An information security evaluation method, device and computer based on multi-factor authentication

An information security, multi-factor technology, applied in the direction of computing, data processing applications, instruments, etc., can solve problems such as inconsistent plans, non-standard security evaluation, incomplete evidence collection data, etc., to enhance non-repudiation, save manpower products, and guarantee authenticity effect

Active Publication Date: 2021-02-09
广州竞远安全技术股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, the collection of on-site evidence adopts the method of offline recording, and there are no strict management and verification measures for the environment and evaluation devices of the on-site evaluation objects, which may easily lead to incomplete evidence collection data, inconsistencies between on-site evaluation methods and plans, and evidence storage. If the security level is not high, subsequent security issues will often lead to disputes between the evaluation party and the entrusting unit, and may also easily lead to non-standard security evaluation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security evaluation method, device and computer based on multi-factor authentication
  • An information security evaluation method, device and computer based on multi-factor authentication
  • An information security evaluation method, device and computer based on multi-factor authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the accompanying drawings and examples, but the present invention is not limited in any way. Any changes or improvements made based on the teaching of the present invention belong to the protection scope of the present invention.

[0019] Such as figure 1 As shown, the information security evaluation method based on multi-factor verification of the present invention is characterized in that it includes collection, target comparison, personnel comparison, verification, update, evaluation, and processing steps, specifically including:

[0020] A. Collection: Obtain the on-site environmental factor information of the evaluation target, and record the acquired information and time stamp on the on-site and remote management servers;

[0021] B. Target comparison: compare the evaluation target environmental factor information obtained on site with the preset environmental factor information on the remot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an information security evaluation method, device and computer based on multi-factor authentication. The method includes obtaining and recording the environmental factor information and time stamp of the evaluation target site; comparing the environmental factor information with the preset information to determine whether it can continue; the evaluation personnel log in to the server and compare it with the preset information to determine whether it can continue; the evaluation personnel Check the evaluation target and compare it with the preset value to judge whether it can continue; judge and update the evaluation guide and evidence collection tasks according to the evaluation target object; conduct evaluation and collect and record the evaluation evidence and results; mark the recorded data with on-site environmental factors Encrypted storage after information tag. The device includes acquisition, target comparison, personnel comparison, verification, update, evaluation, processing and other modules. The computer includes a processor, a collection module, a network module, a storage module and an encryption module. The invention has the characteristics of high evaluation efficiency, high authenticity of evidence, and non-repudiation of evaluation data.

Description

technical field [0001] The invention belongs to the technical field of computer security, and in particular relates to an information security evaluation method and device based on multi-factor verification, which has high evaluation efficiency, strong effectiveness of the evaluation method, high authenticity of evaluation evidence, and non-repudiation of evaluation data, and a computer. Background technique [0002] Currently, in the information security on-site evaluation activities, the evaluation personnel need to complete the evaluation content in the evaluation guide book according to the evaluation plan confirmed with the entrusting unit and the evaluation method after the evaluation, and obtain sufficient evaluation evidence. Therefore, the authenticity and non-repudiation of on-site data, as well as the effectiveness of the evaluation method, etc., play a crucial role in the results of the entire evaluation. In the existing technology, the collection of on-site evid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q10/06
CPCG06Q10/06393
Inventor 彭世强吴杰刘静敏
Owner 广州竞远安全技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products