Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method for integrated security protection subsystem of mobile office system

A technology for security protection and implementation methods, applied in transmission systems, security devices, wireless communications, etc.

Active Publication Date: 2015-03-25
杭州安新立行网络科技有限公司
View PDF6 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to address the security problems existing in the existing mobile office system, starting from system login to information data generation, transmission, use, storage, etc., and by closely combining specific business function logic, a mobile The implementation method of the integrated safety protection subsystem in the office system, which makes the release of enterprise notices and news browsing safe and efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method for integrated security protection subsystem of mobile office system
  • Implementation method for integrated security protection subsystem of mobile office system
  • Implementation method for integrated security protection subsystem of mobile office system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0072] Such as figure 1 As shown, the implementation method of the integrated security protection subsystem in a mobile office system includes the triple identity authentication of the mobile client, the triple security defense of the background management system login, and the security protection closely linked to the business logic data. The specific implementation method adopts the following technical solutions:

[0073] Step 1. Three-factor authentication for smartphone user login

[0074] Such as figure 2 and image 3 As shown, in order to enhance the security of mobile client login control, effectively verify legitimate users, ensure effective access control of information systems, and at the same time protect the privacy of legitimate users and prevent others from stealing privacy, the triple identity authentication for user login includes password authentication. , face recognition authentication, pattern password authentication.

[0075] 1-1. Password authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method for an integrated security protection subsystem of a mobile office system. The implementation method includes the steps of triple mobile phone client identity authentication, triple background management system login security defense and tight service logic data security protection. The step of triple mobile phone client identity authentication includes password authentication, face recognition authentication and pattern password authentication. The step of triple background management system login security defense includes keyboard record prevention based on the simulative transmission keyboard information technology, a transparent one-time pad administrator login identity information encryption transmission mode based on RSA, and a double-factor authentication mode based on cloud pushing and combining dynamic passwords with static user names / passwords. Various kinds of security technology is transparently adopted, the data security is improved, multi-identity-authentication security defense is achieved, the access control capacity is enhanced, and notice announcement and news browsing of enterprises are safe and efficient through the integrated information security protection subsystem.

Description

technical field [0001] The invention belongs to the technical field of information security and mobile office systems, and in particular relates to a method for realizing an integrated safety protection subsystem in a set of mobile office systems. Background technique [0002] The mobile "information communication" office system mainly provides a fast and efficient internal office platform for the rapid release and exchange of enterprise notices and news, which consists of two subsystems, the front-end mobile phone client and the back-end information management system. The main functions of the front-end mobile client include: receiving news and notifications, receiving push messages, commenting, and reading replies. The main functions of the background management system include: release, review and management of information content, user management and identity verification, department group management, etc. [0003] For the mobile "information communication" without secu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06
CPCH04L63/08H04L63/083H04L63/0861H04W12/06
Inventor 吕秋云张程浩王秋华杨宝山金都马智超
Owner 杭州安新立行网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products