Electronic record information security management system

An electronic file and information security technology, applied in the field of information security management, can solve problems such as the system is easy to be breached and reduce system security, and achieve the effect of improving security and ensuring security

Inactive Publication Date: 2016-05-04
ZHONGBEI UNIV
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, attackers can still take one-by-one attack methods, such as recording to attack the voiceprint system, vid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic record information security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] Such as figure 1 As shown, the embodiment of the present invention provides an electronic file information security management system, including

[0028] The registration module is used to generate a biometric model corresponding to the user's registration identity when the user registers, and save the biometric model into the user registration database;

[0029] The man-machine operation module is used to input palm vein data, voiceprint data, and face data, and sends these data to the biometric feature extraction module; it is used to input information calling commands;

[0030] The biometric feature extraction module is used to recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an electronic record information security management system, comprising a registering module, a man-machine operation module, a biological feature extraction module, an identity authentication module, a risk assessment module, a virus feature base, a virus real time scanning module, a system abnormity assessment module, an electronic record database with a built-in encryption module, a data isolation uploading module and a central processing unit. According to the invention, multiple verifications such as vocal print verification, face verification, palm vein verification and random secret key verification are integrated; the electronic record information security is greatly improved; meanwhile, the system is equipped with the built-in virus scanning function; once intrusion is discovered, the system built-in data protection and clear function further ensure the electronic record information security.

Description

technical field [0001] The invention relates to the field of information security management, in particular to an electronic file information security management system. Background technique [0002] The management of electronic archives information mostly adopts the traditional password method, which plays a role in protecting user information to a certain extent. However, the traditional method cannot realize the confirmation of the user's identity, but only confirms the content of the password. Once the password is stolen by others, it will lead to the leakage of file information. Moreover, users today need to use passwords in many scenarios. If different passwords are used separately, it will be easy to forget; if a unified password is used, it is easy to be stolen through other channels, such as credential stuffing attacks. Therefore, in today's fast-growing mobile Internet era, traditional encryption methods gradually show their deficiencies in security, effectiveness...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0838H04L63/0861
Inventor 田淑华宋金秀王利民彭涛郑江马富康
Owner ZHONGBEI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products