Enterprise information security management system and method
A technology for enterprise information and security management, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as high requirements for network administrators, complex implementation, and inconvenience for network administrators, and achieve simple network security management and reduced costs and complexity, the effect of reducing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0031] Example one
[0032] Reference figure 1 , Shows a structural block diagram of an enterprise information security management system according to the first embodiment of the present invention.
[0033] The enterprise information security management system of this embodiment is set in an enterprise intranet, and the system includes: a WEB server 102 in the enterprise intranet, a target server 104 in the enterprise intranet, and a target terminal 106 in the enterprise intranet. Generally speaking, the enterprise information security management system includes both the target server 104 and the target terminal 106, but it is not limited to this. In some cases, it may include only the target server 104 or only the target terminal 106.
[0034] among them,
[0035] The WEB server 102 is used to receive the enterprise information security management instruction entered by the user through the WEB page, and determine the target server and / or target terminal of the enterprise information...
Example Embodiment
[0040] Example two
[0041] Reference figure 2 , Shows a structural block diagram of an enterprise information security management system according to the second embodiment of the present invention.
[0042] The enterprise information security management system of this embodiment is set in an enterprise intranet. In addition to the WEB server 202 and a plurality of terminals 204, the system also includes a file server 206, a database server 208, and a publishing server 210. It should be noted that in this embodiment, the file server 206, the database server 208, and the publishing server 210 exist at the same time, but in actual applications, one or some of them can be set as needed. Of course, more can be set as needed. Server, and can refer to this embodiment to implement corresponding enterprise information security management functions. Each of the foregoing servers in this embodiment may include one or more.
[0043] In the enterprise information security management system of...
Example Embodiment
[0056] Example three
[0057] Reference image 3 , Shows a schematic structural diagram of an enterprise information security management system according to the third embodiment of the present invention.
[0058] The enterprise information security management of this embodiment is set in the enterprise intranet, and the system includes: a WEB server 302, a plurality of terminals 304, a file server 306, a database server 308, a publishing server 310, and a control server 312.
[0059] Such as image 3 As shown, the file server 306, the database server 308, the publishing server 310, and the control server 312 are all connected to the WEB server 302, and multiple terminals 304 are connected to the publishing server 310.
[0060] In this embodiment, the control server 312 accesses the WEB server 302 to show the user an enterprise information security management page for the user (in this embodiment, the network administrator) to input an enterprise information security management instruct...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap