Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

95 results about "Information security management system" patented technology

An information security management system is a set of policies concerned with information security management or IT related risks. The idioms arose primarily out of BS 7799. The governing principle behind an ISMS is that an organization should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk.

Information security management and control method under cloud manufacturing environment

The invention discloses an information security management and control method under a cloud manufacturing environment. On the basis of a network security protocol, a password technology and a public key infrastructure (PKI), comprehensive security guarantee is supplied to information interaction among cloud internal networks, between one cloud and another cloud, and between a user and each cloud by using implementation technologies and methods, such as a virtual private network (VPN) based on multiple layers of protocols, a digital envelope and a password algorithm; Intranet, Extranet and Internet of a cloud manufacturing system are covered; comprehensive management and control technical information files are stored and transmitted to each used loop; a session key (SK) which is randomly produced by using a key production protocol is used for symmetrically encrypting the technical information files; and a receiver public key obtained according to a PKI digital certificate asymmetrically encrypts the SK to form the digital envelope for protecting the technical information files and the SK. The information security management and control method has the characteristics of being high in confidentiality, high inefficiency, flexible in arrangement and the like and can be widely applied to the cloud manufacturing system and other network manufacturing systems.
Owner:CHONGQING UNIV

Grain and oil food full supply chain information security management system and method based on trusted identifier and IPFS

ActiveCN110879902AReduce the difficulty of traceabilityIncrease credibilityDigital data protectionInformation accessPrivacy protection
The invention provides a grain and oil food full supply chain information security management system and method based on a trusted identifier and an IPFS, and relates to the fields of block chain technology, grain and oil food security and the like. The system is realized by adopting a browser / server structure, and provides management functions of registration, information acquisition, informationquery, real-time monitoring and the like for a user based on a credible identification model of a block chain and an IPFS + block chain dual-mode storage mechanism. According to the method, the operation process of the grain and oil food full supply chain is analyzed, distributed nodes are set to upload data, a grain and oil food full supply chain credible identification model based on the blockchain is constructed, and a dual-mode data storage mechanism of IPFS and the block chain is adopted. According to the invention, the data transmission of each link on the grain and oil food full supply chain is safe and transparent, the information access speed and privacy protection are improved, the upper and lower chains of the supply chain information are controlled through the intelligent contract, and the management functions of grain and oil food full supply chain information acquisition, query, tracing, monitoring and the like are realized.
Owner:BEIJING TECHNOLOGY AND BUSINESS UNIVERSITY

Personal account information security management system and method based on biologic characteristic information verification

The invention discloses a personal account information security management system and method based on biologic characteristic information. The method comprises the following steps that (a) a biologic characteristic information collector is connected with an intelligent terminal; (b) the biologic characteristic information of a user is collected; (c) verification is carried out, if the real-time information is matched with the preset biologic characteristic information, a step (d) is executed, and otherwise, a step (g) is executed; (d) the website logging in is carried out, whether the current logged website is registered by users or not or whether the personnel account information is inputted or not is judged, if so, a step (f) is executed, and otherwise, a step (e) is executed; (e) the current website address, the website SSL code, the personnel account information of the user and the biologic characteristic information of the user are captured and are bound together for generating an automatic logging in file; (f), the generated automatic logging in file is obtained, and automatic logging in is realized; (g) input error prompt is given out, and the system waits for the next biologic characteristic information collection. The method and the system have the advantages that the personnel account information of the user and the biologic characteristic information with the unique label are associated for guaranteeing the security of the user personnel information, the use is convenient, and the system and the method can be favorably popularized in a wide range.
Owner:SHENZHEN HOFAN ECOMMERCE

Provincial highway operation management data center system and implementation method thereof

The invention discloses a provincial highway operation management data center system and an implementation method thereof. The system includes a comprehensive database, a data platform, an operation and maintenance system and a security management system; the comprehensive database is used for realizing source-division and class-division management storage of data; the data platform is used for realizing interactive sharing, mining analysis and fusion processing of the data; the operation and maintenance system is used for realizing infield equipment operation and maintenance, asset management and infield maintenance information statistic analysis; and the security management system can initiatively find out important security vulnerabilities and security events, and can rapidly recover a system after the system is damaged. The invention discloses a provincial highway operation and management data transmission, sharing, distribution, storage and processing big data processing implementation method. According to the provincial highway operation management data center system and implementation method thereof of the invention, a data center architecture and a data flow which can connect various service application systems and realize resource sharing are constructed.
Owner:SOUTHEAST UNIV

Method and apparatus for detecting data collection omission in traffic collection device

The invention discloses a method for detecting data collection omission in a traffic collection device and relates to an information security technology in the technical field of information. The method comprises the following steps: step 1 is discovery of omission of active IP data, and step 2 is discovery of omission of active domain name data. According to the invention, a DNS data source is used to supplement original data, and data which has the attribute of a computer room is extracted, and then a simulation request is performed, such that the performance demand for the simulation request is reduced, a more comprehensive simulation request is also provided, and discovered omission is more comprehensive and accurate. When the simulation request is performed, an http (get/post) requestis firstly performed, and then afterwards, data whose simulation request result return values are not within a reasonable scope is subjected to an https (get/post) request. Such a mode, compared to amode of performing http&https simulation requests on all data, can reduce the performance demand for the simulation request, and compared to a mode of only performing the http simulation request, canalso enhance comprehensiveness of the simulation request. According to the invention, the network supervision level can be effectively improved, and data missed by an information security managementsystem is discovered for analysis of omission reasons of the information security management system.
Owner:BEIJING ACT TECH DEV CO LTD

Medical and health information security management system

The invention provides a medical and health information security management system. The system comprises an encryption module, an authority module, a privacy protection module, an anonymization moduleand an instruction permission module; the encryption module is used for realizing resident privacy protection while ensuring file sharing by setting security means of access authority and data encryption; the authority module is used for providing single sign-on, authorization, authentication, role-based access, database advanced security and application process control to achieve access permission setting; the privacy protection module is used for authorizing a user to access the archive information of a patient on the basis of determination of whether the patient agrees or not; the anonymization module is used for hiding privacy information when the archives of the patient are used; and the instruction permission module is used for verifying whether the access is legal or not when the patient file is accessed. According to the medical and health information security management system, the stratum data, the sampling data, the standard penetration data and the dynamic exploration datacorresponding to the rock core are acquired through the rock core pictures and uploaded to the server, so that the efficiency and the quality of exploration drilling logging data acquisition can be greatly improved, the links of manual participation are reduced, and the data accuracy is greatly improved.
Owner:重庆亚德科技股份有限公司

Information security management and control system and information security management and control method

InactiveCN107171855AMeet Internet needsPrevent Mobile Security AccidentsData switching networksData connectionInformation security risk management
The invention discloses an information security management and control system comprising a virtual private dialup network module, an intranet management and control module and a hardware prevention and control module, wherein the virtual private dialup network module is in data connection with the intranet management and control module, the hardware prevention and control module is in data connection with the intranet management and control module, and the hardware prevention and control module is in data connection with an external Internet. According to the information security management and control system and the information security management and control method provided by the invention, a set of comprehensive security management and control system is established for the network access of user terminals, the network management and control means and the wireless communication technology are fully used to effectively manage and control the network access behaviors and the network access time periods of the user terminals, potential security threats of network access, instant messaging and the like are mainly solved, the user terminals are used for performing network access within proper and regular time periods, and meanwhile public sentiment statistic analysis is carried out so as to carry out targeted education and guidance, prevent the occurrence of mobile security accidents and meet the network access needs of special groups.
Owner:山东掌游网络科技有限公司

Financial union cloud service platform

The invention discloses a financial union cloud service platform. The financial union cloud service platform is characterized in that an only-true identity certification system of a billion-level certification scale is established through a combined public key and dynamic password technology, and self-certificating electronic identification of uniqueness and certification of all the people and things in the world can be provided. The core technology problem of an information security management system is solved accordingly, and a solid and credible security base is laid for electronic commerce. A user accesses to the financial union cloud service platform securely through network cloud, the amount of electronic certificates issued from the financial union cloud service platform is ten billion times of that of a conventional CA (certificate authority) certification system, while system investment and operating cost are only less than one tenth of those of a same-scaled CA. Therefore, the financial union cloud service platform has incomparable technical advantages and cost advantages in the field of the electronic certification. The invention further discloses an identity-certification based small and medium-sized financial institution safety integrated service platform, an identity-certification based mobile banking general service platform and an identity-certification based general card service system.
Owner:BEIJING HUFU TECH

Intelligent energy meter information security management module

The invention discloses an intelligent energy meter information security management module, and belongs to an intelligent energy meter management auxiliary device. The information security management module comprises a processor, a first data interface, a second data interface and a flash storage, wherein the processor are respectively connected with the first data interface, the second data interface and the flash storage. When the information security management module and an external data sending end exchange data, identity authentication is performed, and validity of communications between the information security management module and the external data sending end is guaranteed. An intelligent energy meter terminal master controller can only communicate with the exterior through the information security management module. Permission settings of level-to-level management of an energy company are achieved by using different secret keys, and security of the secret keys is enabled to be high by using a 3 data encryption standard (DES) or advanced encryption standard (AES) multistage encryption mode, and furthermore risks caused by secret key exposure are prevented by upgrading the secret keys in real time through a program downloading port on the information security management module. The intelligent energy meter information security management module is simple in structure, can guarantee independence of the energy company on gas meter control, and is unrestrained by the external world.
Owner:CHENGDU QINCHUAN IOT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products