Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Comprehensive information-security audit method

A technology for information security and key information, applied in the field of electric power, can solve the problems of contact and the large workload of information security comprehensive audit system administrators, achieve strong correlation, achieve full tracking, and improve the accuracy of auditing

Active Publication Date: 2012-07-11
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] First of all, after the user approves through one order and two votes, he needs to notify the administrator of the information security comprehensive audit system to perform a series of operations such as user creation, asset addition, and authorization grant; after that, the user can perform system maintenance operations, so that the information security comprehensive Excessive workload for audit system administrators
[0009] In addition, if the user enters the wrong resource application number when performing maintenance operations, the audit records in the information security comprehensive audit system will not be able to correctly link with the correct resource application, resulting in evasion of responsibility for subsequent operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Comprehensive information-security audit method
  • Comprehensive information-security audit method
  • Comprehensive information-security audit method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] In order to improve the efficiency and accuracy of information security comprehensive audit, such as figure 1 As shown, the embodiment of the present invention provides a comprehensive information security audit method, including:

[0036] S11. Integrate Web Service in the information security comprehensive audit system in advance, and create a Web Service interface for the system of one ticket and two bills;

[0037] Web Service is an application comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a comprehensive information-security audit method which comprises the following steps: integrating a Web Service on a comprehensive information-security audit system in advance, and creating a Web Service interface for a single-note two-list system; sending the created key information of a user to the comprehensive information-security audit system by the Web Service interface in the single-note two-list system, wherein the key information of the user includes the identifier of the user; storing the key information of the user by the comprehensive information-security audit system; sending the information and the account information of an operation and maintenance host to the comprehensive information-security audit system by the Web Service interface in the single-note two-list system when the operation and maintenance authorization needs to be applied for the user; and creating the operation and maintenance authorization of the user by the comprehensive information-security audit system. Due to the adoption of the comprehensive information-security audit method, the comprehensive information-security audit accuracy is improved, and in addition, the work load of a comprehensive information-security audit system manager is effectively reduced and the work efficiency is improved.

Description

technical field [0001] The invention relates to the field of electric power, in particular to an information security comprehensive audit method. Background technique [0002] The two tickets (operation ticket, work ticket) are important operating basis for safe production of power system. One order and two tickets system includes the management of more than 20 resource application forms, work tickets and operation tickets, and also covers duty management, inspection and defect management. Through the organic association of work tickets, operation tickets and resource application forms, information operation and maintenance personnel can understand the system changes more comprehensively, integrate inspection work, and facilitate daily operation and maintenance management. [0003] The application of the system of one order and two tickets makes the operation process of the information system more standardized. At the same time, the information security comprehensive audit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06Q50/06H04L29/08
Inventor 王红凯陈建洪建光盛华挺张旭东戴波蒋鸿城梅峰姚一杨沈潇军
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products