Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A comprehensive audit method for information security

A technology for information security and key information, applied in the field of electric power, can solve the problems of contact, information security comprehensive audit system administrator's heavy workload, etc., to achieve the effect of strong correlation, full tracking, and simplified workflow

Active Publication Date: 2016-08-24
STATE GRID ZHEJIANG ELECTRIC POWER +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] First of all, after the user approves through one order and two votes, he needs to notify the administrator of the information security comprehensive audit system to perform a series of operations such as user creation, asset addition, and authorization grant; after that, the user can perform system maintenance operations, so that the information security comprehensive Excessive workload for audit system administrators
[0009] In addition, if the user enters the wrong resource application number when performing maintenance operations, the audit records in the information security comprehensive audit system will not be able to correctly link with the correct resource application, resulting in evasion of responsibility for subsequent operations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A comprehensive audit method for information security
  • A comprehensive audit method for information security
  • A comprehensive audit method for information security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0035] In order to improve the efficiency and accuracy of information security comprehensive audit, such as figure 1 As shown, the embodiment of the present invention provides a comprehensive information security audit method, including:

[0036] S11. Integrate Web Service in the information security comprehensive audit system in advance, and create a Web Service interface for the system of one ticket and two bills;

[0037] Web Service is an application comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security comprehensive audit method, comprising: pre-integrating Web Service in the information security comprehensive audit system, and creating a Web Service interface for the one-ticket-two-bill system; The key information of the user is sent to the information security comprehensive audit system; the information security comprehensive audit system stores the key information; the key information includes the user ID; when it is necessary to apply for operation and maintenance authorization for the user, through the Web Service interface, the system will The host information and account information of the operation and maintenance host are sent to the information security comprehensive audit system; the information security comprehensive audit system establishes the user's operation and maintenance authorization. The invention improves the accuracy rate of the audit in the information security comprehensive audit work, effectively reduces the workload of the administrator of the information security comprehensive audit system, and improves the work efficiency.

Description

technical field [0001] The invention relates to the field of electric power, in particular to an information security comprehensive audit method. Background technique [0002] The two tickets (operation ticket, work ticket) are important operating basis for safe production of power system. One order and two tickets system includes the management of more than 20 resource application forms, work tickets and operation tickets, and also covers duty management, inspection and defect management. Through the organic association of work tickets, operation tickets and resource application forms, information operation and maintenance personnel can understand the system changes more comprehensively, integrate inspection work, and facilitate daily operation and maintenance management. [0003] The application of the system of one order and two tickets makes the operation process of the information system more standardized. At the same time, the information security comprehensive audit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06G06Q50/06H04L29/08
Inventor 王红凯陈建洪建光盛华挺张旭东戴波蒋鸿城梅峰姚一杨沈潇军
Owner STATE GRID ZHEJIANG ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products