Data information security management method

A technology for security management and data information, applied in the field of data management, can solve the problems of neglecting information data security, information leakage, database system crash, etc., and achieve the effect of improving data security, good security performance, and high encryption strength

Inactive Publication Date: 2019-12-03
GUANGDONG POLYTECHNIC NORMAL UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while technicians pay attention to the classified management and utilization of data, they ignore the security of information data. Most of the security management measures are to set up identity authentication windows on the in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data information security management method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0026] See figure 1 , The present invention provides a technical solution: a data information security management method, including the following steps:

[0027] A. The user first conducts identity verification and enters the data system after passing the verification. If the verification fails, the data system will be locked;

[0028] B. Encrypt the database and send the encrypted data to a third-party platform for storage;

[0029] C. Afte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data information security management method, which comprises the following steps that: A, a user firstly performs identity authentication, enters a data system after the authentication is passed, and locks the data system if the authentication is not passed; B, encrypting the database, and sending the encrypted data to a third-party platform for storage; C, then confirming the identity of the user by the third-party platform, performing storage encryption after confirmation is passed, and if confirmation is not passed, returning the data to the value database; and D,the background records and prompts the database information access dynamic log in real time. The management method adopted by the invention is simple to operate and good in safety performance, and caneffectively prevent data leakage.

Description

technical field [0001] The invention relates to the technical field of data management, in particular to a data information security management method. Background technique [0002] Data management is the process of using computer hardware and software technology to effectively collect, store, process and apply data. Its purpose is to fully and effectively play the role of data. The key to effective data management is data organization. With the development of computer technology, data management has experienced three stages of development: manual management, file system, and database system. [0003] With the rapid development of digital information technology, computers have played different important roles in people's life and work. People are increasingly inseparable from computers and digital information technology. However, everything has two sides. While it brings quickness and convenience to our life and work, it also brings us many safety hazards. The user's pri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/14H04L9/06G06F21/62
CPCH04L9/14H04L9/0618G06F21/6218G06F2221/2107
Inventor 郝刚梁鹏
Owner GUANGDONG POLYTECHNIC NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products