Information privacy system and operation method thereof

An information security and encryption system technology, applied in the field of information security systems, can solve problems such as security risks and personal privacy violations

Active Publication Date: 2017-05-31
杭州领点科技有限公司
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the normal use of the learning platform needs to enter the information of the members of each organization, which often contains a lot of personal privacy. With the popularization of the Internet, people can easily query or even transmit and download various information, which

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy system and operation method thereof
  • Information privacy system and operation method thereof
  • Information privacy system and operation method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0057] This specific embodiment is only an explanation of the present invention, and it is not a limitation of the present invention. Those skilled in the art can make modifications to this embodiment without creative contribution as required after reading this specification, but as long as they are within the rights of the present invention All claims are protected by patent law.

[0058] An information security system disclosed in this embodiment, such as figure 1 As shown, it includes an input terminal 1 for storing files, and the input terminal 1 can be a U disk, a mobile hard disk, a mobile phone, a tablet computer, and the like.

[0059] Such as figure 1 As shown, top secret file database 2, secret file database 3 and common file database 4 are also included. Among them, the top-secret file database 2 is used to store the most important information f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information privacy system and an operation method of the information privacy system, and solves the problems that the information in a conventional work communication study platform is easily stolen. The technical scheme has a key point that the information privacy system comprises a top-secret paper database, a secret paper database, a common paper database, a supreme authority administrator access end, a common authority administrator access end, a general public access end, an authority recognition system, a first encryption system, a unified data access interface, a supreme authority administrator output end and a common authority administrator output end. According to the information privacy system and the operation method of the information privacy system, the paper data can be stored to the paper databases at different security levels according to the importance grade when stored, the corresponding authority is acquired through the authority recognition system when data in the paper database are checked and read, then the paper information stored in the corresponding paper database is checked through an external connection access device, otherwise, the paper cannot be opened, and the information security is improved.

Description

technical field [0001] The invention relates to an information security system, in particular to an information security system and an operation method thereof. Background technique [0002] In recent years, with the prevalence of various work exchange and learning platforms, the assignment and transfer of work tasks between multi-level organizations has been realized, so that the work of grassroots organizations can be fed back to the higher-level organizations in real time, and it also supports the sharing of work with other organization members , making the work between all levels more transparent, and at the same time more convenient for quantitative management, so that a good learning atmosphere can be formed between all levels. [0003] However, the normal use of the learning platform needs to enter the information of the members of each organization, which often contains a lot of personal privacy. With the popularization of the Internet, people can easily query or eve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F21/32
CPCG06F21/32G06F21/6245G06F2221/2141
Inventor 胡文彪
Owner 杭州领点科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products