CN206270962U - A kind of computer security control system - Google Patents
A kind of computer security control system Download PDFInfo
- Publication number
- CN206270962U CN206270962U CN201621420091.5U CN201621420091U CN206270962U CN 206270962 U CN206270962 U CN 206270962U CN 201621420091 U CN201621420091 U CN 201621420091U CN 206270962 U CN206270962 U CN 206270962U
- Authority
- CN
- China
- Prior art keywords
- module
- data
- control system
- control unit
- main control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model discloses a kind of computer security control system, including alarm module, wireless module and mobile terminal, the electric supply installation is connected with main control unit, the output end of the main control unit is provided with alarm module, the main control unit is connected by wireless module with mobile terminal, the hard disk is connected with data encryption module, and the security protection unit is connected with data calibration device, and the data calibration device is connected with network interface.The computer security control system is when having data cube computation; order or data to visitor's input are identified, verify, and viral data are recorded, it is ensured that protected host and server system are from infringement; ensure its stabilization, normal operation, it is to avoid the problem of leakage of information.
Description
Technical field
The utility model is related to computer security technique field, specially a kind of computer security control system.
Background technology
The computer of network is connected, often because being subject to come the operational order of automatic network, program, or is received comprising virus
Network data, or meet with illegal invasion and cause system to be interfered, What is more causes the collapse of system.
At present, in computer systems, the status indicator lamp of system is front and rear to the upper electricity on each road voltage of system in start
State carries out abnormal show, in existing system, mechanism is pointed out without the power-up state for computer system, when system occurs firmly
When part exception or poisoning intrusion, lose computer documents, system perturbations, it is impossible to the anomaly such as normal operation, may band
Carry out great loss.
Utility model content
The purpose of this utility model is to provide a kind of computer security control system, to solve to be carried in above-mentioned background technology
The computer control system for going out is vulnerable to the harm of various internet worms or illegal invasion, influences asking for system run all right
Topic.
To achieve the above object, the utility model provides following technical scheme:A kind of computer security control system, including
Main control unit, security protection unit, viral contrast module, antivirus protection module, reseting module, data calibration device, network
Interface, electric supply installation, hard disk, data encryption module, alarm module, wireless module and mobile terminal, the electric supply installation and master
Control unit is connected, and the output end of the main control unit is provided with alarm module, and the main control unit passes through wireless module
It is connected with mobile terminal, the hard disk is connected with data encryption module, the security protection unit and data calibration device
It is connected, the data calibration device is connected with network interface.
Preferably, the security protection unit includes viral contrast module, antivirus protection module and reseting module, the disease
Malicious contrast module includes virus database.
Preferably, the alarm module includes that sound and illumination are alarmed.
Preferably, the electric supply installation also includes conventional power supply and stand-by power supply.
Preferably, the data calibration device includes data encryption and data decryption apparatus.
Compared with prior art, the beneficial effects of the utility model are:The computer security control system connects there is data
When connecing, order or data to visitor's input are identified, verify, to suspicious data or operation alarm and treatment, if
There is viral contrast module, suspicious data can be contrasted with virus database, isolation processing is carried out to virus, and to viral number
According to being recorded, it is ensured that protected host and server system are from infringement, it is ensured that its stabilization, normal operation, in data school
Data encryption and data decryption apparatus are provided with experiment device, it is to avoid the problem of leakage of information.
Brief description of the drawings
Fig. 1 is the utility model system principle schematic block diagram.
In figure:1st, main control unit, 2, security protection unit, 3, viral contrast module, 4, antivirus protection module, 5, reset
Module, 6, data calibration device, 7, network interface, 8, electric supply installation, 9, hard disk, 10, data encryption module, 11, alarm module,
12nd, wireless module, 13, mobile terminal.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole
Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made
The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of computer security control system, including master control
Unit processed 1, security protection unit 2, viral contrast module 3, antivirus protection module 4, reseting module 5, data calibration device 6, net
Network interface 7, electric supply installation 8, hard disk 9, data encryption module 10, alarm module 11, wireless module 12 and mobile terminal 13, power supply
Device 8 is connected with main control unit 1, and the output end of main control unit 1 is provided with alarm module 11, and main control unit 1 passes through nothing
Wire module 12 is connected with mobile terminal 13, and hard disk 9 is connected with data encryption module 10, security protection unit 2 and data school
Experiment device 6 is connected, and data calibration device 6 is connected with network interface 7.
In above-described embodiment, specifically, security protection unit 2 includes viral contrast module 3, antivirus protection module 4 and answers
Position module 5, viral contrast module 3 includes virus database, when suspicious data is found, first by antivirus protection module 3
Virus database suspicious data is contrasted, however, it is determined that its is dangerous, then by its isolation processing, and viral data are entered
Row storage, it is to avoid by viral secondary invasion.
In above-described embodiment, specifically, alarm module 11 includes that sound and illumination are alarmed, invasion information is expanded in time
Dissipate, be easy to make counter-measure in time.
In above-described embodiment, specifically, electric supply installation 8 also includes conventional power supply and stand-by power supply, stand-by power supply can be prevented
Cause loss of data because of conventional power failure.
In above-described embodiment, specifically, data calibration device 6 includes data encryption and data decryption apparatus, it is to avoid letter
The problem of leakage is ceased, security during data transfer is improved.
Operation principle:When using the computer security control system, visitor is first by the order that network interface 7 is input into
Data calibration device 6 is first passed through, data calibration device 6 is verified to it, reduce packet loss, and be sent to security protection unit
2, the viral contrast module 3 in security protection unit 2 is contrasted data with virus database, however, it is determined that its is dangerous,
Then by its isolation processing, and viral data are stored, it is to avoid by viral secondary invasion, meanwhile, alarm module 11 sends sound
Sound and illumination are alarmed, and invasion information is diffused in time, are easy to make counter-measure in time, and reseting module 5 is used for master control
Unit processed 1 carries out reset operation, it is to avoid information is lost, leakage, and the main control unit 1 of the computer security control system passes through nothing
Wire module 12 is connected with mobile terminal 13, will log in and warning message is sent in mobile terminal 13 in real time, is easy to operator
Member is managed.
In sum, general principle of the present utility model, principal character and advantage has been shown and described above.The industry
Technical staff it should be appreciated that the utility model is not restricted to the described embodiments, described in above-described embodiment and specification only
It is to illustrate principle of the present utility model, on the premise of the utility model spirit and scope are not departed from, the utility model also has
Various changes and modifications, these changes and improvements are both fallen within the range of claimed the utility model.The utility model requirement
Protection domain is defined by appending claims and its effect thing.
Claims (5)
1. a kind of computer security control system, including main control unit (1), security protection unit (2), viral contrast module
(3), antivirus protection module (4), reseting module (5), data calibration device (6), network interface (7), electric supply installation (8), hard disk
(9), data encryption module (10), alarm module (11), wireless module (12) and mobile terminal (13), it is characterised in that:It is described
Electric supply installation (8) is connected with main control unit (1), and the output end of the main control unit (1) is provided with alarm module (11), institute
State main control unit (1) to be connected with mobile terminal (13) by wireless module (12), the hard disk (9) and data encryption module
(10) it is connected, the security protection unit (2) is connected with data calibration device (6), the data calibration device (6) and net
Network interface (7) is connected.
2. a kind of computer security control system according to claim 1, it is characterised in that:The security protection unit
(2) including viral contrast module (3), antivirus protection module (4) and reseting module (5), the viral contrast module (3) is including disease
Malicious database.
3. a kind of computer security control system according to claim 1, it is characterised in that:Alarm module (11) bag
Include sound and illumination alarm.
4. a kind of computer security control system according to claim 1, it is characterised in that:The electric supply installation (8) is also
Including commonly using power supply and stand-by power supply.
5. a kind of computer security control system according to claim 1, it is characterised in that:The data calibration device
(6) including data encryption and data decryption apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621420091.5U CN206270962U (en) | 2016-12-22 | 2016-12-22 | A kind of computer security control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201621420091.5U CN206270962U (en) | 2016-12-22 | 2016-12-22 | A kind of computer security control system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN206270962U true CN206270962U (en) | 2017-06-20 |
Family
ID=59047568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201621420091.5U Expired - Fee Related CN206270962U (en) | 2016-12-22 | 2016-12-22 | A kind of computer security control system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN206270962U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830068A (en) * | 2018-06-22 | 2018-11-16 | 武汉彤科电力科技有限公司 | A kind of terminal security guard system and method |
-
2016
- 2016-12-22 CN CN201621420091.5U patent/CN206270962U/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830068A (en) * | 2018-06-22 | 2018-11-16 | 武汉彤科电力科技有限公司 | A kind of terminal security guard system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11122061B2 (en) | Method and server for determining malicious files in network traffic | |
US10079835B1 (en) | Systems and methods for data loss prevention of unidentifiable and unsupported object types | |
US9686304B1 (en) | Systems and methods for healing infected document files | |
CN106713049A (en) | Alarm method and device of monitor | |
CN107895122B (en) | Special sensitive information active defense method, device and system | |
WO2005031528A3 (en) | Method of and system for enterprise information asset protection through insider attack specification, monitoring and mitigation | |
CN111131221B (en) | Interface checking device, method and storage medium | |
US20170061131A1 (en) | Side-Channel Integrity Validation of Devices | |
CN108259472A (en) | Dynamic joint defence mechanism based on attack analysis realizes system and method | |
CN104268468A (en) | Protecting method and system of dynamic link library of Android system | |
CN107563192A (en) | A kind of means of defence for extorting software, device, electronic equipment and storage medium | |
CN107846418A (en) | Fire wall Initiative Defence System and means of defence | |
CN102184371B (en) | Detecting method and system for database operation authority of SQL (Structured Query Language) | |
CN106169035A (en) | A kind of high-security mobile storage system and method | |
Lee et al. | Rcryptect: Real-time detection of cryptographic function in the user-space filesystem | |
CN116032629A (en) | Classification treatment method, system electronic equipment and storage medium for alarm traffic | |
JP2015052951A (en) | Security strengthening device | |
CN206270962U (en) | A kind of computer security control system | |
JP2015052950A (en) | Data storage device, secure io device | |
CN104184746B (en) | Method and device for processing data by gateway | |
KR101889503B1 (en) | Method and apparatus for providing flight data protection | |
US11895155B2 (en) | Resilient self-detection of malicious exfiltration of sensitive data | |
US11507656B2 (en) | Ransomware detection and remediation | |
KR101606090B1 (en) | Apparatus and method for protecting network | |
CN111030982B (en) | Strong management and control method, system and storage medium for confidential files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170620 Termination date: 20171222 |
|
CF01 | Termination of patent right due to non-payment of annual fee |