Three power separation-based information security management system and information security management method

An information security and management system technology, applied in the field of information security management, can solve problems such as information security accidents and security loopholes, and achieve the effect of avoiding excessive authority and improving security and reliability

Active Publication Date: 2013-01-23
BEIJING KEXIN HUATAI INFORMATION TECH
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in today's information management operating system, the authority of administrators is paramount, so once their behavior is untrustworthy, or they make mi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three power separation-based information security management system and information security management method
  • Three power separation-based information security management system and information security management method
  • Three power separation-based information security management system and information security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to further explain the technical means and effects of the present invention to achieve the intended purpose, the specific structure and effects of the present invention will be described in detail below in conjunction with the accompanying drawings, implementation methods, and structural features.

[0035] The realization method of the present invention is to establish an information system safety management system based on the separation of three powers, construct a system management subsystem, a safety management subsystem, and an audit management subsystem to realize unified and decentralized management of the information system. According to the actual needs of safe operation of the system, the system management subsystem is responsible for user identity management, system resource configuration and operation, and emergency handling; Unified management of policies and distributed security mechanisms; the audit management subsystem is responsible for the cent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three power separation-based information security management system which comprises a system management subsystem, a security management subsystem and an auditing management subsystem, wherein the system management subsystem manages system subject resources and system object resources to generate and send a first auditing record to the auditing management subsystem, the security management subsystem uniformly marks the system subject/object resources and authorizes the system subject and manages the security policy and distributive security mechanism of the system to generate and send a second auditing record to the auditing management subsystem, the auditing management subsystem centrally manages the security auditing policy and mechanism distributed in all components of the system, and the auditing management subsystem receives and manages the first and second auditing record and generates the system auditing record. Therefore, the information security management system is distinguished as the decentralized management of the three subsystems, the management authority of the subsystems is distributed, mutual authority restriction relationship is formed among the subsystems, and the information security and management reliability can be improved.

Description

【Technical field】 [0001] The invention relates to the field of computer information security, in particular to an information security management system based on the separation of three powers and an information security management method based on the information security management system. 【Background technique】 [0002] The security management of information system in the construction of informatization has aroused great attention of the country. Information system security management is not just a matter of management system and technology, but an organic collection of strategy, management and technology. Comprehensively constructing and standardizing information security from the height of security management system will effectively guarantee the security of my country's information system. [0003] Strict information system security management is the basic guarantee for system security functions to achieve security goals during operation. However, in today's informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
Inventor 沈军
Owner BEIJING KEXIN HUATAI INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products