General security protection system for interactive data system

A technology for interactive data and security protection, applied in the field of interactive data visualization applications, to achieve the effects of saving development resources, improving development efficiency, and high reusability

Active Publication Date: 2017-09-26
CHENGDU SEFON SOFTWARE CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to overcome the problem in the prior art that it is necessary to do customized development for different security requirements of each different WEB system. Universal security protection system for interactive data WEB system for protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General security protection system for interactive data system
  • General security protection system for interactive data system
  • General security protection system for interactive data system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. However, it should not be understood that the scope of the above subject matter of the present invention is limited to the following embodiments, and all technologies realized based on the content of the present invention belong to the scope of the present invention.

[0036] like figure 1 As shown, the present embodiment provides a general security protection system for an interactive data system, which includes in turn,

[0037] The data input interface is connected with the human-computer interaction input of the interactive data system;

[0038] The protection module is used to perform security detection on the data input by the sub-data input interface, and output the data that has passed the security detection from the data output interface;

[0039] The data output interface is connected with the data processing module of the i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of visualization application of interactive data, in particular to a general security protection system for an interactive data system. By the aid of the general security protection system for the interactive data system, a service arrangement worker can dock an interface of the provided security system with the interactive data system on the premise that the service arrangement worker only needs to know functions, the interface and the use method provided by the security protection system without knowing specific development technologies of the security system, so that the worker can independently arrange an interactive data WEB application system with security capability. As for the interactive data application platform realizing data visualization, the provided security system adopts loose coupling design and is divided into multiple independent modules, the modules can be organically combined together only if the platform has the module expansion capability, and the WEB application system with security capability is generated.

Description

technical field [0001] The invention relates to the application field of interactive data visualization, in particular to a general safety protection system for interactive data systems. Background technique [0002] The security of the application system has attracted more and more people's attention. Using the loopholes of the WEB application system to intrude and infiltrate has become one of the hidden dangers of Internet security. How to ensure system security and enterprise core data from damage has become the focus of the enterprise information department. question. [0003] Information security of software systems, including information confidentiality, integrity and availability. Confidentiality: High-level information flows to low-level clients only under authorization; Integrity: Information will not be modified without authorization, and information remains consistent; Availability: Normal requests from legitimate users can be timely, correct, and get service or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/0807H04L63/0876H04L63/1416H04L63/1466
Inventor 王纯斌张艳尹寿长赵神州王建洪
Owner CHENGDU SEFON SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products