CN214627029U - File transmission system based on virus prevention and traceability - Google Patents

File transmission system based on virus prevention and traceability Download PDF

Info

Publication number
CN214627029U
CN214627029U CN202120950947.4U CN202120950947U CN214627029U CN 214627029 U CN214627029 U CN 214627029U CN 202120950947 U CN202120950947 U CN 202120950947U CN 214627029 U CN214627029 U CN 214627029U
Authority
CN
China
Prior art keywords
processor
file
switch
data switch
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202120950947.4U
Other languages
Chinese (zh)
Inventor
杨航
毕凯峰
张佳发
明哲
张华兵
陈华军
王健
母天石
李慧娟
邓子杰
李昳
周磊
付志博
黄海英
刘家豪
叶思斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Digital Power Grid Group Information Communication Technology Co ltd
China Southern Power Grid Co Ltd
Southern Power Grid Digital Grid Research Institute Co Ltd
Original Assignee
China Southern Power Grid Co Ltd
Southern Power Grid Digital Grid Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Co Ltd, Southern Power Grid Digital Grid Research Institute Co Ltd filed Critical China Southern Power Grid Co Ltd
Priority to CN202120950947.4U priority Critical patent/CN214627029U/en
Application granted granted Critical
Publication of CN214627029U publication Critical patent/CN214627029U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The utility model discloses a file transmission system based on virus is taken precautions against and is traced to source belongs to computer file transmission field. The utility model discloses a when the second treater detects the virus attack, the disconnection between first switch control first treater and the system and the network at this moment to ensure that file virus can not leak sensitive file through the network; the second processor controls the third data switch to be switched off; thereby ensuring that the file virus does not further attack the at least one monitoring device via the network switch. And the second processor controls the third data switch to be closed, and transmits the backup files in the file backup storage device to at least one monitoring device through the network switch so as to ensure the normal monitoring and transmission of the files. By monitoring whether the monitor is attacked by viruses or not when the monitor detects that the data transmission quantity is abnormal, the use of the processor under abnormal operation is avoided, and the safety of the file is further ensured.

Description

File transmission system based on virus prevention and traceability
Technical Field
The utility model relates to a computer file transmission field, in particular to file transmission system based on virus is taken precautions against and is traced to source.
Background
The computer viruses mainly comprise three types, namely network viruses, file viruses and boot viruses, and the file viruses cover all viruses infected by a file system of an operating system, so that the file viruses are huge in number and serious in harm.
The file viruses are mainly divided into two types, one is that the viruses are added at the front part of the file, and the other is that the viruses are added at the tail part of the file. The simplest and least expensive method for detecting known viruses at present is a feature code method, in which a program to be detected is compared with feature codes of viruses one by one in a scanning manner, and if the same codes are found, the program is judged to be infected by the viruses.
When a certain trigger condition is met, the file virus starts to implement infection or active attack, the existence of the virus can be usually detected only when the virus attacks, and the transmission process of the file virus is often concealed and difficult to detect, so that the file process of the file virus is difficult to effectively analyze, and the file virus is not beneficial to prevention and tracing.
SUMMERY OF THE UTILITY MODEL
In order to solve the problem of the prior art, the embodiment of the utility model provides a file transmission system based on virus prevention and traceability is provided. The technical scheme is as follows:
provided is a file transmission system based on virus prevention and source tracing, the system comprises:
the system comprises a file source storage device, a file backup storage device, a monitor, a first processor, a second processor, a network switch, a tracing server and at least one monitoring device; wherein:
the file source storage equipment is connected with a network through a network interface; the file source storage device is connected with the first processor through a first data switch; the first processor is connected with the file backup storage device;
the file source storage device is in data connection with the monitor;
the monitor is connected with the second processor through a second data switch;
the file backup storage device is connected with the second processor through a third data switch;
the second processor is in data connection with the network switch, and the network switch is in network connection with the at least one monitoring device;
the first processor controls the first data switch to be closed and opened, and the second processor controls the second data switch and the third data switch to be closed and opened;
the network interface is connected with the tracing server through a fourth data switch, and the fourth data switch is connected with the first processor;
when the file backup storage device is in normal use, the first data switch is closed, the first processor receives files transmitted from a network interface through the file source storage device, the files are backed up through the file backup storage device, and the fourth data switch is opened;
when the monitor detects that the data transmission quantity is abnormal or the second processor detects virus attack, the second processor controls the third data switch to be switched off and controls the third data switch to be switched on, and the first processor controls the first switch to be switched off;
the second processor transmits the backup files in the file backup storage device to the at least one monitoring device through the network switch;
and the first processor controls the fourth data switch to be closed, so that the tracing server traces the source of the virus attack through the network interface.
Alternatively to this, the first and second parts may,
the first processor is connected with the data interface.
Alternatively to this, the first and second parts may,
the second processor is connected with the input device and the display screen.
Alternatively to this, the first and second parts may,
the monitor is respectively connected with the first data switch, the second data switch and the third data switch.
Alternatively to this, the first and second parts may,
and the second processor is connected with the virus analysis private network through a private network interface.
Alternatively to this, the first and second parts may,
the monitor is electrically connected with the indicator lamp and the monitor is connected with the monitoring screen.
The embodiment of the utility model provides a beneficial effect that technical scheme brought is:
1. when the second processor detects virus attack, the first processor controls the first switch to be disconnected, and at the moment, the system is disconnected with the network, so that file viruses are prevented from leaking sensitive files through the network; the second processor controls the third data switch to be switched off; thereby ensuring that the file virus cannot further attack at least one monitoring device through the network switch;
2. and the second processor controls the third data switch to be closed, and transmits the backup files in the file backup storage device to at least one monitoring device through the network switch so as to ensure the normal monitoring and transmission of the files.
3. By monitoring whether the monitor is attacked by viruses or not when the monitor detects that the data transmission quantity is abnormal, the use of the processor under abnormal operation is avoided, and the safety of the file is further ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic view of a file transmission system based on virus prevention and tracing provided by an embodiment of the present invention;
fig. 2 is a schematic view of a file transmission system based on virus prevention and tracing provided by an embodiment of the present invention;
fig. 3 is a schematic view of a file transmission system based on virus prevention and tracing provided by an embodiment of the present invention;
fig. 4 is a schematic view of a file transmission system based on virus prevention and tracing provided by an embodiment of the present invention;
fig. 5 is a schematic view of a file transmission system based on virus prevention and tracing provided by an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the following description will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. Based on the embodiments in the present invention, all other embodiments obtained by a person skilled in the art without creative work belong to the protection scope of the present invention.
There is provided a file transfer system based on virus prevention and tracing, as shown in fig. 1, the system comprising:
the system comprises a file source storage device, a file backup storage device, a monitor, a first processor, a second processor, a network switch, a tracing server and at least one monitoring device; wherein:
the file source storage equipment is connected with a network through a network interface; the file source storage equipment is connected with the first processor through a first data switch; the first processor is connected with the file backup storage device;
the file source storage device is in data connection with the monitor;
the monitor is connected with the second processor through a second data switch;
the file backup storage device is connected with the second processor through a third data switch;
the second processor is in data connection with a network switch, and the network switch is in network connection with at least one monitoring device;
the first processor controls the on and off of the first data switch, and the second processor controls the on and off of the second data switch and the third data switch;
the network interface is connected with the tracing server through a fourth data switch, and the fourth data switch is connected with the first processor;
when the system is normally used, namely when virus attack is not received, the first data switch is closed, the first processor receives the file transmitted from the network interface through the file source storage device and backs up the file through the file backup storage device; the second data switch is closed, the third data interface is opened, and the second processor transmits the files in the file source storage device to the at least one monitoring device through the network switch.
When the second processor detects virus attack, the first processor controls the first switch to be disconnected, and at the moment, the system is disconnected with the network, so that file viruses are prevented from leaking sensitive files through the network; the second processor controls the third data switch to be switched off; thereby ensuring that the file virus cannot further attack at least one monitoring device through the network switch;
and the second processor controls the third data switch to be closed, and transmits the backup files in the file backup storage device to at least one monitoring device through the network switch so as to ensure the normal monitoring and transmission of the files.
Before the file is transmitted, a communication handshake protocol is carried out between the file and the destination device, namely, the device on the transmission path is informed of the size of the transmitted file and the data volume of the transmitted data in advance, when a virus attacks, the file is damaged or new data is added into the file, so that the data volume is changed, the monitor detects that the data transmission volume is abnormal, and whether the virus attacks are suffered or not can be judged;
when the monitor detects that the data transmission quantity is abnormal, the second processor controls the third data switch to be switched off and controls the third data switch to be switched on, and the first processor controls the first switch to be switched off;
the second processor transmits the backup files in the file backup storage device to at least one monitoring device through the network switch; the first processor controls the fourth data switch to be closed, so that the tracing server traces the source of the virus attack through the network interface.
Optionally, referring to fig. 2, the first processor is connected to a data interface, where the data interface may be a USB interface, and may support that after suffering from virus attack, a user may export a backup file by moving a storage medium, so as to further ensure security of a sensitive file.
Optionally, referring to fig. 3, the second processor is connected to the input device and the display screen;
the display screen can display the monitoring data of the monitor and can also display the file backup state, and the display process can be realized by the second processor through detecting the file backup storage device.
The user can realize the operation of backing up the file or the operation of transmitting the file through the input device, and can input the instruction for opening or closing the first data switch, the second data switch and the third data switch, so as to further facilitate the use of the user.
Alternatively, as shown with reference to figure 4,
the monitor is respectively connected with the first data switch, the second data switch and the third data switch, and the first data switch, the second data switch and the third data switch are turned on or turned off by transmitting an electric signal to any one of the first data switch, the second data switch and the third data switch, so that the situation that the first processor, the second processor and the third data switch cannot be normally turned on or turned off due to file virus attack is avoided, and the normal cloud top of the system is further ensured.
Optionally, referring to fig. 5, the second processor is connected to the virus analysis private network through a private network interface.
The virus analysis private network comprises a plurality of analysis servers, the second processor uploads virus attacks to the servers through the private network interface, so that cloud analysis of viruses is achieved, virus prevention and virus discovery are further enhanced, a virus database does not need to be maintained locally, and data safety is further guaranteed.
Optionally, the watch-dog is connected with the pilot lamp electricity, and the watch-dog is connected with the monitor screen, and this pilot lamp is used for instructing whether the watch-dog normally works to convenience of customers' operation and maintenance work, whether this monitor screen can further show the watch-dog normally works, and the monitoring data of watch-dog, thereby avoid the normal use under the unavailable condition of display screen.
Above-mentioned all optional technical scheme can adopt arbitrary combination to form the optional embodiment of this utility model, and the repeated description is no longer given here.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the present invention, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present invention should be included within the protection scope of the present invention.

Claims (6)

1. A file transfer system based on virus prevention and tracing, the system comprising:
the system comprises a file source storage device, a file backup storage device, a monitor, a first processor, a second processor, a network switch, a tracing server and at least one monitoring device; wherein:
the file source storage equipment is connected with a network through a network interface; the file source storage device is connected with the first processor through a first data switch; the first processor is connected with the file backup storage device;
the file source storage device is in data connection with the monitor;
the monitor is connected with the second processor through a second data switch;
the file backup storage device is connected with the second processor through a third data switch;
the second processor is in data connection with the network switch, and the network switch is in network connection with the at least one monitoring device;
the first processor controls the first data switch to be closed and opened, and the second processor controls the second data switch and the third data switch to be closed and opened;
the network interface is connected with the tracing server through a fourth data switch, and the fourth data switch is connected with the first processor;
when the file backup storage device is in normal use, the first data switch is closed, the first processor receives files transmitted from a network interface through the file source storage device, the files are backed up through the file backup storage device, and the fourth data switch is opened;
when the monitor detects that the data transmission quantity is abnormal or the second processor detects virus attack, the second processor controls the third data switch to be switched off and controls the third data switch to be switched on, and the first processor controls the first data switch to be switched off;
the second processor transmits the backup files in the file backup storage device to the at least one monitoring device through the network switch;
and the first processor controls the fourth data switch to be closed, so that the tracing server traces the source of the virus attack through the network interface.
2. The system of claim 1,
the first processor is connected with the data interface.
3. The system of claim 2,
the second processor is connected with the input device and the display screen.
4. The system of claim 3,
the monitor is respectively connected with the first data switch, the second data switch and the third data switch.
5. The system of claim 4,
and the second processor is connected with the virus analysis private network through a private network interface.
6. The system of claim 5,
the monitor is electrically connected with the indicator lamp and the monitor is connected with the monitoring screen.
CN202120950947.4U 2021-04-28 2021-04-28 File transmission system based on virus prevention and traceability Active CN214627029U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202120950947.4U CN214627029U (en) 2021-04-28 2021-04-28 File transmission system based on virus prevention and traceability

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202120950947.4U CN214627029U (en) 2021-04-28 2021-04-28 File transmission system based on virus prevention and traceability

Publications (1)

Publication Number Publication Date
CN214627029U true CN214627029U (en) 2021-11-05

Family

ID=78406947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202120950947.4U Active CN214627029U (en) 2021-04-28 2021-04-28 File transmission system based on virus prevention and traceability

Country Status (1)

Country Link
CN (1) CN214627029U (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116541212A (en) * 2023-07-04 2023-08-04 武汉大数据产业发展有限公司 Device, method and system for realizing disaster recovery of big data center

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116541212A (en) * 2023-07-04 2023-08-04 武汉大数据产业发展有限公司 Device, method and system for realizing disaster recovery of big data center
CN116541212B (en) * 2023-07-04 2023-09-22 武汉大数据产业发展有限公司 Device, method and system for realizing disaster recovery of big data center

Similar Documents

Publication Publication Date Title
CN107493265A (en) A kind of network security monitoring method towards industrial control system
KR102195788B1 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
CN104662517A (en) Techniques for detecting a security vulnerability
CN101626368A (en) Device, method and system for preventing web page from being distorted
KR20070099201A (en) Method of security management for mobile wireless device and apparatus for security management using the same
CN110620791A (en) Industrial safety data ferrying system with early warning function
CN104778415A (en) Computer behavior-based data anti-leakage system and method
CN103812675A (en) Method and system for realizing allopatric disaster recovery switching of service delivery platform
CN109120599A (en) A kind of external connection managing and control system
CN101888284B (en) Method and device used for one-way transmission of data
CN214627029U (en) File transmission system based on virus prevention and traceability
WO2024012135A1 (en) Interface-detection-based externally-connected protection device and method
CN111669371B (en) Network attack restoration system and method suitable for power network
CN103593616A (en) System and method for preventing and controlling USB flash disk viruses in enterprise information network
CN113190337A (en) Portable primary and secondary computer system and implementation method thereof
US11115424B2 (en) Computerized system for complying with certain critical infrastructure protection requirements
CN111885179B (en) External terminal protection device and protection system based on file monitoring service
CN114153301A (en) Power failure monitoring device and method and external protective equipment
CN213879882U (en) Virus remote analysis system based on distributed malicious code analysis equipment
CN111859434A (en) External terminal protection device and protection system for providing confidential file transmission
CN213879892U (en) Distributed file protection system comprising multiple protection devices
CN103310147B (en) Factory's security control apparatus and management method
CN215010299U (en) Input device based on virus prevention and analysis
CN213342278U (en) Network security monitoring equipment
CN213876731U (en) Computer virus prevention device based on multiple distributed attack tracing devices

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 510000 No.11 Kexiang Road, Science City, Huangpu District, Guangzhou City, Guangdong Province

Patentee after: CHINA SOUTHERN POWER GRID Co.,Ltd.

Country or region after: China

Patentee after: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

Address before: 510000 No.11 Kexiang Road, Science City, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: CHINA SOUTHERN POWER GRID Co.,Ltd.

Country or region before: China

Patentee before: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

CP03 Change of name, title or address
TR01 Transfer of patent right

Effective date of registration: 20240329

Address after: 510000 No. 11 Kexiang Road, Science City, Luogang District, Guangzhou City, Guangdong Province

Patentee after: CHINA SOUTHERN POWER GRID Co.,Ltd.

Country or region after: China

Patentee after: China Southern Power Grid Digital Power Grid Group Information Communication Technology Co.,Ltd.

Address before: 510000 No.11 Kexiang Road, Science City, Huangpu District, Guangzhou City, Guangdong Province

Patentee before: CHINA SOUTHERN POWER GRID Co.,Ltd.

Country or region before: China

Patentee before: Southern Power Grid Digital Grid Research Institute Co.,Ltd.

TR01 Transfer of patent right