Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information leakage testing control method, device and system and information channel safety certification device

A technology of security authentication and information channel, which is applied in the field of information channel security authentication device and information leakage prosecution, and can solve problems such as single security authentication measures, channel information is easily intercepted, and information counterfeiting

Active Publication Date: 2014-01-01
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. The security authentication measures of the information channel to realize the exchange of information between the two parties are usually relatively single, and fail to provide the function of free selection of multiple security authentication methods, and the convenience and flexibility of security authentication are poor
In addition, there is no function to check the legality of the certificate holder for technical security authentication, and there is a security risk of only authenticating passwords and certificates but not authenticating persons and equipment.
[0004] 2. Under the existing technical conditions, the security authentication information channel and the data information exchange channel for implementing information exchange are not separated, they are shared and shared, the channel information is easily intercepted, and the security authentication device and its control system are easy to be attacked by the network, which in turn leads to system failure. infiltration disaster
[0005] 3. The technical method of information exchange and processing under the existing technical conditions does not carry out technical processing such as automatic data source identification, format matching screening, confidential data transformation, encryption and decryption, disassembly and assembly of data information at the front-end boundary of the interface and security inspection, so it is easy to cause incidents such as illegal connection, information leakage and information counterfeiting
[0006] Therefore, the data information exchange processing system and processing technical methods under the existing technical conditions not only have some functional deficiencies, but also have obvious technical safety hazards, which are not only inconvenient to use, but also have high operating costs and serious waste of resources.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information leakage testing control method, device and system and information channel safety certification device
  • Information leakage testing control method, device and system and information channel safety certification device
  • Information leakage testing control method, device and system and information channel safety certification device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0082]Such as figure 1 As shown, the embodiment of the present invention provides an information leakage prosecution system, the system includes: an information channel security authentication device 100, at least one biometric access control device 200, at least one front-end processor 300, and at least one business information prosecution processing server 400, at least one short WeChat processing server 500, user application server 600 and multiple user POS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information leakage testing control method, device and system and an information channel safety certification device. The method comprises the steps of sending an information channel safety certification service request to a service information testing control processing server through a front-end processor, receiving information with the information source recognition function and a timestamp to send a dynamic electronic license, receiving user data information of POS equipment, conducting automatic recognition and checking on information source recognition characteristic parameter values, transmission information formats and content characteristic parameter values of the user data information, memorizing POS information source identification and information encoding in the user data information, reestablishing a retrieval tag, sending user upper-sending server processing data information to a short-micro message processing server in a split-channel mode, receiving short-micro messages fed back by the service information testing control processing server to conduct analyzing and splitting, converting information source equipment characteristics in the short-micro messages in a reversed mode to be transformed into original information source equipment characteristics in the user data information, and reassembling the short-micro messages to be fed back to a user application server.

Description

technical field [0001] The present invention relates to network data communication technology, in particular to an information leak detection and control method, device, system and information channel security authentication device. Background technique [0002] Under the current technical conditions, in order to realize the data information interaction and sharing between the user application system and the information exchange service application system, the method of network interconnection is often adopted to achieve the purpose of data exchange and interactive processing. The information will be transmitted through the network and system of the other party, and sometimes the two parties have to share some technologies or data processing algorithms, so there are the following technical security risks or functional deficiencies: [0003] 1. The security authentication measures of the information channel to realize the information exchange between the two parties are usual...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 董宏勋肖平沈新力邢雷袁萍戚光亚肖凯提王睿高健李宗俐
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products