A method and system for integrated management of information security equipment based on transparent computing

A transparent computing and information security technology, applied in computer security devices, computing, electronic digital data processing, etc., to achieve strong adaptability and scalability

Active Publication Date: 2017-07-07
STATE GRID CORP OF CHINA +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It is against this background that the present invention introduces the theory of transparent computing into the field of integrated management of information security equipment, provides a method for integrated management of information security equipment based on transparent computing, and reduces the number of tasks due to security policies, security technologies, etc. The level of complexity brought to information security device management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for integrated management of information security equipment based on transparent computing
  • A method and system for integrated management of information security equipment based on transparent computing
  • A method and system for integrated management of information security equipment based on transparent computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Below in conjunction with embodiment, further illustrate the present invention.

[0037] like figure 1 As shown, the integrated management architecture of information security equipment based on transparent computing includes transparent computing client, transparent computing integrated management platform, and information security equipment.

[0038] like figure 2As shown, the transparent computing client includes an identity verification module, a permission receiving module, and a device calling module; the identity verification module is used to verify the current user to ensure the legitimacy of the current user; the permission receiving module is used to receive information from the transparent computing integrated The user can operate a security device only if the information security device grants the authority to the user through the integrated management platform; the device call module is used when the user operates the device. The information from the in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a transparent-computing-based integrated management method and system for information safety equipment, which are suitable for safety officers of information systems to manage information safety equipment. The integrated management method comprises three steps including an initialization stage of a transparent-computing integrated management platform, a user operation stage, a transparent-computing migration stage. The integrated management system comprises a transparent-computing client subsystem, a transparent-computing integrated management subsystem and an information safety subsystem. The transparent-computing-based integrated management method and system break through the bottlenecks that an operating system is diversified in equipment and non-unified in security policy, realize end-to-end transparent management, and reduces complexity in managing the information safety equipment due to multi-aspect tasks of security policy, safety technique and the like.

Description

technical field [0001] The invention relates to the field of integrated management of information security equipment, in particular to a method and system for integrated management of information security equipment based on transparent computing. Background technique [0002] With the rapid development of computer technology and the continuous deepening of the company's informatization process, information security has reached an unprecedented height. Information security equipment is increasing, with increasingly powerful functions, and security strategies are becoming more and more complex. At present, when all security devices are in use, they must be operated through their unique hardware interfaces, otherwise they will not work normally. For security personnel who manage information security devices, they only care about how to directly operate various security devices through terminal devices, and do not want to pay attention to their device interfaces, hardware config...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/604G06F21/6209G06F2221/2141
Inventor 李晓光张义丁玉坤赵玉敬马莉杜宁宁韩雅菲周伟李晓亮
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products