Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An information security management system

A management system and information security technology, applied in the direction of computer security devices, electronic digital data processing, instruments, etc., can solve the problems of release risk, easy to be closed, and cannot be directly used, so as to eliminate dynamic security risks and avoid soft Risk, the effect of avoiding hard risk

Active Publication Date: 2022-03-25
WONDERS INFORMATION
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This invention has supporting requirements for hardware, operating system and even network environment, and cannot be directly applied to general IT infrastructure environment
[0009] Chinese patent CN107888609A discloses a computer network information security system. The invention realizes the interception of conventional viruses through the virus protection system and reduces the number of computer attacks. The virus protection system is anti-virus software, and the anti-virus software runs directly on the operating system. , it is easy to be closed easily, once the anti-virus software is closed due to negligence, a large number of dangerous applications may be installed on the server, threatening the security of server resources and the internal resources of the entire network
If a system needs to be highly "safe", it will definitely restrict the application scenarios of the system, and on this basis, it will inevitably increase the user's management costs, reduce user efficiency and Willingness; and in the balance between management costs and security risks, traditional application publishing and operation and maintenance management do not involve multi-node cluster deployment. Even if there are operational errors or security problems, the scope of influence is relatively limited. Therefore, traditional information system management The release certification of the software and the subsequent online operation will not be bound to a special system for execution. Therefore, there are release risks in traditional information system management, as well as subjective and objective operational risks in the process of system operation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security management system
  • An information security management system
  • An information security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] as attached figure 1 As shown, an information security management system includes an application release module, an application release management center module, a server security agent module, and an authorization management center.

[0048] The system isolates the server operating system and applications to form a cloud information system security protection model. Isolating a server operating system involves the following steps:

[0049] (1) The system kernel is cut, and only the basic driver and boot are reserved;

[0050] (2) Customize the file system;

[0051] (3) Customize the system boot loading area, that is, the MBR loading process;

[0052] (4) Integrated system kernel, file system and boot program;

[0053] (5) Integrated system resource management, application integration management and other sub-modules;

[0054] (6) Customize the initialization process of the operating system, shield all ports except ports 80 and 443; replace the login module of the ...

Embodiment 2

[0071] This embodiment is carried out on the basis of Embodiment 1, and the same parts will not be repeated. It mainly introduces the operation process of the information security management system, as shown in the attached Figure 4 As shown in the figure, it is the flow chart of the application release of this system. As shown in the figure, specifically, when the application release module releases the application, it first generates an installation (or upgrade) package, and logs in to the application release management center module for identity authentication. After passing, the installation package (or upgrade package) will be released to the application release management center module through the interface; the application release management center module will scan the installation package (or upgrade package) for security vulnerabilities, release review, authorization management, and generate a signed installation package (or upgrade package); the application publishin...

Embodiment 3

[0074] Based on the above-mentioned embodiment 1, the application publishing of this system includes the following steps:

[0075] (1) Register the name, version, and signature key of the application system to be released in the "Application Release Management Center", the list of "server security agents" who are allowed to obtain installation and operation authorization, and the list of preset system jury members;

[0076] (2) First, it is necessary to perform MD5 calculation on the xxx_yyy.tar installation package (binary compressed package) uploaded by the application publisher, and compare it with the MD5 value recorded in the xxx_yyy.config.ini file (configuration file) uploaded together. To determine the integrity of the installation package;

[0077] (3) Start the test container and automatically deploy the installation package;

[0078] (4) Start automatic vulnerability scanning, analyze and evaluate technical vulnerabilities and security risks;

[0079] (5) Generate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to an information security management system, which includes an application release module, an application release management center module, a server security agent module, and an authorization management center; the system isolates the server operating system, applications and operating users to form a cloud information system The security protection model must pass through the mandatory access channel to manipulate and publish applications on the server operating system in the operation isolation; Subjective and objective operational risks in the process, on the premise of its own safety and reliability, the present invention considers the security protection of the operating system and application system in all aspects, and transforms the traditional information system operation management from an open, subjective The state of the system is transformed into a closed and controllable state, which greatly improves the safety of the system during operation while ensuring the flexibility of operation and maintenance.

Description

technical field [0001] The invention relates to the technical field of information system security management, in particular to an information security management system. Background technique [0002] The current trend of computer infrastructure virtualization and cloudification has gradually become the mainstream. There are a large number of third-party application systems running on some private cloud platforms. Since each server may run multiple different application instances, and an application may also be deployed as multiple instances on multiple server nodes, therefore Once a server has a security problem, it will affect the operation of multiple applications. Similarly, if an application has a security problem, it will affect more servers and other applications. [0003] In order to ensure the security of the server and the application software running on it are credible and safe, there are currently the following methods: [0004] 1. Trusted and secure computer. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74G06F21/45G06F21/57G06F21/64
CPCG06F21/45G06F21/577G06F21/64G06F21/74G06F2221/2141G06F2221/2149G06F2221/2113G06F2221/033
Inventor 徐奎东沈欢潘宁杨秋芬张鹏李志民钟南高扬董辉张凡赵世杰
Owner WONDERS INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products