CN107798222A - Assessment of bids USBkey terminals and identification, method for managing security, system - Google Patents

Assessment of bids USBkey terminals and identification, method for managing security, system Download PDF

Info

Publication number
CN107798222A
CN107798222A CN201711166919.8A CN201711166919A CN107798222A CN 107798222 A CN107798222 A CN 107798222A CN 201711166919 A CN201711166919 A CN 201711166919A CN 107798222 A CN107798222 A CN 107798222A
Authority
CN
China
Prior art keywords
assessment
bids
usbkey
terminals
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711166919.8A
Other languages
Chinese (zh)
Inventor
何伟
王其昊
余险峰
程朋飞
于兴春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youyi Hui Technology Co Ltd
Original Assignee
Beijing Youyi Hui Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Youyi Hui Technology Co Ltd filed Critical Beijing Youyi Hui Technology Co Ltd
Priority to CN201711166919.8A priority Critical patent/CN107798222A/en
Publication of CN107798222A publication Critical patent/CN107798222A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories

Abstract

The invention belongs to field of computer technology, there is provided a kind of assessment of bids USBkey terminals and identification, method for managing security, system.This method includes identification user identity certificate information, and according to recognition result and incidence relation, determine the McCode identification codes of assessment of bids USBkey terminals, obtain project information to be participated in evaluation and electing, business tool is started by the safe preservation program of assessment of bids USBkey terminals, accesses the storage region of assessment of bids USBkey terminals.Assessment of bids USBkey terminals and identification, method for managing security, system of the present invention, it is possible to increase data-handling efficiency, improve data safety performance, simplify operation.

Description

Assessment of bids USBkey terminals and identification, method for managing security, system
Technical field
The present invention relates to field of computer technology, and in particular to a kind of assessment of bids USBkey terminals and identification, safety management side Method, system.
Background technology
At present, many bid companies establish net admitance management system, and network solves separating for different geographical, People can understand the information of different places by network, and find chance.Net admitance management system mainly carries trick The various aspects for actual flow of submitting a tender, the main issue including bid information, source management, bidding process management, bid knot Fruit displaying etc..Bid type is broadly divided into:Inquire the price, bid, it is comprehensive bid, invited bidding, competitive negotiation it is several.
By bidding management system by together with tenderer and tenderer's real-time integration, preferably solves Asymmetry information The problem of title, tenderer issue the information on bidding of corresponding species, and invite different more to supply in systems according to actual conditions Business is answered, to be submitted a tender.Tenderer is participated in submitting a tender, offering, bidding, and tenderer is screened to the situation of bid, contrasted, from And complete whole bidding and tendering process.And when both sides are before bid practical operation is carried out, tenderer will carry out guarantee fund, bidding documents The submission and the download of bidding documents taken, so as to complete the preparation submitted a tender according to the content of bidding documents.
However, complex operation unsound to the management system of bidding professor, information identification, the efficiency of management are poor, and information is usurped Phenomena such as changing happens occasionally.Therefore, data-handling efficiency how is improved, improves data safety performance, simplifies operation, is this area The problem of technical staff's urgent need to resolve.
The content of the invention
For in the prior art the defects of, the invention provides a kind of assessment of bids USBkey terminals and identification, safety management side Method, system, it is possible to increase data-handling efficiency, improve data safety performance, simplify operation.
In a first aspect, the present invention provides a kind of identification of assessment of bids USBkey terminals, method for managing security, this method includes:
User identity certificate information is identified, and according to recognition result and incidence relation, determines the assessment of bids USBkey terminals McCode identification codes, obtain project information to be participated in evaluation and electing;
Business tool is started by the safe preservation program of the assessment of bids USBkey terminals;
Access the storage region of the assessment of bids USBkey terminals.
Further, business tool is started by the safe preservation program of the assessment of bids USBkey terminals, specifically included:Touch The safe preservation program for sending out assessment of bids USBkey terminals described;
The safe preservation program copies to the business tool assessment of bids terminal specified, and starts the business work Tool;
After the business tool is started, this method also includes:
Pass through the business tool and accessory information of assessment of bids terminal described in the safe preservation program reset.
Identification, method for managing security embodiment based on above-mentioned any assessment of bids USBkey terminals, further, described in access The storage region of assessment of bids USBkey terminals, is specifically included:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of the assessment of bids USBkey terminals knows Other code:
If so, then access the virtual optical panel of the assessment of bids USBkey terminals according to the access request of pre-receiving, commonly deposit Storage area, secure storage areas or immune memory block,
The storage region of the assessment of bids USBkey terminals includes the virtual optical panel, the general memory area, the peace Full memory block and the immune memory block.
Further, before the storage region for accessing the assessment of bids USBkey terminals, this method also includes:
According to the stipulated time set in advance, switch the open/close states of the secure storage areas.
Further, after triggering the safe preservation program, this method also includes:
The environment of the assessment of bids terminal is detected, generates testing result.
Further, the environment of the assessment of bids terminal is detected, generates testing result, specifically include:
The network environment of the assessment of bids terminal is detected, generates network connection testing result;
The component or control of the assessment of bids terminal are detected, generate software environment testing result.
Second aspect, the present invention provide a kind of assessment of bids USBkey terminals, and the terminal includes:The virtual optical panel set gradually And expansion area, the expansion area include general memory area, secure storage areas and immune memory block, the virtual optical panel, are used for Store safe preservation program, business tool and intelligent control of authority subsystem, the intelligent control of authority subsystem controls switching The state of assessment of bids USBkey terminals, the expansion area, in the virtual optical panel insufficient space, storage information, each One McCode identification code of assessment of bids USBkey terminal built-ins.
The third aspect, the present invention provide a kind of identification of assessment of bids USBkey terminals, safety management system, and the system includes: The self-service sign-in machine of expert, assessment of bids USBkey terminals, assessment of bids terminal, assessment of bids all-in-one and cloud resource pool server, the expert is certainly Sign-in machine is helped to be connected with the cloud resource pool server signal, the assessment of bids USBkey terminals are plugged in the assessment of bids terminal, institute Commentary mark terminal, the assessment of bids all-in-one connect with the cloud resource pool server successively signal, each assessment of bids USBkey terminals The numbering of McCode identification codes and each assessment of bids terminal correspond, the self-service sign-in machine of expert, for identifying user's body Part certificate information, and according to recognition result and incidence relation, the McCode identification codes of the assessment of bids USBkey terminals are determined, it is described Cloud resource pool server, for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through the assessment of bids All-in-one is transmitted to the assessment of bids terminal, the assessment of bids terminal, for the safe preservation journey by the assessment of bids USBkey terminals Sequence starts business tool, accesses the storage region of the assessment of bids USBkey terminals.
As shown from the above technical solution, the assessment of bids USBkey terminals and identification, method for managing security, be that the present embodiment provides System, according to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals, The storage region of assessment of bids USBkey terminals is accessed, guarantee data security accesss, prevents that information from distorting and data leak, raising data Treatment effeciency, data safety performance is improved, simplify operation.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art The required accompanying drawing used is briefly described in embodiment or description of the prior art.In all of the figs, similar element Or part is typically identified by similar reference.In accompanying drawing, each element or part might not be drawn according to the ratio of reality.
Fig. 1 shows a kind of identification of assessment of bids USBkey terminals provided by the present invention, the method stream of method for managing security Cheng Tu;
Fig. 2 shows that identification, the connection of safety management system of a kind of assessment of bids USBkey terminals provided by the present invention are shown It is intended to.
Embodiment
The embodiment of technical solution of the present invention is described in detail below in conjunction with accompanying drawing.Following examples are only used for Clearly illustrate technical scheme, therefore be intended only as example, and the protection of the present invention can not be limited with this Scope.
It should be noted that unless otherwise indicated, technical term or scientific terminology used in this application should be this hair The ordinary meaning that bright one of ordinary skill in the art are understood.
Assessment of bids USBkey terminals provided by the present invention mainly include two functions, and first:Possesses current safe U disc at present Function, second:The safe preservation program and business tool of customization, wherein, business tool is capable of the type of the surface terminal, i.e., not The user of same type, such as bid manager, bidding professor, using different types of assessment of bids USBkey terminals.
In a first aspect, a kind of identification for assessment of bids USBkey terminals that the embodiment of the present invention is provided, method for managing security, knot Fig. 1 is closed, this method includes:
Step S1, user identity certificate information is identified, and according to recognition result and incidence relation, determine assessment of bids USBkey ends The McCode identification codes at end, obtain project information to be participated in evaluation and electing.Wherein, incidence relation can be the relation pre-established, such as really The bidding professor of target information each to be participated in evaluation and electing is determined, by each project information to be participated in evaluation and electing and the user identity of the bidding professor Certificate information and McCode identification codes establish incidence relation.
Step S2, business tool is started by the safe preservation program of assessment of bids USBkey terminals, assessment of bids user can pass through The mode for exempting to log in is entered in instrument, participates in the assessment of bids.
Step S3, access the storage region of assessment of bids USBkey terminals.
As shown from the above technical solution, the identification for the assessment of bids USBkey terminals that the present embodiment provides, method for managing security, root According to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals, are accessed The storage region of assessment of bids USBkey terminals, guarantee data security access, prevents that information from distorting and data leak, improves data processing Efficiency, data safety performance is improved, simplify operation.
In order to further improve the identification of the present embodiment assessment of bids USBkey terminals, method for managing security security, pass through When the safe preservation program of assessment of bids USBkey terminals starts business tool, specific implementation process is as follows:It is whole to trigger assessment of bids USBkey The safe preservation program at end.
Safe preservation program copies to business tool the assessment of bids terminal specified, and starts business tool.
After business tool is started, this method also includes:
Pass through the business tool and accessory information of safe preservation program reset assessment of bids terminal.
Here, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security, can be by assessment of bids USBkey terminals Business tool is copied in assessment of bids terminal and performed, improve data safety performance, also, after Bid Evaluation terminates or midway needs When exiting instrument, safe preservation program can dispose the business tool in assessment of bids terminal and related accessories, in order to avoid follow-up expert Or other staff peep and taken.
Specifically, in terms of storage area. access setting, when accessing the storage region of assessment of bids USBkey terminals, specific implementation Process is as follows:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of assessment of bids USBkey terminals is identified Code:If so, then according to the access request of pre-receiving, the virtual optical panel of access assessment of bids USBkey terminals, general memory area, safety Memory block or immune memory block,
The storage region of assessment of bids USBkey terminals includes virtual optical panel, general memory area, secure storage areas and immune deposited Storage area.Wherein, it is specified that the time can be according to assessment of bids demand set time, or set according to practical business demand when Between.
Here, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security, according to the stipulated time set in advance It is interior, if corresponding McCode identification codes to be present, login function is exempted from realization, accesses the different memory areas of assessment of bids USBkey terminals Domain, both facilitate user to log in, and ensured Data Access Security again, and improve security performance.
For example, before the storage region for accessing the assessment of bids USBkey terminals, this method can also be according to set in advance Stipulated time, switch the open/close states of the secure storage areas, after corresponding access request is received, you can access corresponding Storage region, the secure access of data can either be realized, and can enough reduces data leak, distorts equivalent risk.
In terms of safety detection, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security also include:To the assessment of bids The environment of terminal is detected, and generates testing result, and specific implementation process is as follows:
The network environment of assessment of bids terminal is detected, generates network connection testing result.
The component or control of assessment of bids terminal are detected, generate software environment testing result.
For example, after clicking on " network detection ", can be by the network connection result presentation of assessment of bids terminal on interface, selecting needs After the networking connection used, remaining network connection will be automatically disabled, and ensure that the safety of assessment of bids network is unique.
Click on " environment measuring " and software environment detection is carried out to assessment of bids terminal, the important component and control to computer are carried out Detection, and be presented to user by testing result is visual, user can select a good opportunity according to their needs installation must and it is nonessential Software or component etc., installation process are silent installations, it is not necessary to the installation selection of user.
Second aspect, a kind of assessment of bids USBkey terminals that the embodiment of the present invention is provided, the terminal include:Set gradually Virtual optical panel and expansion area, expansion area include general memory area, secure storage areas and immune memory block, and virtual optical panel is used for Safe preservation program, business tool and intelligent control of authority subsystem are stored, intelligent control of authority subsystem controls switch the assessment of bids The state of USBkey terminals.
For example, safe preservation program and business tool are to use and design exclusively for business, two programs need to merge into One image file, is burnt to the virtual optical panel of assessment of bids USBkey terminals, and user can directly double-click CD-ROM drive icon and start safety Demons, start business tool.
Expansion area is used in virtual optical panel insufficient space, storage information, each assessment of bids USBkey terminal built-ins one McCode identification codes.
Wherein, virtual optical panel storage has intelligent authority control system, and this region physics is read-only, can not change deletion.
General memory area does not have to directly access under system by any password authentication.
Immune memory block is the storage region being physically present, but operating system None- identified, whole by assessment of bids USBkey The upper level applications carried are held to be conducted interviews to the storage region.
Hiding immune memory block, only it can just be shown using the management tool in virtual drive, others are appointed Where formula can not all find immune memory block, be effectively prevented the leaking data of burst disk.
Assessment of bids USBkey terminals are provided with the immune storage region independently of operating system, and the region is in upper electric enumeration process Exchanged in operating system printenv, system is not aware that the amount of capacity in immune area, situations such as institutional framework, to operating system Speech, immune memory block are not present, can not directly conducted interviews, and the read-write operation of data can only be carried out by special purpose interface. Various viruses, trojan horse program are that immune area can not be operated, and fundamentally ensure that the security of data.
As shown from the above technical solution, the assessment of bids USBkey terminals that the present embodiment provides, are divided into different storage regions, Virtual optical panel and expansion area store different information, and switch assessment of bids USBkey terminals by intelligent control of authority subsystem State, prevent data leak or distort, improve the security performance of data access.
The third aspect, a kind of identification for assessment of bids USBkey terminals that the embodiment of the present invention is provided, safety management system, knot Fig. 2 is closed, the system includes:The self-service sign-in machine 1 of expert, assessment of bids USBkey terminals 2, assessment of bids terminal 3, assessment of bids all-in-one 4 and cloud money Source pool server 5, the self-service sign-in machine 1 of expert are connected with the signal of cloud resource pool server 5, and assessment of bids USBkey terminals 2, which are plugged in, to be commented Terminal 3 is marked, assessment of bids terminal 3, assessment of bids all-in-one 4 connect with cloud resource pool server 5 successively signal, each assessment of bids USBkey terminals The numbering of 2 McCode identification codes and each assessment of bids terminal 3 corresponds.
The self-service sign-in machine 1 of expert is used to identify user identity certificate information, and according to recognition result and incidence relation, it is determined that The McCode identification codes of assessment of bids USBkey terminals 2, for example, bidding professor senses identity document core by the self-service sign-in machine 1 of expert Piece, identify user identity certificate information.After identifying expert's identity, bidding professor confirms in the display screen of the self-service sign-in machine 1 of expert Project to be tested information and whether need to avoid, then bidding professor can is got with numbered assessment of bids USBkey terminals 2, The seat in the plane of reference numeral in assessment of bids room is gone to, can exempt to log in entering tool after insertion assessment of bids USBkey terminals 2, complete expert Identification.
Cloud resource pool server 5 is used for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through Assessment of bids all-in-one 4 is transmitted to assessment of bids terminal 3, and assessment of bids terminal 3 is used to start by the safe preservation program of assessment of bids USBkey terminals 2 Business tool, access the storage region of assessment of bids USBkey terminals 2.
As shown from the above technical solution, the identification for the assessment of bids USBkey terminals 2 that the present embodiment provides, safety management system, According to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals, are visited The storage region of assessment of bids USBkey terminals 2 is asked, guarantee data security access, prevents that information from distorting and data leak, improves data Treatment effeciency, data safety performance is improved, simplify operation.
In the specification of the present invention, numerous specific details are set forth.It is to be appreciated, however, that embodiments of the invention can be with Put into practice in the case of these no details.In some instances, known method, structure and skill is not been shown in detail Art, so as not to obscure the understanding of this description.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification Close and combine.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme, it all should cover among the claim of the present invention and the scope of specification.

Claims (8)

1. a kind of identification of assessment of bids USBkey terminals, method for managing security, it is characterised in that including:
User identity certificate information is identified, and according to recognition result and incidence relation, determines the assessment of bids USBkey terminals McCode identification codes, obtain project information to be participated in evaluation and electing;
Business tool is started by the safe preservation program of the assessment of bids USBkey terminals;
Access the storage region of the assessment of bids USBkey terminals.
2. the identification of assessment of bids USBkey terminals, method for managing security according to claim 1, it is characterised in that by described The safe preservation program of assessment of bids USBkey terminals starts business tool, specifically includes:Trigger the peace of the assessment of bids USBkey terminals Full demons;
The safe preservation program copies to the business tool assessment of bids terminal specified, and starts the business tool;
After the business tool is started, this method also includes:
Pass through the business tool and accessory information of assessment of bids terminal described in the safe preservation program reset.
3. the identification of assessment of bids USBkey terminals, method for managing security according to claim 1, it is characterised in that described in access The storage region of assessment of bids USBkey terminals, is specifically included:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of the assessment of bids USBkey terminals is identified Code:
If so, then according to the access request of pre-receiving, virtual optical panel, the generic storage of the assessment of bids USBkey terminals are accessed Area, secure storage areas or immune memory block,
The storage region of the assessment of bids USBkey terminals is deposited including the virtual optical panel, the general memory area, the safety Storage area and the immune memory block.
4. the identification of assessment of bids USBkey terminals, method for managing security according to claim 3, it is characterised in that described in access Before the storage region of assessment of bids USBkey terminals, this method also includes:
According to the stipulated time set in advance, switch the open/close states of the secure storage areas.
5. the identification of assessment of bids USBkey terminals, method for managing security according to claim 2, it is characterised in that described in triggering After safe preservation program, this method also includes:
The environment of the assessment of bids terminal is detected, generates testing result.
6. the identification of assessment of bids USBkey terminals, method for managing security according to claim 5, it is characterised in that to institute's commentary The environment of mark terminal is detected, and is generated testing result, is specifically included:
The network environment of the assessment of bids terminal is detected, generates network connection testing result;
The component or control of the assessment of bids terminal are detected, generate software environment testing result.
A kind of 7. assessment of bids USBkey terminals, it is characterised in that including:
The virtual optical panel set gradually and expansion area,
The expansion area includes general memory area, secure storage areas and immune memory block,
The virtual optical panel, for storing safe preservation program, business tool and intelligent control of authority subsystem, the intelligence Control of authority subsystem controls switch the state of assessment of bids USBkey terminals,
The expansion area, in the virtual optical panel insufficient space, storage information,
Each assessment of bids USBkey one McCode identification code of terminal built-in.
8. a kind of identification of assessment of bids USBkey terminals, safety management system, it is characterised in that including:
The self-service sign-in machine of expert, assessment of bids USBkey terminals, assessment of bids terminal, assessment of bids all-in-one and cloud resource pool server,
The self-service sign-in machine of expert is connected with the cloud resource pool server signal,
The assessment of bids USBkey terminals are plugged in the assessment of bids terminal,
The assessment of bids terminal, the assessment of bids all-in-one connect with the cloud resource pool server successively signal,
The McCode identification codes of each assessment of bids USBkey terminals correspond with the numbering of each assessment of bids terminal,
The self-service sign-in machine of expert, for identifying user identity certificate information, and according to recognition result and incidence relation, it is determined that The McCode identification codes of the assessment of bids USBkey terminals,
The cloud resource pool server, for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through The assessment of bids all-in-one is transmitted to the assessment of bids terminal,
The assessment of bids terminal, for starting business tool by the safe preservation program of the assessment of bids USBkey terminals, access institute The storage region of commentary mark USBkey terminals.
CN201711166919.8A 2017-11-21 2017-11-21 Assessment of bids USBkey terminals and identification, method for managing security, system Pending CN107798222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711166919.8A CN107798222A (en) 2017-11-21 2017-11-21 Assessment of bids USBkey terminals and identification, method for managing security, system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711166919.8A CN107798222A (en) 2017-11-21 2017-11-21 Assessment of bids USBkey terminals and identification, method for managing security, system

Publications (1)

Publication Number Publication Date
CN107798222A true CN107798222A (en) 2018-03-13

Family

ID=61535442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711166919.8A Pending CN107798222A (en) 2017-11-21 2017-11-21 Assessment of bids USBkey terminals and identification, method for managing security, system

Country Status (1)

Country Link
CN (1) CN107798222A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117638A (en) * 2018-07-13 2019-01-01 中国电子科技集团公司第三十研究所 A kind of credible and secure mainboard of height and its control method based on physics switching

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591438A (en) * 2004-06-10 2005-03-09 上海正前信息科技发展有限公司 Method for electronic ID card USB key identification in computer network bar
US8249938B2 (en) * 2004-09-22 2012-08-21 Sap Ag Fuzzy evaluation of responses to provide degree of satisfaction
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN105913295A (en) * 2016-04-01 2016-08-31 福建随行软件有限公司 Electronic bid inquiring method, system and tendering and bidding system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1591438A (en) * 2004-06-10 2005-03-09 上海正前信息科技发展有限公司 Method for electronic ID card USB key identification in computer network bar
US8249938B2 (en) * 2004-09-22 2012-08-21 Sap Ag Fuzzy evaluation of responses to provide degree of satisfaction
CN103632080A (en) * 2013-11-06 2014-03-12 国家电网公司 Mobile data application safety protection system and mobile data application safety protection method based on USBKey
CN105913295A (en) * 2016-04-01 2016-08-31 福建随行软件有限公司 Electronic bid inquiring method, system and tendering and bidding system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109117638A (en) * 2018-07-13 2019-01-01 中国电子科技集团公司第三十研究所 A kind of credible and secure mainboard of height and its control method based on physics switching

Similar Documents

Publication Publication Date Title
Chaudhry et al. Personal data: thinking inside the box
US8424061B2 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
Garfinkel et al. Practical UNIX and Internet security
Katzan Jr On the privacy of cloud computing
KR20200018230A (en) Method and system for preventing leakage of surveyor information based on virtual code
US20030101072A1 (en) Document protection system
CN110245940B (en) Information processing method in digital asset certificate inheritance transfer and related device
CN103530106B (en) Method and system of context-dependent transactional management for separation of duties
CN110781468A (en) Identity authentication processing method and device, electronic equipment and storage medium
CN107015895A (en) Data-centered monitoring to the conjunction rule of Distributed Application
WO2014187118A1 (en) Verification method, apparatus, server and system
KR102310840B1 (en) Method of providing real estate transaction platform that supports direct transactions between sellers and buyers
Massacci et al. Detecting conflicts between functional and security requirements with secure tropos: John rusnak and the allied irish bank
CN110414246B (en) Shared file security management method, device, terminal and storage medium
KR20190107601A (en) Method and system for the generation of user-initiated federated identities
CN107563748A (en) For the processing method and processing device of account, medium and computing device
CN107798222A (en) Assessment of bids USBkey terminals and identification, method for managing security, system
US20200344111A1 (en) System and method for obtaining consensus in a distributed ledger network
CN106897078A (en) Information obtaining method and device
Goanta The private governance of identity on the silk road
Tang The implementation of Deming's system model to improve security management: A case study
Wang et al. PDAS: a digital-signature-based authorization platform for digital personal data
Braithwaite Securing e-business systems: A guide for managers and executives
US20220309599A1 (en) System and method for authorizing transfer requests of physical locations
Malisow (ISC) 2 CCSP Certified Cloud Security Professional Official Practice Tests

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180313