Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

143 results about "Information systems security" patented technology

Information systems security, more commonly referred to as INFOSEC, refers to the processes and methodologies involved with keeping information confidential, available, and assuring its integrity. It also refers to: Access controls, which prevent unauthorized personnel from entering or accessing a system.

Access control method and system based on block chain technology

ActiveCN108123936AResistance to failureResist being attackedFinancePayment protocolsAuthorization ModeData privacy protection
The invention provides an access control method and system based on block chain technology. The block chain technology is combined with attribute-based access control in the method, and the method comprises the following steps: adding an object in a chain, binding a judgment process of attribute and strategy on all block chain nodes with reference to the strategy. The access authorization is converted from a centralized manner into a distributed manner, the consistency check of the judgment results in the whole network is achieved by using a consensus mechanism of the block chain, and the authorized operations for accessing the recorded transactions are permanently recorded on the block chain. The method has the advantages of anti-single point failure, flexible authorization mode, accurateaccess boundary, and record auditability. The access control method and system provided by the invention are applicable to operating environments such as enterprises and governments that have the need of data privacy protection and realize multi-branch cooperation work based on a block chain platform, the access permissions of users in the system can be dynamically and scalably managed, fine-grained permission management is achieved for the strategy and the attribute, and the access control method and system are of important practical significance for protecting the security of information systems in a distributed network environment.
Owner:UNIV OF SCI & TECH BEIJING

Automatic penetration testing method for information system security

The invention belongs to the technical field of network security and discloses an automatic penetration testing method for information system security. A penetration testing platform is built to automatically scan the mainframe state of an information system and the security loopholes of a topological structure and the information system, to analyze the loophole information, to automatically transfer a verification script in a loophole verification base for attacking a target system, to obtain and improve the target control authority and to remove the access trace after finishing the penetration attack. Finally, the whole penetration testing process and result are recorded and analyzed to generate a testing report. According to the method, the penetration testing flow is comprehensively considered and the existing security analyzing tools are fully utilized to design various tools for packing an automatic penetration testing module, so that the automatic transfer and execution of the tools are achieved, and the completeness of the penetration testing process is improved. Through the exchange utilization of data among different modules and the automatic analysis and arrangement of the result output of the security analyzing tools, the efficiency and automatic degree of the penetration testing are improved.
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Method for evaluating operation quality of information systems

The invention discloses a method for evaluating operation quality of information systems. The method comprises the steps of firstly, constructing an evaluation index system for the operation quality of information systems; secondly, using an analytic hierarchy process to evaluate the operation quality of the qualitative information system and calculate the subjective weight of evaluation indexes, using an entropy weight method to evaluate the operation quality of the quantitative information system and calculate the objective weight of evaluation indexes, and synthesizing the subjective weight of evaluation indexes and the objective weight of evaluation indexes to calculate the combined weight of all evaluation indexes; and finally, calculating evaluative values of all evaluation objects according to the combined weight, and conducting evaluation analyses on evaluative values of all evaluation objects. According to the method, the entropy weight method and the analytic hierarchy process are combined to evaluate the operation quality of information systems, the potential problems in operation of information systems are found out, the operation guaranteeing capability of information systems is improved, and the operation and maintenance level of information systems is evaluated accurately and objectively, so that the safe, high-efficiency and economical operation of information systems is effectively guided.
Owner:ANHUI JIYUAN SOFTWARE CO LTD +1

A power grid information system fault positioning system and method based on a bidirectional deep neural network

The invention discloses a power grid information system fault positioning system and method based on a bidirectional deep neural network. The power grid information system fault positioning system comprises a fault monitoring module, an inference machine, a database and a deep learning module. The method includes; Performing deep neural network forward and reverse training on a fault tree analysisresult; and obtaining a corresponding relation between the fault characteristics and the fault positions, storing the corresponding relation in an expert knowledge base, carrying out power grid information system fault monitoring, writing the fault characteristics obtained according to monitoring data into a characteristic database, and performing reasoning to obtain a fault positioning result according to the expert knowledge base and the fault characteristics. The problem that power grid information system fault positioning is difficult can be effectively solved; The problems of low positioning speed and inaccurate positioning are solved, so that the system can give an alarm at the first time when a fault occurs, intelligent fault positioning and intelligent processing functions of theinformation system can be realized in combination with the fault self-processing system, the operation and maintenance efficiency of the power grid information system can be further improved, and safeand stable operation of the information system is guaranteed.
Owner:国网甘肃省电力公司信息通信公司 +2

Information system security risk assessment method and device

ActiveCN103996006ASolve the core problem of risk quantificationHigh precisionPlatform integrity maintainanceRisk quantificationMulti dimensional
The invention discloses an information system security risk assessment method. The method includes the steps of constructing a threatening behavior model bank, matching calling behaviors recorded in an information system with threatening behaviors in the threatening behavior model bank to obtain decision values of the matched calling behaviors, determining weighted values of the threatening behaviors according to the decision values of the matched calling behaviors, and enabling the weighted values of the threatening behaviors to be combined with a vulnerability weighted value and a remedial measure weighted value to obtain a risk grade. The invention further discloses an information system security risk assessment device. Through the scheme of the information system security risk assessment method and device, security risks of the information system can be measured in multi-dimensional mode, the defects of existing risk evaluation quantification are greatly made up for, the accuracy and credibility of threat evaluation are improved, and the core problem of risk quantification of the information system can be solved; consequently, users can conveniently and objectively know the condition of running risks of the information system, and the risks of the information system can be perceived.
Owner:SHANXI CHINA MOBILE COMM CORP

Information system security situation assessment method based on correction matrix-entropy weight membership cloud

The invention discloses an information system security situation assessment method based on a correction matrix-entropy weight membership cloud. The information system security situation assessment method comprises the following steps: S1, establishing an evaluation index system; S2, standardizing the multi-source data; S3, determining an index weight vector; S4, quantifying and grading the security situation of the information system; and S5, grading the security situation of the information system. Compared with the prior art, according to the information system security situation assessmentmethod based on the correction matrix-entropy weight membership cloud provided by the invention, the optimal deterministic matrix can be found by correcting the interval judgment matrix on the premise of reserving subjective evaluation of experts, so that the weight vector of the index layer is determined, and the security situation is quantified and graded in combination with the entropy weightmembership cloud. Through comparative analysis with an evaluation result based on an entropy weight coefficient method and a traditional AHP method, it is shown that the information system security situation assessment method has good stability, feasibility and effectiveness, and enables the safety situation quantitative evaluation result to be more reasonable.
Owner:CIVIL AVIATION UNIV OF CHINA

Safety development middleware for electric power mobile polling terminal and safety control method

The present invention provides a safety development middleware for electric power mobile polling terminal and a safety control method. The middleware comprises a safety parameter collection unit, a safety strategic management unit and a basic safety service unit. The three units employ a standard TCP/IP protocol for communication; the safety parameter collection unit is configured to collect basic information of the polling terminal hardware and the operation environment thereof; the safety strategic management unit is configured to perform communication with a superior polling terminal management center to obtain a safety control strategy; and the basic safety service unit is configured to shield the distinction between the polling terminal hardware with different types and the distinction between different types of operation systems of the polling terminal to provide basic safety service. The safety development middleware for electric power mobile polling terminal and the safety control method provide a uniform safety development interface for the electric power polling terminal to realize the remote safety control of the electric power polling device and allow the development of the electric power polling business not to reduce the original information system safety protection intensity.
Owner:GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products