CN201984523U - Information security management system (ISMS) for personnel and carrier - Google Patents
Information security management system (ISMS) for personnel and carrier Download PDFInfo
- Publication number
- CN201984523U CN201984523U CN2011200180928U CN201120018092U CN201984523U CN 201984523 U CN201984523 U CN 201984523U CN 2011200180928 U CN2011200180928 U CN 2011200180928U CN 201120018092 U CN201120018092 U CN 201120018092U CN 201984523 U CN201984523 U CN 201984523U
- Authority
- CN
- China
- Prior art keywords
- carrier
- information
- personnel
- system server
- rfid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Alarm Systems (AREA)
Abstract
The utility model provides an information security management system (ISMS) for personnel and a carrier. Both the personnel and the carrier are provided with an RFID (radio frequency identification device) label, the information carried by the RFID label is uploaded to a system server after being collected by an RFID collector, and the system server allows the personnel to leave with the carrier only when all the information meets requirements after checking a personnel information storage database, a carrier information storage database, a first access database and a second access database; and as long as one item does not meet the requirements, the system server sends alarm information to a terminal machine which triggers an alarm device to alarm according to received alarm information so as to strengthen monitoring; in addition, various information is recorded when the personnel and the carrier passes through a monitoring area, thereby being convenient for working staff to work out the frequencies of illegal carrying or legal carrying of a certain carrier and the contents such as alarm places, alarm time and the like so as to provide analysis basis for confidential work.
Description
Technical field
The utility model relates to the monitoring technique field, particularly a kind of personnel and carrier information safety management system.
Background technology
Along with the continuous enhancing of China's rapid economy development and scientific and technological strength, a large amount of valuable scientific payoffss continue to bring out, and therefore, strengthen scientific and technological safety management work and have important practical significance.
In security work, the management of inner concerning security matters assets, data is a groundwork, also be the easiest link that starts a leak, existing supervisory system ubiquity defectives such as complex structure, monitoring coverage rate are little, thus directly cause control and monitoring weak, let out phenomenon such as the frequent generation of secret case.
The utility model content
At the above-mentioned defective that prior art exists, the utility model provides a kind of personnel and carrier information safety management system, has the strong advantage of control and monitoring, can effectively suppress the generation of the leakage of a state or party secret.
The technical solution of the utility model is as follows:
The utility model provides a kind of personnel and carrier information safety management system, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with the database of the personnel of storing, carrier and relevant information thereof;
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID collector is used for personal information, carrier information in personnel that enter described position to be monitored or the RFID label that carrier carried are respectively read, and will read the result and be uploaded to described system server, described system server is according to the described database of data query that receives, whether and it is legal in information or warning information to terminating machine transmission permission to meet the requirements according to Query Result, and described terminating machine triggers described warning device according to the warning information that receives and reports to the police.
Preferably, described system server and described watch-dog are by the mutual various information of internal network.
Preferably, described watch-dog also comprises the video capture device that is used to take location drawing picture to be monitored, and gives described system server with the image uploading that photographs.
Preferably, described carrier is one or more in following: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment.
Preferably, described system server also comprises current record storage unit, is used to write down personnel that described RFID collector uploads and carrier time, place, current personal information, the current carrier information by described position to be monitored.
Preferably, described database comprises the personal information stored data base of the personal information that prestores, the carrier information stored data base of the carrier information that the RFID label that disposes on the carrier that prestores is entrained; Being used for storage personnel and carrier inside uses first rights database of relation and is used for second rights database that relation is used in storage personnel and carrier outside; Described system server is inquired about described personal information stored data base, carrier information stored data base, first rights database and second rights database successively after receiving data, have only when all meeting the requirements, and just allows legal passing through; As long as have one undesirable, then send a warning message to terminating machine.
Preferably, described personal information stored data base, described carrier information stored data base, described first rights database and described second rights database are branch Chinese style database or are each subdata base of a database.
The beneficial effects of the utility model are as follows:
The utility model provides a kind of personnel and carrier information safety management system, for personnel and carrier all dispose the RFID label, after collecting the entrained information of RFID label by the RFID collector, give system server with this information uploading, system server is by checking personnel's information stores database, carrier information stored data base and first rights database and second rights database, have only when all meeting the requirements, just the permission personnel carry that carrier is legal to be left, thereby have strengthened control and monitoring.In addition, personnel and carrier are when the guarded region, and various information all go on record, and make things convenient for the staff to count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, contents such as the place of generation violation alarm, time, personnel, carrier information are for security work provides the analysis foundation.
Description of drawings
The personnel that Fig. 1 provides for the utility model and the structural representation of carrier information safety management system.
Embodiment
Below in conjunction with accompanying drawing a concrete embodiment of the present utility model is described.
The utility model provides a kind of personnel and carrier information safety management system, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with following database respectively; The personal information stored data base of the personal information that prestores; The carrier information stored data base of the carrier information that the RFID label that disposes on the carrier of prestoring is entrained; Being used for storage personnel and carrier inside uses the rights database of relation and is used for second rights database that relation is used in storage personnel and carrier outside;
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID display is used for the entrained entrained personal information of RFID label of the personnel that enter described position to be monitored is read, and will read the result and be uploaded to described system server, and, described RFID collector is used for the entrained entrained carrier information of RFID label of the carrier that enters described position to be monitored is read, and will read the result and be uploaded to described system server; Described system server is inquired about described personal information stored data base, carrier information stored data base, first rights database and second rights database successively according to the data that receive, have only when all meeting the requirements, as long as just allow legal by have one undesirable, then send a warning message to terminating machine, described terminating machine triggers described warning device according to the warning information that receives and reports to the police.
Wherein, position to be monitored is only way which must be passeds such as secret chamber, office, corridor, office building gateway, Yuan Qu thoroughfare, gateway, gate.
Concrete, the concerning security matters carrier comprises in the utility model: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment etc.Therefore, needing at first to embed the RFID label on the concerning security matters carrier identifies, this RFID label institute canned data deposits in the carrier information stored data base simultaneously, and the RFID label institute canned data that embeds on the carrier comprises: essential informations such as container name, specification, model, asset number, buying hour.
For the concerning security matters personnel, need at first all concerning security matters personnel's of storage essential information in the personal information stored data base, comprising: name, sex, photo, employee's card numbering, contact information and other information needed.
In addition, first rights database and second rights database have been set up in the utility model, wherein, first rights database is used for storage personnel and the carrier inside relation of using (that is: personnel use certain carrier in specified scope), and second rights database is used for storage personnel and the carrier outside relation of using (that is: personnel can with certain carrier band from guarded region).
For example: when personnel A needed the intimate borrowing carrier B, personnel A needed at first to register to the register office, and the register office is stored the corresponding relation of personnel A and carrier B in first rights database into, shows that personnel A has authority intimate borrowing carrier B.
And when personnel A needs the outside to use carrier B, personnel A needs at first to register to the register office, the register office is stored the corresponding relation of personnel A and carrier B in first rights database and second rights database simultaneously, shows that personnel A has the authority outside to use carrier B.And simultaneously provide personnel A rfid card and carry carrier B when arriving certain guarded region as personnel A to personnel A, RFID collector in the watch-dog can be gathered entrained RFID information on entrained RFID information of personnel and the carrier simultaneously, and give system server with the information uploading that collects, system server is personnel query information stores database at first, judge whether these personnel are the staff, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about the carrier information stored data base, judge whether this carrier is interior carrier, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about first rights database, judge whether these personnel have this carrier of authority intimate borrowing, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about second rights database, judge whether these personnel have the authority outside to use this carrier, if judged result then obtains illegal traffic information for not; Otherwise draw legal traffic information.
That is to say, only legal personnel, carrier is legal and personnel have authority that this carrier is carried out intimate borrowing and personnel to have authority that this carrier is carried out the outside to use these four kinds of requirements when all meeting the requirements, personnel just have authority with this carrier band from guarded region, as long as have one undesirable, just obtain illegal traffic information
When system server obtains illegal traffic information, can send a warning message to terminating machine, terminating machine triggers described warning device according to the warning information that receives and reports to the police, type of alarm can for: show alarm song tone alerts, light alarm etc.
What no matter obtain is legal traffic information or illegally can manages it information, being arranged on current record storage unit in the system server all can the record and the time of carrier by described position to be monitored, the place, current personal information, current carrier information, the information of noting is stored in the mode of daily record, for example, the concerning security matters carrier information that each period of every day is monitored, the carrier, carry licensing status and write down the formation daily record, by classified inquiry, for the concerning security matters managerial staff member provides reliable data can be by to the analysis of daily record according to managerial personnel, count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, the place of secret report in violation of rules and regulations takes place, time, personnel, contents such as carrier information are for security work provides the analysis foundation.
In addition, according to actual needs, the user of using system server can be divided into Three Estate, as: the keeper of Senior Administrator, common management person, each grade of application management person has corresponding rights of using, as:, application management person can check master data, the equipment state of system, and common management person can manage with the device interior data equipment and inquire about; The Senior Administrator can carry out the importing and exporting of data, data transfer, system's setting, data retrieval, data statistics, by the division of this authority, can further improve the secured feature of native system.
In the utility model, the various information that various database is stored can be carried out typing and modification by human-computer interaction interface, comprising: the mandate letter of the personal information in the Database Systems, discrepancy information, carrier etc.
In addition, the RFID collector can be set to fixed form or hand-held, and by hand-held, the staff is scanned the concerning security matters carrier by carrying a handhold RFID collector, thereby makes things convenient for the staff to carry out regular job.
In addition, system server and watch-dog be by the mutual various information of internal network, with the complete physical isolation of outer net, prevents that outside invasion from stealing data.
In sum, by using personnel provided by the utility model and carrier information safety management system, for personnel and carrier all dispose the RFID label, after collecting the entrained information of RFID label by the RFID collector, give system server with this information uploading, system server is by checking personnel's information stores database, the carrier information stored data base and first rights database and second rights database, have only when all meeting the requirements, just the permission personnel carry that carrier is legal to be left, thereby control and monitoring have been strengthened in addition, when personnel and carrier pass through guarded region, various information all go on record, make things convenient for the staff to count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, the place of alarm in violation of rules and regulations takes place, time, personnel, contents such as carrier information are for security work provides the analysis foundation.
Claims (5)
1. personnel and carrier information safety management system is characterized in that, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with the database of the personnel of storing, carrier and relevant information thereof:
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID collector is used for personal information, carrier information in personnel that enter described position to be monitored or the RFID label that carrier carried are respectively read, and will read the result and be uploaded to described system server, described system server sends to terminating machine and allows legal information or the warning information of passing through, and described terminating machine triggers described warning device according to the warning information that receives.
2. system according to claim 1 is characterized in that, described system server and described watch-dog are by the internal network communication.
3. system according to claim 1 is characterized in that, described watch-dog also comprises the video capture device that is used to take location drawing picture to be monitored, and gives described system server with the image uploading that photographs.
4. system according to claim 1 is characterized in that, described carrier is one or more in following: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment.
5. system according to claim 1, it is characterized in that, described system server also comprises current record storage unit, is used to write down personnel that described RFID collector uploads and carrier time, place, current personal information, the current carrier information by described position to be monitored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200180928U CN201984523U (en) | 2011-01-20 | 2011-01-20 | Information security management system (ISMS) for personnel and carrier |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011200180928U CN201984523U (en) | 2011-01-20 | 2011-01-20 | Information security management system (ISMS) for personnel and carrier |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201984523U true CN201984523U (en) | 2011-09-21 |
Family
ID=44611979
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011200180928U Expired - Fee Related CN201984523U (en) | 2011-01-20 | 2011-01-20 | Information security management system (ISMS) for personnel and carrier |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201984523U (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306357A (en) * | 2011-09-28 | 2012-01-04 | 广州市远望谷信息技术有限公司 | Confidential work supervision system based on RFID (Radio Frequency Identification Device) technique |
CN102902216A (en) * | 2012-10-19 | 2013-01-30 | 江苏香江科技股份有限公司 | Data machine room control method and system based on RFID (Radio Frequency Identification Device) |
CN103268690A (en) * | 2013-05-28 | 2013-08-28 | 成都闰世科技有限公司 | Night patrol alarming linkage management and control system and control method |
CN110068792A (en) * | 2019-04-12 | 2019-07-30 | 铂元智能科技(北京)有限公司 | Positioning system, localization method and wireless transmission terminal |
CN112906839A (en) * | 2021-02-22 | 2021-06-04 | 厦门熵基科技有限公司 | Fixed asset monitoring method, device, equipment and storage medium |
-
2011
- 2011-01-20 CN CN2011200180928U patent/CN201984523U/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306357A (en) * | 2011-09-28 | 2012-01-04 | 广州市远望谷信息技术有限公司 | Confidential work supervision system based on RFID (Radio Frequency Identification Device) technique |
CN102902216A (en) * | 2012-10-19 | 2013-01-30 | 江苏香江科技股份有限公司 | Data machine room control method and system based on RFID (Radio Frequency Identification Device) |
CN103268690A (en) * | 2013-05-28 | 2013-08-28 | 成都闰世科技有限公司 | Night patrol alarming linkage management and control system and control method |
CN103268690B (en) * | 2013-05-28 | 2015-04-29 | 成都闰世科技有限公司 | Night patrol alarming linkage management and control system and control method |
CN110068792A (en) * | 2019-04-12 | 2019-07-30 | 铂元智能科技(北京)有限公司 | Positioning system, localization method and wireless transmission terminal |
CN112906839A (en) * | 2021-02-22 | 2021-06-04 | 厦门熵基科技有限公司 | Fixed asset monitoring method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103489291B (en) | A kind of integrated safety-protection system of comprehensive intelligent wireless | |
CN108229195B (en) | Two-dimensional code multi-dimensional multi-industry information display method and platform | |
CN101127670B (en) | A coal mine under-well secure integration management system | |
CN201984523U (en) | Information security management system (ISMS) for personnel and carrier | |
CN104635701A (en) | Intelligent optical cable joint box management platform based on Internet of things technology | |
CN107665419A (en) | The labor service real-name management system of national grid wisdom building site control platform | |
CN106408173A (en) | Quality random inspection execution process supervision system | |
CN106960405A (en) | Wisdom archives big data plateform system | |
CN102855704A (en) | Automatic article depositing-withdrawing machine and use method thereof | |
CN105574698A (en) | Intelligent storage management system based on big data | |
CN106257533A (en) | A kind of environmental sanitation emergency guarantee intelligent response disposes management platform and method | |
CN101667934A (en) | Centralized supervision device and supervision method of USB interface equipment networking | |
CN107240057A (en) | Video monitoring residence management system and management method based on Quick Response Code | |
CN207319279U (en) | The labor service real-name management system of national grid wisdom building site control platform | |
CN101521662B (en) | Confidential U-disk remote monitoring system and method thereof | |
CN204155309U (en) | Building ground management system | |
CN106022403B (en) | A kind of Workshop Production overhaul of the equipments record system and method based on RFID | |
CN110097486A (en) | A kind of movable police verification core recording system | |
CN104680355A (en) | Novel-technology cloud computing enterprise information movement management system | |
CN203812267U (en) | Material-evidence management and control and information sharing system based on RFID technology for public security | |
CN204010003U (en) | Solid waste is processed supervisory systems | |
CN107808238A (en) | A kind of management method and system for equipping assets | |
CN108986298A (en) | A kind of intelligent charging terminal management system | |
CN203133928U (en) | Internet-of-Things stamp anti-counterfeit management apparatus | |
CN116523443A (en) | Virtual warehouse management system based on RFID |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110921 Termination date: 20150120 |
|
EXPY | Termination of patent right or utility model |