CN106779458A - A kind of confidential part management system - Google Patents
A kind of confidential part management system Download PDFInfo
- Publication number
- CN106779458A CN106779458A CN201611248164.1A CN201611248164A CN106779458A CN 106779458 A CN106779458 A CN 106779458A CN 201611248164 A CN201611248164 A CN 201611248164A CN 106779458 A CN106779458 A CN 106779458A
- Authority
- CN
- China
- Prior art keywords
- module
- confidential part
- operator
- part management
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 3
- 238000007726 management method Methods 0.000 claims description 63
- 238000012550 audit Methods 0.000 claims description 24
- 238000012544 monitoring process Methods 0.000 claims description 10
- 230000009471 action Effects 0.000 claims description 9
- 230000008859 change Effects 0.000 claims description 8
- 238000011084 recovery Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 4
- 238000012423 maintenance Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 241000625014 Vir Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000004064 recycling Methods 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Human Resources & Organizations (AREA)
- Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Hardware Design (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
A kind of confidential part management system of the present invention, including confidential part management platform and first operator's module, system manager's module and second operator's module can be included with some checking terminals of confidential part management platform connecting communication, confidential part management platform;System manager's module is used to create new user profile;First operator's module is used for establishment file and receives and dispatches task, the distribution or recovery of the confidential part of transmitting/receiving file task correspondence;Second operator's module is used for according to transmitting/receiving file task, sends task application and asks to corresponding first operator module, and the user profile of the operator is included in task application request;Task application request is permitted or refused to first operator's module according to the user profile of the second operator, if permitting, the task application is asked, and will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute or reclaim corresponding confidential part.
Description
Technical field
The present invention relates to art file management technology, and in particular to a kind of confidential part management system.
Background technology
Confidential part is the more important file with the expansion of industry size in industry-by-industry, and with all trades and professions
Information-based popularization and application, it is more and more wider come the application of storage information using electronic information, and the pipe of the confidential part of correspondence
Reason, still also more fall behind, typically all using electronic data management, but be only confidential part is encoded, borrow with
And delineation of power, and the work for specifically managing or relying on keeper is differentiated, and the typing of management information is still used
Manual typing and the pattern of management, manual typing and management mode have that efficiency is low, workload is cumbersome and file borrows tracking
Not in time the problems such as.Be present low level of security, complex management, responsibility in ordinary file management system, it is impossible to have
The distribution and recovery of effect management classified papers, this is just to the security requirement more and more higher of information system.More especially to information
The exigent unit of safety is to enterprise, it is necessary to a set of information system with high safety rank carries out related content pipe
Reason, just can guarantee that the electronic data security of internal system, it is to avoid attacks and reveals.
The content of the invention
It is an object of the present invention to provide a kind of confidential part management system, solves above technical problem;
Technical problem solved by the invention can be realized using following technical scheme:A kind of confidential part management system,
It is characterised in that it includes confidential part management platform and can be with some checking terminals of confidential part management platform connecting communication, institute
Stating confidential part management platform includes first operator's module, system manager's module and second operator's module;
First operator, system manager and the second operator test respective user profile by confidential part management platform
First operator's module, system manager's module and second operator's module are logined after card respectively, and produces log-on message;Institute
User profile is stated for the authentication of user;
System manager's module is used to create new user profile;
The first operator module is used for establishment file and receives and dispatches task, and the transmitting/receiving file task corresponds to dividing for confidential part
Hair is reclaimed;
The second operator module is used for according to the transmitting/receiving file task, sends task application and asks to corresponding the
One operator's module, includes the user profile of second operator in the task application request;
The first operator module permits or refuses that the task application please according to the user profile of second operator
Ask, if permitting, the task application is asked, and will distribute or reclaim corresponding confidential part;If refusing task application request, no
Give distribution or reclaim corresponding confidential part.
Further, described checking terminal is also associated with verifying device that the checking device is used to gather characteristics of human body
Information, the user profile includes characteristics of human body's information.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part
Safe and secret member's module is logined after platform validation respectively and log-on message is produced;The confidential part management system correspondence is each confidential
Part is configured with Permission Levels, during the new user profile of system manager's module creation one, specifies the authority of the user profile
Scope, the extent of competence includes some Permission Levels, and the extent of competence of appointed user profile is by safe and secret
After member's module license comes into force, user can access the confidential part of corresponding authority grade in the extent of competence.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part
Safe and secret member's module is logined after platform validation respectively and log-on message is produced;System manager's module is additionally operable to change institute
The system information of confidential part management platform is stated, the confidential part management platform information changed is permitted through safe and secret member's module
After come into force.
Further, also including safe and secret member's module, safe and secret member manages its user profile by confidential part
Safe and secret member's module is logined after platform validation respectively and log-on message is produced;The user profile also includes IP address and MAC
Address, the confidential part management platform obtains the IP address and MAC Address produced during User logs in, safe and secret member's module
For the IP address and MAC Address to be bound with the user profile of the user.
Further, the confidential part management platform also includes operation monitoring module, and the operation monitoring module is used to remember
Operation information of the family in the confidential part management platform is employed, the operation information at least includes Action Events, operating time, behaviour
Make user;The Action Events include file, data object or the result of operation;The operating time includes rising for Action Events
Time beginning terminates the time.
Further, the type of the operation user includes security audit person, the first operator, system manager, safety
Custodian, the second operator.
Further, the confidential part management platform also includes
Security audit person's module, the security audit person is by corresponding user profile after confidential part management platform is verified
Login security audit person's module;Security audit person's module be used to call and check user type for system manager and
The operation information of safe and secret member and/or described login information.
Further, safe and secret member's module is used to calling and checking that user type is operator and security audit person
The operation information and/or described etc. enter information.
Further, the checking device is fingerprint capturer.
Beneficial effect:Due to using above technical scheme, by so design, the issue and reception of confidential part are required for leading to
Crossing safe and secret member carries out task issue and request confirmation, so, it is possible to storage and the outbound letter to each confidential part
Breath is managed, it is ensured that the security of confidential part, and the establishment of user profile and the management of confidential part pass through system administration respectively
Member's module and safe and secret member's module carry out function implementation, authority independence so that the more anxious reliability of whole system is complete.
Brief description of the drawings
Fig. 1 is system hardware Organization Chart of the invention;
Fig. 2 is system module Organization Chart of the invention;
Fig. 3 is system flow chart of the invention;
Fig. 4 is system distribution flow figure two of the invention.
Reference:1st, confidential part management platform;11st, safe and secret member's module;12nd, security audit person's module;131st,
One operator's module;132nd, second operator's module;14th, system manager's module;15th, monitoring module is operated;2nd, terminal is verified;
3rd, device is verified.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art obtained on the premise of creative work is not made it is all its
His embodiment, belongs to the scope of protection of the invention.
It should be noted that in the case where not conflicting, the embodiment in the present invention and the feature in embodiment can phases
Mutually combination.
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings, but not as limiting to the invention.
A kind of confidential part management system, including confidential part management platform 1 and can be connected logical with confidential part management platform 1
Some checking terminals 2 of news, confidential part management platform 1 has HTTP server and the database server to carry out function services.It is confidential
Part management platform 1 includes safe and secret member's module 11, the operator's module 132 of system manager's module 14 and second;
Safe and secret member, the first operator, the second operator, system manager and the second operator believe respective user
Breath logins safe and secret member's module 11, system manager's module 14 and first respectively after confidential part management platform 1 is verified
Operator's module 131, second operator's module 132, and produce log-on message;Security audit person's module 12, security audit person will
Corresponding user profile logins security audit person's module 12 after confidential part management platform 1 is verified.While making in the module
With preceding, obtain whether the user has using the authority of the module according to login user account, carry out second checking.
System manager's module 14 can perform following basic function:1st, the actual conditions according to unit carry out department information
Maintenance, such as increase newly department, change department information, delete department.2nd, the actual conditions according to personnel are come attendant's information,
Such as Add User, change user profile, delete user.User's lock-out state is released, the access password of user is reset.3rd, carry out
The display Name of the maintenance of system information, such as initialization system, if open IP checkings, if use identifying code, if enable
User locks, the complexity checking of password, if carry out the expired checking of password, and the setting of password each day it's overdue empties the work(such as warning
Energy.4th, timed task configuration, periodically empties password error number of times, the disk space of regular monitoring database server.5th, check
System failure daily record.6th, the maintenance of other common tables and data dictionary.
Safe and secret member's module 11 can perform following basic function:1st, it is the user's distributing user type in system.Such as
Security audit person, safe and secret member, system manager, the second operator.And module (the security audit that every kind of group can access
Member's module 12, safe and secret member's module 11, system manager's module 14, second operator's module 132).2nd, it is the user of system
Distribution extent of competence, different extent of competence can consult different with the information for browsing, and work as user and initiate once in system
When access request is initiated in one address, its extent of competence is carried out judging whether it can access the address first, if it could not,
Then refusal request.3rd, it is user's binding IP and MAC Address of system.4th, stepping on for common second operator and security audit person is checked
Enter information;5th, the operation information of common second operator and security audit person is checked, for supervising common second operator and An
Full auditor.
Security audit person's module 12 can perform following basic function:1st, stepping on for system manager and safe and secret member is checked
Enter information.2nd, the operation information of system manager and safe and secret member is checked.3rd, the work of operational statistics class, can be machine
The Information Statistics of important document, or the Information Statistics of confidential part inner content data, and the authority of security audit person be also by
Safe and secret member's distribution.But security audit person can also play a part of a supervision to system manager and safe and secret member.
Second operator's module 132 can perform following basic function:1st, the related service under respective extent of competence is completed,
The issue of such as confidential part and recovery;2nd, determined whether to change the authority of related confidential part content according to authority setting.
The system has bound fixed access modules to each group.User in the group can only access fixed work(
Can module.Simultaneity factor actual load two-layer blocker, first against the access without authentication is intercepted and is recorded,
In addition for the user by authentication, the group according to where it verifies whether it has the authority for accessing respective modules.
If it find that unauthorized access, after being accessed rejection, and records, the content of record is realized by operating monitoring module 15, side
Just system manager or safe and secret member consult.So ensure and prevent URL to kidnap and request camouflage.
Above-mentioned basic authority realizes the preliminary function of whole system, including system operation and the basic maintenance supervision of system
Implement, and further, the confidential part management function of system is made and is discussed in detail:
To that should have a user profile, user profile is the realization of the functions such as the checking for user to each user, and this
In system, checking terminal 2 be also associated with verify device 3, checking device 3 be used for gather characteristics of human body's information, user profile bag
Include characteristics of human body's information.Checking device 3 is fingerprint capturer.Checking terminal 2 can be arbitrary outer net electronic equipment, or Intranet
Terminal, and according to safe class different demarcation extent of competence, and user can manually input account, password etc. and login information,
And when performing corresponding authority, further information of the checking to increase or prove need to be carried out by fingerprint capturer, to avoid machine
The influence that important document leakage is caused, so shown in reference picture 1, there are multiple following structures, and customer data base then configures user
Basic document and user type, extent of competence of other information in addition to the user profile needed for checking, such as user etc.
Deng.
System manager's module 14 is used to create new user profile, and the other information of correspondence user is entered in platform in the lump
Row storage generation, user profile also includes IP address and MAC Address, and confidential part management platform 1 obtains what is produced during User logs in
IP address and MAC Address, safe and secret member's module 11 are used to bind IP address and MAC Address with the user profile of the user.
The each confidential part of correspondence is configured with Permission Levels, when system manager's module 14 creates a new user profile, specifies the user
The extent of competence of information, extent of competence includes some Permission Levels, and the extent of competence of appointed user profile is protected by safety
After the close license of member's module 11 comes into force, user can intra vires access the confidential part of corresponding authority grade.And and data safety
Whether related user's other information, such as user grouping, user right range information, user can change the power of business sheet
Limit, is all that after the confirmation of safe and secret member's module 11, can just come into force;But safe and secret member's module 11 itself can not be implemented
The function of division, only realizes the function of judging, and the function of dividing is realized by system manager's module 14.
Shown in reference picture 2, a confidential part need to be such as issued, then the first operator's module 131 for first corresponding to is created that
One file distribution task, and after second operator's module 132 receives the task, there is task application request, while by referring to
Line collector uploads the finger print information of oneself, is identified as one of user profile, and now, according to the second operator's
Situations such as extent of competence, fingerprint recognition situation, information of the second operator, first operator's module 131 judges whether license, if
This document is then consigned to corresponding second operator by license, and operation behavior is recorded, while marking the confidential part
State.Likewise, the step of recycling machine important document is similar, do not repeat, and specific functions of modules is as follows,
First operator's module 131 is used for establishment file and receives and dispatches task, the distribution of the confidential part of transmitting/receiving file task correspondence or
Reclaim;
Second operator's module 132 is used for according to transmitting/receiving file task, sends task application and asks to the corresponding first behaviour
Work person's module 131, includes the user profile of second operator in task application request;
Task application request is permitted or refused to first operator's module 131 according to the user profile of the second operator, if
Permit that the task application is asked, then will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute
Or reclaim corresponding confidential part.
System manager's module 14 is additionally operable to change the system information of confidential part management platform 1, and system information includes department
Grouping information;User profile;The display Name of internal system information such as initialization system, if open IP checkings, if use
Identifying code, if enable user's locking, the complexity checking of password, if carry out the expired checking of password, password each day it's overdue sets
It is fixed, empty the functions such as warning;Systemic-function information, timed task configuration empties password error number of times, monitoring database server
Disk space;Common table and data dictionary, and for the modification of key message may influence whether system security and can
By property, so the modification authority of system manager's module 14 is not directly to come into force, but it has been made after changing, and is changed
The confidential information of part management platform 1 comes into force after permitting through safe and secret member's module 11.Sensitive information (ratio this for system information
Such as systematic name, password locking number of times etc.), it is necessary to system administration proposes the modification application to system information, by safe guarantor
After close member agrees to, come into force just now.If safe and secret member disagrees, modification of the system manager to system information is not come into force
's.
Confidential part management platform 1 also includes operation monitoring module 15, and operation monitoring module 15 is used to record user confidential
The operation information of part management platform 1, operation information at least includes Action Events, operating time, operation user;Action Events include
The file of operation, data object or result;Operating time includes the initial time of Action Events or terminates time, the time of record
It is the clock generation by being uniquely determined in network, can is the clock of HTTP server, it is ensured that temporal uniformity.Operation
The type of user includes security audit person, the first operator, the second operator, system manager, safe and secret member.
In addition, the design uses the persistent layer technology of Spring3+Mybatis in framework, add to carrying out SSL to whole station
Close, in order to protect safety of the sensitive data in transmit process, global many esbablished corporations use SSL (Security Socket
Layer) encryption mechanism.SSL is the safe and secret agreement that Netscape companies are proposed, in browser (such as Internet
Explorer, Netscape Navigator) and Web server (the Netscape Enterprise of such as Netscape
Server, ColdFusion Server etc.) between construct escape way and carry out data transmission, SSL operates in tcp/ip layer
On, under application layer, for application program provides encryption data passage, it employs the AESs such as RC4, MD5 and RSA,
Use the key of 40, it is adaptable to the encryption of business information.Meanwhile, it is simultaneously interior that Netscape companies accordingly develop HTTPS agreements
Be placed in its browser, HTTPS is actually HTTP over SSL, it use default port 443, rather than as HTTP that
Sample is communicated using port 80 with TCP/IP.HTTPS agreements are encrypted initial data in sender using SSL, so
It is decrypted in reciever afterwards, encryption and decryption need sender and reciever by exchanging known key to realize, therefore,
The data for being transmitted are not easy to be intercepted and captured and decrypted by network hacker, generate the digital certificate of high-level AES (SHA256).
8080 ports are closed, forces all of access to encrypt port using 8443, application SSL channel encryptions technology is for complete in the frame
The access encryption of office.(irreversible) is stored in database after user cipher is encrypted using SM3 DEAs, so
Ensure that other cannot get the real content of the password per capita except open air is used.Even if password meets with intercepting and capturing, also can only obtain close
Text.So may insure the safety of user cipher.And password has uniqueness after encryption, that is to say, that even if identical is close
Code, the value in being stored in database after encrypted is also different.In the case of user's some time not more new password, system
User's Modify password can be Qiang Zhiyaoqiud, then just allows it to access the system.Module outside access privilege is not to user
Open, when user attempts to be accessed by illegal means the picture outside its authority, system can automatically intercept the access, and record
In generation operation information.
Preferred embodiments of the present invention are the foregoing is only, embodiments of the present invention and protection model is not thereby limited
Enclose, to those skilled in the art, should can appreciate that done by all utilization description of the invention and diagramatic content
Scheme obtained by equivalent and obvious change, should be included in protection scope of the present invention.
Claims (10)
1. a kind of confidential part management system, it is characterised in that including confidential part management platform and can be with confidential part management platform
Some checking terminals of connecting communication, the confidential part management platform include first operator's module, system manager's module with
And the second operator's module;
First operator, system manager and the second operator are by respective user profile after confidential part management platform is verified
First operator's module, system manager's module and second operator's module are logined respectively, and produce log-on message;The use
Family information is used for the authentication of user;
System manager's module is used to create new user profile;
The first operator module is used for establishment file and receives and dispatches task, the distribution of the confidential part of transmitting/receiving file task correspondence or
Reclaim;
The second operator module is used for according to the transmitting/receiving file task, sends task application and asks to the corresponding first behaviour
Work person's module, includes the user profile of second operator in the task application request;
Task application request is permitted or refused to the first operator module according to the user profile of second operator, if
Permit that the task application is asked, then will distribute or reclaim corresponding confidential part;If refusing task application request, not distribute
Or reclaim corresponding confidential part.
2. a kind of confidential part management system according to claim 1, it is characterised in that described checking terminal is also associated with
Checking device, the checking device is used to gather characteristics of human body's information, and the user profile includes characteristics of human body's information.
3. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module,
Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing
Log-on message;The each confidential part of the confidential part management system correspondence is configured with Permission Levels, system manager's module wound
When building a new user profile, the extent of competence of the user profile, the extent of competence is specified to include some Permission Levels,
After the license of safe and secret member's module comes into force, user can be in the extent of competence for the extent of competence of appointed user profile
Access the confidential part of corresponding authority grade.
4. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module,
Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing
Log-on message;System manager's module is additionally operable to change the system information of the confidential part management platform, the machine changed
Important document management platform information comes into force after permitting through safe and secret member's module.
5. a kind of confidential part management system according to claim 1, it is characterised in that also including safe and secret member's module,
Safe and secret member is by its user profile by logining safe and secret member's module respectively after the checking of confidential part management platform and producing
Log-on message;The user profile also includes IP address and MAC Address, and the confidential part management platform is produced when obtaining User logs in
Raw IP address and MAC Address, safe and secret member's module are used for the user of the IP address and MAC Address and the user
Information is bound.
6. a kind of confidential part management system according to claim 3 or 4 or 5, it is characterised in that the confidential part management is flat
Platform also includes operation monitoring module, and the operation monitoring module is used to record operation letter of the user in the confidential part management platform
Breath, the operation information at least includes Action Events, operating time, operation user;File of the Action Events including operation,
Data object or result;The operating time includes the initial time of Action Events or terminates the time.
7. a kind of confidential part management system according to claim 6, it is characterised in that the type of the operation user includes
Security audit person, the first operator, the second operator, system manager, safe and secret member.
8. a kind of confidential part management system according to claim 7, it is characterised in that the confidential part management platform is also wrapped
Include
Security audit person's module, the security audit person logins corresponding user profile after confidential part management platform is verified
Security audit person's module;
Security audit person's module is used to calling and checking that user type is system manager and the behaviour of safe and secret member
Make information and/or described login information.
9. a kind of confidential part management system according to claim 7, it is characterised in that safe and secret member's module is used for
User type is called and checked for the operation information of operator and security audit person and/or described etc. enters information.
10. a kind of confidential part management system according to claim 2, it is characterised in that the checking device is adopted for fingerprint
Storage.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611248164.1A CN106779458A (en) | 2016-12-29 | 2016-12-29 | A kind of confidential part management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611248164.1A CN106779458A (en) | 2016-12-29 | 2016-12-29 | A kind of confidential part management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106779458A true CN106779458A (en) | 2017-05-31 |
Family
ID=58929273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611248164.1A Pending CN106779458A (en) | 2016-12-29 | 2016-12-29 | A kind of confidential part management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106779458A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113873035A (en) * | 2021-09-28 | 2021-12-31 | 北京天融信网络安全技术有限公司 | File transmission method and device, file transmission equipment and user terminal |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07182414A (en) * | 1993-12-24 | 1995-07-21 | Nec Corp | Developing daily schedule management system |
CN101459668A (en) * | 2007-12-14 | 2009-06-17 | 索尼株式会社 | Contents viewing and listening management apparatus, contents viewing and listening management system and method thereof, and program |
-
2016
- 2016-12-29 CN CN201611248164.1A patent/CN106779458A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07182414A (en) * | 1993-12-24 | 1995-07-21 | Nec Corp | Developing daily schedule management system |
CN101459668A (en) * | 2007-12-14 | 2009-06-17 | 索尼株式会社 | Contents viewing and listening management apparatus, contents viewing and listening management system and method thereof, and program |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113873035A (en) * | 2021-09-28 | 2021-12-31 | 北京天融信网络安全技术有限公司 | File transmission method and device, file transmission equipment and user terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109831327B (en) | IMS full-service network monitoring intelligent operation and maintenance support system based on big data analysis | |
JP6606156B2 (en) | Data security service | |
EP2957063B1 (en) | Policy enforcement with associated data | |
CN103501228B (en) | A kind of dynamic two-dimension code token and dynamic two-dimension code command identifying method | |
CN106776141B (en) | A kind of backup and recovery system enhanced safely | |
CN105430000A (en) | Cloud computing security management system | |
CN103152179A (en) | Uniform identity authentication method suitable for multiple application systems | |
CN110069918A (en) | A kind of efficient double factor cross-domain authentication method based on block chain technology | |
CN104767731A (en) | Identity authentication protection method of Restful mobile transaction system | |
CN106533693B (en) | Access method and device of railway vehicle monitoring and overhauling system | |
CN103442354A (en) | Mobile-police-terminal safety management and control system | |
CN104202338A (en) | Secure access method applicable to enterprise-level mobile applications | |
EP4178155A1 (en) | Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof | |
CN104504538A (en) | Distributed personnel file management system | |
CN105554018A (en) | Network real name verification method | |
CN109309645A (en) | A kind of software distribution security guard method | |
CN110998572A (en) | Self-verification user authentication method based on time-dependent blockchain | |
CN114357490A (en) | Data sharing method, device and system based on block chain | |
CN115270182A (en) | Power grid project closed-loop control file management system | |
Kyrillidis et al. | Distributed e-voting using the smart card web server | |
CN106779458A (en) | A kind of confidential part management system | |
CN115643573A (en) | Privileged account authentication method and system based on dynamic security environment | |
Yu et al. | Research on zero trust access control model and formalization based on rail transit data platform | |
CN105429986B (en) | A kind of system of genuine cyber identification verifying and secret protection | |
CN105743883B (en) | A kind of the identity attribute acquisition methods and device of network application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Haishu District of Zhejiang province 315000 Bu Zheng Xiang, Ningbo City No. 16 (Chong Building 10 floor) Applicant after: Zhejiang KingNet Chengdu Westone Information Industry Inc. Address before: Haishu District of Zhejiang province 315000 Bu Zheng Xiang, Ningbo City No. 16 (Chong Building 10 floor) Applicant before: NINGBO JINWANG INFORMATION INDUSTRY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |