CN106779458A - A kind of confidential part management system - Google Patents

A kind of confidential part management system Download PDF

Info

Publication number
CN106779458A
CN106779458A CN201611248164.1A CN201611248164A CN106779458A CN 106779458 A CN106779458 A CN 106779458A CN 201611248164 A CN201611248164 A CN 201611248164A CN 106779458 A CN106779458 A CN 106779458A
Authority
CN
China
Prior art keywords
module
confidential part
operator
part management
safe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611248164.1A
Other languages
Chinese (zh)
Inventor
龚桦枫
郭辉
裴高翔
胡明光
张伟
沈立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Jinwang Information Industry Co Ltd
Original Assignee
Ningbo Jinwang Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Jinwang Information Industry Co Ltd filed Critical Ningbo Jinwang Information Industry Co Ltd
Priority to CN201611248164.1A priority Critical patent/CN106779458A/en
Publication of CN106779458A publication Critical patent/CN106779458A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Game Theory and Decision Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of confidential part management system of the present invention, including confidential part management platform and first operator's module, system manager's module and second operator's module can be included with some checking terminals of confidential part management platform connecting communication, confidential part management platform;System manager's module is used to create new user profile;First operator's module is used for establishment file and receives and dispatches task, the distribution or recovery of the confidential part of transmitting/receiving file task correspondence;Second operator's module is used for according to transmitting/receiving file task, sends task application and asks to corresponding first operator module, and the user profile of the operator is included in task application request;Task application request is permitted or refused to first operator's module according to the user profile of the second operator, if permitting, the task application is asked, and will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute or reclaim corresponding confidential part.

Description

A kind of confidential part management system
Technical field
The present invention relates to art file management technology, and in particular to a kind of confidential part management system.
Background technology
Confidential part is the more important file with the expansion of industry size in industry-by-industry, and with all trades and professions Information-based popularization and application, it is more and more wider come the application of storage information using electronic information, and the pipe of the confidential part of correspondence Reason, still also more fall behind, typically all using electronic data management, but be only confidential part is encoded, borrow with And delineation of power, and the work for specifically managing or relying on keeper is differentiated, and the typing of management information is still used Manual typing and the pattern of management, manual typing and management mode have that efficiency is low, workload is cumbersome and file borrows tracking Not in time the problems such as.Be present low level of security, complex management, responsibility in ordinary file management system, it is impossible to have The distribution and recovery of effect management classified papers, this is just to the security requirement more and more higher of information system.More especially to information The exigent unit of safety is to enterprise, it is necessary to a set of information system with high safety rank carries out related content pipe Reason, just can guarantee that the electronic data security of internal system, it is to avoid attacks and reveals.
The content of the invention
It is an object of the present invention to provide a kind of confidential part management system, solves above technical problem;
Technical problem solved by the invention can be realized using following technical scheme:A kind of confidential part management system, It is characterised in that it includes confidential part management platform and can be with some checking terminals of confidential part management platform connecting communication, institute Stating confidential part management platform includes first operator's module, system manager's module and second operator's module;
First operator, system manager and the second operator test respective user profile by confidential part management platform First operator's module, system manager's module and second operator's module are logined after card respectively, and produces log-on message;Institute User profile is stated for the authentication of user;
System manager's module is used to create new user profile;
The first operator module is used for establishment file and receives and dispatches task, and the transmitting/receiving file task corresponds to dividing for confidential part Hair is reclaimed;
The second operator module is used for according to the transmitting/receiving file task, sends task application and asks to corresponding the One operator's module, includes the user profile of second operator in the task application request;
The first operator module permits or refuses that the task application please according to the user profile of second operator Ask, if permitting, the task application is asked, and will distribute or reclaim corresponding confidential part;If refusing task application request, no Give distribution or reclaim corresponding confidential part.
Further, described checking terminal is also associated with verifying device that the checking device is used to gather characteristics of human body Information, the user profile includes characteristics of human body's information.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part Safe and secret member's module is logined after platform validation respectively and log-on message is produced;The confidential part management system correspondence is each confidential Part is configured with Permission Levels, during the new user profile of system manager's module creation one, specifies the authority of the user profile Scope, the extent of competence includes some Permission Levels, and the extent of competence of appointed user profile is by safe and secret After member's module license comes into force, user can access the confidential part of corresponding authority grade in the extent of competence.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part Safe and secret member's module is logined after platform validation respectively and log-on message is produced;System manager's module is additionally operable to change institute The system information of confidential part management platform is stated, the confidential part management platform information changed is permitted through safe and secret member's module After come into force.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part Safe and secret member's module is logined after platform validation respectively and log-on message is produced;The user profile also includes IP address and MAC Address, the confidential part management platform obtains the IP address and MAC Address produced during User logs in, safe and secret member's module For the IP address and MAC Address to be bound with the user profile of the user.
Further, the confidential part management platform also includes operation monitoring module, and the operation monitoring module is used to remember Operation information of the family in the confidential part management platform is employed, the operation information at least includes Action Events, operating time, behaviour Make user;The Action Events include file, data object or the result of operation;The operating time includes rising for Action Events Time beginning terminates the time.
Further, the type of the operation user includes security audit person, the first operator, system manager, safety Custodian, the second operator.
Further, the confidential part management platform also includes
Security audit person's module, the security audit person is by corresponding user profile after confidential part management platform is verified Login security audit person's module;Security audit person's module be used to call and check user type for system manager and The operation information of safe and secret member and/or described login information.
Further, safe and secret member's module is used to calling and checking that user type is operator and security audit person The operation information and/or described etc. enter information.
Further, the checking device is fingerprint capturer.
Beneficial effect:Due to using above technical scheme, by so design, the issue and reception of confidential part are required for leading to Crossing safe and secret member carries out task issue and request confirmation, so, it is possible to storage and the outbound letter to each confidential part Breath is managed, it is ensured that the security of confidential part, and the establishment of user profile and the management of confidential part pass through system administration respectively Member's module and safe and secret member's module carry out function implementation, authority independence so that the more anxious reliability of whole system is complete.
Brief description of the drawings
Fig. 1 is system hardware Organization Chart of the invention;
Fig. 2 is system module Organization Chart of the invention;
Fig. 3 is system flow chart of the invention;
Fig. 4 is system distribution flow figure two of the invention.
Reference:1st, confidential part management platform;11st, safe and secret member's module;12nd, security audit person's module;131st, One operator's module;132nd, second operator's module;14th, system manager's module;15th, monitoring module is operated;2nd, terminal is verified; 3rd, device is verified.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of creative work is not made it is all its His embodiment, belongs to the scope of protection of the invention.
It should be noted that in the case where not conflicting, the embodiment in the present invention and the feature in embodiment can phases Mutually combination.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as limiting to the invention.
A kind of confidential part management system, including confidential part management platform 1 and can be connected logical with confidential part management platform 1 Some checking terminals 2 of news, confidential part management platform 1 has HTTP server and the database server to carry out function services.It is confidential Part management platform 1 includes safe and secret member's module 11, the operator's module 132 of system manager's module 14 and second;
Safe and secret member, the first operator, the second operator, system manager and the second operator believe respective user Breath logins safe and secret member's module 11, system manager's module 14 and first respectively after confidential part management platform 1 is verified Operator's module 131, second operator's module 132, and produce log-on message;Security audit person's module 12, security audit person will Corresponding user profile logins security audit person's module 12 after confidential part management platform 1 is verified.While making in the module With preceding, obtain whether the user has using the authority of the module according to login user account, carry out second checking.
System manager's module 14 can perform following basic function:1st, the actual conditions according to unit carry out department information Maintenance, such as increase newly department, change department information, delete department.2nd, the actual conditions according to personnel are come attendant's information, Such as Add User, change user profile, delete user.User's lock-out state is released, the access password of user is reset.3rd, carry out The display Name of the maintenance of system information, such as initialization system, if open IP checkings, if use identifying code, if enable User locks, the complexity checking of password, if carry out the expired checking of password, and the setting of password each day it's overdue empties the work(such as warning Energy.4th, timed task configuration, periodically empties password error number of times, the disk space of regular monitoring database server.5th, check System failure daily record.6th, the maintenance of other common tables and data dictionary.
Safe and secret member's module 11 can perform following basic function:1st, it is the user's distributing user type in system.Such as Security audit person, safe and secret member, system manager, the second operator.And module (the security audit that every kind of group can access Member's module 12, safe and secret member's module 11, system manager's module 14, second operator's module 132).2nd, it is the user of system Distribution extent of competence, different extent of competence can consult different with the information for browsing, and work as user and initiate once in system When access request is initiated in one address, its extent of competence is carried out judging whether it can access the address first, if it could not, Then refusal request.3rd, it is user's binding IP and MAC Address of system.4th, stepping on for common second operator and security audit person is checked Enter information;5th, the operation information of common second operator and security audit person is checked, for supervising common second operator and An Full auditor.
Security audit person's module 12 can perform following basic function:1st, stepping on for system manager and safe and secret member is checked Enter information.2nd, the operation information of system manager and safe and secret member is checked.3rd, the work of operational statistics class, can be machine The Information Statistics of important document, or the Information Statistics of confidential part inner content data, and the authority of security audit person be also by Safe and secret member's distribution.But security audit person can also play a part of a supervision to system manager and safe and secret member.
Second operator's module 132 can perform following basic function:1st, the related service under respective extent of competence is completed, The issue of such as confidential part and recovery;2nd, determined whether to change the authority of related confidential part content according to authority setting.
The system has bound fixed access modules to each group.User in the group can only access fixed work( Can module.Simultaneity factor actual load two-layer blocker, first against the access without authentication is intercepted and is recorded, In addition for the user by authentication, the group according to where it verifies whether it has the authority for accessing respective modules. If it find that unauthorized access, after being accessed rejection, and records, the content of record is realized by operating monitoring module 15, side Just system manager or safe and secret member consult.So ensure and prevent URL to kidnap and request camouflage.
Above-mentioned basic authority realizes the preliminary function of whole system, including system operation and the basic maintenance supervision of system Implement, and further, the confidential part management function of system is made and is discussed in detail:
To that should have a user profile, user profile is the realization of the functions such as the checking for user to each user, and this In system, checking terminal 2 be also associated with verify device 3, checking device 3 be used for gather characteristics of human body's information, user profile bag Include characteristics of human body's information.Checking device 3 is fingerprint capturer.Checking terminal 2 can be arbitrary outer net electronic equipment, or Intranet Terminal, and according to safe class different demarcation extent of competence, and user can manually input account, password etc. and login information, And when performing corresponding authority, further information of the checking to increase or prove need to be carried out by fingerprint capturer, to avoid machine The influence that important document leakage is caused, so shown in reference picture 1, there are multiple following structures, and customer data base then configures user Basic document and user type, extent of competence of other information in addition to the user profile needed for checking, such as user etc. Deng.
System manager's module 14 is used to create new user profile, and the other information of correspondence user is entered in platform in the lump Row storage generation, user profile also includes IP address and MAC Address, and confidential part management platform 1 obtains what is produced during User logs in IP address and MAC Address, safe and secret member's module 11 are used to bind IP address and MAC Address with the user profile of the user. The each confidential part of correspondence is configured with Permission Levels, when system manager's module 14 creates a new user profile, specifies the user The extent of competence of information, extent of competence includes some Permission Levels, and the extent of competence of appointed user profile is protected by safety After the close license of member's module 11 comes into force, user can intra vires access the confidential part of corresponding authority grade.And and data safety Whether related user's other information, such as user grouping, user right range information, user can change the power of business sheet Limit, is all that after the confirmation of safe and secret member's module 11, can just come into force;But safe and secret member's module 11 itself can not be implemented The function of division, only realizes the function of judging, and the function of dividing is realized by system manager's module 14.
Shown in reference picture 2, a confidential part need to be such as issued, then the first operator's module 131 for first corresponding to is created that One file distribution task, and after second operator's module 132 receives the task, there is task application request, while by referring to Line collector uploads the finger print information of oneself, is identified as one of user profile, and now, according to the second operator's Situations such as extent of competence, fingerprint recognition situation, information of the second operator, first operator's module 131 judges whether license, if This document is then consigned to corresponding second operator by license, and operation behavior is recorded, while marking the confidential part State.Likewise, the step of recycling machine important document is similar, do not repeat, and specific functions of modules is as follows,
First operator's module 131 is used for establishment file and receives and dispatches task, the distribution of the confidential part of transmitting/receiving file task correspondence or Reclaim;
Second operator's module 132 is used for according to transmitting/receiving file task, sends task application and asks to the corresponding first behaviour Work person's module 131, includes the user profile of second operator in task application request;
Task application request is permitted or refused to first operator's module 131 according to the user profile of the second operator, if Permit that the task application is asked, then will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute Or reclaim corresponding confidential part.
System manager's module 14 is additionally operable to change the system information of confidential part management platform 1, and system information includes department Grouping information;User profile;The display Name of internal system information such as initialization system, if open IP checkings, if use Identifying code, if enable user's locking, the complexity checking of password, if carry out the expired checking of password, password each day it's overdue sets It is fixed, empty the functions such as warning;Systemic-function information, timed task configuration empties password error number of times, monitoring database server Disk space;Common table and data dictionary, and for the modification of key message may influence whether system security and can By property, so the modification authority of system manager's module 14 is not directly to come into force, but it has been made after changing, and is changed The confidential information of part management platform 1 comes into force after permitting through safe and secret member's module 11.Sensitive information (ratio this for system information Such as systematic name, password locking number of times etc.), it is necessary to system administration proposes the modification application to system information, by safe guarantor After close member agrees to, come into force just now.If safe and secret member disagrees, modification of the system manager to system information is not come into force 's.
Confidential part management platform 1 also includes operation monitoring module 15, and operation monitoring module 15 is used to record user confidential The operation information of part management platform 1, operation information at least includes Action Events, operating time, operation user;Action Events include The file of operation, data object or result;Operating time includes the initial time of Action Events or terminates time, the time of record It is the clock generation by being uniquely determined in network, can is the clock of HTTP server, it is ensured that temporal uniformity.Operation The type of user includes security audit person, the first operator, the second operator, system manager, safe and secret member.
In addition, the design uses the persistent layer technology of Spring3+Mybatis in framework, add to carrying out SSL to whole station Close, in order to protect safety of the sensitive data in transmit process, global many esbablished corporations use SSL (Security Socket Layer) encryption mechanism.SSL is the safe and secret agreement that Netscape companies are proposed, in browser (such as Internet Explorer, Netscape Navigator) and Web server (the Netscape Enterprise of such as Netscape Server, ColdFusion Server etc.) between construct escape way and carry out data transmission, SSL operates in tcp/ip layer On, under application layer, for application program provides encryption data passage, it employs the AESs such as RC4, MD5 and RSA, Use the key of 40, it is adaptable to the encryption of business information.Meanwhile, it is simultaneously interior that Netscape companies accordingly develop HTTPS agreements Be placed in its browser, HTTPS is actually HTTP over SSL, it use default port 443, rather than as HTTP that Sample is communicated using port 80 with TCP/IP.HTTPS agreements are encrypted initial data in sender using SSL, so It is decrypted in reciever afterwards, encryption and decryption need sender and reciever by exchanging known key to realize, therefore, The data for being transmitted are not easy to be intercepted and captured and decrypted by network hacker, generate the digital certificate of high-level AES (SHA256). 8080 ports are closed, forces all of access to encrypt port using 8443, application SSL channel encryptions technology is for complete in the frame The access encryption of office.(irreversible) is stored in database after user cipher is encrypted using SM3 DEAs, so Ensure that other cannot get the real content of the password per capita except open air is used.Even if password meets with intercepting and capturing, also can only obtain close Text.So may insure the safety of user cipher.And password has uniqueness after encryption, that is to say, that even if identical is close Code, the value in being stored in database after encrypted is also different.In the case of user's some time not more new password, system User's Modify password can be Qiang Zhiyaoqiud, then just allows it to access the system.Module outside access privilege is not to user Open, when user attempts to be accessed by illegal means the picture outside its authority, system can automatically intercept the access, and record In generation operation information.
Preferred embodiments of the present invention are the foregoing is only, embodiments of the present invention and protection model is not thereby limited Enclose, to those skilled in the art, should can appreciate that done by all utilization description of the invention and diagramatic content Scheme obtained by equivalent and obvious change, should be included in protection scope of the present invention.

Claims (10)

1. a kind of confidential part management system, it is characterised in that including confidential part management platform and can be with confidential part management platform Some checking terminals of connecting communication, the confidential part management platform include first operator's module, system manager's module with And the second operator's module;
First operator, system manager and the second operator are by respective user profile after confidential part management platform is verified First operator's module, system manager's module and second operator's module are logined respectively, and produce log-on message;The use Family information is used for the authentication of user;
System manager's module is used to create new user profile;
The first operator module is used for establishment file and receives and dispatches task, the distribution of the confidential part of transmitting/receiving file task correspondence or Reclaim;
The second operator module is used for according to the transmitting/receiving file task, sends task application and asks to the corresponding first behaviour Work person's module, includes the user profile of second operator in the task application request;
Task application request is permitted or refused to the first operator module according to the user profile of second operator, if Permit that the task application is asked, then will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute Or reclaim corresponding confidential part.
2. a kind of confidential part management system according to claim 1, it is characterised in that described checking terminal is also associated with Checking device, the checking device is used to gather characteristics of human body's information, and the user profile includes characteristics of human body's information.
3. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module, Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing Log-on message;The each confidential part of the confidential part management system correspondence is configured with Permission Levels, system manager's module wound When building a new user profile, the extent of competence of the user profile, the extent of competence is specified to include some Permission Levels, After the license of safe and secret member's module comes into force, user can be in the extent of competence for the extent of competence of appointed user profile Access the confidential part of corresponding authority grade.
4. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module, Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing Log-on message;System manager's module is additionally operable to change the system information of the confidential part management platform, the machine changed Important document management platform information comes into force after permitting through safe and secret member's module.
5. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module, Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing Log-on message;The user profile also includes IP address and MAC Address, and the confidential part management platform is produced when obtaining User logs in Raw IP address and MAC Address, safe and secret member's module are used for the user of the IP address and MAC Address and the user Information is bound.
6. a kind of confidential part management system according to claim 3 or 4 or 5, it is characterised in that the confidential part management is flat Platform also includes operation monitoring module, and the operation monitoring module is used to record operation letter of the user in the confidential part management platform Breath, the operation information at least includes Action Events, operating time, operation user;File of the Action Events including operation, Data object or result;The operating time includes the initial time of Action Events or terminates the time.
7. a kind of confidential part management system according to claim 6, it is characterised in that the type of the operation user includes Security audit person, the first operator, the second operator, system manager, safe and secret member.
8. a kind of confidential part management system according to claim 7, it is characterised in that the confidential part management platform is also wrapped Include
Security audit person's module, the security audit person logins corresponding user profile after confidential part management platform is verified Security audit person's module;
Security audit person's module is used to calling and checking that user type is system manager and the behaviour of safe and secret member Make information and/or described login information.
9. a kind of confidential part management system according to claim 7, it is characterised in that safe and secret member's module is used for User type is called and checked for the operation information of operator and security audit person and/or described etc. enters information.
10. a kind of confidential part management system according to claim 2, it is characterised in that the checking device is adopted for fingerprint Storage.
CN201611248164.1A 2016-12-29 2016-12-29 A kind of confidential part management system Pending CN106779458A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611248164.1A CN106779458A (en) 2016-12-29 2016-12-29 A kind of confidential part management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611248164.1A CN106779458A (en) 2016-12-29 2016-12-29 A kind of confidential part management system

Publications (1)

Publication Number Publication Date
CN106779458A true CN106779458A (en) 2017-05-31

Family

ID=58929273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611248164.1A Pending CN106779458A (en) 2016-12-29 2016-12-29 A kind of confidential part management system

Country Status (1)

Country Link
CN (1) CN106779458A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873035A (en) * 2021-09-28 2021-12-31 北京天融信网络安全技术有限公司 File transmission method and device, file transmission equipment and user terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07182414A (en) * 1993-12-24 1995-07-21 Nec Corp Developing daily schedule management system
CN101459668A (en) * 2007-12-14 2009-06-17 索尼株式会社 Contents viewing and listening management apparatus, contents viewing and listening management system and method thereof, and program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH07182414A (en) * 1993-12-24 1995-07-21 Nec Corp Developing daily schedule management system
CN101459668A (en) * 2007-12-14 2009-06-17 索尼株式会社 Contents viewing and listening management apparatus, contents viewing and listening management system and method thereof, and program

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113873035A (en) * 2021-09-28 2021-12-31 北京天融信网络安全技术有限公司 File transmission method and device, file transmission equipment and user terminal

Similar Documents

Publication Publication Date Title
CN109831327B (en) IMS full-service network monitoring intelligent operation and maintenance support system based on big data analysis
JP6606156B2 (en) Data security service
EP2957063B1 (en) Policy enforcement with associated data
CN103501228B (en) A kind of dynamic two-dimension code token and dynamic two-dimension code command identifying method
CN106776141B (en) A kind of backup and recovery system enhanced safely
CN105430000A (en) Cloud computing security management system
CN103152179A (en) Uniform identity authentication method suitable for multiple application systems
CN110069918A (en) A kind of efficient double factor cross-domain authentication method based on block chain technology
CN104767731A (en) Identity authentication protection method of Restful mobile transaction system
CN106533693B (en) Access method and device of railway vehicle monitoring and overhauling system
CN103442354A (en) Mobile-police-terminal safety management and control system
CN104202338A (en) Secure access method applicable to enterprise-level mobile applications
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
CN104504538A (en) Distributed personnel file management system
CN105554018A (en) Network real name verification method
CN109309645A (en) A kind of software distribution security guard method
CN110998572A (en) Self-verification user authentication method based on time-dependent blockchain
CN114357490A (en) Data sharing method, device and system based on block chain
CN115270182A (en) Power grid project closed-loop control file management system
Kyrillidis et al. Distributed e-voting using the smart card web server
CN106779458A (en) A kind of confidential part management system
CN115643573A (en) Privileged account authentication method and system based on dynamic security environment
Yu et al. Research on zero trust access control model and formalization based on rail transit data platform
CN105429986B (en) A kind of system of genuine cyber identification verifying and secret protection
CN105743883B (en) A kind of the identity attribute acquisition methods and device of network application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Haishu District of Zhejiang province 315000 Bu Zheng Xiang, Ningbo City No. 16 (Chong Building 10 floor)

Applicant after: Zhejiang KingNet Chengdu Westone Information Industry Inc.

Address before: Haishu District of Zhejiang province 315000 Bu Zheng Xiang, Ningbo City No. 16 (Chong Building 10 floor)

Applicant before: NINGBO JINWANG INFORMATION INDUSTRY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication