CN201984523U - Information security management system (ISMS) for personnel and carrier - Google Patents

Information security management system (ISMS) for personnel and carrier Download PDF

Info

Publication number
CN201984523U
CN201984523U CN2011200180928U CN201120018092U CN201984523U CN 201984523 U CN201984523 U CN 201984523U CN 2011200180928 U CN2011200180928 U CN 2011200180928U CN 201120018092 U CN201120018092 U CN 201120018092U CN 201984523 U CN201984523 U CN 201984523U
Authority
CN
China
Prior art keywords
carrier
information
personnel
system server
rfid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2011200180928U
Other languages
Chinese (zh)
Inventor
周宝忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING JYST TECHNOLOGY Co Ltd
Original Assignee
BEIJING JYST TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING JYST TECHNOLOGY Co Ltd filed Critical BEIJING JYST TECHNOLOGY Co Ltd
Priority to CN2011200180928U priority Critical patent/CN201984523U/en
Application granted granted Critical
Publication of CN201984523U publication Critical patent/CN201984523U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The utility model provides an information security management system (ISMS) for personnel and a carrier. Both the personnel and the carrier are provided with an RFID (radio frequency identification device) label, the information carried by the RFID label is uploaded to a system server after being collected by an RFID collector, and the system server allows the personnel to leave with the carrier only when all the information meets requirements after checking a personnel information storage database, a carrier information storage database, a first access database and a second access database; and as long as one item does not meet the requirements, the system server sends alarm information to a terminal machine which triggers an alarm device to alarm according to received alarm information so as to strengthen monitoring; in addition, various information is recorded when the personnel and the carrier passes through a monitoring area, thereby being convenient for working staff to work out the frequencies of illegal carrying or legal carrying of a certain carrier and the contents such as alarm places, alarm time and the like so as to provide analysis basis for confidential work.

Description

Personnel and carrier information safety management system
Technical field
The utility model relates to the monitoring technique field, particularly a kind of personnel and carrier information safety management system.
Background technology
Along with the continuous enhancing of China's rapid economy development and scientific and technological strength, a large amount of valuable scientific payoffss continue to bring out, and therefore, strengthen scientific and technological safety management work and have important practical significance.
In security work, the management of inner concerning security matters assets, data is a groundwork, also be the easiest link that starts a leak, existing supervisory system ubiquity defectives such as complex structure, monitoring coverage rate are little, thus directly cause control and monitoring weak, let out phenomenon such as the frequent generation of secret case.
The utility model content
At the above-mentioned defective that prior art exists, the utility model provides a kind of personnel and carrier information safety management system, has the strong advantage of control and monitoring, can effectively suppress the generation of the leakage of a state or party secret.
The technical solution of the utility model is as follows:
The utility model provides a kind of personnel and carrier information safety management system, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with the database of the personnel of storing, carrier and relevant information thereof;
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID collector is used for personal information, carrier information in personnel that enter described position to be monitored or the RFID label that carrier carried are respectively read, and will read the result and be uploaded to described system server, described system server is according to the described database of data query that receives, whether and it is legal in information or warning information to terminating machine transmission permission to meet the requirements according to Query Result, and described terminating machine triggers described warning device according to the warning information that receives and reports to the police.
Preferably, described system server and described watch-dog are by the mutual various information of internal network.
Preferably, described watch-dog also comprises the video capture device that is used to take location drawing picture to be monitored, and gives described system server with the image uploading that photographs.
Preferably, described carrier is one or more in following: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment.
Preferably, described system server also comprises current record storage unit, is used to write down personnel that described RFID collector uploads and carrier time, place, current personal information, the current carrier information by described position to be monitored.
Preferably, described database comprises the personal information stored data base of the personal information that prestores, the carrier information stored data base of the carrier information that the RFID label that disposes on the carrier that prestores is entrained; Being used for storage personnel and carrier inside uses first rights database of relation and is used for second rights database that relation is used in storage personnel and carrier outside; Described system server is inquired about described personal information stored data base, carrier information stored data base, first rights database and second rights database successively after receiving data, have only when all meeting the requirements, and just allows legal passing through; As long as have one undesirable, then send a warning message to terminating machine.
Preferably, described personal information stored data base, described carrier information stored data base, described first rights database and described second rights database are branch Chinese style database or are each subdata base of a database.
The beneficial effects of the utility model are as follows:
The utility model provides a kind of personnel and carrier information safety management system, for personnel and carrier all dispose the RFID label, after collecting the entrained information of RFID label by the RFID collector, give system server with this information uploading, system server is by checking personnel's information stores database, carrier information stored data base and first rights database and second rights database, have only when all meeting the requirements, just the permission personnel carry that carrier is legal to be left, thereby have strengthened control and monitoring.In addition, personnel and carrier are when the guarded region, and various information all go on record, and make things convenient for the staff to count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, contents such as the place of generation violation alarm, time, personnel, carrier information are for security work provides the analysis foundation.
Description of drawings
The personnel that Fig. 1 provides for the utility model and the structural representation of carrier information safety management system.
Embodiment
Below in conjunction with accompanying drawing a concrete embodiment of the present utility model is described.
The utility model provides a kind of personnel and carrier information safety management system, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with following database respectively; The personal information stored data base of the personal information that prestores; The carrier information stored data base of the carrier information that the RFID label that disposes on the carrier of prestoring is entrained; Being used for storage personnel and carrier inside uses the rights database of relation and is used for second rights database that relation is used in storage personnel and carrier outside;
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID display is used for the entrained entrained personal information of RFID label of the personnel that enter described position to be monitored is read, and will read the result and be uploaded to described system server, and, described RFID collector is used for the entrained entrained carrier information of RFID label of the carrier that enters described position to be monitored is read, and will read the result and be uploaded to described system server; Described system server is inquired about described personal information stored data base, carrier information stored data base, first rights database and second rights database successively according to the data that receive, have only when all meeting the requirements, as long as just allow legal by have one undesirable, then send a warning message to terminating machine, described terminating machine triggers described warning device according to the warning information that receives and reports to the police.
Wherein, position to be monitored is only way which must be passeds such as secret chamber, office, corridor, office building gateway, Yuan Qu thoroughfare, gateway, gate.
Concrete, the concerning security matters carrier comprises in the utility model: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment etc.Therefore, needing at first to embed the RFID label on the concerning security matters carrier identifies, this RFID label institute canned data deposits in the carrier information stored data base simultaneously, and the RFID label institute canned data that embeds on the carrier comprises: essential informations such as container name, specification, model, asset number, buying hour.
For the concerning security matters personnel, need at first all concerning security matters personnel's of storage essential information in the personal information stored data base, comprising: name, sex, photo, employee's card numbering, contact information and other information needed.
In addition, first rights database and second rights database have been set up in the utility model, wherein, first rights database is used for storage personnel and the carrier inside relation of using (that is: personnel use certain carrier in specified scope), and second rights database is used for storage personnel and the carrier outside relation of using (that is: personnel can with certain carrier band from guarded region).
For example: when personnel A needed the intimate borrowing carrier B, personnel A needed at first to register to the register office, and the register office is stored the corresponding relation of personnel A and carrier B in first rights database into, shows that personnel A has authority intimate borrowing carrier B.
And when personnel A needs the outside to use carrier B, personnel A needs at first to register to the register office, the register office is stored the corresponding relation of personnel A and carrier B in first rights database and second rights database simultaneously, shows that personnel A has the authority outside to use carrier B.And simultaneously provide personnel A rfid card and carry carrier B when arriving certain guarded region as personnel A to personnel A, RFID collector in the watch-dog can be gathered entrained RFID information on entrained RFID information of personnel and the carrier simultaneously, and give system server with the information uploading that collects, system server is personnel query information stores database at first, judge whether these personnel are the staff, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about the carrier information stored data base, judge whether this carrier is interior carrier, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about first rights database, judge whether these personnel have this carrier of authority intimate borrowing, if judged result then obtains illegal traffic information for not; Otherwise, further inquire about second rights database, judge whether these personnel have the authority outside to use this carrier, if judged result then obtains illegal traffic information for not; Otherwise draw legal traffic information.
That is to say, only legal personnel, carrier is legal and personnel have authority that this carrier is carried out intimate borrowing and personnel to have authority that this carrier is carried out the outside to use these four kinds of requirements when all meeting the requirements, personnel just have authority with this carrier band from guarded region, as long as have one undesirable, just obtain illegal traffic information
When system server obtains illegal traffic information, can send a warning message to terminating machine, terminating machine triggers described warning device according to the warning information that receives and reports to the police, type of alarm can for: show alarm song tone alerts, light alarm etc.
What no matter obtain is legal traffic information or illegally can manages it information, being arranged on current record storage unit in the system server all can the record and the time of carrier by described position to be monitored, the place, current personal information, current carrier information, the information of noting is stored in the mode of daily record, for example, the concerning security matters carrier information that each period of every day is monitored, the carrier, carry licensing status and write down the formation daily record, by classified inquiry, for the concerning security matters managerial staff member provides reliable data can be by to the analysis of daily record according to managerial personnel, count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, the place of secret report in violation of rules and regulations takes place, time, personnel, contents such as carrier information are for security work provides the analysis foundation.
In addition, according to actual needs, the user of using system server can be divided into Three Estate, as: the keeper of Senior Administrator, common management person, each grade of application management person has corresponding rights of using, as:, application management person can check master data, the equipment state of system, and common management person can manage with the device interior data equipment and inquire about; The Senior Administrator can carry out the importing and exporting of data, data transfer, system's setting, data retrieval, data statistics, by the division of this authority, can further improve the secured feature of native system.
In the utility model, the various information that various database is stored can be carried out typing and modification by human-computer interaction interface, comprising: the mandate letter of the personal information in the Database Systems, discrepancy information, carrier etc.
In addition, the RFID collector can be set to fixed form or hand-held, and by hand-held, the staff is scanned the concerning security matters carrier by carrying a handhold RFID collector, thereby makes things convenient for the staff to carry out regular job.
In addition, system server and watch-dog be by the mutual various information of internal network, with the complete physical isolation of outer net, prevents that outside invasion from stealing data.
In sum, by using personnel provided by the utility model and carrier information safety management system, for personnel and carrier all dispose the RFID label, after collecting the entrained information of RFID label by the RFID collector, give system server with this information uploading, system server is by checking personnel's information stores database, the carrier information stored data base and first rights database and second rights database, have only when all meeting the requirements, just the permission personnel carry that carrier is legal to be left, thereby control and monitoring have been strengthened in addition, when personnel and carrier pass through guarded region, various information all go on record, make things convenient for the staff to count that certain class carrier is carried in violation of rules and regulations or legal frequency of carrying, the place of alarm in violation of rules and regulations takes place, time, personnel, contents such as carrier information are for security work provides the analysis foundation.

Claims (5)

1. personnel and carrier information safety management system is characterized in that, comprising: system server and watch-dog; Described system server is arranged at Surveillance center machine room position, and links to each other with the database of the personnel of storing, carrier and relevant information thereof:
Described watch-dog is arranged at position to be monitored, comprising: RFID collector and warning device; Described RFID collector is used for personal information, carrier information in personnel that enter described position to be monitored or the RFID label that carrier carried are respectively read, and will read the result and be uploaded to described system server, described system server sends to terminating machine and allows legal information or the warning information of passing through, and described terminating machine triggers described warning device according to the warning information that receives.
2. system according to claim 1 is characterized in that, described system server and described watch-dog are by the internal network communication.
3. system according to claim 1 is characterized in that, described watch-dog also comprises the video capture device that is used to take location drawing picture to be monitored, and gives described system server with the image uploading that photographs.
4. system according to claim 1 is characterized in that, described carrier is one or more in following: USB flash disk, portable hard drive, paper medium, carrier container, CD, computer, business automation equipment, communication apparatus, computer peripheral equipment.
5. system according to claim 1, it is characterized in that, described system server also comprises current record storage unit, is used to write down personnel that described RFID collector uploads and carrier time, place, current personal information, the current carrier information by described position to be monitored.
CN2011200180928U 2011-01-20 2011-01-20 Information security management system (ISMS) for personnel and carrier Expired - Fee Related CN201984523U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011200180928U CN201984523U (en) 2011-01-20 2011-01-20 Information security management system (ISMS) for personnel and carrier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011200180928U CN201984523U (en) 2011-01-20 2011-01-20 Information security management system (ISMS) for personnel and carrier

Publications (1)

Publication Number Publication Date
CN201984523U true CN201984523U (en) 2011-09-21

Family

ID=44611979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011200180928U Expired - Fee Related CN201984523U (en) 2011-01-20 2011-01-20 Information security management system (ISMS) for personnel and carrier

Country Status (1)

Country Link
CN (1) CN201984523U (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306357A (en) * 2011-09-28 2012-01-04 广州市远望谷信息技术有限公司 Confidential work supervision system based on RFID (Radio Frequency Identification Device) technique
CN102902216A (en) * 2012-10-19 2013-01-30 江苏香江科技股份有限公司 Data machine room control method and system based on RFID (Radio Frequency Identification Device)
CN103268690A (en) * 2013-05-28 2013-08-28 成都闰世科技有限公司 Night patrol alarming linkage management and control system and control method
CN110068792A (en) * 2019-04-12 2019-07-30 铂元智能科技(北京)有限公司 Positioning system, localization method and wireless transmission terminal
CN112906839A (en) * 2021-02-22 2021-06-04 厦门熵基科技有限公司 Fixed asset monitoring method, device, equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102306357A (en) * 2011-09-28 2012-01-04 广州市远望谷信息技术有限公司 Confidential work supervision system based on RFID (Radio Frequency Identification Device) technique
CN102902216A (en) * 2012-10-19 2013-01-30 江苏香江科技股份有限公司 Data machine room control method and system based on RFID (Radio Frequency Identification Device)
CN103268690A (en) * 2013-05-28 2013-08-28 成都闰世科技有限公司 Night patrol alarming linkage management and control system and control method
CN103268690B (en) * 2013-05-28 2015-04-29 成都闰世科技有限公司 Night patrol alarming linkage management and control system and control method
CN110068792A (en) * 2019-04-12 2019-07-30 铂元智能科技(北京)有限公司 Positioning system, localization method and wireless transmission terminal
CN112906839A (en) * 2021-02-22 2021-06-04 厦门熵基科技有限公司 Fixed asset monitoring method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103489291B (en) A kind of integrated safety-protection system of comprehensive intelligent wireless
CN108229195B (en) Two-dimensional code multi-dimensional multi-industry information display method and platform
CN101127670B (en) A coal mine under-well secure integration management system
CN201984523U (en) Information security management system (ISMS) for personnel and carrier
CN104635701A (en) Intelligent optical cable joint box management platform based on Internet of things technology
CN107665419A (en) The labor service real-name management system of national grid wisdom building site control platform
CN106408173A (en) Quality random inspection execution process supervision system
CN106960405A (en) Wisdom archives big data plateform system
CN102855704A (en) Automatic article depositing-withdrawing machine and use method thereof
CN105574698A (en) Intelligent storage management system based on big data
CN106257533A (en) A kind of environmental sanitation emergency guarantee intelligent response disposes management platform and method
CN101667934A (en) Centralized supervision device and supervision method of USB interface equipment networking
CN107240057A (en) Video monitoring residence management system and management method based on Quick Response Code
CN207319279U (en) The labor service real-name management system of national grid wisdom building site control platform
CN101521662B (en) Confidential U-disk remote monitoring system and method thereof
CN204155309U (en) Building ground management system
CN106022403B (en) A kind of Workshop Production overhaul of the equipments record system and method based on RFID
CN110097486A (en) A kind of movable police verification core recording system
CN104680355A (en) Novel-technology cloud computing enterprise information movement management system
CN203812267U (en) Material-evidence management and control and information sharing system based on RFID technology for public security
CN204010003U (en) Solid waste is processed supervisory systems
CN107808238A (en) A kind of management method and system for equipping assets
CN108986298A (en) A kind of intelligent charging terminal management system
CN203133928U (en) Internet-of-Things stamp anti-counterfeit management apparatus
CN116523443A (en) Virtual warehouse management system based on RFID

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110921

Termination date: 20150120

EXPY Termination of patent right or utility model