Information security detection method and system
A technology of information security and detection system, which is applied in the field of information security detection methods and systems, and can solve problems such as poor security of management system security protection technology systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] According to an embodiment of the present invention, a system embodiment of an information security detection system is provided. figure 1 is an information security detection system according to an embodiment of the present invention, such as figure 1 As shown, the information security detection system includes: an information receiving unit 102 , an authority verification unit 104 , an information detection unit 106 and an alarm unit 108 .
[0027] Wherein, the information receiving unit 102 is configured to receive information to be detected, wherein the information to be detected includes identity information and operation information. The authority verification unit 104 is configured to receive the information to be detected sent by the information receiving unit, and detect whether the identity information has the authority corresponding to the operation information, and if the identity information has authority, transmit the information to be detected to the info...
Embodiment 2
[0039] According to an embodiment of the present invention, a method embodiment of an information security detection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0040] Figure 5 is an information security detection method according to an embodiment of the present invention, such as Figure 5 As shown, the method includes the following steps:
[0041] Step S502, receiving information to be detected, wherein the information to be detected includes identity information and operation information.
[0042] Wherein, the information to be detected may be generated in response to a user's operation.
[0043] Optionally, the operation information includes on...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com