Information security encryption and number hiding system

An information security and number technology, applied in the field of information security, can solve problems such as company loss, loss, and customer information leakage, and achieve the effect of protecting resources, facilitating control, and ensuring customer resources

Active Publication Date: 2018-10-12
我要家网络科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Customer information is a valuable resource for any company, but company customers must be maintained by employees, resulting in the leakage of customer information to employees. In this way, if employees leave or mismanage, it is likely to lead to the loss of most customer information. Leakage and loss, which will bring immeasurable losses to the company

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] An information security encryption hidden number system proposed by the present invention includes: a master database, a shared client and a computer client.

[0021] The master database is used to store customer information, including customer identity information and customer phone numbers. Customer identification information includes customer name and customer company name. In this way, identification by the customer's company name can avoid information confusion of customers with duplicate names. In this embodiment, the master database is stored on the server.

[0022] The shared client is installed on the mobile phone and connected to the master database to obtain customer information in the master database and encrypt and hide the customer phone number. In this embodiment, the sharing client logs in through an account, and after each account is logged in, the corresponding customer information is obtained according to the authority and displayed on the sharing c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security encryption and number hiding system, comprising a primary database and a shared client. The information security encryption and number hiding system provided by the invention assists a process of dialing a mobile phone by an employee by virtue of the shared client, so that the effect that the employee can conveniently and rapidly make or answer customer calls and send and receive messages is guaranteed, the employee also can conveniently identify customers by virtue of identifications for customer names, and service quality is improved; and the effect that phone numbers of the customers are confidential to the employee is also guaranteed, and security of customer information is guaranteed, so that resources of a company are protected, and security risks of the company are greatly reduced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an information security encryption hidden number system. Background technique [0002] Customer information is a valuable resource for any company, but company customers must be maintained by employees, resulting in the leakage of customer information to employees. In this way, if employees leave or mismanage, it is likely to lead to the loss of most customer information. Leakage and loss will bring immeasurable losses to the company. Therefore, how to hide customer information from employees without affecting the communication between employees and customers is very important, and it is also a protective measure that a company that requires information security should do. Contents of the invention [0003] Based on the technical problems existing in the background technology, the present invention proposes an information security encryption hidden number system; ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04M1/725G06F21/60H04W4/14
CPCG06F21/602H04M3/42008H04W4/14H04W12/02H04M1/72484
Inventor 熊兵刚
Owner 我要家网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products