Method for protecting security of visualized information system
A security protection and information system technology, applied in the field of security protection for visual information systems, can solve problems that cannot be fully applied to visual information systems, and achieve the effects of reliable data storage and application, safe collection, and perfect security systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0051] The present invention will be further described in detail below in conjunction with the drawings:
[0052] A method of security protection for visual information systems, which includes security protection for the first-level monitoring center (third-party government monitoring center is the first-level monitoring center), and the second-level enterprise internal network (which specifically refers to cold The internal network management system of each enterprise in the chain process) performs security protection and the third-level data collection terminal (refers to the data collection terminal of video data, temperature and humidity data, and item RFID data information); in the design of the visual information system , Fully consider the system's high reliability, availability, performance and interconnection. The invention is a safety guarantee system that can effectively guarantee terminal safety, communication safety, and data confidentiality, integrity and authentici...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap