Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30 results about "Information security audit" patented technology

An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to auditing the logical security of databases and highlights key components to look for and different methods for auditing these areas.

Security certification type trans-regional direct-selling bank alliance transaction method and system

The invention provides a security certification type trans-regional direct-selling bank alliance transaction method and system. The system comprises an user information acquiring module, a transaction request module, a handling module positioned on a direct-selling bank alliance platform, an user information verification module for organization members, and a transaction handling module, wherein the user information acquiring module and the transaction request module are arranged on an alliance service platform. According to the system, the members of a financial service organization provide service, so that the services are diversified; the members of each financial product service organization are provided point-to-point security communication protection, and thus the funds security and information security of a user and the end-to-end security can be ensured; each organization provides the security real-name authentication information of the user, so as to ensure the validity of the user information; the direct-selling bank alliance platform serving the regional financial product service organization is built; the security real-name authentication information of the user in each financial product service mechanism is utilized on the premise that the security is ensured to provide the user the wide and secure financial service.
Owner:上海方付通科技服务股份有限公司

Financing integrated service platform and method

InactiveCN108154441AReduce operating costsRealize the transferFinanceData authenticityThe Internet
The invention belongs to the technical field of internet finance, and provides a financing integrated service platform. The platform comprises a server connected with both a financing side and an investing side, an information release platform, a project capital injection platform, an information safety auditing platform, a rebate platform and a profit participation platform; the information release platform is used for enabling a financing party to release financing project data; the project capital injection platform is used for enabling an investor to select a financing project and inject capital; the information safety auditing platform is used for enabling a service platform administrator for auditing identity and data authenticity of the investor and the financing party; the rebate platform is used for enabling the financing party to feed back a feedback object of a certain proportion according to the capital injection amount of the investor after financing project financing is successful; the profit participation platform is used for enabling the financing party to perform profit participation on the investor. The invention further provides a financing comprehensive servicemethod. The platform is exquisite in concept, and the technical problem that due to the fact that in the prior art, the market lacks a platform for performing comprehensive service on financing projects, a large number of resources are wasted is solved.
Owner:周斌

Comprehensive information-security audit method

The invention discloses a comprehensive information-security audit method which comprises the following steps: integrating a Web Service on a comprehensive information-security audit system in advance, and creating a Web Service interface for a single-note two-list system; sending the created key information of a user to the comprehensive information-security audit system by the Web Service interface in the single-note two-list system, wherein the key information of the user includes the identifier of the user; storing the key information of the user by the comprehensive information-security audit system; sending the information and the account information of an operation and maintenance host to the comprehensive information-security audit system by the Web Service interface in the single-note two-list system when the operation and maintenance authorization needs to be applied for the user; and creating the operation and maintenance authorization of the user by the comprehensive information-security audit system. Due to the adoption of the comprehensive information-security audit method, the comprehensive information-security audit accuracy is improved, and in addition, the work load of a comprehensive information-security audit system manager is effectively reduced and the work efficiency is improved.
Owner:STATE GRID ZHEJIANG ELECTRIC POWER +1

Automobile industry information safety system trustworthiness evaluation method and evaluation system

The invention discloses an automobile industry information safety system trustworthiness assessment method, which comprises the following steps: step 1, assessment preparation: completing a series of preparation work before assessment, and obtaining information required for auditing of an assessment system; step 2, primary auditing: performing primary auditing on the evaluation preparation work in the step 1 and the acquired information required by the auditing of the evaluation system; 3, a scoring model is compiled, and the scoring model is compiled according to the evaluation module and the safety process domain thereof; 4, performing formal auditing, auditing whether the security process domain of the evaluation module is in accordance, and determining the security process domain of the score rate of the evaluation module; the invention further discloses an automobile industry information safety system trustworthiness evaluation system. The independence and authority of the auditing result are high, the auditing result can be accepted by all parties, and it can be guaranteed that all demand parties can quickly, accurately and comprehensively inquire the information security auditing result from the evaluation system.
Owner:中汽研华诚认证(天津)有限公司

An adaptive cloud computing environment virtual security domain access control method and system

ActiveCN103458003BImplement access controlImplement cross-domain access controlTransmissionSecurity domainNetwork communication
The present invention relates to a method and system for controlling access to a virtual security domain in an adaptive cloud computing environment. The method deploys a virtual security gateway device on a virtual machine management layer, and implements the virtual security gateway device with a cloud security policy synchronization center in the cloud computing environment. Interact to obtain security policy information, and monitor the network communication behavior of the virtual machine on the virtual machine management layer according to the security policy, and directly perform access control on the network communication data packets inside the same physical machine; for network communication across physical machines The security control package is added to the data package, and the cross-physical machine adaptive access control is performed through the security control package and the security feedback package containing the dynamic adjustment access control policy information. The method and system can realize the fine-grained access control function for communication between different virtual machines on the same physical machine or different physical machines, and can dynamically adjust access control policies to realize adaptive cloud computing environment virtual security domain access control .
Owner:CEC CYBERSPACE GREAT WALL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products