CN212231496U - Network security monitoring system - Google Patents

Network security monitoring system Download PDF

Info

Publication number
CN212231496U
CN212231496U CN202021020871.7U CN202021020871U CN212231496U CN 212231496 U CN212231496 U CN 212231496U CN 202021020871 U CN202021020871 U CN 202021020871U CN 212231496 U CN212231496 U CN 212231496U
Authority
CN
China
Prior art keywords
module
input end
output end
unit
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202021020871.7U
Other languages
Chinese (zh)
Inventor
高小东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Xingqi Technology Co ltd
Original Assignee
Hefei Xingqi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Xingqi Technology Co ltd filed Critical Hefei Xingqi Technology Co ltd
Priority to CN202021020871.7U priority Critical patent/CN212231496U/en
Application granted granted Critical
Publication of CN212231496U publication Critical patent/CN212231496U/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The utility model discloses a network security monitored control system relates to network supervision field, and is poor for solving the current network security monitoring mode among the prior art, constantly needs the problem of manual handling. The monitoring system comprises a monitoring module, the output end of the monitoring module is connected with the input ends of a display module and a wireless connection module respectively, the input end of the monitoring module is connected with the output end of an information acquisition module, the management system comprises an auditing module, the input end of the auditing module is connected with the output end of the monitoring module, the protection system comprises a processor module, the input end of the processor module is connected with the output ends of a unit to be processed and a shielding unit respectively, the output end of the wireless connection module is connected with the input end of a cloud server, the output end of the cloud server is connected with the input end of a management computer, and the output end of the cloud server is connected with the input end of a storage module.

Description

Network security monitoring system
Technical Field
The utility model relates to a network supervision technical field specifically is a network security monitored control system.
Background
Network monitoring, which aims at monitoring and controlling computers in a local area network, Emulex rapidly manages the internet aiming at the process management (intranet monitoring) such as internet activities (internet monitoring) on an internal computer and internal behaviors and assets related to non-internet access, the use of the internet is more and more common, the network and the internet not only become a communication bridge in an enterprise, but also are important pipelines for various business transactions between the enterprise and the outside, network monitoring products are mainly divided into monitoring software and monitoring hardware, the email speed is higher than that of the traditional mail, the efficiency is higher, in many enterprises, the email gradually has the property of formal official documents, the management of enterprise archive data is not limited to various paper documents, but also comprises various incoming and outgoing emails, if the email is managed and backed up, the enterprise can more effectively manage internal and external archives, convenient email, which may also be used by employees as a primary conduit for intentional or unintentional leaks of secrets, has been investigated by checking employees' email using special software to prevent leaks of corporate secrets for approximately three quarters of the large enterprise in the united states.
The system is characterized in that the system is used for monitoring and controlling computers in a local area network, and managing processes (intranet monitoring) such as UniAccess for Internet activities (Internet monitoring) on an internal computer and internal behaviors and assets related to non-Internet; the method comprises the steps of Internet monitoring (Internet behavior monitoring and control, Internet behavior safety audit) and intranet monitoring (intranet behavior monitoring, control, software and hardware asset management, data and information safety), and some transparent encryption software deployments for data safety are added, but the existing network safety monitoring mode is poor, and the working efficiency is influenced because manual processing is continuously needed; therefore, the market is urgently needed to develop a network security monitoring system to help people solve the existing problems.
SUMMERY OF THE UTILITY MODEL
An object of the utility model is to provide a network security monitored control system to it is poor to solve the current network security monitoring mode that proposes in the above-mentioned background art, constantly needs the problem of manual handling.
In order to achieve the above object, the utility model provides a following technical scheme: the utility model provides a network security monitoring system, includes monitored control system, management system and protection system, monitored control system includes the monitoring module, the output of monitoring module is connected with display module and wireless connection module's input respectively, just the input of monitoring module is connected with information acquisition module's output, management system is including examining and examining the module, the input of examining and examining the module is connected with the output of monitoring module, protection system includes the processor module, the input of processor module is connected with pending processing unit and shielding unit's output respectively.
Preferably, the monitoring system comprises a management computer, the management computer adopts an intelligent computer which can be accessed to an enterprise local area network and a wireless internet, the management computer is connected to the wireless internet through a wireless connection module, the output end of the wireless connection module is connected with the input end of a cloud server, the output end of the cloud server is connected with the input end of the management computer, the output end of the cloud server is connected with the input end of a storage module, the cloud server is provided with a plurality of databases, and sensitive characters, pictures and sound files are arranged in the plurality of databases.
Preferably, the input end of the information acquisition module is respectively connected with the output ends of the character acquisition unit, the image acquisition unit and the sound acquisition unit, the information acquisition module is provided with a screen acquisition module, and the input end of the screen acquisition module is respectively connected with the output ends of the camera module and the radio module.
Preferably, the input end of the auditing module is connected with the output end of the verifying module, the input end of the verifying module is respectively connected with the output ends of the digital password verifying unit, the face identifying unit, the GPS positioning unit and the fingerprint identifying unit, and the verifying module is provided with encryption protection.
Preferably, the output end of the verification module is connected with the input end of the alarm module, the output end of the alarm module is connected with the input end of the wireless connection module, the output end of the wireless connection module is connected with the input end of the loudspeaker module, and the verification module is in bidirectional connection with the processor module.
Preferably, the output end of the processor module is connected with the input end of the shielding module, the output end of the monitoring module is respectively connected with the shielding unit and the input end of the unit to be processed, the output end of the processor module is connected with the input end of the storage module, and the processor module adopts an intelligent processor which can be accessed into a network.
Compared with the prior art, the beneficial effects of the utility model are that:
1. the utility model can be processed quickly according to the processor module by setting the monitoring system, protect each computer in the local area network according to the sensitive characters, pictures and sound files in the processor module, shield the sensitive characters, pictures and sound files through the shielding unit, shield some special files without setting, wait for manual audit through the unit to be processed, shield or upload the special files after manual audit, store the shielded files in the storage module through the processor meter width, and send the files to the shielding unit through the processor module in the next shielding work, therefore, the newly added sensitive characters, pictures and sound files can be processed, the applicability is strong, the working strength of workers can be effectively reduced, and the use is convenient.
2. The utility model discloses a through management system's setting, managers need verify on the computer before carrying out network supervision work, verify the unit through the digit password, face identification unit, GPS positioning unit and fingerprint identification unit confirm the back respectively, can log in the management system of LAN, the authenticity of multiple verification improvement identity, if the error condition many times appears, accessible alarm module in time reports to the police, can remind the staff through speaker module to improve the security.
3. The utility model discloses a through the setting of cloud ware, through the information that information acquisition module collected, can improve display module on the one hand and show, on the other hand, accessible wireless connection module transmits the cloud ware in, stores data through the cloud ware to seek, plan rationally, convenient to use, the later stage of being convenient for uses the planning for a long time, so that subsequent management.
Drawings
Fig. 1 is a schematic diagram of a monitoring system of the present invention;
fig. 2 is a schematic diagram of the management system of the present invention;
fig. 3 is a schematic diagram of the protection system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments.
Referring to fig. 1-3, the present invention provides an embodiment: the utility model provides a network security monitoring system, including monitored control system, management system and protection system, monitored control system includes the monitoring module, the output of monitoring module is connected with display module and wireless connection module's input respectively, and the input of monitoring module is connected with the output of information acquisition module, the management system includes the module of examining and examining, the input of examining and examining the module is connected with the output of monitoring module, the protection system includes the processor module, the input of processor module is connected with the output of waiting to process unit and shielding unit respectively, monitor the inside computer of LAN through the monitoring module, and shield automatically through the treater, effectively protect through the protection system, wireless connection module adopts remote spread spectrum wireless data transmission module YL-1278RF, the MU module adopts intelligent module 990.
Furthermore, the monitoring system comprises a management computer, the management computer is an intelligent computer which can be accessed to an enterprise local area network and a wireless internet, the management computer is connected to the wireless internet through a wireless connection module, the output end of the wireless connection module is connected with the input end of a cloud server, the output end of the cloud server is connected with the input end of the management computer, the output end of the cloud server is connected with the input end of a storage module, the cloud server is provided with a plurality of databases, sensitive characters, pictures and sound files are arranged in the databases, each computer in the local area network is protected according to the sensitive characters, the pictures and the sound files which are arranged in the processor module, and the sensitive characters, the pictures and the sound files are shielded through a shielding unit.
Further, the input of information acquisition module respectively with the characters collection unit, the output of image acquisition unit and sound collection unit is connected, and the information acquisition module is provided with the screen acquisition module, and the input of screen acquisition module is connected with the output of camera module and radio module respectively, in the LAN, the inside information acquisition module that adopts of every computer is respectively through characters collection unit, image acquisition unit and sound collection unit monitor every computer, characters collection unit adopts the model to be LW IGW7404M digital acquisition module, image acquisition unit adopts intelligent WG315 data collection ware, sound collection unit adopts CI1006 intelligent speech recognition module.
Furthermore, the input end of the auditing module is connected with the output end of the verifying module, the input end of the verifying module is respectively connected with the output ends of the digital password verifying unit, the face recognition unit, the GPS positioning unit and the fingerprint recognition unit, the verifying module is provided with encryption protection, and when a manager logs in the management system, multiple verification is carried out to improve the authenticity of the identity.
Furthermore, the output end of the verification module is connected with the input end of the alarm module, the output end of the alarm module is connected with the input end of the wireless connection module, the output end of the wireless connection module is connected with the input end of the loudspeaker module, the verification module is in two-way connection with the processor module, if multiple error conditions occur, the alarm module can give an alarm in time, and workers can be reminded through the loudspeaker module, so that the safety is improved.
Furthermore, the output end of the processor module is connected with the input end of the shielding module, the output end of the monitoring module is respectively connected with the shielding unit and the input end of the unit to be processed, the output end of the processor module is connected with the input end of the storage module, the processor module adopts an intelligent processor which can be accessed into a network and is sent into the shielding unit through the processor module, so that newly added sensitive characters, pictures and sound files can be processed, and the applicability is high.
The working principle is as follows: when in use, in the local area network, an information acquisition module adopted in each computer monitors each computer through a character acquisition unit, an image acquisition unit and a sound acquisition unit respectively, the information can be processed quickly according to a processor module, each computer in the local area network is protected according to sensitive characters, pictures and sound files which are arranged in the processor module before, the sensitive characters, the pictures and the sound files are shielded through a shielding unit, some special files which are not set can wait for manual examination through a unit to be processed, a manager needs to verify on the computer before carrying out network supervision work, and after being confirmed respectively through a digital password verification unit, a human face recognition unit, a GPS positioning unit and a fingerprint recognition unit, the manager can log in a management system of the multiple local area network to verify and improve the authenticity of identity, if error condition appears many times, accessible alarm module in time reports to the police, can remind the staff through speaker module, the manual work is examined and examined the back, shield or upload special file, and shielded file passes through the wide save of treater meter in storage module, in the shielding work is carried out next time, accessible processor module sends to shielding unit in, the information of collecting through information acquisition module collection, can improve display module on the one hand and show, on the other hand, accessible wireless connection module transmits to the cloud ware in, store data through the cloud ware, thereby can handle the sensitive characters of newly-joining, picture and sound file, and the suitability is strong, and can effectually reduce staff's working strength.
It is obvious to a person skilled in the art that the invention is not restricted to details of the above-described exemplary embodiments, but that it can be implemented in other specific forms without departing from the spirit or essential characteristics of the invention. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (6)

1. A network security monitoring system comprises a monitoring system, a management system and a protection system, and is characterized in that: the monitoring system comprises a monitoring module, the output end of the monitoring module is connected with the input ends of a display module and a wireless connection module respectively, the input end of the monitoring module is connected with the output end of an information acquisition module, the management system comprises an auditing module, the input end of the auditing module is connected with the output end of the monitoring module, the protection system comprises a processor module, and the input end of the processor module is connected with the output ends of a unit to be processed and a shielding unit respectively.
2. The network security monitoring system according to claim 1, wherein: the monitoring system comprises a management computer, the management computer is an intelligent computer which can be accessed to an enterprise local area network and a wireless internet, the management computer is connected to the wireless internet through a wireless connection module, the output end of the wireless connection module is connected with the input end of a cloud server, the output end of the cloud server is connected with the input end of the management computer, the output end of the cloud server is connected with the input end of a storage module, the cloud server is provided with a plurality of databases, and sensitive characters, pictures and sound files are arranged in the databases.
3. The network security monitoring system according to claim 1, wherein: the input end of the information acquisition module is respectively connected with the output ends of the character acquisition unit, the image acquisition unit and the sound acquisition unit, the information acquisition module is provided with a screen acquisition module, and the input end of the screen acquisition module is respectively connected with the output ends of the camera module and the radio module.
4. The network security monitoring system according to claim 1, wherein: the input end of the verification module is connected with the output end of the verification module, the input end of the verification module is respectively connected with the output ends of the digital password verification unit, the face recognition unit, the GPS positioning unit and the fingerprint recognition unit, and the verification module is provided with encryption protection.
5. The network security monitoring system of claim 4, wherein: the output end of the verification module is connected with the input end of the alarm module, the output end of the alarm module is connected with the input end of the wireless connection module, the output end of the wireless connection module is connected with the input end of the loudspeaker module, and the verification module is in bidirectional connection with the processor module.
6. The network security monitoring system according to claim 1, wherein: the output end of the processor module is connected with the input end of the shielding module, the output end of the monitoring module is respectively connected with the shielding unit and the input end of the unit to be processed, the output end of the processor module is connected with the input end of the storage module, and the processor module adopts an intelligent processor which can be accessed into a network.
CN202021020871.7U 2020-06-06 2020-06-06 Network security monitoring system Expired - Fee Related CN212231496U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202021020871.7U CN212231496U (en) 2020-06-06 2020-06-06 Network security monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202021020871.7U CN212231496U (en) 2020-06-06 2020-06-06 Network security monitoring system

Publications (1)

Publication Number Publication Date
CN212231496U true CN212231496U (en) 2020-12-25

Family

ID=73930097

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202021020871.7U Expired - Fee Related CN212231496U (en) 2020-06-06 2020-06-06 Network security monitoring system

Country Status (1)

Country Link
CN (1) CN212231496U (en)

Similar Documents

Publication Publication Date Title
Dokuchaev et al. Classification of personal data security threats in information systems
CN104063473B (en) A kind of database audit monitoring system and its method
TW200530805A (en) Database user behavior monitor system and method
CN104579626B (en) A kind of electronic document output management and control system and method based on one-way transmission
Sokolov et al. The automating process of information security management
RU2759210C1 (en) System and method for protecting electronic documents containing confidential information from unauthorised access
CN111143794A (en) User identity online application auditing system for enterprise website
CN201732369U (en) Intelligent form filling integrated device
CN113779609B (en) Data management method, device, electronic equipment and storage medium
CN201628960U (en) Electronic form intelligent input system based on network
CN110826094A (en) Information leakage monitoring method and device
CN204680024U (en) Computer security based on dynamic human face recognition technology is taken precautions against and early warning system
CN212231496U (en) Network security monitoring system
CN104680355A (en) Novel-technology cloud computing enterprise information movement management system
US20130041796A1 (en) Application governance process and tool
Rodionova et al. Protection of the information resources of a library based on analysis of business processes
CN109710457A (en) A kind of financial audit unified platform
Khurshid et al. Big data-9vs, challenges and solutions
CN112511360B (en) Multi-source service platform data security component monitoring method and system
CN206021344U (en) Financial industry network financing risk management and control system
CN113706092A (en) Engineering project supervision method and system
CN113344506A (en) Digital file sorting system
CN107093221A (en) A kind of fingerprint attendance identifying system
CN201403103Y (en) Network fixation safety management system
Niinimäki et al. Security development of a pocket-sized teleradiology consultation system

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201225

CF01 Termination of patent right due to non-payment of annual fee