CN208128283U - Information security of computer network monitor system - Google Patents

Information security of computer network monitor system Download PDF

Info

Publication number
CN208128283U
CN208128283U CN201820529316.3U CN201820529316U CN208128283U CN 208128283 U CN208128283 U CN 208128283U CN 201820529316 U CN201820529316 U CN 201820529316U CN 208128283 U CN208128283 U CN 208128283U
Authority
CN
China
Prior art keywords
module
input terminal
output end
information
central processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201820529316.3U
Other languages
Chinese (zh)
Inventor
黄鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangan Vocational and Technical College
Original Assignee
Guangan Vocational and Technical College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangan Vocational and Technical College filed Critical Guangan Vocational and Technical College
Priority to CN201820529316.3U priority Critical patent/CN208128283U/en
Application granted granted Critical
Publication of CN208128283U publication Critical patent/CN208128283U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model is information security of computer network monitor system, and structure includes:Computer, server, central processing unit and CPU, computer is connect with server, the server side is connected with warning device and camera, the server other end is connected with information resource database, the information resource database connects central processing unit, the central processing unit input terminal and information tracking module, viral real time scan module, authentication module, network information security module is connected with the output end of Network Abnormal evaluation module, the central processing unit is bi-directionally connected with CPU, the CPU output end is connect with data migration module and data backup module input terminal, the CPU input terminal is connect with emergency module output end, the data migration module and data backup module output end are connect with storage module input terminal.The information security of computer network monitor system improves the safety of computerized information and network by the monitoring of many-sided multi-angle.

Description

Information security of computer network monitor system
Technical field
The utility model relates to technical field of the computer network, specially information security of computer network monitor system.
Background technique
The network information security is one and is related to computer science, network technology, the communication technology, cryptographic technique, information security The multi-disciplinary comprehensive branch of learning such as technology, applied mathematics, number theory, information theory.It is primarily referred to as the hardware of network system, software And its data in system are protected, not by the reason of accidental or malice and by destroying, changing, revealing, system connects Continuous reliably normally to run, network service is not interrupted.
In recent years, it is grown rapidly along with Internet technology in the whole world, people are providing great convenience, however, letter For breathization while bringing various substances and culture is enjoyed, we are also just by the safety for carrying out automatic network got worse Threaten, the data burglar of such as network, the invasion of hacker, virus distribution person or even internal system blabber.Although we are just In the software technology that various complexity are widely used, such as firewall, proxy server invade detector, channel controlling mechanism, but It is that no matter in developed country, or in developing country (including China), activities of hacker is more and more savage, they are all-pervasive, Serious harm is caused to society.At the same time, more allow people uneasy, hacker website is also being continuously increased on internet, Study hacking technique, acquisition hacking tool become easy.In this way, making originally that just very fragile internet is more aobvious It obtains dangerous.So reinforcing we itself safety precaution, it is quite necessary to.Therefore, we have proposed computer network informations Safety custody system.
Utility model content
The purpose of this utility model is to provide information security of computer network monitor system, solves institute in background technique The problem of proposition.
To achieve the above object, the utility model provides the following technical solutions:Information security of computer network monitor system, Its structure includes:Its structure includes:Computer, server, central processing unit and CPU, the computer are connect with server, institute It states server side and is connected with warning device and camera, the server other end is connected with information resource database, the information Resources bank connects central processing unit, the central processing unit input terminal and information tracking module, viral real time scan module, identity Authentication module, network information security module are connected with the output end of Network Abnormal evaluation module, and the central processing unit and CPU are bis- To connection, the CPU output end is connect with data migration module and data backup module input terminal, the CPU input terminal with answer Anxious module output end connection, the data migration module and data backup module output end are connect with storage module input terminal, institute The input terminal of the output end and recovery module of stating storage module connects, and the output end of the recovery module and the input terminal of CPU connect It connects.
As a kind of preferred embodiment of the utility model, the network information security module is generated by netkey Device, netkey controller and netkey decipher are constituted, the netkey generator, netkey controller and network Key decipher output end is connect with central processing unit input terminal.
As a kind of preferred embodiment of the utility model, the information tracking module controls unit and data by resource Follow-up auditing unit is constituted, and the resource controls the output end that unit and data follow-up auditing unit are constituted and central processing unit is defeated Enter end connection.
As a kind of preferred embodiment of the utility model, the Network Abnormal evaluation module input terminal and timing inspection Module is connected with port security control module output end, and the timing polling module input terminal is connect with timer output end.
As a kind of preferred embodiment of the utility model, the output end of the virus real time scan module and external end Mouth input terminal connection.
As a kind of preferred embodiment of the utility model, face recognition module, number built in the authentication module According to evaluation module and data memory module, the authentication module connection ordinary user port and particular port.
Compared with prior art, the beneficial effects of the utility model are as follows:
1. the novel computer network information security monitor system, passes through the network information security guarded for the network information Module, viral real time scan module, timing polling module and port security control module, carry out the authentication list of authentication Member, network information security module, viral real time scan module, timing polling module, port security control module and authentication Unit is assessed with central processing unit and central processing unit, information tracking module, viral real time scan module, Network Abnormal Module, CPU, emergency module, data migration module, data backup module, storage module and recovery module are equipped with, and are solved Digital information itself has the characteristic for being easy to replicate, and using this characteristic, information is susceptible to the robber for being difficult to control and tracing The case where taking prestige knee is monitored and protects to the information of computer information safe system from multiple angles, many aspects, identity Authentication module can identify fingerprint to judge ordinary user and specific user, substantially increase the use of computer information safe With the security performance of transmission.
Detailed description of the invention
Upon reading the detailed description of non-limiting embodiments with reference to the following drawings, other spies of the utility model Sign, objects and advantages will become more apparent upon:
Fig. 1 is the overall structure diagram of the utility model information security of computer network monitor system;
Fig. 2 is that the network information security modular structure of the utility model information security of computer network monitor system is illustrated Figure;
Fig. 3 is the information tracking module schematic diagram of the utility model information security of computer network monitor system;
In figure:Computer -1, server -2, warning device -3, camera -4, information resource database -5, information tracking module - 6, viral real time scan module -7, authentication module -8, network information security module -9, central processing unit -10, reduction mould Block -11, storage module -12, timer -13, timing polling module -14, Network Abnormal evaluation module -15, port security control Module -16, emergency module -17, data migration module -18, CPU19, data backup module -20, netkey generator -21, Netkey controller -22, netkey decipher -23, resource control unit -24, data tracking auditable unit -25, external Port -71.
Specific embodiment
To be easy to understand the technical means, creative features, achievement of purpose, and effectiveness of the utility model, below In conjunction with specific embodiment, the utility model is further described.
Fig. 1-3 is please referred to, the utility model provides a kind of technical solution:Information security of computer network monitor system, Structure includes:Computer 1, server 2, central processing unit 10 and CPU19, the computer 1 are connect with server 2, the clothes Business 2 one end of device is connected with warning device 3 and camera 4, and 2 other end of server is connected with information resource database 5, the information Resources bank 5 connects central processing unit 10,10 input terminal of central processing unit and information tracking module 6, viral real time scan mould Block 7, authentication module 8, network information security module 9 are connected with the output end of Network Abnormal evaluation module 15, the center Processor 10 and CPU19 is bi-directionally connected, the CPU19 output end and 20 input terminal of data migration module 18 and data backup module Connection, the CPU19 input terminal are connect with emergency 17 output end of module, the data migration module 18 and data backup module 20 Output end is connect with 12 input terminal of storage module, and the output end of the storage module 12 is connect with the input terminal of recovery module 11, The output end of the recovery module 11 and the input terminal of CPU19 connect.
Referring to Fig. 2, the network information security module 9 is by netkey generator 21,22 and of netkey controller Netkey decipher 23 is constituted, the netkey generator 21, netkey controller 22 and netkey decipher 23 Output end is connect with 10 input terminal of central processing unit, the monitoring for network security.
Referring to Fig. 3, the information tracking module 6 controls unit 24 by resource and data follow-up auditing unit 25 is constituted, The resource is controlled the output end that unit 24 and data follow-up auditing unit 25 are constituted and is connect with 10 input terminal of central processing unit, uses In the monitoring of information security.
Referring to Fig. 1,15 input terminal of Network Abnormal evaluation module and timing polling module 14 and port security control The connection of 16 output end of module, 14 input terminal of timing polling module is connect with 13 output end of timer, for periodically guarding.
Referring to Fig. 1, the output end of the virus real time scan module 7 is connect with external 71 input terminal of port, it is used for pair The scanning of external device is guarded.
Referring to Fig. 1, face recognition module, data evaluation module and data store mould built in the authentication module 8 Block, the authentication module 8 connect ordinary user port and particular port, for identification specific user.
Information security of computer network monitor system described in the utility model is needed to first pass through identity when users use and be tested Module 8 is demonstrate,proved, there is data evaluation module and data memory module in authentication module 8, user carries out face knowledge by camera 4 Not, when by when enter particular port, when identification occurs abnormal, into ordinary user port, network information security module 9 is set Netkey generator 21, netkey controller 22 and the netkey decipher 23 set detect server, virus Real time scan module 7 is scanned server and external port 71, and Network Abnormal evaluation module 15 is by timer 13 and timing Polling module 14 controls timing inspection scanning server;When computer 1 receives attack display exception, emergency module 17 starts, Data are shifted and are stored by data migration module 18, data backup module 20, storage module 12, when computer 1 restores normal, also Former module 11 restores data, and in operation, information tracking module 6 is to data information spotting scaming, to realize many-sided multi-angle Network monitoring.
The utility model, computer -1, server -2, warning device -3, camera -4, information resource database -5, information Tracking module -6, viral real time scan module -7, authentication module -8, network information security module -9, central processing unit - 10, recovery module -11, storage module -12, timer -13, timing polling module -14, Network Abnormal evaluation module -15, port Safety control module -16, emergency module -17, data migration module -18, CPU19, data backup module -20, netkey are raw - 21, netkey controller -22, netkey decipher -23, the resource of growing up to be a useful person control unit -24, data tracking auditable unit - 25, external -71 component of port is universal standard part or component as known to those skilled in the art, and structure and principle are all this Technical staff can learn by technical manual or know by routine experiment method that the utility model passes through many-sided multi-angle Monitoring, improve the safety of computerized information and network
The basic principles and main features of the present invention and the advantages of the present invention have been shown and described above, for For those skilled in the art, it is clear that the present invention is not limited to the details of the above exemplary embodiments, and without departing substantially from this In the case where the spirit or essential attributes of utility model, the utility model can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the utility model is by institute Attached claim rather than above description limit, it is intended that will fall within the meaning and scope of the equivalent elements of the claims All changes are embraced therein.It should not treat any reference in the claims as limiting related right It is required that.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (6)

1. information security of computer network monitor system, structure include:Computer(1), server(2), central processing unit (10)And CPU(19), it is characterised in that:The computer(1)With server(2)Connection, the server(2)One end is connected with Warning device(3)And camera(4), the server(2)The other end is connected with information resource database(5), the information resource database (5)Connect central processing unit(10), the central processing unit(10)Input terminal and information tracking module(6), viral real time scan Module(7), authentication module(8), network information security module(9)With Network Abnormal evaluation module(15)Output end connect It connects, the central processing unit(10)With CPU(19)It is bi-directionally connected, the CPU(19)Output end and data migration module(18)With Data backup module(20)Input terminal connection, the CPU(19)Input terminal and emergency module(17)Output end connection, the data Shift module(18)And data backup module(20)Output end and storage module(12)Input terminal connection, the storage module(12) Output end and recovery module(11)Input terminal connection, the recovery module(11)Output end and CPU(19)Input terminal Connection.
2. information security of computer network monitor system according to claim 1, it is characterised in that:The network information peace Full module(9)By netkey generator(21), netkey controller(22)With netkey decipher(23)It constitutes, it is described Netkey generator(21), netkey controller(22)With netkey decipher(23)Output end and central processing unit (10)Input terminal connection.
3. information security of computer network monitor system according to claim 1, it is characterised in that:The information trace mould Block(6)Unit is controlled by resource(24)With data follow-up auditing unit(25)It constitutes, the resource controls unit(24)And data Follow-up auditing unit(25)The output end and central processing unit of composition(10)Input terminal connection.
4. information security of computer network monitor system according to claim 1, it is characterised in that:The Network Abnormal is commented Estimate module(15)Input terminal and timing polling module(14)With port security control module(16)Output end connection, the timing are patrolled Examine module(14)Input terminal and timer(13)Output end connection.
5. information security of computer network monitor system according to claim 1, it is characterised in that:The virus is swept in real time Retouch module(7)Output end and external port(71)Input terminal connection.
6. information security of computer network monitor system according to claim 1, it is characterised in that:The authentication mould Block(8)Built-in face recognition module, data evaluation module and data memory module, the authentication module(8)Connection is common User port and particular port.
CN201820529316.3U 2018-04-15 2018-04-15 Information security of computer network monitor system Expired - Fee Related CN208128283U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201820529316.3U CN208128283U (en) 2018-04-15 2018-04-15 Information security of computer network monitor system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201820529316.3U CN208128283U (en) 2018-04-15 2018-04-15 Information security of computer network monitor system

Publications (1)

Publication Number Publication Date
CN208128283U true CN208128283U (en) 2018-11-20

Family

ID=64191361

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201820529316.3U Expired - Fee Related CN208128283U (en) 2018-04-15 2018-04-15 Information security of computer network monitor system

Country Status (1)

Country Link
CN (1) CN208128283U (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175458A (en) * 2019-04-18 2019-08-27 上海马小修智能科技有限公司 A kind of Computer Data Security management system
CN112597462A (en) * 2020-12-30 2021-04-02 上海磐御网络科技有限公司 Industrial network safety system
CN112804212A (en) * 2020-12-31 2021-05-14 上海磐御网络科技有限公司 Information security assessment system
CN114513333A (en) * 2022-01-07 2022-05-17 深圳比特耐特信息技术股份有限公司 Computer network information safety monitoring system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175458A (en) * 2019-04-18 2019-08-27 上海马小修智能科技有限公司 A kind of Computer Data Security management system
CN112597462A (en) * 2020-12-30 2021-04-02 上海磐御网络科技有限公司 Industrial network safety system
CN112804212A (en) * 2020-12-31 2021-05-14 上海磐御网络科技有限公司 Information security assessment system
CN112804212B (en) * 2020-12-31 2023-02-28 上海磐御网络科技有限公司 Information security assessment system
CN114513333A (en) * 2022-01-07 2022-05-17 深圳比特耐特信息技术股份有限公司 Computer network information safety monitoring system and method

Similar Documents

Publication Publication Date Title
CN208128283U (en) Information security of computer network monitor system
US10055559B2 (en) Security device, methods, and systems for continuous authentication
KR101689297B1 (en) Automated verification method of security event and automated verification apparatus of security event
CN105005720B (en) Computer security control system
US8887279B2 (en) Distributed real-time network protection for authentication systems
KR100966073B1 (en) Apparatus and method for managing terminal users
CN101252439A (en) System and method for increasing information safety equipment security
CN109165507A (en) Cross-site scripting attack leak detection method, device and terminal device
Bitton et al. Evaluating the information security awareness of smartphone users
CN107147627A (en) A kind of network safety protection method and system based on big data platform
CN107122685A (en) A kind of big data method for secure storing and equipment
CN106529291B (en) Malware detection method
Adhikary et al. Battering keyloggers and screen recording software by fabricating passwords
CN107666464A (en) A kind of information processing method and server
Muwardi et al. Network security monitoring system via notification alert
CN108959860A (en) Whether a kind of detection android system is cracked and cracks record acquisition methods
Čisar et al. General vulnerability aspects of Internet of Things
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
CN105989273B (en) Application program login method, device and electronic equipment
CN105933356A (en) Method and device for detecting DNS (Domain Name System) hijacking of client
CN114189387B (en) Alliance chain safety detection method and device
CN106951777B (en) The estimating method of user interface when Android application operation
Soni et al. Security requirements in internet of things: Challenges and methods
Alkhamisi An Analysis of Security Attacks on IoT Applications
Qureshi et al. A Novel Framework for a Cyber Secure Smart City

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181120

Termination date: 20210415