Enterprise economic management information safety system

A technology of information security system and economic management, applied in the field of enterprise economic management system, can solve the problems of easy system being breached, reduce system security, etc., and achieve the effect of improving security and improving security system

Inactive Publication Date: 2017-12-08
ZIBO VOCATIONAL INST
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, attackers can still use one-by-one attack methods, such as recording to attack the voiceprint system, video t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise economic management information safety system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.

[0024] see figure 1 , the present embodiment adopts the following technical solutions:

[0025] An enterprise economic management information security system, comprising

[0026] The user registration module is used to generate a biometric model corresponding to the user registration identity when the user registers, and save the biometric model in the user registration database;

[0027] The vulnerability detection module is used to detect the system vulnerabilities, install patches in time, enhance compatibility, plug the discovered security holes, and prevent the inva...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an enterprise economic management information security system, which includes a user registration module, which is used to generate a biometric model corresponding to the user's registration identity when the user registers, and save the biometric model in a user registration database; Vulnerability detection module is used to detect system vulnerabilities, install patches in time, enhance compatibility, plug the discovered security holes, and prevent virus invasion; virus prevention module is used to prevent viruses in the system and prevent the use of foreign CDs , mobile hard disk, U disk and other storage devices; the present invention improves the security system of the system through real-time loophole detection, virus prevention, killing and isolation of the system, and further improves the security of the system by controlling the transmission of data and the security of the enterprise database. Information Security.

Description

technical field [0001] The present invention relates to the technical field of enterprise economic management system, specifically an enterprise economic management information security system. Background technique [0002] The management of enterprise economic management information mostly adopts the traditional password method. This method protects user information to a certain extent. However, the traditional method cannot realize the confirmation of the user's identity, but only confirms the content of the password. , once the password is stolen by others, it will lead to information leakage. Moreover, users today need to use passwords in many scenarios. If different passwords are used separately, it will be easy to forget; if a unified password is used, it is easy to be stolen through other channels, such as credential stuffing attacks. Therefore, in today's fast-growing mobile Internet era, traditional encryption methods gradually show their deficiencies in security, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56G06F21/57G06F21/62G06F21/31G06F21/32
CPCG06F21/56G06F21/31G06F21/32G06F21/566G06F21/568G06F21/577G06F21/6218
Inventor 周婕
Owner ZIBO VOCATIONAL INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products