Enterprise economic management information security system

An information security system and economic management technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve problems such as easy to break the system, reduce system security, etc., achieve traceability, improve security, Guaranteed safety effect

Inactive Publication Date: 2016-09-28
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF8 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, attackers can still use one-by-one attack methods, such as recording to attack the voiceprint system, video t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise economic management information security system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the objects and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0029] Such as figure 1 As shown, the embodiment of the present invention provides an enterprise economic management information security system, including

[0030] The registration module is used to generate a biometric model corresponding to the user's registration identity when the user registers, and save the biometric model into the user registration database;

[0031] The man-machine operation module is used to input all relevant data that occurs during the execution of enterprise economic management, and sends the input related data to the data processing module; it is used to input palm vein data and voiceprint data, and transfer these ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise economic management information security system, which includes a registration module, a man-machine operation module, an identity authentication module, a central processing unit, a data processing module, an enterprise economic management information database, a virus feature database, a regular inspection module, a virus Feature matching module, system anomaly evaluation module, data isolation upload module and data analysis module. The present invention integrates voiceprint verification and palm vein verification, which greatly improves the security of information. At the same time, it has a virus scanning function. Once an intrusion is found, the system has a data protection and clearing function, which further ensures the security of electronic file information. Each data entry carries the identity information of the person who entered it, which realizes the traceability of the data, and has its own data analysis and statistics function, which provides a basis for enterprise economic management decision-making.

Description

technical field [0001] The invention relates to the field of enterprise economic management, in particular to an enterprise economic management information security system. Background technique [0002] The management of enterprise economic management information mostly adopts the traditional password method. This method protects user information to a certain extent. However, the traditional method cannot realize the confirmation of the user's identity, but only confirms the content of the password. , once the password is stolen by others, it will lead to information leakage. Moreover, users today need to use passwords in many scenarios. If different passwords are used separately, it will be easy to forget; if a unified password is used, it is easy to be stolen through other channels, such as credential stuffing attacks. Therefore, in today's fast-growing mobile Internet era, traditional encryption methods gradually show their deficiencies in security, effectiveness, and co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/56
CPCG06F21/32G06F21/568
Inventor 李治国
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products