CN206270962U - A kind of computer security control system - Google Patents

A kind of computer security control system Download PDF

Info

Publication number
CN206270962U
CN206270962U CN201621420091.5U CN201621420091U CN206270962U CN 206270962 U CN206270962 U CN 206270962U CN 201621420091 U CN201621420091 U CN 201621420091U CN 206270962 U CN206270962 U CN 206270962U
Authority
CN
China
Prior art keywords
module
data
control system
control unit
main control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201621420091.5U
Other languages
Chinese (zh)
Inventor
王红伟
赵慧娜
樊佩佩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luohe Vocational Technology College
Original Assignee
Luohe Vocational Technology College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luohe Vocational Technology College filed Critical Luohe Vocational Technology College
Priority to CN201621420091.5U priority Critical patent/CN206270962U/en
Application granted granted Critical
Publication of CN206270962U publication Critical patent/CN206270962U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model discloses a kind of computer security control system, including alarm module, wireless module and mobile terminal, the electric supply installation is connected with main control unit, the output end of the main control unit is provided with alarm module, the main control unit is connected by wireless module with mobile terminal, the hard disk is connected with data encryption module, and the security protection unit is connected with data calibration device, and the data calibration device is connected with network interface.The computer security control system is when having data cube computation; order or data to visitor's input are identified, verify, and viral data are recorded, it is ensured that protected host and server system are from infringement; ensure its stabilization, normal operation, it is to avoid the problem of leakage of information.

Description

A kind of computer security control system
Technical field
The utility model is related to computer security technique field, specially a kind of computer security control system.
Background technology
The computer of network is connected, often because being subject to come the operational order of automatic network, program, or is received comprising virus Network data, or meet with illegal invasion and cause system to be interfered, What is more causes the collapse of system.
At present, in computer systems, the status indicator lamp of system is front and rear to the upper electricity on each road voltage of system in start State carries out abnormal show, in existing system, mechanism is pointed out without the power-up state for computer system, when system occurs firmly When part exception or poisoning intrusion, lose computer documents, system perturbations, it is impossible to the anomaly such as normal operation, may band Carry out great loss.
Utility model content
The purpose of this utility model is to provide a kind of computer security control system, to solve to be carried in above-mentioned background technology The computer control system for going out is vulnerable to the harm of various internet worms or illegal invasion, influences asking for system run all right Topic.
To achieve the above object, the utility model provides following technical scheme:A kind of computer security control system, including Main control unit, security protection unit, viral contrast module, antivirus protection module, reseting module, data calibration device, network Interface, electric supply installation, hard disk, data encryption module, alarm module, wireless module and mobile terminal, the electric supply installation and master Control unit is connected, and the output end of the main control unit is provided with alarm module, and the main control unit passes through wireless module It is connected with mobile terminal, the hard disk is connected with data encryption module, the security protection unit and data calibration device It is connected, the data calibration device is connected with network interface.
Preferably, the security protection unit includes viral contrast module, antivirus protection module and reseting module, the disease Malicious contrast module includes virus database.
Preferably, the alarm module includes that sound and illumination are alarmed.
Preferably, the electric supply installation also includes conventional power supply and stand-by power supply.
Preferably, the data calibration device includes data encryption and data decryption apparatus.
Compared with prior art, the beneficial effects of the utility model are:The computer security control system connects there is data When connecing, order or data to visitor's input are identified, verify, to suspicious data or operation alarm and treatment, if There is viral contrast module, suspicious data can be contrasted with virus database, isolation processing is carried out to virus, and to viral number According to being recorded, it is ensured that protected host and server system are from infringement, it is ensured that its stabilization, normal operation, in data school Data encryption and data decryption apparatus are provided with experiment device, it is to avoid the problem of leakage of information.
Brief description of the drawings
Fig. 1 is the utility model system principle schematic block diagram.
In figure:1st, main control unit, 2, security protection unit, 3, viral contrast module, 4, antivirus protection module, 5, reset Module, 6, data calibration device, 7, network interface, 8, electric supply installation, 9, hard disk, 10, data encryption module, 11, alarm module, 12nd, wireless module, 13, mobile terminal.
Specific embodiment
Below in conjunction with the accompanying drawing in the utility model embodiment, the technical scheme in the utility model embodiment is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the utility model, rather than whole Embodiment.Based on the embodiment in the utility model, those of ordinary skill in the art are not under the premise of creative work is made The every other embodiment for being obtained, belongs to the scope of the utility model protection.
Fig. 1 is referred to, the utility model provides a kind of technical scheme:A kind of computer security control system, including master control Unit processed 1, security protection unit 2, viral contrast module 3, antivirus protection module 4, reseting module 5, data calibration device 6, net Network interface 7, electric supply installation 8, hard disk 9, data encryption module 10, alarm module 11, wireless module 12 and mobile terminal 13, power supply Device 8 is connected with main control unit 1, and the output end of main control unit 1 is provided with alarm module 11, and main control unit 1 passes through nothing Wire module 12 is connected with mobile terminal 13, and hard disk 9 is connected with data encryption module 10, security protection unit 2 and data school Experiment device 6 is connected, and data calibration device 6 is connected with network interface 7.
In above-described embodiment, specifically, security protection unit 2 includes viral contrast module 3, antivirus protection module 4 and answers Position module 5, viral contrast module 3 includes virus database, when suspicious data is found, first by antivirus protection module 3 Virus database suspicious data is contrasted, however, it is determined that its is dangerous, then by its isolation processing, and viral data are entered Row storage, it is to avoid by viral secondary invasion.
In above-described embodiment, specifically, alarm module 11 includes that sound and illumination are alarmed, invasion information is expanded in time Dissipate, be easy to make counter-measure in time.
In above-described embodiment, specifically, electric supply installation 8 also includes conventional power supply and stand-by power supply, stand-by power supply can be prevented Cause loss of data because of conventional power failure.
In above-described embodiment, specifically, data calibration device 6 includes data encryption and data decryption apparatus, it is to avoid letter The problem of leakage is ceased, security during data transfer is improved.
Operation principle:When using the computer security control system, visitor is first by the order that network interface 7 is input into Data calibration device 6 is first passed through, data calibration device 6 is verified to it, reduce packet loss, and be sent to security protection unit 2, the viral contrast module 3 in security protection unit 2 is contrasted data with virus database, however, it is determined that its is dangerous, Then by its isolation processing, and viral data are stored, it is to avoid by viral secondary invasion, meanwhile, alarm module 11 sends sound Sound and illumination are alarmed, and invasion information is diffused in time, are easy to make counter-measure in time, and reseting module 5 is used for master control Unit processed 1 carries out reset operation, it is to avoid information is lost, leakage, and the main control unit 1 of the computer security control system passes through nothing Wire module 12 is connected with mobile terminal 13, will log in and warning message is sent in mobile terminal 13 in real time, is easy to operator Member is managed.
In sum, general principle of the present utility model, principal character and advantage has been shown and described above.The industry Technical staff it should be appreciated that the utility model is not restricted to the described embodiments, described in above-described embodiment and specification only It is to illustrate principle of the present utility model, on the premise of the utility model spirit and scope are not departed from, the utility model also has Various changes and modifications, these changes and improvements are both fallen within the range of claimed the utility model.The utility model requirement Protection domain is defined by appending claims and its effect thing.

Claims (5)

1. a kind of computer security control system, including main control unit (1), security protection unit (2), viral contrast module (3), antivirus protection module (4), reseting module (5), data calibration device (6), network interface (7), electric supply installation (8), hard disk (9), data encryption module (10), alarm module (11), wireless module (12) and mobile terminal (13), it is characterised in that:It is described Electric supply installation (8) is connected with main control unit (1), and the output end of the main control unit (1) is provided with alarm module (11), institute State main control unit (1) to be connected with mobile terminal (13) by wireless module (12), the hard disk (9) and data encryption module (10) it is connected, the security protection unit (2) is connected with data calibration device (6), the data calibration device (6) and net Network interface (7) is connected.
2. a kind of computer security control system according to claim 1, it is characterised in that:The security protection unit (2) including viral contrast module (3), antivirus protection module (4) and reseting module (5), the viral contrast module (3) is including disease Malicious database.
3. a kind of computer security control system according to claim 1, it is characterised in that:Alarm module (11) bag Include sound and illumination alarm.
4. a kind of computer security control system according to claim 1, it is characterised in that:The electric supply installation (8) is also Including commonly using power supply and stand-by power supply.
5. a kind of computer security control system according to claim 1, it is characterised in that:The data calibration device (6) including data encryption and data decryption apparatus.
CN201621420091.5U 2016-12-22 2016-12-22 A kind of computer security control system Expired - Fee Related CN206270962U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201621420091.5U CN206270962U (en) 2016-12-22 2016-12-22 A kind of computer security control system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201621420091.5U CN206270962U (en) 2016-12-22 2016-12-22 A kind of computer security control system

Publications (1)

Publication Number Publication Date
CN206270962U true CN206270962U (en) 2017-06-20

Family

ID=59047568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201621420091.5U Expired - Fee Related CN206270962U (en) 2016-12-22 2016-12-22 A kind of computer security control system

Country Status (1)

Country Link
CN (1) CN206270962U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830068A (en) * 2018-06-22 2018-11-16 武汉彤科电力科技有限公司 A kind of terminal security guard system and method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830068A (en) * 2018-06-22 2018-11-16 武汉彤科电力科技有限公司 A kind of terminal security guard system and method

Similar Documents

Publication Publication Date Title
US11122061B2 (en) Method and server for determining malicious files in network traffic
US10079835B1 (en) Systems and methods for data loss prevention of unidentifiable and unsupported object types
US9686304B1 (en) Systems and methods for healing infected document files
CN106713049A (en) Alarm method and device of monitor
CN107895122B (en) Special sensitive information active defense method, device and system
WO2005031528A3 (en) Method of and system for enterprise information asset protection through insider attack specification, monitoring and mitigation
CN111131221B (en) Interface checking device, method and storage medium
US20170061131A1 (en) Side-Channel Integrity Validation of Devices
CN108259472A (en) Dynamic joint defence mechanism based on attack analysis realizes system and method
CN104268468A (en) Protecting method and system of dynamic link library of Android system
CN107563192A (en) A kind of means of defence for extorting software, device, electronic equipment and storage medium
CN107846418A (en) Fire wall Initiative Defence System and means of defence
CN102184371B (en) Detecting method and system for database operation authority of SQL (Structured Query Language)
CN106169035A (en) A kind of high-security mobile storage system and method
Lee et al. Rcryptect: Real-time detection of cryptographic function in the user-space filesystem
CN116032629A (en) Classification treatment method, system electronic equipment and storage medium for alarm traffic
JP2015052951A (en) Security strengthening device
CN206270962U (en) A kind of computer security control system
JP2015052950A (en) Data storage device, secure io device
CN104184746B (en) Method and device for processing data by gateway
KR101889503B1 (en) Method and apparatus for providing flight data protection
US11895155B2 (en) Resilient self-detection of malicious exfiltration of sensitive data
US11507656B2 (en) Ransomware detection and remediation
KR101606090B1 (en) Apparatus and method for protecting network
CN111030982B (en) Strong management and control method, system and storage medium for confidential files

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170620

Termination date: 20171222

CF01 Termination of patent right due to non-payment of annual fee