Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management system

A management system and data security technology, applied in the field of data security management system, can solve problems such as poor security, and achieve the effect of improving security

Active Publication Date: 2019-03-15
WENZHOU BOYING TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the disadvantages of poor security in the prior art, and propose a data security management system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management system
  • Data security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention.

[0019] refer to Figure 1-2 , a data security management system, including a security monitoring host, the security monitoring host is connected to a plurality of encryption transmission modules through a network, the security monitoring host performs security monitoring on the data transmitted in the plurality of encryption transmission modules, and the encryption transmission modules are separated through the network It is connected with the remote client and the cloud database. The encrypted transmission module is used to encrypt the data between the user and the cloud database to ensure the security of data transmission. The cloud database is connected to the clou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of data security management technology, and particularly to a data security management system. The system includes a security monitoring host. The security monitoring host is connected with multiple encryption transmission modules through a network. The encryption transmission modules are all respectively connected with a remote use end and a cloud database through the network. The cloud database is connected with a cloud computing module through the network. The encryption transmission modules are all connected with an encryption algorithm database through the network. The security monitoring host is connected with an identity verification module through a line conductor. According to the system, the encryption algorithm database is set, transmitted datasegments are encrypted through randomly acquired encryption algorithms, then decryption is carried out through identity verification on users, and security of data transmission is improved.

Description

technical field [0001] The invention relates to the technical field of data security management, in particular to a data security management system. Background technique [0002] With the rapid development of information network technology, the ecological chain of cloud computing is becoming more and more perfect, and cloud computing has become a high-value productivity tool. [0003] At present, more and more government agencies, enterprises, institutions, and individuals are beginning to migrate their applications to the cloud, achieving a balance between their own business needs and optimal allocation of resources; however, due to data security concerns, few core business applications are migrated to the cloud. cloud. [0004] Moreover, although the data transmission process in the prior art adopts encrypted transmission, there is often only one encryption method, which is vulnerable to attacks and leaks, and the security is average. Therefore, a data security managemen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32G06F21/60G06F21/32
CPCG06F21/32G06F21/602H04L9/3231H04L63/02H04L63/0428H04L63/0861
Inventor 阚宏伟
Owner WENZHOU BOYING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products