CN115525924A - Information safety system based on cloud computing - Google Patents

Information safety system based on cloud computing Download PDF

Info

Publication number
CN115525924A
CN115525924A CN202211133735.2A CN202211133735A CN115525924A CN 115525924 A CN115525924 A CN 115525924A CN 202211133735 A CN202211133735 A CN 202211133735A CN 115525924 A CN115525924 A CN 115525924A
Authority
CN
China
Prior art keywords
login
file
personnel
level
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211133735.2A
Other languages
Chinese (zh)
Inventor
喻宇
夏霆
海世强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Instant Network Technology Co ltd
Original Assignee
Nanjing Instant Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Instant Network Technology Co ltd filed Critical Nanjing Instant Network Technology Co ltd
Priority to CN202211133735.2A priority Critical patent/CN115525924A/en
Publication of CN115525924A publication Critical patent/CN115525924A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the field of information security, and discloses a cloud computing information security system, which comprises a main control module, wherein a file grading module grades files in a whole file library, a personnel grading module grades and differentiates personnel with login authority, a portrait identification module judges whether the login personnel are authorized to log in, a password verification module judges whether the login personnel are authorized to log in, an access unit is used for calling files accessed by the login personnel in the file library, a tracking unit is used for monitoring and recording the access process of the login personnel, a danger interception unit is used for carrying out danger interception and sending out a warning signal when the system is attacked by danger, an automatic log-out unit is used for carrying out forced automatic log-out on a logged-in account number when a browsing interface is in a non-motion state for a long time in the access process of the login personnel, a log-out detection module is used for detecting the downloaded files again, the safe login of the personnel of the cloud computing information security system is realized, the file loading time is reduced, and the security of the system is improved.

Description

Information safety system based on cloud computing
Technical Field
The invention relates to the field of information security, in particular to an information security system based on cloud computing.
Background
With the development of cloud computing technology, a cloud computing core algorithm program is gradually popularized in places such as government offices, companies, enterprises, public institutions and the like, and in the application process, the network security accounts for a great proportion, so that the system can be used only by ensuring the security of the system, especially in a system such as a research institute with high and new scientific research technology storage, the security protection function is more important, when relevant personnel in the research institute carry out scientific research on an information terminal and visit and browse of relevant files, the situation of leakage of important files is easily caused, and because too many login personnel are involved, the situation of leakage, leakage of people and the like is difficult to confirm, in addition, because the file loading efficiency is low when the personnel browse information, the situation of time waste occurs, and therefore, in conclusion, the related innovative design of equipment is needed.
Disclosure of Invention
In order to solve the above technical problem, the present invention provides a cloud-based information security system, including: the system comprises a main control module, an authority classification module, a login monitoring module, an access tracking module, a safety protection module and a logout detection module;
the main control module is used for receiving and processing data transmission of the whole system and sending control commands to other equipment;
the authority classification module comprises a file classification module and a personnel classification module, the file classification module is used for classifying files in the whole file library based on the importance of the technology related to the files in the cloud computing system, and the personnel classification module is used for performing grade differentiation on personnel with login authority (login account numbers established in the main control module);
the login monitoring module comprises a face recognition module and a password verification module, the face recognition module judges whether the login personnel is authorized to login or not through face and action recognition of the login personnel, and the password verification module judges whether the login personnel is authorized to login or not through interface password input login;
the access tracking module comprises an access unit and a tracking unit, the access unit is used for calling files accessed by login personnel in a file library, and the tracking unit is used for monitoring and recording the access process of the login personnel;
the system comprises a security protection module and a login module, wherein the security protection module comprises a danger interception unit and an automatic logout unit, the danger interception unit is used for carrying out danger interception and sending out a warning signal when the system is attacked by danger, and the automatic logout unit is used for carrying out forced automatic logout on a logged-in account number when a login person browses an interface for a long time in an access process and is in a non-motion state, so that the situation that the login person forgets to log out is prevented;
and the logout detection module is used for detecting the downloaded file again and detecting whether the downloadable data or data beyond the authority of the login personnel exists in the downloaded file.
Preferably, the file classification module comprises a block storage unit, a file updating unit and a file selection unit, the master control module classifies the files in the whole file library into three stages, i, ii, iii and iv, respectively, and the authority coverage area ratio is relatively: and the block storage unit divides storage equipment in the whole file library into a file library A, a file library B, a file library C and a file library D, wherein the file library has the relationship that: the file selecting unit selects and grades the new files formed after automatic updating, judges the authority of the new files belonging to any one of the I level, the II level, the III level and the IV level, and stores the new files into the file library corresponding to the grade.
Preferably, the staff classifying module classifies staff into an alpha level, a beta level, a gamma level and a delta level according to various parameters of the staff, and the authority coverage size ratio is as follows: the alpha level < beta level < gamma level < delta level, personnel in the alpha level have the authority to access the file in the level I stored in the file library A, personnel in the beta level have the authority to access the file in the level II stored in the file library B, personnel in the gamma level have the authority to access the file in the level III stored in the file library C, and personnel in the delta level have the authority to access the file in the level IV stored in the file library D.
Preferably, the face recognition module comprises a camera component and a motion capture component, the camera component comprises a camera, the camera is used for recording a video of a login process of a login person, the login image is arranged into compressed file data and then transmitted to the main control module for backup, the motion capture component comprises a motion capture instrument and a face recognition instrument, the face recognition instrument performs face recognition and identity verification on the login person, whether the person is in a list allowing the person to enter the list is judged, if the person is in the list, the person normally enters the list, if the person is not in the list, the person is refused to login and an alarm is given, the motion capture instrument captures the motion of the person, real-time monitoring and recording of the login motion of the person are performed, and the alarm is given when abnormal behaviors of the person are found.
Preferably, the password verification module includes a password login unit, and the password login unit determines whether the person is in a list allowed to enter the person under the authority, if the person is in the list, the person normally enters the list, and if the person is not in the list, the password verification module gives an alarm to the abnormal person who enters the list, and locks and closes a login entrance.
Preferably, the main control module stores and records each established account, the access unit performs hierarchical sequencing according to access browsing frequency of the account to files within the authority range, and caches the files with high access frequency to the access port in advance, and when a person sends an access request, the access unit judges whether the request file is in the cache of the access port: if the request file is in the cache of the access port, directly accessing the request file from the cache of the access port; if the file is not in the cache of the access port, the access unit searches according to the file in the access personnel authority range, and then calls the relevant file to the access port to access the request file.
Preferably, the tracking unit monitors and records the browsing interface of the login person in the access process, and meanwhile, saves and backs up the trace of the access process.
Preferably, the danger intercepting unit is used for simultaneously intercepting intrusion attacks and sending out an alarm signal when the system is attacked by unknown persons or abnormal login of unknown persons is received, the danger intercepting unit can attack and effectively intercept the intrusion programs through the implanted safety protection program, the danger intercepting unit can also send out the alarm signal, and simultaneously carries out analysis and risk level division according to the attack strength, and sends the attacked signal and the corresponding risk level to related persons.
Preferably, when the logout detection module detects that the downloadable data is detected in the download file of the login person, the logout detection module deletes the data out of the authority or cannot store the downloadable data, and simultaneously, the logout detection module transmits an error signal of the downloadable data to the main control module, and the main control module forms a patch according to the error signal and performs self-updating and upgrading according to the patch.
The invention has the technical effects and advantages that: the file classification module is used for classifying files in the whole file library, the personnel classification module is used for performing grade differentiation on personnel with login authority, the portrait identification module is used for judging whether the login personnel are authorized to log in or not through identifying the face and the action of the login personnel, the password verification module is used for judging whether the login personnel are authorized to log in or not through inputting interface passwords, the access unit is used for calling files accessed by the login personnel in the file library, the tracking unit is used for monitoring and recording the access process of the login personnel, the danger interception unit is used for performing danger interception and sending out an alarm signal when the system is subjected to danger attack, the automatic login unit is used for performing forced automatic login on a login account number when the login personnel is in a non-motion state for a long time in the access process, the situation that the login personnel forget to log out the login is prevented, the login detection module is used for re-detecting the downloaded files, whether non-downloadable data or data except the login personnel authority exist in the downloaded files is detected, and the safety of the system is improved.
Drawings
Fig. 1 is a block diagram of a cloud computing-based information security system according to the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and specific embodiments. The embodiments of the present invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
Referring to fig. 1, in the present embodiment, a cloud computing-based information security system is proposed, including: the system comprises a main control module, an authority classification module, a login monitoring module, an access tracking module, a safety protection module and a logout detection module;
the main control module is used for receiving and processing data transmission of the whole system and sending control commands to other equipment.
The authority classification module comprises a file classification module and a personnel classification module, the file classification module is used for classifying files in the whole file library based on the importance of the technology involved in the files by the cloud computing system, the file classification module comprises a block storage unit, a file updating unit and a file selecting unit, the files in the whole file library are classified into three levels by the cloud computing system, the three levels are I level, II level, III level and IV level respectively, and the authority coverage range ratio is comparatively small: class I < class II < class III < class IV, the storage unit divides the storage device in the whole document library into a document library A, a document library B, a document library C and a document library D, wherein the document library has the relationship that the document library A is contained in the document library B, the document library B is contained in the document library C, the document library C is contained in the document library D, and the class I document is stored in the document library A, the class II document is stored in the document library B, the class III document is stored in the document library C, the class IV document is stored in the document library D, the document updating unit automatically updates the data inputted by external transmission into the whole document library based on a cloud computing system, supplements or replaces the original document, and then form the new file, the file selection unit is to select and grade the new file formed after the automatic updating, judge whether the new file belongs to the authority of which one of I level, II level, III level and IV level, after attributing the new file with the corresponding file level, store the new file in the file library corresponding to its level, the personnel classification module carries on the grade differentiation to the personnel who have login authority, according to personnel's working year, skill level, academic calendar, scientific research level and management hierarchy carry on the classification, and then divide personnel into alpha level, beta level, gamma level and delta level, its authority coverage scope size ratio is comparatively: and the alpha level < the beta level < the gamma level < the delta level, namely, the personnel in the alpha level have the authority to access the file in the I level stored in the A file library, the personnel in the beta level have the authority to access the file in the II level stored in the B file library, the personnel in the gamma level have the authority to access the file in the III level stored in the C file library, and the personnel in the delta level have the authority to access the file in the IV level stored in the D file library.
The login monitoring module comprises a human image recognition module and a password verification module, the human image recognition module comprises a camera shooting assembly and a motion capture assembly, the camera shooting assembly comprises a camera, the camera is used for recording a login process of a login person, a login image is arranged into compressed file data and is transmitted to a cloud computing system for backup, the cloud computing system controls storage time of the compressed file, the storage time is manually input with an instruction, the cloud computing system executes according to the input instruction so as to facilitate subsequent inquiry of the login image of the individual person, the motion capture assembly comprises a motion capture instrument and a human face recognition instrument, the human face recognition instrument performs human face recognition and identity verification on the login person and judges whether the person is in a list allowing the person to enter in the authority, if the person is in the list, the person normally enters the list, and if the person is not in the list, the abnormal person is alarmed, the personnel is positioned and photographed by a camera, the video is transmitted to the personnel on duty, the motion capture instrument captures the motion of the personnel, the login motion of the personnel is identified in real time, the login motion is monitored and recorded at the same time, when abnormal overstimulation or dangerous behavior of the personnel is found, the motion capture instrument sends out a warning signal and transmits the signal to a main control module to be submitted to the personnel on duty, the password verification module comprises a password login unit, login setting is carried out according to the access authority of the login personnel, whether the personnel is in a list of the authority allowed to enter the personnel is judged, if the personnel is in the list, the personnel normally enter, if the personnel is not in the list, the abnormal intruder is warned, and a login entrance is locked and closed, wherein, I-level personnel are kept secret at a low level, and only the password verification module is required to log in and verify, class II and class III personnel are of medium confidentiality and only need to be signed in and verified by a portrait identification module, and class IV personnel are of high confidentiality and need to be signed in and verified by a password verification module and the portrait identification module.
The access tracking module comprises an access unit and a tracking unit, the access unit is used for calling files accessed by login personnel in a file library, the main control module stores and records each established account number, performs hierarchical sequencing according to the access browsing frequency of the account number to the files in the authority range, performs sequencing according to the access frequency of the files, and simultaneously sequences the files from high to low based on the access frequency, performs priority access and display on the files with high access frequency, and caches the files with high access frequency to an access port in advance, when the personnel send an access request, the main control module judges whether the request files are in the cache of the access port: if the request file is in the cache of the access port, directly accessing the request file from the cache of the access port; if the file is not in the cache of the access port, the main control module searches according to the file in the authority range of the login personnel, then calls the relevant file to the access port and accesses the request file, and aims to display the file in a corresponding mode according to user selection through a man-machine interaction mode, reduce the time of file searching and improve the access efficiency.
The security protection module comprises a danger interception unit and an automatic log-out unit, the danger interception unit is used for carrying out danger interception and warning signal sending when the system is attacked by danger, when the system is attacked by unknown or receives abnormal log-in of unknown personnel, the danger interception unit can attack and intercept an intrusion program through an implanted security protection program, when the security protection program is not enough to intercept the intrusion program, the security protection program can send a request signal to the main control module, the main control module controls the system to carry out network blocking, the network blocking comprises full network blocking and local network blocking, the full network blocking is suitable for carrying out full network breaking on the system under the condition that mesh (full) attack and counterattack are invalid, the local network blocking is suitable for carrying out local network breaking on the system part under attack under the condition that the system is attacked by point (local) attack and counterattack is invalid, in addition, the danger unit also can send a warning signal, the danger unit can simultaneously carry out analysis and risk level division according to the size of the attack, and send a signal and a corresponding risk level to the relevant personnel who forgets to automatically log-out the account number and prevent the personnel from entering and logging out the forced log-out of the account number and browsing in the long-time login process.
The check-out module is used for re-detecting the downloaded file, detecting whether the downloaded file has non-downloadable data or data outside the authority of the login personnel, screening and re-detecting the downloaded file through the check-out module, improving the safety protection level of the system, greatly reducing the possibility of leakage of confidential files, deleting the data outside the authority or not storing the downloaded data when the check-out module detects the non-downloadable data in the downloaded file of the login personnel, transmitting an error signal of the downloaded data to the main control module, forming a patch by the main control module according to the error signal, performing self-updating and upgrading according to the patch, preventing next error generation and improving the self-updating capability of the system.
It is to be understood that the described embodiments are merely a few embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in this and related arts based on the embodiments of the present invention without creative efforts, shall fall within the protection scope of the present invention. Structures, devices, and methods of operation not specifically described or illustrated herein are not specifically illustrated or described, but are instead contemplated to be practiced in the art by those skilled in the art.

Claims (9)

1. A cloud-based computing information security system, comprising: the system comprises a main control module, an authority classification module, a login monitoring module, an access tracking module, a safety protection module and a logout detection module;
the main control module is used for receiving and processing data transmission of the whole system and sending control commands to other equipment;
the authority classification module comprises a file classification module and a personnel classification module, the file classification module is used for classifying files in the whole file library based on the importance of the technology involved in the files in the cloud computing system, and the personnel classification module is used for performing grade differentiation on the personnel with login authority (the login account number established in the main control module);
the login monitoring module comprises a face recognition module and a password verification module, the face recognition module judges whether the login personnel is authorized to login through face and action recognition of the login personnel, and the password verification module judges whether the login personnel is authorized to login through interface password input login;
the access tracking module comprises an access unit and a tracking unit, the access unit is used for calling files accessed by login personnel in the file library, and the tracking unit is used for monitoring and recording the access process of the login personnel;
the system comprises a security protection module and a login module, wherein the security protection module comprises a danger interception unit and an automatic logout unit, the danger interception unit is used for carrying out danger interception and sending out a warning signal when the system is attacked by danger, and the automatic logout unit is used for carrying out forced automatic logout on a logged-in account number when a login person browses an interface for a long time in an access process and is in a non-motion state, so that the situation that the login person forgets to log out is prevented;
and the logout detection module is used for detecting the downloaded file again and detecting whether the downloadable data or data beyond the authority of the login personnel exists in the downloaded file.
2. The information security system based on cloud computing of claim 1, wherein the file classification module comprises a block storage unit, a file updating unit and a file selection unit, the main control module classifies files in the whole file library into three levels, namely level i, level ii, level iii and level iv, and the ratio of the authority coverage ranges is as follows: level I < level II < level III < level IV, the block storage unit divides the storage device in the whole document library into a document library A, a document library B, a document library C and a document library D, wherein the relationship of the document library is as follows: the file selecting unit selects and grades the new files formed after automatic updating, judges the authority of the new files belonging to any one of the I level, the II level, the III level and the IV level, and stores the new files into the file library corresponding to the grade.
3. The cloud computing-based information security system of claim 1, wherein the people ranking module ranks people according to their parameters to classify people into alpha, beta, gamma, and delta levels, and the coverage area ratio of the right is as follows: the alpha level < beta level < gamma level < delta level, personnel in the alpha level have the authority to access the file in the level I stored in the file library A, personnel in the beta level have the authority to access the file in the level II stored in the file library B, personnel in the gamma level have the authority to access the file in the level III stored in the file library C, and personnel in the delta level have the authority to access the file in the level IV stored in the file library D.
4. The cloud-computing-based information security system according to claim 1, wherein the portrait recognition module includes a camera component and a motion capture component, the camera component includes a camera, the camera is used for recording a login process of a login person, and after the login image is arranged into compressed file data, the compressed file data is transmitted to the main control module for backup, the motion capture component includes a motion capture instrument and a face recognition instrument, the face recognition instrument performs face recognition and identity verification on the login person, judges whether the login person is in a list of persons allowed to enter the list, if the login person is in the list, the login person normally enters the list, if the login person is not in the list, the login person refuses to perform alarm, and the motion capture instrument captures the motion of the person, further performs real-time monitoring and recording on the login motion of the person, and when abnormal behavior of the person is found, the alarm is performed.
5. The cloud-computing-based information security system of claim 1, wherein the password authentication module comprises a password login unit, and the password login unit judges whether the person is in a list of persons allowed to enter by permission, if the person is in the list, the person normally enters, and if the person is not in the list, the person who abnormally enters is warned, and a login entrance is locked and closed.
6. The cloud-computing-based information security system according to claim 4, wherein the main control module stores and records each established account, the access unit performs hierarchical ranking according to access browsing frequency of the account for files within the authority range, and caches files with high access frequency to the access port in advance, and when a person sends an access request, the access unit determines whether the requested file is in the cache of the access port: if the request file is in the cache of the access port, directly accessing the request file from the cache of the access port; if the file is not in the cache of the access port, the access unit searches according to the file in the access personnel authority range, and then calls the relevant file to the access port to access the request file.
7. The cloud-based information security system of claim 1, wherein the tracking unit monitors and records the browsing interface of the login personnel during the access process, and meanwhile, saves and backs up the trace of the access process.
8. The cloud computing information security system of claim 1, wherein the danger intercepting unit is configured to intercept and send out an alarm signal for intrusion attack at the same time when the system is under unknown attack or receives an abnormal login of an unknown person, the danger intercepting unit attacks and effectively intercepts an intrusion program through an implanted security protection program, and the danger intercepting unit also sends out an alarm signal, analyzes and classifies risk levels according to attack strength, and sends an attacked signal and a corresponding risk level to a relevant person.
9. The cloud-based information security system of claim 1, wherein the logout detection module detects that the downloadable data is not detected in the download file of the logged-in person, the logout detection module deletes the data that is not authorized or is not storable, and simultaneously transmits an error signal of the downloaded data to the main control module, and the main control module forms a patch according to the error signal and performs self-updating and self-upgrading according to the patch.
CN202211133735.2A 2022-09-19 2022-09-19 Information safety system based on cloud computing Pending CN115525924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211133735.2A CN115525924A (en) 2022-09-19 2022-09-19 Information safety system based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211133735.2A CN115525924A (en) 2022-09-19 2022-09-19 Information safety system based on cloud computing

Publications (1)

Publication Number Publication Date
CN115525924A true CN115525924A (en) 2022-12-27

Family

ID=84696804

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211133735.2A Pending CN115525924A (en) 2022-09-19 2022-09-19 Information safety system based on cloud computing

Country Status (1)

Country Link
CN (1) CN115525924A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117744129A (en) * 2023-09-18 2024-03-22 苏州天安慧网络运营有限公司 Intelligent operation and maintenance method and system based on CIM

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117744129A (en) * 2023-09-18 2024-03-22 苏州天安慧网络运营有限公司 Intelligent operation and maintenance method and system based on CIM

Similar Documents

Publication Publication Date Title
CN104283889B (en) APT attack detectings and early warning system inside electric system based on the network architecture
Smaha Haystack: An intrusion detection system
US20050203881A1 (en) Database user behavior monitor system and method
US11902307B2 (en) Method and apparatus for network fraud detection and remediation through analytics
CN106295355B (en) A kind of active safety support method towards Linux server
CN112560027A (en) Data safety monitoring system
CN114003943B (en) Safe double-control management platform for computer room trusteeship management
US20210234877A1 (en) Proactively protecting service endpoints based on deep learning of user location and access patterns
CN114584405A (en) Electric power terminal safety protection method and system
CN106446658A (en) Data center security protection method and system
AU2014370501A1 (en) An integrated access control and identity management system
CN116708210A (en) Operation and maintenance processing method and terminal equipment
CN100414554C (en) Electronic data evidence obtaining method and system for computer
CN113901450A (en) Industrial host terminal safety protection system
CN115758355A (en) Lesojous software defense method and system based on fine-grained access control
KR102188775B1 (en) Method and system for remotely controlling client terminals using face recognition and face recognition terminal
US8978150B1 (en) Data recovery service with automated identification and response to compromised user credentials
CN115525924A (en) Information safety system based on cloud computing
CN117708880A (en) Intelligent security processing method and system for banking data
JP4843546B2 (en) Information leakage monitoring system and information leakage monitoring method
CN116821928A (en) Method and system for improving internal data security of power edge computing chip
CN110958236A (en) Dynamic authorization method of operation and maintenance auditing system based on risk factor insight
CN115587357A (en) Threat scene analysis method and system based on big data
Lunt Using statistics to track intruders
CN117313095B (en) System and method for real-time monitoring and recording unknown virus behavior track

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination