CN103281302A - Management method and management system for realizing information security - Google Patents

Management method and management system for realizing information security Download PDF

Info

Publication number
CN103281302A
CN103281302A CN2013101537457A CN201310153745A CN103281302A CN 103281302 A CN103281302 A CN 103281302A CN 2013101537457 A CN2013101537457 A CN 2013101537457A CN 201310153745 A CN201310153745 A CN 201310153745A CN 103281302 A CN103281302 A CN 103281302A
Authority
CN
China
Prior art keywords
targeted customer
management center
center server
source user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013101537457A
Other languages
Chinese (zh)
Inventor
谢静宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd
Original Assignee
SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd filed Critical SUZHOU YIBEI INFORMATION TECHNOLOGY Co Ltd
Priority to CN2013101537457A priority Critical patent/CN103281302A/en
Publication of CN103281302A publication Critical patent/CN103281302A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention provides a management method and a management system for realizing information security. The method comprises the following steps: a source user builds access limit information and transmits a call request to a management center server; after the management center server obtains a target user access right, the source user binds the target user access right and the access limit information and transmits a distributing policy request to a policy controller; the policy controller feeds back a distributing policy response to the source user; the source user transmits the bound target user access right and access limit information to the target user according to a distributing policy; and the target user processes the information after being certified by the management center server. The policy controller periodically counts the accident rate since the source user outwards transmits the information, and adjusts the useful life of the access limit information within a foreign authorization policy table in the management center server according to the accident rate and a useful life adjusting policy.

Description

A kind of management method and system that realizes information security
Technical field
The invention belongs to network communication field, relate in particular to a kind of management method and system that realizes information security.
Background technology
In network communication field, the information safety protection of electronic document is a very important aspect.Current, need the scheme of highly effective badly for the information safety protection of electronic document.
Summary of the invention
The invention provides a kind of management method and system that realizes information security, to address the above problem.
The invention provides a kind of management method that realizes information security.Said method may further comprise the steps: source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request; After management center server obtained targeted customer's access rights, source user bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller, wherein, carried entity type information under the targeted customer in the distribution policy request; Strategy controller wherein, carries distribution policy in the distribution policy response to the response of source user feedback distribution policy; Source user is sent to the targeted customer according to distribution policy with targeted customer's access rights and the visit limited information of binding; The targeted customer handles described information after authenticating by management center server.Wherein, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.The cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
The present invention also provides a kind of management system that realizes information security, comprises source user, targeted customer, management center server, communication server and strategy controller.Management center server connects source user, targeted customer and strategy controller respectively.Communication server connects source user and targeted customer, and strategy controller connects source user and management center server.Source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.After management center server obtained targeted customer's access rights, source user bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller, wherein, carried entity type information under the targeted customer in the distribution policy request.Strategy controller wherein, carries distribution policy in the distribution policy response to the response of source user feedback distribution policy.Source user is sent to the targeted customer according to distribution policy with targeted customer's access rights and the visit limited information of binding.The targeted customer handles described information after authenticating by management center server.The accident rate that externally transmission information of strategy controller periodic statistics source user causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server according to accident rate and the term of validity.The cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.
Compared to prior art, management method and system according to realization information security provided by the invention, after management center server obtains targeted customer's access rights, source user is according to entity type under the targeted customer, obtain distribution policy from strategy controller, according to distribution policy, bound targets access privilege and visit limited information are sent to the targeted customer.So, realize the safety certification of information, thereby guaranteed information security.In addition, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.So, can adjust safeguard measure in real time according to actual conditions.In addition, the cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.So, avoid cpu load excessive, thereby guaranteed communication security.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not constitute improper restriction of the present invention.In the accompanying drawings:
Figure 1 shows that the flow chart of the management method of the realization information security that preferred embodiment according to the present invention provides;
Figure 2 shows that the schematic diagram of the management system of the realization information security that preferred embodiment according to the present invention provides.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Figure 1 shows that the flow chart of the management method of the realization information security that preferred embodiment according to the present invention provides.As shown in Figure 1, the management method of the realization information security that provides of preferred embodiment of the present invention comprises step 101~105.
In step 101, source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.Wherein, the visit limited information for example comprises top-secret information, confidential information and secret information.In addition, under the targeted customer entity for example comprise the board of directors of our company, Finance Department of our company, Legal Service of our company, technology department of our company, our company cooperation unit, do not have cooperative relationship and non-competing adversary's unit, the benign competition adversary of our company and the vicious competitor of our company with our company.Yet the present invention does not limit this.In practical application, can specifically arrange entity under visit limited information and the targeted customer as required.
In step 102, after described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request.
In present embodiment, the management center server storage targeted customer access rights table of comparisons, and targeted customer's access rights table of comparisons comprises the corresponding relation of the affiliated entity type of targeted customer, visit limited information and access rights.In this, targeted customer's access rights table of comparisons example is as shown in table 1.Yet the present invention is not limited thereto.
Figure BDA00003121892100031
Table 1
In this, targeted customer's access rights table of comparisons can be preset.Management center server obtains targeted customer's access rights according to table 1, and targeted customer's access rights of obtaining are returned to source user.Yet the present invention does not limit this.In other embodiment, management center server for example only obtains the template of targeted customer's access rights, and described template returned to source user, source user can be set required targeted customer's access rights according to described template, thereby obtains the final objective access privilege.
In present embodiment, after source user obtained targeted customer's access rights, bound targets access privilege and visit limited information also sent the distribution policy request to strategy controller.Wherein, carry source user, the affiliated entity type information of targeted customer in the distribution policy request.
In step 103, described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy.
In step 104, described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding.Wherein, source user is according to distribution policy, and targeted customer's access rights and visit limited information with binding are sent to the targeted customer by communication server.
In present embodiment, safe class or the priority level of entity under the strategy controller storage user; Distribution policy.Particularly, if the priority level of entity or safe class are greater than preset value under the targeted customer, distribution policy is: source user is sent to the targeted customer with targeted customer's access rights and visit limited information; If priority level or the safe class of entity are less than or equal to described preset value under the targeted customer, distribution policy is: source user is sent to targeted customer's access rights and visit limited information the keeper of entity under the targeted customer, described keeper encrypts described targeted customer's access rights and visit limited information, and described targeted customer's access rights after will encrypting and visit limited information and be sent to all targeted customers.
For example, if entity comprises the board of directors of our company under the targeted customer, Finance Department of our company, Legal Service of our company and technology department of our company, and the priority level of entity from height to low order is under the targeted customer: the board of directors of our company (the 8th grade), Legal Service of our company (the 7th grade), Finance Department of our company (the 6th grade), technology department of our company (the 5th grade), the cooperation unit of our company (fourth estate), there is not cooperative relationship and non-competing adversary's unit (tertiary gradient) with our company, the benign competition adversary of our company (second grade), the vicious competitor of our company (the first estate).At this moment, if entity for example is the board of directors of our company (that is the 8th grade) under the targeted customer, and preset value for example is the fourth estate, then according to distribution policy, source user can directly be sent to the directors of our company (that is targeted customer) with targeted customer's access rights and visit limited information.In addition, if the cooperation unit that the affiliated entity of targeted customer for example is our company (namely, the fourth estate), then according to distribution policy, source user can and be visited the keeper that limited information is sent to the cooperation unit of our company with targeted customer's access rights, and the keeper encrypts targeted customer's access rights and the visit limited information that receives from source user.Wherein, the present invention does not limit the keeper to the cipher mode of information.Targeted customer's access rights after the keeper will encrypt and visit limited information are sent to targeted customer (that is the personnel of the cooperation unit of our company).So, distinguish the difference of distribution policy according to priority level or the safe class of entity under the targeted customer, thereby guarantee the information safety of transmission.
In step 105, described targeted customer handles described information after authenticating by described management center server.Particularly, after targeted customer's access rights that targeted customer's reception sources user sends and the visit limited information, can send authentication request to management center server.Wherein, authentication request for example comprises targeted customer's information.Management center server receives described authentication request, and by behind targeted customer's the authentification of message, the targeted customer obtains the associated rights (for example, the targeted customer can check confidential information) of described visit limited information.
In present embodiment, if the targeted customer receives targeted customer's access rights and the visit limited information of encryption, and the targeted customer is by after the management center server authentication, and management center server is notified the keeper will decipher rule and is sent to the targeted customer.Particularly, if the targeted customer receives targeted customer's access rights and the visit limited information of encryption from the keeper, and management center server is by behind targeted customer's the authentification of message, management center server sends announcement information to the keeper of entity under the targeted customer, and described keeper receives and will decipher rule accordingly behind the announcement information and be sent to the targeted customer.After targeted customer's receiving and deciphering rule, targeted customer's access rights and visit limited information are decrypted, and after deciphering, obtain the associated rights (for example, checking confidential information) of visit limited information.
In addition, in present embodiment, if targeted customer and described source user do not belong to same company, then management center server determines that according to external delegated strategy table source user externally sends the delegated strategy of information.Wherein, external delegated strategy table comprises the corresponding relation of the term of validity of source user rank, the affiliated entity type of targeted customer, delegated strategy, visit limited information level of confidentiality, access rights and visit limited information.In this, externally delegated strategy table example is as shown in table 2, yet the present invention does not limit this.
Figure BDA00003121892100041
Figure BDA00003121892100051
Figure BDA00003121892100071
Table 2
In practical application, the content of table 2 can arrange according to company's actual needs.In this, the source user rank comprises president, general manager and director, minister's rank, section chief's rank and clerk's rank.According to other difference of source user level, source user externally sends the authority difference of information, and at different other unit is visited limited information level of confidentiality, access rights and has time limit all different.So, guarantee fail safe that external information is sent.
In addition, in present embodiment, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server according to accident rate and the term of validity.In this, externally delegated strategy table example is as shown in table 3, yet the present invention does not limit this.
Accident rate The term of validity of visit limited information is adjusted strategy
0-5% Preset value
5%-10% Reduce by 10%
10%-20% Reduce by 20%
More than 20% Refusal sends
Table 3
For example, if because externally transmission information of source user causes having an accident, and the accident rate in a measurement period for example be 7%(wherein, accident rate equals the ratio that accident frequency that the external transmission information in the measurement period causes and source user externally send the information total degree), then according to table 3 as can be known, what strategy controller can be adjusted all-access limited information in the table 2 of management center server storage has a time limit (that is, reducing by 10%).So, can adjust safeguard measure in real time according to actual conditions.
Concrete implementation is: strategy controller sends term of validity adjustment request to management center server, wherein, carries the term of validity of visit limited information in the described term of validity adjustment request and adjusts policy information; After management center server is received term of validity adjustment request, carry out the term of validity of visit limited information and adjust strategy.0~5%, then term of validity adjustment request can not trigger as if the accident rate in the measurement period, and the term of validity is still according to original preset value.
In addition, in present embodiment, strategy controller is the cpu busy percentage of Real-time Monitor Management central server also, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.In this, strategy controller arranges the timeslice poll strategy table of comparisons, and example is as shown in table 4, yet the present invention does not limit this.
Figure BDA00003121892100081
Table 4
Particularly, strategy controller periodically detects the cpu busy percentage of management center server, when if the cpu busy percentage of management center server reaches respective threshold, strategy controller can be with the work slice of management center server, the mode by poll, distributes.For example, when the cpu busy percentage of management center server reached 80%, strategy controller distributed request to management center server transmitting time sheet, wherein, carried timeslice poll policy information in the described timeslice distribution request.After described management center server receives that described timeslice is distributed request, time of implementation sheet poll strategy; At this moment, management center server is controlled its work slice, by the mode of poll, distributes to other request work of president, general manager and director, minister's rank and section chief's level, and suspends other work of clerk's level.In like manner, if the cpu busy percentage of management center server is more high, then corresponding work slice by the mode of poll, is left the more high source user of rank for.So, be responsible for the work slice of allocation manager central server according to the cpu busy percentage situation of management center server by strategy controller, guaranteed higher-level user's request, promoted higher-level user's experience, simultaneously, avoid cpu load excessive, guaranteed communication security.
Figure 2 shows that the schematic diagram of the management system of the realization information security that preferred embodiment according to the present invention provides.As shown in Figure 2, the management system of the realization information security that provides of preferred embodiment of the present invention comprises source user 10, targeted customer 16, management center server 12, communication server 14 and strategy controller 18.Management center server 12 connects source user 10, targeted customer 16 and strategy controller 18 respectively, and communication server 14 connects source user 10 and targeted customer 16, and strategy controller 18 connects source user 10 and management center server 12.
In present embodiment, source user 10 is created the visit limited information and is sent call request to management center server 12, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request.After management center server 12 obtains targeted customer's access rights, source user 10 bound targets access privileges and visit limited information also send the distribution policy requests to strategy controller 18, wherein, carry the affiliated entity type information of targeted customer in the distribution policy request.Strategy controller 18 wherein, carries distribution policy in the distribution policy response to source user 10 feedback distribution policy responses.Source user 10 is sent to targeted customer 16 according to distribution policy with targeted customer's access rights and the visit limited information of binding.Targeted customer 16 handles described information after authenticating by management center server 12.The accident rate that strategy controller 18 periodic statistics source users 10 external transmission information cause, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the management center server 12 according to accident rate and the term of validity.The cpu busy percentage of strategy controller 18 supervision and management center servers 12, if the cpu busy percentage of management center server 12 reaches preset value, strategy controller 18 carries out poll according to the timeslice of source user level allocation management center server 12.About the specific operation process of described system, described with above-mentioned method, so repeat no more in this.
In sum, management method and the system of the realization information security that preferred embodiment provides according to the present invention, after management center server obtains targeted customer's access rights, source user is according to entity type under the targeted customer, obtain distribution policy from strategy controller, according to distribution policy, bound targets access privilege and visit limited information are sent to the targeted customer.So, realize the safety certification of information, thereby guaranteed information security.In addition, the accident rate that externally transmission information of strategy controller periodic statistics source user causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the management center server of term of validity adjustment.So, can adjust safeguard measure in real time according to actual conditions.In addition, the cpu busy percentage of strategy controller supervision and management center server, if the cpu busy percentage of management center server reaches preset value, strategy controller carries out poll according to the timeslice of source user level allocation management center server.So, avoid cpu load excessive, thereby guaranteed communication security.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (8)

1. a management method that realizes information security is characterized in that, may further comprise the steps:
Source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request;
After described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request;
Described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy;
Described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding;
Described targeted customer handles described information after authenticating by described management center server,
Wherein, the accident rate that externally transmission information of the described source user of described strategy controller periodic statistics causes, and according to accident rate and the tactful term of validity of adjusting the visit limited information in the external delegated strategy table in the described management center server of term of validity adjustment
Described strategy controller is monitored the cpu busy percentage of described management center server, if the cpu busy percentage of described management center server reaches preset value, described strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
2. method according to claim 1, it is characterized in that, the described management center server storage targeted customer access rights table of comparisons, described targeted customer's access rights table of comparisons comprises the corresponding relation of the affiliated entity type of targeted customer, visit limited information and access rights.
3. method according to claim 1 and 2 is characterized in that, described visit limited information comprises top-secret information, confidential information and secret information.
4. method according to claim 1, it is characterized in that, if the priority level of entity or safe class are greater than preset value under the targeted customer, described distribution policy is: described source user is sent to all targeted customers with described targeted customer's access rights and visit limited information;
If priority level or the safe class of entity are less than or equal to described preset value under the targeted customer, described distribution policy is: described source user is sent to described targeted customer's access rights and visit limited information the keeper of entity under the targeted customer, described keeper encrypts described targeted customer's access rights and visit limited information, and described targeted customer's access rights after will encrypting and visit limited information and be sent to all targeted customers.
5. method according to claim 4, it is characterized in that, described targeted customer receives described targeted customer's access rights and the visit limited information of encryption, and after described targeted customer authenticated by described management center server, described management center server was notified described keeper will decipher rule and is sent to described targeted customer.
6. method according to claim 1 is characterized in that, if targeted customer and described source user do not belong to same company, then described management center server determines that according to described external delegated strategy table described source user externally sends the delegated strategy of information.
7. method according to claim 6, it is characterized in that described external delegated strategy table comprises the corresponding relation of the term of validity of source user rank, the affiliated entity type of targeted customer, delegated strategy, visit limited information level of confidentiality, access rights and visit limited information.
8. management system that realizes information security, it is characterized in that, comprise source user, targeted customer, management center server, communication server and strategy controller, described management center server connects described source user, described targeted customer and described strategy controller respectively, described communication server connects described source user and described targeted customer, described strategy controller connects described source user and described management center server
Wherein, described source user is created the visit limited information and is sent call request to management center server, wherein, carries the affiliated entity type information of visit limited information level of confidentiality and targeted customer in the call request,
After described management center server obtains described targeted customer's access rights, described source user is bound described targeted customer's access rights and is visited limited information and send the distribution policy request to described strategy controller, wherein, carry source user, the affiliated entity type information of targeted customer in the described distribution policy request
Described strategy controller wherein, carries distribution policy in the described distribution policy response to the response of described source user feedback distribution policy,
Described source user is sent to described targeted customer according to described distribution policy with described targeted customer's access rights and the visit limited information of binding,
Described targeted customer handles described information after authenticating by described management center server,
The accident rate that externally transmission information of the described source user of described strategy controller periodic statistics causes, and adjust the term of validity that strategy is adjusted the visit limited information in the external delegated strategy table in the described management center server according to accident rate and the term of validity
Described strategy controller is monitored the cpu busy percentage of described management center server, if the cpu busy percentage of described management center server reaches preset value, described strategy controller carries out poll according to the timeslice of the described management center server of source user level allocation.
CN2013101537457A 2013-04-28 2013-04-28 Management method and management system for realizing information security Pending CN103281302A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013101537457A CN103281302A (en) 2013-04-28 2013-04-28 Management method and management system for realizing information security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013101537457A CN103281302A (en) 2013-04-28 2013-04-28 Management method and management system for realizing information security

Publications (1)

Publication Number Publication Date
CN103281302A true CN103281302A (en) 2013-09-04

Family

ID=49063749

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013101537457A Pending CN103281302A (en) 2013-04-28 2013-04-28 Management method and management system for realizing information security

Country Status (1)

Country Link
CN (1) CN103281302A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103530570A (en) * 2013-09-24 2014-01-22 国家电网公司 Electronic document safety management system and method
WO2014176899A1 (en) * 2013-04-28 2014-11-06 苏州亿倍信息技术有限公司 Information security management method and system
CN114510738A (en) * 2021-12-31 2022-05-17 华能烟台八角热电有限公司 Data use risk assessment method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005779A1 (en) * 2006-07-03 2008-01-03 Fujitsu Limited Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN102724221A (en) * 2011-03-30 2012-10-10 上海微河信息科技有限公司 Enterprise information system using cloud computing and method for setting user authority thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005779A1 (en) * 2006-07-03 2008-01-03 Fujitsu Limited Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method
CN102087690A (en) * 2009-12-02 2011-06-08 富士施乐株式会社 Document management system and document management method
CN102724221A (en) * 2011-03-30 2012-10-10 上海微河信息科技有限公司 Enterprise information system using cloud computing and method for setting user authority thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014176899A1 (en) * 2013-04-28 2014-11-06 苏州亿倍信息技术有限公司 Information security management method and system
CN103530570A (en) * 2013-09-24 2014-01-22 国家电网公司 Electronic document safety management system and method
CN103530570B (en) * 2013-09-24 2016-08-17 国家电网公司 A kind of electronic document safety management system and method
CN114510738A (en) * 2021-12-31 2022-05-17 华能烟台八角热电有限公司 Data use risk assessment method and system

Similar Documents

Publication Publication Date Title
EP3474172B1 (en) Access control using a blockchain
CN109547445B (en) Method and system for verifying legality of network request of client
EP2574090B1 (en) Managing mobile device applications
CN102404726B (en) Distributed control method for information of accessing internet of things by user
CN104756441A (en) Methods and apparatus for data access control
CN103179114A (en) Fine-grained access control method for data in cloud storage
CN101872399A (en) Dynamic digital copyright protection method based on dual identity authentication
CN103220141B (en) A kind of protecting sensitive data method and system based on group key strategy
DE10393847B4 (en) Method and apparatus for finding shared confidential information without affecting non-shared confidential information
CN113645195B (en) Cloud medical record ciphertext access control system and method based on CP-ABE and SM4
US10172003B2 (en) Communication security processing method, and apparatus
Yan et al. Controlling cloud data access based on reputation
CN103297963B (en) Based on the method and system without the M2M secret protection of certificate and key management
KR20120072032A (en) The system and method for performing mutual authentication of mobile terminal
CN103281302A (en) Management method and management system for realizing information security
CN102999710A (en) Method, equipment and system for safely sharing digital content
CN103269268A (en) Method and system for managing information safety
CN109413648B (en) Access control method, terminal, smart card, background server and storage medium
CN117527378A (en) Data encryption transmission method and system based on user attribute and dynamic strategy
CN103281304A (en) Information safety processing method and system
US8699710B2 (en) Controlled security domains
CN103186724B (en) The dissemination method of digital content and device, terminal
CN101166090A (en) An authorization method based on multiple authentication and RSA authentication
CN102932354A (en) Verification method and device for internet protocol (IP) address
CN102819696B (en) Prevent account data by the method for unauthorized access and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130904