Unlock instant, AI-driven research and patent intelligence for your innovation.

Information security supervision method and device

An information security and security technology, applied in computer security devices, program control devices, program control design, etc., can solve problems such as labor-consuming, repetitive work, and large amount of data, so as to improve work efficiency, reduce labor costs, and save manpower resource effect

Pending Publication Date: 2021-05-07
珠海金智维信息科技有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since this work is a persistent and regular work, and has the characteristics of large amount of data, fixed process, and repeated work, it requires a lot of manpower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security supervision method and device
  • Information security supervision method and device
  • Information security supervision method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0032] figure 1 It is a schematic diagram of an information security supervision method according to an embodiment of the present invention, as shown in figure 1 As shown, the embodiment of the present invention provides an information security supervision method, which realizes fully automatic operation of information security supervision without manual operation, and the method includes:

[0033] Step 101: input information security supervision requirements;

[0034] Step 102: Determine the information security supervision strategy according to the information sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information security supervision method and device. The method comprises the following steps: inputting an information security supervision demand; determining an information safety supervision strategy according to an information safety supervision demand, and building an RPA robot; according to the information security supervision strategy, logging in an administrator account through a PRA robot, and monitoring a security strategy execution condition of a client managed by the administrator account; when the administrator account governs the execution of the security policy of the client side to be non-compliant, extracting non-compliant data through the PRA robot; according to the non-compliance data, positioning a non-compliance client through the PRA robot, and limiting the operation authority of the non-compliance client; according to the non-compliance data, sending a rectification notification to the non-compliance client through the PRA robot; and monitoring the rectification state of the non-compliant client through the PRA robot, and after rectification of the non-compliant client is completed, cancelling the limitation on the operation authority of the non-compliant client. According to the invention, manual operation is not needed, and full-automatic operation of information safety supervision is achieved.

Description

technical field [0001] The invention relates to the technical field of computer data processing, in particular to an information security supervision method and device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] The information security line of defense is the first line of defense for the smooth development of various businesses. Improving the implementation rate of information security policies is a basic but very important task for information security protection. [0004] The work of improving the implementation rate of security policies mainly relies on manually extracting the list of problems on the equipment within the jurisdiction from the security management center SOC on a regular basis, and then sending the list of problems to the units to which the equipm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/44G06F9/455
CPCG06F21/552G06F21/554G06F21/44G06F9/45512G06F2221/033
Inventor 廖万里金卓肖飞屈文浩叶锡建
Owner 珠海金智维信息科技有限公司