Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security detection method and system

A technology of information security and detection system, which is applied in the field of information security detection methods and systems, and can solve problems such as poor security of management system security protection technology systems

Inactive Publication Date: 2016-04-13
STATE GRID BEIJING ELECTRIC POWER +1
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an information security detection method and system to at least solve the technical problem of poor system security caused by the lack of security protection technology for the management system in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security detection method and system
  • Information security detection method and system
  • Information security detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to an embodiment of the present invention, a system embodiment of an information security detection system is provided. figure 1 is an information security detection system according to an embodiment of the present invention, such as figure 1 As shown, the information security detection system includes: an information receiving unit 102 , an authority verification unit 104 , an information detection unit 106 and an alarm unit 108 .

[0027] Wherein, the information receiving unit 102 is configured to receive information to be detected, wherein the information to be detected includes identity information and operation information. The authority verification unit 104 is configured to receive the information to be detected sent by the information receiving unit, and detect whether the identity information has the authority corresponding to the operation information, and if the identity information has authority, transmit the information to be detected to the info...

Embodiment 2

[0039] According to an embodiment of the present invention, a method embodiment of an information security detection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0040] Figure 5 is an information security detection method according to an embodiment of the present invention, such as Figure 5 As shown, the method includes the following steps:

[0041] Step S502, receiving information to be detected, wherein the information to be detected includes identity information and operation information.

[0042] Wherein, the information to be detected may be generated in response to a user's operation.

[0043] Optionally, the operation information includes on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security detection method and system. The system comprises an information receiving unit, a permission checkout unit, an information detection unit and an alarming unit, wherein the information receiving unit is used for receiving information to be detected, wherein the information to be detected comprises identity information and operation information; the permission checkout unit is used for detecting whether the identity information has a permission corresponding to the operation information, transmitting the information to be detected to the information detection unit under a situation that the identity information has the permission, and sending a first alarming instruction which contains the identity information to the alarming unit under the situation that the identity information does not have the permission; the information detection unit is used for detecting whether the occurrence frequency of the operation information exceeds a preset threshold value or not, and sending a second alarming instruction which contains the operation information to the alarming unit under the condition that the occurrence frequency exceeds the preset threshold value; and the alarming unit is used for giving an alarm on the basis of the first alarming instruction or the second alarming instruction. The technical problem of poor system security since no security protection technologies which aim at a management system are in the presence in the prior art is solved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an information security detection method and system. Background technique [0002] With the rapid development of Internet technology, information security is particularly important. In order to strengthen the construction of the workforce, improve employees' safety awareness, and effectively control people's unsafe behaviors and factors, it is necessary to establish a management system for personnel, enterprises, projects, and violation approval, so that the company and all grassroots units can fully grasp the construction units and construction personnel. , Basic information of construction projects. [0003] However, the prior art does not have a security protection technology for the management system, which may easily lead to malicious tampering or theft of system data and poor system security. [0004] For the above problems, no effective solution has been propo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/31
CPCG06F21/6218G06F21/31
Inventor 尹康赵广怀周霖靳松华李鹏张川罗旭明尚斌
Owner STATE GRID BEIJING ELECTRIC POWER
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products