and therefore, the existing protection system of the computer only stays at the security protection level of the security computer, and when the security information of the computer is threatened by being stolen, a targeted means cannot be timely made to prevent the information from being stolen.
Disclosure of Invention
The invention provides a security-related computer protection system, which can effectively solve the problem that the existing computer protection system cannot timely and effectively respond to the behavior in time so as to cause the security-related information to be easily leaked in the process of security protection when finding that illegal persons maliciously operate a computer to steal the security-related information and after detecting the illegal behavior in the background technology, so that the existing computer protection system only stays at the security protection level of the security-related computer, and cannot timely make a targeted means to prevent the information from being stolen when the security-related information of the computer is threatened by being stolen.
In order to achieve the purpose, the invention provides the following technical scheme: a secret-related computer protection system comprises a hardware security protection module, a software security protection module, an exception monitoring response module and a management terminal;
the hardware safety protection module comprises a safety access U disk, a safety connection joint and safety export equipment, the software safety protection module comprises a password authentication unit, a safety identification unit and a network monitoring unit, and the abnormity monitoring response module comprises a networking alarm and a sound relay; the management terminal comprises a USB flash disk safety management unit.
According to the technical scheme, the safety access U disk is mainly matched with a secret-related computer for use and is mainly used for acquiring and storing secret-related information in the secret-related computer, the safety access U disk can be normally used after being registered in a server of a management terminal through information, the safety access U disk can acquire a safety verification code corresponding to the safety access U disk after being registered through a specified secret-related program, a special secret special connection interface is arranged at an access end of the safety access U disk, the special connection interface is only suitable for the secret-related computer, and the special connection interface enables the safety access U disk not to be inserted into computers except the secret-related computer.
According to the technical scheme, the safety connection joint is installed on the secret-related computer, the safety connection joint is controlled to be started by the secret-related computer, the safety connection joint can be used for normal connection only by starting the safety connection joint through the secret-related computer after the secret-related computer is safely and normally started, the secret-related computer is mainly connected with the special connection interface of the safety access USB flash disk through the safety connection joint and used for establishing an information transmission link between the safety access USB flash disk and the secret-related computer, and the safety connection joint and the special connection interface are identical and are provided with special connection interfaces.
According to the technical scheme, the safety export equipment is installed inside the confidential computer, one end of the safety export equipment is connected with an optical fiber network transmission channel of the confidential computer, the safety export equipment exports data information of the confidential computer through the optical fiber network transmission channel, the other end of the safety export equipment is connected with a safety connection joint of the confidential computer, the data information of the confidential computer is exported to the safety connection joint mainly through the optical fiber network transmission channel, and the data information is finally exported to the safety access U disk through the safety connection joint to finish information acquisition.
According to the technical scheme, the password authentication unit mainly comprises password authentication and identity authentication, the password authentication unit is installed in a confidential computer, when the confidential computer is started, the password authentication unit is synchronously started, and an operator needs to complete the password authentication and the identity authentication through the password authentication unit in the process of operating the computer;
the password verification is mainly completed by inputting a safe encrypted password in the confidential computer, and when the input safe encrypted password is wrong and the wrong safe encrypted password is input continuously for three times, the confidential computer cannot be started and is automatically shut down;
the identity verification means that after the password is verified correctly, the face image of an operator is scanned and recognized through a face recognition technology in a confidential computer, the face image information of the operator is obtained through scanning and recognition, the face image information of the operator is verified with face image information prestored in a system image library in the confidential computer, the confidential computer is normally started after the face image information is verified and compared, when the face image information cannot be matched with the face image information in the system image library of the confidential computer in the verification process, the confidential computer cannot be started, and the confidential computer is normally started and networked after the security verification is performed through a password authentication unit and the authentication of the operator is successful.
According to the technical scheme, the safety identification unit is used for identifying the safety access U disk for acquiring the secret-related information data when an operator needs to acquire the secret-related information data in the secret-related computer after the computer is normally started, the folder for storing the secret-related information data can be popped up in a popup window mode when the operator needs to transmit the secret-related information data, the operator only needs to correctly input the verification code acquired by registering the safety access U disk to complete safety identification, and when the operator cannot correctly input the correct verification code, the folder for storing the secret-related information data can be in an encrypted state and cannot be opened.
According to the technical scheme, the network monitoring unit is mainly used for monitoring a transmission network connected with a confidential computer, after the confidential computer is subjected to security verification by the password authentication unit and is networked, the network monitoring unit is used for carrying out information verification on the communication network connected with the confidential computer, and the terminal name, the network IP address and the information of a person responsible for the network of the communication network connected with the confidential computer are mainly inquired to ensure that the network is a secure network connected with the confidential computer;
the network monitoring unit can monitor other abnormal networks of malicious external connection of an operator besides monitoring networking information connected with the confidential computer, the abnormal networks of the external connection mainly comprise a network card network, a wireless network and a mobile phone mobile network, the network card network, the wireless network and the mobile phone mobile network are accessed from the outside of the confidential computer by the operator, after the network monitoring unit monitors the external connection network accessed into the confidential computer, the network monitoring unit can transmit the malicious networking information to the management terminal, and the management terminal can rapidly make a response of closing the computer through a remote control technology.
According to the technical scheme, after the network monitoring unit monitors malicious networking information of an operator, a network card network, a wireless network and a mobile phone mobile network of an external connection of the operator can be randomly accessed into the networking alarm through a secret-involved computer, after the networking alarm is connected to an abnormal safety network, the networking alarm connected with the external connection network can be started to send out abnormal networking alarm information to remind related workers of attention, and the alarm information is audible and visual alarm response.
According to the technical scheme, the sound relay is mainly used for disconnecting the connection power supply of the confidential computer in a circuit control mode, after the networking alarm is connected into an external network and starts alarm response, the relay circuit in the sound relay can detect the existence of alarm sound and activate the sound relay through the relay circuit, and after the sound relay is activated, the sound relay quickly responds to cut off the connection power supply of the confidential computer.
According to the technical scheme, the U disk safety management unit is mainly used for managing a safety access U disk connected with a confidential computer, and specifically comprises the steps of managing registration information and use information of the safety access U disk;
when the USB flash disk safety management unit manages the registration information of the safely accessed USB flash disk, the registration work of the safely accessed USB flash disk is mainly finished, the safely accessed USB flash disk is subjected to information registration in a management terminal through the USB flash disk safety management unit by using a straight line, and the registered information comprises information of USB flash disk users and verification code information;
when managing the use information of the safe access U disk, the U disk safety management unit is mainly used for managing the use frequency information and the use range information of the U disk, and specifically, the U disk safety management unit is used for stipulating the use information of the U disk in a specified secret-related computer within the corresponding use frequency.
Compared with the prior art, the invention has the beneficial effects that:
1. the transmission path of the confidential computer can be protected in a hardware protection mode through the security access U disk, the security connection joint and the security export equipment, and in the protection process, the special transmission path of the confidential computer is formed through the connection among the security access U disk, the security connection joint and the security export equipment, so that the confidential computer can only transmit information through the special transmission path, the transmission path of the confidential computer is limited, the protection of the transmission path of the confidential computer is realized, the confidential computer can be limited by more elements in the process of confidential information transmission, and the accuracy and the security of the information transmission path of the confidential computer are ensured.
2. The security information of the security-related computer can be obtained by different verification methods through the password authentication unit, the security identification unit and the network monitoring unit, so that the accuracy and the security of the information of the security-related computer can be verified when the operator obtains the security information of the security-related computer, and when the operator information is verified, the response that the security-related computer cannot be started and the security-related computer is automatically shut down can be timely made when the operator information is wrong, so that the security-related computer can be protected timely when the operator fails in verification, and further the phenomenon of information leakage of the subsequent security-related computer can be avoided, and the security-related computer can be authenticated and identified through the password authentication unit and the security identification unit, the network monitoring unit can monitor the transmission network connected with the confidential computer, so that the network is ensured to be a safe transmission network connected with the confidential computer, when an operator connects an external network through an irregular behavior, the network monitoring unit can also detect the information of the external network in time, and a response for closing the computer is made in time in a remote control mode, so that the information leakage of the confidential computer is prevented
In conclusion, the information protection capability of the confidential computer can be comprehensively improved in a form of combining software and hardware through the hardware safety protection module and the software safety protection module, so that the confidential computer can be protected from multiple different aspects in multiple confidential protection modes, the safety of the confidential computer in the information transmission process is guaranteed, and the protection effect of the system on the confidential computer is improved.
3. The invention can monitor the irregular networking behaviors of illegal persons through the network monitoring unit, can send out abnormal networking alarm information in time after the network monitoring unit monitors malicious networking information of operating personnel through the networking alarm, so as to remind the attention of related working personnel in time, thus leading the information of a confidential computer to make an alarm response in time when leakage occurs, simultaneously, after the networking alarm is connected into an external network and starts the alarm response, the alarm sound is detected through a relay circuit in the sound relay, thus the sound relay is activated through the alarm sound, the connection power supply of the confidential computer is cut off in time through the quick response of the sound relay, further response is made, and when the information data of the confidential computer is threatened by leakage, the system can timely make a targeted means to prevent information from being stolen, and further the system can improve the security protection capability of the security computer by adding response measures on the basis of software and hardware protection.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a block diagram of the system architecture of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example (b): as shown in fig. 1, the present invention provides a technical solution, a secret-related computer protection system, which includes a hardware security protection module, a software security protection module, an anomaly monitoring response module, and a management terminal;
the hardware safety protection module comprises a safety access U disk, a safety connection joint and safety export equipment, the software safety protection module comprises a password authentication unit, a safety identification unit and a network monitoring unit, and the abnormity monitoring response module comprises a networking alarm and a sound relay; the management terminal comprises a USB flash disk safety management unit.
Based on the technical scheme, the safety access U disk is mainly matched with a confidential computer for use and is mainly used for acquiring and storing confidential information in the confidential computer, the safety access U disk can be normally used after being registered in a server of a management terminal, the safety access U disk can acquire a corresponding safety verification code after being registered through a specified confidential program, a special secret special connection interface is arranged at an access end of the safety access U disk, the special connection interface is only suitable for the confidential computer, and the special connection interface enables the safety access U disk not to be inserted into computers except the confidential computer.
Based on the technical scheme, the safety connection joint is installed on the secret-related computer, the safety connection joint is controlled to be started by the secret-related computer, the safety connection joint can be used for normal connection only when the secret-related computer is started safely and normally, the secret-related computer is mainly connected with the special connection interface of the safety access USB flash disk through the safety connection joint and used for establishing an information transmission link between the safety access USB flash disk and the secret-related computer, and the safety connection joint and the special connection interface are identical and have special connection interfaces.
Based on the technical scheme, the safety export equipment is installed inside the confidential computer, one end of the safety export equipment is connected with an optical fiber network transmission channel of the confidential computer, the safety export equipment exports data information of the confidential computer through the optical fiber network transmission channel, the other end of the safety export equipment is connected with a safety connection joint of the confidential computer, the data information of the confidential computer is exported to the safety connection joint mainly through the optical fiber network transmission channel, and the data information is finally exported to a safety access U disk through the safety connection joint to finish information acquisition.
Based on the technical scheme, the password authentication unit mainly comprises password authentication and identity authentication, the password authentication unit is installed in the confidential computer, when the confidential computer is started, the password authentication unit is synchronously started, and an operator needs to complete the password authentication and the identity authentication through the password authentication unit in the process of operating the computer;
the password verification is mainly completed by inputting a safe encrypted password in the confidential computer, and when the input safe encrypted password is wrong and the wrong safe encrypted password is input continuously for three times, the confidential computer cannot be started and is automatically shut down;
the identity verification means that after the password is verified correctly, the face image of an operator is scanned and recognized through a face recognition technology in a confidential computer, the face image information of the operator is obtained through scanning and recognition, the face image information of the operator is verified with face image information prestored in a system image library in the confidential computer, the confidential computer is normally started after the face image information is verified and compared, when the face image information cannot be matched with the face image information in the system image library of the confidential computer in the verification process, the confidential computer cannot be started, and the confidential computer is normally started and networked after the security verification is performed through a password authentication unit and the authentication of the operator is successful.
Based on the technical scheme, the safety identification unit is used for identifying the safety access U disk for acquiring the confidential information data when an operator needs to acquire the confidential information data in the confidential computer after the computer is normally started, the folder for storing the confidential information data can be popped up in a popup window mode when the operator needs to transmit the confidential information data, the operator only needs to correctly input the verification code acquired by registering the safety access U disk to complete safety identification, and when the operator cannot correctly input the correct verification code, the folder for storing the confidential information data is in an encrypted state and cannot be opened.
Based on the technical scheme, the network monitoring unit is mainly used for monitoring a transmission network connected with a confidential computer, after the confidential computer is subjected to security verification by the password authentication unit and is networked, the communication network connected with the confidential computer is subjected to information verification by the network monitoring unit, the terminal name and the network IP address of the communication network connected with the confidential computer and information of a person responsible for the network are mainly inquired, and the network is ensured to be a secure network connected with the confidential computer;
the network monitoring unit can monitor other abnormal networks of malicious external connection of an operator besides monitoring networking information connected with the confidential computer, the abnormal networks of the external connection mainly comprise a network card network, a wireless network and a mobile phone mobile network, the network card network, the wireless network and the mobile phone mobile network are accessed from the outside of the confidential computer by the operator, after the network monitoring unit monitors the external connection network accessed into the confidential computer, the network monitoring unit can transmit the malicious networking information to the management terminal, and the management terminal can rapidly make a response of closing the computer through a remote control technology.
Based on the technical scheme, the networking alarm is mainly characterized in that after a network monitoring unit monitors malicious networking information of an operator, a network card network, a wireless network and a mobile phone mobile network of an external connection of the operator can be randomly accessed into the networking alarm through a confidential computer, and after the networking alarm is connected to an abnormal safety network, the networking alarm connected with the external connection network can be started to send out abnormal networking alarm information to remind related workers of attention in time, wherein the alarm information is an audible and visual alarm response.
Based on the technical scheme, the sound relay is mainly used for disconnecting the connection power supply of the confidential computer in a circuit control mode, after the networking alarm is connected into an external network and starts alarm response, the relay circuit in the sound relay can detect the existence of alarm sound and activate the sound relay through the relay circuit, and after the sound relay is activated, the sound relay quickly responds to cut off the connection power supply of the confidential computer.
Based on the technical scheme, the USB flash disk safety management unit is mainly used for managing a safety access USB flash disk connected with a confidential computer, and specifically comprises the steps of managing registration information and use information of the safety access USB flash disk;
when the USB flash disk safety management unit manages the registration information of the safely accessed USB flash disk, the registration work of the safely accessed USB flash disk is mainly finished, the safely accessed USB flash disk is subjected to information registration in a management terminal through the USB flash disk safety management unit by using a straight line, and the registered information comprises information of USB flash disk users and verification code information;
when managing the use information of the safe access U disk, the U disk safety management unit is mainly used for managing the use frequency information and the use range information of the U disk, and specifically, the U disk safety management unit is used for stipulating the use information of the U disk in a specified secret-related computer within the corresponding use frequency.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A secret-related computer protection system is characterized in that: the system comprises a hardware safety protection module, a software safety protection module, an abnormity monitoring response module and a management terminal;
the hardware safety protection module comprises a safety access U disk, a safety connection joint and safety export equipment, the software safety protection module comprises a password authentication unit, a safety identification unit and a network monitoring unit, and the abnormity monitoring response module comprises a networking alarm and a sound relay; the management terminal comprises a USB flash disk safety management unit.
2. The security computer protection system of claim 1, wherein: the safety access U disk is mainly matched with a secret-related computer for use and is mainly used for acquiring and storing secret-related information in the secret-related computer, the safety access U disk can be normally used after being registered in a server of a management terminal through information, the safety access U disk can acquire a safety verification code corresponding to the safety access U disk after being registered through a specified secret-related program, an access end of the safety access U disk is provided with a special secret special connection interface, the special connection interface is only suitable for the secret-related computer, and the special connection interface enables the safety access U disk not to be inserted into computers except the secret-related computer.
3. The security computer protection system of claim 1, wherein: the security connection joint is arranged on a security computer, the security connection joint is controlled to be started by the security computer, the security connection joint can be used for normal connection only by starting the security connection joint through the security computer after the security computer is safely and normally started, the security computer is mainly connected with a special connection interface which is safely accessed to the USB flash disk through the security connection joint and is used for establishing an information transmission link between the security access USB flash disk and the security computer, and the security connection joint and the special connection interface are the same and have special connection interfaces.
4. The security computer protection system of claim 1, wherein: the safety exporting device is installed inside the confidential computer, one end of the safety exporting device is connected with an optical fiber network transmission channel of the confidential computer, the safety exporting device exports data information of the confidential computer through the optical fiber network transmission channel, the other end of the safety exporting device is connected with a safety connection joint of the confidential computer, the data information of the confidential computer is exported to the safety connection joint through the optical fiber network transmission channel, and the data information is exported to a safety access U disk through the safety connection joint finally to finish information acquisition.
5. The security computer protection system of claim 1, wherein: the password authentication unit mainly comprises password authentication and identity authentication, the password authentication unit is arranged in a confidential computer, when the confidential computer is started, the password authentication unit is synchronously started, and an operator needs to complete the password authentication and the identity authentication through the password authentication unit in the process of operating the computer;
the password verification is mainly completed by inputting a safe encrypted password in the confidential computer, and when the input safe encrypted password is wrong and the wrong safe encrypted password is input continuously for three times, the confidential computer cannot be started and is automatically shut down;
the identity verification means that after the password is verified correctly, the face image of an operator is scanned and recognized through a face recognition technology in a confidential computer, the face image information of the operator is obtained through scanning and recognition, the face image information of the operator is verified with face image information prestored in a system image library in the confidential computer, the confidential computer is normally started after the face image information is verified and compared, when the face image information cannot be matched with the face image information in the system image library of the confidential computer in the verification process, the confidential computer cannot be started, and the confidential computer is normally started and networked after the security verification is performed through a password authentication unit and the authentication of the operator is successful.
6. The security computer protection system of claim 1, wherein: the security identification unit is used for identifying the security access U disk for acquiring the confidential information data when an operator needs to acquire the confidential information data in the confidential computer after the computer is normally started, the folder for storing the confidential information data can be popped up in a popup window mode when the operator needs to transmit the confidential information data, the operator only needs to correctly input the verification code acquired by registering the security access U disk to complete the security identification, and when the operator cannot correctly input the correct verification code, the folder for storing the confidential information data can be in an encrypted state and cannot be opened.
7. The security computer protection system of claim 1, wherein: the network monitoring unit is mainly used for monitoring a transmission network connected with a confidential computer, after the confidential computer is subjected to security verification by the password authentication unit and is networked, the communication network connected with the confidential computer is subjected to information verification by the network monitoring unit, the terminal name, the network IP address and the information of a person responsible for the network of the communication network connected with the confidential computer are mainly inquired, and the network is ensured to be a secure network connected with the confidential computer;
the network monitoring unit can monitor other abnormal networks of malicious external connection of an operator besides monitoring networking information connected with the confidential computer, the abnormal networks of the external connection mainly comprise a network card network, a wireless network and a mobile phone mobile network, the network card network, the wireless network and the mobile phone mobile network are accessed from the outside of the confidential computer by the operator, after the network monitoring unit monitors the external connection network accessed into the confidential computer, the network monitoring unit can transmit the malicious networking information to the management terminal, and the management terminal can rapidly make a response of closing the computer through a remote control technology.
8. The security computer protection system of claim 7, wherein: the network alarm is mainly characterized in that after a network monitoring unit monitors malicious networking information of an operator, a network card network, a wireless network and a mobile phone mobile network of an external connection of the operator can be randomly accessed into the network alarm through a confidential computer, and after the network alarm is connected to an abnormal safety network, the network alarm connected with the external connection network can be started to send out abnormal networking alarm information to remind related workers of attention, wherein the alarm information is an audible and visual alarm response.
9. The security computer protection system of claim 8, wherein: the sound relay is mainly used for disconnecting the connection power supply of the confidential computer in a circuit control mode, after the networking alarm is connected into an external network and starts alarm response, the relay circuit in the sound relay can detect the existence of alarm sound and activate the sound relay through the relay circuit, and after the sound relay is activated, the sound relay quickly responds to the disconnection power supply of the confidential computer.
10. The security computer protection system of claim 1, wherein: the USB flash disk safety management unit is mainly used for managing a safety access USB flash disk connected with a confidential computer, and specifically comprises the step of managing registration information and use information of the safety access USB flash disk;
when the USB flash disk safety management unit manages the registration information of the safely accessed USB flash disk, the registration work of the safely accessed USB flash disk is mainly finished, the safely accessed USB flash disk is subjected to information registration in a management terminal through the USB flash disk safety management unit by using a straight line, and the registered information comprises information of USB flash disk users and verification code information;
when managing the use information of the safe access U disk, the U disk safety management unit is mainly used for managing the use frequency information and the use range information of the U disk, and specifically, the U disk safety management unit is used for stipulating the use information of the U disk in a specified secret-related computer within the corresponding use frequency.
CN202110968592.6A 2021-08-23 2021-08-23 Secret-related computer protection system Withdrawn CN113704061A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110968592.6A CN113704061A (en) 2021-08-23 2021-08-23 Secret-related computer protection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110968592.6A CN113704061A (en) 2021-08-23 2021-08-23 Secret-related computer protection system

Publications (1)

Publication Number Publication Date
CN113704061A true CN113704061A (en) 2021-11-26

Family

ID=78654073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110968592.6A Withdrawn CN113704061A (en) 2021-08-23 2021-08-23 Secret-related computer protection system

Country Status (1)

Country Link
CN (1) CN113704061A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116244757A (en) * 2023-03-15 2023-06-09 武汉天楚云计算有限公司 Computer equipment monitoring alarm method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116244757A (en) * 2023-03-15 2023-06-09 武汉天楚云计算有限公司 Computer equipment monitoring alarm method

Similar Documents

Publication Publication Date Title
CN112487383B (en) Computer system for guaranteeing information security and control method thereof
CN110719203B (en) Operation control method, device and equipment of intelligent household equipment and storage medium
CN110011848B (en) Mobile operation and maintenance auditing system
KR101276261B1 (en) Security System For Remote Connection
CN109684804A (en) A kind of method for security protection and system of BMC serial ports
CN103441926A (en) Security gateway system of numerically-controlled machine tool network
KR102160656B1 (en) Login Method Using Palm Vein
CN103200562A (en) Communication terminal locking method and communication terminal
CN113704061A (en) Secret-related computer protection system
CN112637172A (en) Novel data security and confidentiality method
CN112507308A (en) Identity recognition and authentication method
CN111898167A (en) External terminal protection equipment and protection system including identity information verification
CN114157438A (en) Network equipment management method and device and computer readable storage medium
KR100250976B1 (en) Detection and managment method of terminal copying in wireless communication service
CN111191208A (en) High-security computer information data protection system and method
CN107968777B (en) Network security monitoring system
KR20100085459A (en) Personal information protecting device for using filtering network transferring data method thereof
CN114257404B (en) Abnormal external connection statistical alarm method, device, computer equipment and storage medium
CN112395574B (en) Safe login management method
CN108270601B (en) Mobile terminal, alarm information acquisition method and device and alarm information sending method and device
CN104852904A (en) Server remote restart method based on mobile phone APP and encrypted short message
JP2004206258A (en) Multiple authentication system, computer program, and multiple authentication method
CN111898105A (en) External terminal protection equipment with user tracing function and protection system
CN112906027A (en) Cloud computing data center access management method
CN111475433A (en) Serial port using method and device, power terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20211126