Information protection method and management system thereof for unconnected system

An information protection and non-connection technology, applied in the field of information systems, can solve problems such as difficulty in ensuring system reliability

Inactive Publication Date: 2010-07-07
TSINGHUA TONGFANG CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (2) The controllability of disconnected systems, so that only authorized systems can operate and use secret data
To solve the second problem, authorization technology can be used, that is, through the authorization and identity identification of related systems, it can obtain the legal operation right of secret data, but it is difficult to guarantee the reliability of system authorization when the systems are not connected.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information protection method and management system thereof for unconnected system
  • Information protection method and management system thereof for unconnected system
  • Information protection method and management system thereof for unconnected system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] see figure 1 , The management system of the present invention is composed of an authorization management system A, multiple encryption systems B and multiple decryption systems C which are not connected to each other. Authorization management system A is composed of encryption authorization manager 1 and decryption authorization manager 2; encryption system B is composed of encryption authorization file manager 3, data encryption manager 4 and data release manager 5; decryption system C is managed by decryption authorization file Device 6, decryption key manager 7 and data decryption manager 8. The authorization management system A performs authorization management on the encryption system B and the decryption system C, the encryption system B encrypts and releases the secret data, and the decryption system C decrypts and utilizes the secret data.

[0026] see figure 2 and image 3 , the steps of the information protection method of the present invention are:

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information protection method and a management system thereof for an unconnected system, and relates to information system field. The management system is composed of an authorization management system, multiple encryption systems and multiple decryption systems which are unconnected with each other. The authorization management system is composed of an encryption authorization manager and a decryption authorization manager; the encryption system is composed of an encryption authorization file manager, a data encryption manager and a data distribution manager; the decryption system is composed of a decryption authorization file manager, a decryption key manager and a data decryption manager. The authorization management system is used for managing the authorization of the encryption system and the decryption system, the encryption system is encrypting and distributing the confidential data, and the decryption system is used for decrypting and using the confidential data. The invention adopts dual-key asymmetric encryption technique to realize the safe transfer and illegal utilization of confidential data among unconnected systems, also guarantees the authorization safety and stability of the system.

Description

technical field [0001] The invention relates to the field of information systems, in particular to an information security protection method and a management system for disconnected systems. Background technique [0002] In the field of information, a disconnected system refers to a system without a signal or data channel directly used for information transmission and information feedback between systems. Information security protection technology for disconnected systems is a technology to ensure the safe transfer and legal use of secret data between disconnected systems. It is a challenging technology, and it needs to solve the following two problems: [0003] (1) The security protection of secret data, so that secret data can be safely transmitted, safely stored, and legally used; [0004] (2) The controllability problem of disconnected systems, so that only authorized systems can operate and use secret data. [0005] In the prior art, encryption technology can be used ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 陆驿石晶陆达
Owner TSINGHUA TONGFANG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products