Enterprise information security management system and method

A technology for enterprise information and security management, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as high requirements for network administrators, complex implementation, and inconvenience for network administrators, and achieve simple network security management and reduced costs and complexity, the effect of reducing complexity

Inactive Publication Date: 2013-09-04
BEIJING QIANXIN TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the terminal-side software of the existing enterprise information security management software is inconvenient to manage, which brings inconvenience to the network administrator to a large extent, and it is not convenient for the network administrator to handle the security status in real time in an emergency
Moreover, the enterprise information security management software based on the CS architecture relies on the operating system or even the hardware plat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise information security management system and method
  • Enterprise information security management system and method
  • Enterprise information security management system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] Example one

[0032] Reference figure 1 , Shows a structural block diagram of an enterprise information security management system according to the first embodiment of the present invention.

[0033] The enterprise information security management system of this embodiment is set in an enterprise intranet, and the system includes: a WEB server 102 in the enterprise intranet, a target server 104 in the enterprise intranet, and a target terminal 106 in the enterprise intranet. Generally speaking, the enterprise information security management system includes both the target server 104 and the target terminal 106, but it is not limited to this. In some cases, it may include only the target server 104 or only the target terminal 106.

[0034] among them,

[0035] The WEB server 102 is used to receive the enterprise information security management instruction entered by the user through the WEB page, and determine the target server and / or target terminal of the enterprise information...

Example Embodiment

[0040] Example two

[0041] Reference figure 2 , Shows a structural block diagram of an enterprise information security management system according to the second embodiment of the present invention.

[0042] The enterprise information security management system of this embodiment is set in an enterprise intranet. In addition to the WEB server 202 and a plurality of terminals 204, the system also includes a file server 206, a database server 208, and a publishing server 210. It should be noted that in this embodiment, the file server 206, the database server 208, and the publishing server 210 exist at the same time, but in actual applications, one or some of them can be set as needed. Of course, more can be set as needed. Server, and can refer to this embodiment to implement corresponding enterprise information security management functions. Each of the foregoing servers in this embodiment may include one or more.

[0043] In the enterprise information security management system of...

Example Embodiment

[0056] Example three

[0057] Reference image 3 , Shows a schematic structural diagram of an enterprise information security management system according to the third embodiment of the present invention.

[0058] The enterprise information security management of this embodiment is set in the enterprise intranet, and the system includes: a WEB server 302, a plurality of terminals 304, a file server 306, a database server 308, a publishing server 310, and a control server 312.

[0059] Such as image 3 As shown, the file server 306, the database server 308, the publishing server 310, and the control server 312 are all connected to the WEB server 302, and multiple terminals 304 are connected to the publishing server 310.

[0060] In this embodiment, the control server 312 accesses the WEB server 302 to show the user an enterprise information security management page for the user (in this embodiment, the network administrator) to input an enterprise information security management instruct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an enterprise information security management system and an enterprise information security management method. The enterprise information security management system comprises a WEB server of an enterprise intranet, and a target server and/or a target terminal, wherein the WEB server is used for receiving an enterprise information security management command input by a user through a WEB page and determining the target server and/or the target terminal of the enterprise information security management command according to service logic for carrying enterprise information security management, which is deployed in the WEB server, and sending the enterprise information security management command to the target server and/or the target terminal determined in the enterprise intranet; and the target server and/or the target terminal is used for receiving the enterprise information security management command, executing enterprise information security management operation indicated by the enterprise information security management command according to a set strategy and returning an executive result to the WEB server. By the invention, the complexity of enterprise security management is reduced, and the maintenance cost is reduced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an enterprise information security management system and method. Background technique [0002] Enterprise information security management software is a kind of information security management software used by enterprises in order to meet the needs of the market, improve safety production management methods, and improve safety production management levels. It uses computer information technology to integrate the main elements of the safety management system into different functional modules. Enterprise information security management software can cover the basic content of enterprise safety production management, and is widely used in various enterprise safety management. [0003] At present, enterprise information security management software is based on CS architecture, that is to say, terminals using enterprise information security management software need to have correspond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 苏云琳黄鉴廷邓振波
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products