Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enterprise information security management system and method

A technology for enterprise information and security management, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as high requirements for network administrators, complex implementation, and inconvenience for network administrators, and achieve simple network security management and reduced costs and complexity, the effect of reducing complexity

Inactive Publication Date: 2013-09-04
BEIJING QIANXIN TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the terminal-side software of the existing enterprise information security management software is inconvenient to manage, which brings inconvenience to the network administrator to a large extent, and it is not convenient for the network administrator to handle the security status in real time in an emergency
Moreover, the enterprise information security management software based on the CS architecture relies on the operating system or even the hardware platform, and has high requirements for network administrators; it is difficult to develop management applications and integrate new technologies; when the network scale is large, the load and management of the management system The communication overhead is greatly increased, which makes the implementation of enterprise information security management complex and costly in the face of computer networks with increasingly strong heterogeneity and rapidly expanding network scale

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise information security management system and method
  • Enterprise information security management system and method
  • Enterprise information security management system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] refer to figure 1 , shows a structural block diagram of an enterprise information security management system according to Embodiment 1 of the present invention.

[0033] The enterprise information security management system of this embodiment is set in the enterprise intranet, and the system includes: a WEB server 102 of the enterprise intranet, a target server 104 of the enterprise intranet, and a target terminal 106 of the enterprise intranet. Generally speaking, the enterprise information security management system includes both the target server 104 and the target terminal 106 , but is not limited thereto. In some cases, it may only include the target server 104 or only the target terminal 106 .

[0034] in,

[0035] The WEB server 102 is used to receive the enterprise information security management instruction input by the user through the WEB page, and determine the target server and / or target terminal of the enterprise information security management instructio...

Embodiment 2

[0041] refer to figure 2 , shows a structural block diagram of an enterprise information security management system according to Embodiment 2 of the present invention.

[0042] The enterprise information security management system of this embodiment is set in the enterprise intranet, and the system includes a file server 206, a database server 208, and a publishing server 210 in addition to a WEB server 202 and a plurality of terminals 204. It should be noted that, in this embodiment, the file server 206, the database server 208, and the publishing server 210 exist at the same time, but in practical applications, one or some of them can be selected as needed, and of course, more can also be set as needed. server, and can implement corresponding enterprise information security management functions with reference to this embodiment. Each of the foregoing servers in this embodiment may include one or more.

[0043] In the enterprise information security management system of th...

Embodiment 3

[0057] refer to image 3 , shows a schematic structural diagram of an enterprise information security management system according to Embodiment 3 of the present invention.

[0058] The enterprise information security management in this embodiment is set in the enterprise intranet, and the system includes: WEB server 302 , multiple terminals 304 , file server 306 , database server 308 , publishing server 310 , and control server 312 .

[0059] Such as image 3 As shown, the file server 306 , the database server 308 , the distribution server 310 , and the control server 312 are all connected to the WEB server 302 , and a plurality of terminals 304 are connected to the distribution server 310 .

[0060] In this embodiment, the control server 312 accesses the WEB server 302, presents the enterprise information security management page to the user, for the user (the network administrator in this embodiment) to input the enterprise information security management instruction, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an enterprise information security management system and an enterprise information security management method. The enterprise information security management system comprises a WEB server of an enterprise intranet, and a target server and / or a target terminal, wherein the WEB server is used for receiving an enterprise information security management command input by a user through a WEB page and determining the target server and / or the target terminal of the enterprise information security management command according to service logic for carrying enterprise information security management, which is deployed in the WEB server, and sending the enterprise information security management command to the target server and / or the target terminal determined in the enterprise intranet; and the target server and / or the target terminal is used for receiving the enterprise information security management command, executing enterprise information security management operation indicated by the enterprise information security management command according to a set strategy and returning an executive result to the WEB server. By the invention, the complexity of enterprise security management is reduced, and the maintenance cost is reduced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an enterprise information security management system and method. Background technique [0002] Enterprise information security management software is a kind of information security management software used by enterprises in order to meet the needs of the market, improve safety production management methods, and improve safety production management levels. It uses computer information technology to integrate the main elements of the safety management system into different functional modules. Enterprise information security management software can cover the basic content of enterprise safety production management, and is widely used in various enterprise safety management. [0003] At present, enterprise information security management software is based on CS architecture, that is to say, terminals using enterprise information security management software need to have correspond...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 苏云琳黄鉴廷邓振波
Owner BEIJING QIANXIN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products