CN107798222A - Assessment of bids USBkey terminals and identification, method for managing security, system - Google Patents
Assessment of bids USBkey terminals and identification, method for managing security, system Download PDFInfo
- Publication number
- CN107798222A CN107798222A CN201711166919.8A CN201711166919A CN107798222A CN 107798222 A CN107798222 A CN 107798222A CN 201711166919 A CN201711166919 A CN 201711166919A CN 107798222 A CN107798222 A CN 107798222A
- Authority
- CN
- China
- Prior art keywords
- assessment
- bids
- usbkey
- terminals
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000011156 evaluation Methods 0.000 claims abstract description 13
- 230000003287 optical effect Effects 0.000 claims description 18
- 230000006054 immunological memory Effects 0.000 claims description 12
- 238000012360 testing method Methods 0.000 claims description 12
- 230000015654 memory Effects 0.000 claims description 11
- 230000008569 process Effects 0.000 description 6
- 238000001514 detection method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 241000700605 Viruses Species 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000011900 installation process Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 244000144985 peep Species 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/79—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
Abstract
The invention belongs to field of computer technology, there is provided a kind of assessment of bids USBkey terminals and identification, method for managing security, system.This method includes identification user identity certificate information, and according to recognition result and incidence relation, determine the McCode identification codes of assessment of bids USBkey terminals, obtain project information to be participated in evaluation and electing, business tool is started by the safe preservation program of assessment of bids USBkey terminals, accesses the storage region of assessment of bids USBkey terminals.Assessment of bids USBkey terminals and identification, method for managing security, system of the present invention, it is possible to increase data-handling efficiency, improve data safety performance, simplify operation.
Description
Technical field
The present invention relates to field of computer technology, and in particular to a kind of assessment of bids USBkey terminals and identification, safety management side
Method, system.
Background technology
At present, many bid companies establish net admitance management system, and network solves separating for different geographical,
People can understand the information of different places by network, and find chance.Net admitance management system mainly carries trick
The various aspects for actual flow of submitting a tender, the main issue including bid information, source management, bidding process management, bid knot
Fruit displaying etc..Bid type is broadly divided into:Inquire the price, bid, it is comprehensive bid, invited bidding, competitive negotiation it is several.
By bidding management system by together with tenderer and tenderer's real-time integration, preferably solves Asymmetry information
The problem of title, tenderer issue the information on bidding of corresponding species, and invite different more to supply in systems according to actual conditions
Business is answered, to be submitted a tender.Tenderer is participated in submitting a tender, offering, bidding, and tenderer is screened to the situation of bid, contrasted, from
And complete whole bidding and tendering process.And when both sides are before bid practical operation is carried out, tenderer will carry out guarantee fund, bidding documents
The submission and the download of bidding documents taken, so as to complete the preparation submitted a tender according to the content of bidding documents.
However, complex operation unsound to the management system of bidding professor, information identification, the efficiency of management are poor, and information is usurped
Phenomena such as changing happens occasionally.Therefore, data-handling efficiency how is improved, improves data safety performance, simplifies operation, is this area
The problem of technical staff's urgent need to resolve.
The content of the invention
For in the prior art the defects of, the invention provides a kind of assessment of bids USBkey terminals and identification, safety management side
Method, system, it is possible to increase data-handling efficiency, improve data safety performance, simplify operation.
In a first aspect, the present invention provides a kind of identification of assessment of bids USBkey terminals, method for managing security, this method includes:
User identity certificate information is identified, and according to recognition result and incidence relation, determines the assessment of bids USBkey terminals
McCode identification codes, obtain project information to be participated in evaluation and electing;
Business tool is started by the safe preservation program of the assessment of bids USBkey terminals;
Access the storage region of the assessment of bids USBkey terminals.
Further, business tool is started by the safe preservation program of the assessment of bids USBkey terminals, specifically included:Touch
The safe preservation program for sending out assessment of bids USBkey terminals described;
The safe preservation program copies to the business tool assessment of bids terminal specified, and starts the business work
Tool;
After the business tool is started, this method also includes:
Pass through the business tool and accessory information of assessment of bids terminal described in the safe preservation program reset.
Identification, method for managing security embodiment based on above-mentioned any assessment of bids USBkey terminals, further, described in access
The storage region of assessment of bids USBkey terminals, is specifically included:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of the assessment of bids USBkey terminals knows
Other code:
If so, then access the virtual optical panel of the assessment of bids USBkey terminals according to the access request of pre-receiving, commonly deposit
Storage area, secure storage areas or immune memory block,
The storage region of the assessment of bids USBkey terminals includes the virtual optical panel, the general memory area, the peace
Full memory block and the immune memory block.
Further, before the storage region for accessing the assessment of bids USBkey terminals, this method also includes:
According to the stipulated time set in advance, switch the open/close states of the secure storage areas.
Further, after triggering the safe preservation program, this method also includes:
The environment of the assessment of bids terminal is detected, generates testing result.
Further, the environment of the assessment of bids terminal is detected, generates testing result, specifically include:
The network environment of the assessment of bids terminal is detected, generates network connection testing result;
The component or control of the assessment of bids terminal are detected, generate software environment testing result.
Second aspect, the present invention provide a kind of assessment of bids USBkey terminals, and the terminal includes:The virtual optical panel set gradually
And expansion area, the expansion area include general memory area, secure storage areas and immune memory block, the virtual optical panel, are used for
Store safe preservation program, business tool and intelligent control of authority subsystem, the intelligent control of authority subsystem controls switching
The state of assessment of bids USBkey terminals, the expansion area, in the virtual optical panel insufficient space, storage information, each
One McCode identification code of assessment of bids USBkey terminal built-ins.
The third aspect, the present invention provide a kind of identification of assessment of bids USBkey terminals, safety management system, and the system includes:
The self-service sign-in machine of expert, assessment of bids USBkey terminals, assessment of bids terminal, assessment of bids all-in-one and cloud resource pool server, the expert is certainly
Sign-in machine is helped to be connected with the cloud resource pool server signal, the assessment of bids USBkey terminals are plugged in the assessment of bids terminal, institute
Commentary mark terminal, the assessment of bids all-in-one connect with the cloud resource pool server successively signal, each assessment of bids USBkey terminals
The numbering of McCode identification codes and each assessment of bids terminal correspond, the self-service sign-in machine of expert, for identifying user's body
Part certificate information, and according to recognition result and incidence relation, the McCode identification codes of the assessment of bids USBkey terminals are determined, it is described
Cloud resource pool server, for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through the assessment of bids
All-in-one is transmitted to the assessment of bids terminal, the assessment of bids terminal, for the safe preservation journey by the assessment of bids USBkey terminals
Sequence starts business tool, accesses the storage region of the assessment of bids USBkey terminals.
As shown from the above technical solution, the assessment of bids USBkey terminals and identification, method for managing security, be that the present embodiment provides
System, according to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals,
The storage region of assessment of bids USBkey terminals is accessed, guarantee data security accesss, prevents that information from distorting and data leak, raising data
Treatment effeciency, data safety performance is improved, simplify operation.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art
The required accompanying drawing used is briefly described in embodiment or description of the prior art.In all of the figs, similar element
Or part is typically identified by similar reference.In accompanying drawing, each element or part might not be drawn according to the ratio of reality.
Fig. 1 shows a kind of identification of assessment of bids USBkey terminals provided by the present invention, the method stream of method for managing security
Cheng Tu;
Fig. 2 shows that identification, the connection of safety management system of a kind of assessment of bids USBkey terminals provided by the present invention are shown
It is intended to.
Embodiment
The embodiment of technical solution of the present invention is described in detail below in conjunction with accompanying drawing.Following examples are only used for
Clearly illustrate technical scheme, therefore be intended only as example, and the protection of the present invention can not be limited with this
Scope.
It should be noted that unless otherwise indicated, technical term or scientific terminology used in this application should be this hair
The ordinary meaning that bright one of ordinary skill in the art are understood.
Assessment of bids USBkey terminals provided by the present invention mainly include two functions, and first:Possesses current safe U disc at present
Function, second:The safe preservation program and business tool of customization, wherein, business tool is capable of the type of the surface terminal, i.e., not
The user of same type, such as bid manager, bidding professor, using different types of assessment of bids USBkey terminals.
In a first aspect, a kind of identification for assessment of bids USBkey terminals that the embodiment of the present invention is provided, method for managing security, knot
Fig. 1 is closed, this method includes:
Step S1, user identity certificate information is identified, and according to recognition result and incidence relation, determine assessment of bids USBkey ends
The McCode identification codes at end, obtain project information to be participated in evaluation and electing.Wherein, incidence relation can be the relation pre-established, such as really
The bidding professor of target information each to be participated in evaluation and electing is determined, by each project information to be participated in evaluation and electing and the user identity of the bidding professor
Certificate information and McCode identification codes establish incidence relation.
Step S2, business tool is started by the safe preservation program of assessment of bids USBkey terminals, assessment of bids user can pass through
The mode for exempting to log in is entered in instrument, participates in the assessment of bids.
Step S3, access the storage region of assessment of bids USBkey terminals.
As shown from the above technical solution, the identification for the assessment of bids USBkey terminals that the present embodiment provides, method for managing security, root
According to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals, are accessed
The storage region of assessment of bids USBkey terminals, guarantee data security access, prevents that information from distorting and data leak, improves data processing
Efficiency, data safety performance is improved, simplify operation.
In order to further improve the identification of the present embodiment assessment of bids USBkey terminals, method for managing security security, pass through
When the safe preservation program of assessment of bids USBkey terminals starts business tool, specific implementation process is as follows:It is whole to trigger assessment of bids USBkey
The safe preservation program at end.
Safe preservation program copies to business tool the assessment of bids terminal specified, and starts business tool.
After business tool is started, this method also includes:
Pass through the business tool and accessory information of safe preservation program reset assessment of bids terminal.
Here, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security, can be by assessment of bids USBkey terminals
Business tool is copied in assessment of bids terminal and performed, improve data safety performance, also, after Bid Evaluation terminates or midway needs
When exiting instrument, safe preservation program can dispose the business tool in assessment of bids terminal and related accessories, in order to avoid follow-up expert
Or other staff peep and taken.
Specifically, in terms of storage area. access setting, when accessing the storage region of assessment of bids USBkey terminals, specific implementation
Process is as follows:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of assessment of bids USBkey terminals is identified
Code:If so, then according to the access request of pre-receiving, the virtual optical panel of access assessment of bids USBkey terminals, general memory area, safety
Memory block or immune memory block,
The storage region of assessment of bids USBkey terminals includes virtual optical panel, general memory area, secure storage areas and immune deposited
Storage area.Wherein, it is specified that the time can be according to assessment of bids demand set time, or set according to practical business demand when
Between.
Here, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security, according to the stipulated time set in advance
It is interior, if corresponding McCode identification codes to be present, login function is exempted from realization, accesses the different memory areas of assessment of bids USBkey terminals
Domain, both facilitate user to log in, and ensured Data Access Security again, and improve security performance.
For example, before the storage region for accessing the assessment of bids USBkey terminals, this method can also be according to set in advance
Stipulated time, switch the open/close states of the secure storage areas, after corresponding access request is received, you can access corresponding
Storage region, the secure access of data can either be realized, and can enough reduces data leak, distorts equivalent risk.
In terms of safety detection, the identification of the present embodiment assessment of bids USBkey terminals, method for managing security also include:To the assessment of bids
The environment of terminal is detected, and generates testing result, and specific implementation process is as follows:
The network environment of assessment of bids terminal is detected, generates network connection testing result.
The component or control of assessment of bids terminal are detected, generate software environment testing result.
For example, after clicking on " network detection ", can be by the network connection result presentation of assessment of bids terminal on interface, selecting needs
After the networking connection used, remaining network connection will be automatically disabled, and ensure that the safety of assessment of bids network is unique.
Click on " environment measuring " and software environment detection is carried out to assessment of bids terminal, the important component and control to computer are carried out
Detection, and be presented to user by testing result is visual, user can select a good opportunity according to their needs installation must and it is nonessential
Software or component etc., installation process are silent installations, it is not necessary to the installation selection of user.
Second aspect, a kind of assessment of bids USBkey terminals that the embodiment of the present invention is provided, the terminal include:Set gradually
Virtual optical panel and expansion area, expansion area include general memory area, secure storage areas and immune memory block, and virtual optical panel is used for
Safe preservation program, business tool and intelligent control of authority subsystem are stored, intelligent control of authority subsystem controls switch the assessment of bids
The state of USBkey terminals.
For example, safe preservation program and business tool are to use and design exclusively for business, two programs need to merge into
One image file, is burnt to the virtual optical panel of assessment of bids USBkey terminals, and user can directly double-click CD-ROM drive icon and start safety
Demons, start business tool.
Expansion area is used in virtual optical panel insufficient space, storage information, each assessment of bids USBkey terminal built-ins one
McCode identification codes.
Wherein, virtual optical panel storage has intelligent authority control system, and this region physics is read-only, can not change deletion.
General memory area does not have to directly access under system by any password authentication.
Immune memory block is the storage region being physically present, but operating system None- identified, whole by assessment of bids USBkey
The upper level applications carried are held to be conducted interviews to the storage region.
Hiding immune memory block, only it can just be shown using the management tool in virtual drive, others are appointed
Where formula can not all find immune memory block, be effectively prevented the leaking data of burst disk.
Assessment of bids USBkey terminals are provided with the immune storage region independently of operating system, and the region is in upper electric enumeration process
Exchanged in operating system printenv, system is not aware that the amount of capacity in immune area, situations such as institutional framework, to operating system
Speech, immune memory block are not present, can not directly conducted interviews, and the read-write operation of data can only be carried out by special purpose interface.
Various viruses, trojan horse program are that immune area can not be operated, and fundamentally ensure that the security of data.
As shown from the above technical solution, the assessment of bids USBkey terminals that the present embodiment provides, are divided into different storage regions,
Virtual optical panel and expansion area store different information, and switch assessment of bids USBkey terminals by intelligent control of authority subsystem
State, prevent data leak or distort, improve the security performance of data access.
The third aspect, a kind of identification for assessment of bids USBkey terminals that the embodiment of the present invention is provided, safety management system, knot
Fig. 2 is closed, the system includes:The self-service sign-in machine 1 of expert, assessment of bids USBkey terminals 2, assessment of bids terminal 3, assessment of bids all-in-one 4 and cloud money
Source pool server 5, the self-service sign-in machine 1 of expert are connected with the signal of cloud resource pool server 5, and assessment of bids USBkey terminals 2, which are plugged in, to be commented
Terminal 3 is marked, assessment of bids terminal 3, assessment of bids all-in-one 4 connect with cloud resource pool server 5 successively signal, each assessment of bids USBkey terminals
The numbering of 2 McCode identification codes and each assessment of bids terminal 3 corresponds.
The self-service sign-in machine 1 of expert is used to identify user identity certificate information, and according to recognition result and incidence relation, it is determined that
The McCode identification codes of assessment of bids USBkey terminals 2, for example, bidding professor senses identity document core by the self-service sign-in machine 1 of expert
Piece, identify user identity certificate information.After identifying expert's identity, bidding professor confirms in the display screen of the self-service sign-in machine 1 of expert
Project to be tested information and whether need to avoid, then bidding professor can is got with numbered assessment of bids USBkey terminals 2,
The seat in the plane of reference numeral in assessment of bids room is gone to, can exempt to log in entering tool after insertion assessment of bids USBkey terminals 2, complete expert
Identification.
Cloud resource pool server 5 is used for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through
Assessment of bids all-in-one 4 is transmitted to assessment of bids terminal 3, and assessment of bids terminal 3 is used to start by the safe preservation program of assessment of bids USBkey terminals 2
Business tool, access the storage region of assessment of bids USBkey terminals 2.
As shown from the above technical solution, the identification for the assessment of bids USBkey terminals 2 that the present embodiment provides, safety management system,
According to user identity certificate information, it is determined that the McCode identification codes and project information to be participated in evaluation and electing of corresponding USBkey terminals, are visited
The storage region of assessment of bids USBkey terminals 2 is asked, guarantee data security access, prevents that information from distorting and data leak, improves data
Treatment effeciency, data safety performance is improved, simplify operation.
In the specification of the present invention, numerous specific details are set forth.It is to be appreciated, however, that embodiments of the invention can be with
Put into practice in the case of these no details.In some instances, known method, structure and skill is not been shown in detail
Art, so as not to obscure the understanding of this description.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area
Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification
Close and combine.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme, it all should cover among the claim of the present invention and the scope of specification.
Claims (8)
1. a kind of identification of assessment of bids USBkey terminals, method for managing security, it is characterised in that including:
User identity certificate information is identified, and according to recognition result and incidence relation, determines the assessment of bids USBkey terminals
McCode identification codes, obtain project information to be participated in evaluation and electing;
Business tool is started by the safe preservation program of the assessment of bids USBkey terminals;
Access the storage region of the assessment of bids USBkey terminals.
2. the identification of assessment of bids USBkey terminals, method for managing security according to claim 1, it is characterised in that by described
The safe preservation program of assessment of bids USBkey terminals starts business tool, specifically includes:Trigger the peace of the assessment of bids USBkey terminals
Full demons;
The safe preservation program copies to the business tool assessment of bids terminal specified, and starts the business tool;
After the business tool is started, this method also includes:
Pass through the business tool and accessory information of assessment of bids terminal described in the safe preservation program reset.
3. the identification of assessment of bids USBkey terminals, method for managing security according to claim 1, it is characterised in that described in access
The storage region of assessment of bids USBkey terminals, is specifically included:
At the appointed time, judge that the McCode in the data system of assessment of bids room with the presence or absence of the assessment of bids USBkey terminals is identified
Code:
If so, then according to the access request of pre-receiving, virtual optical panel, the generic storage of the assessment of bids USBkey terminals are accessed
Area, secure storage areas or immune memory block,
The storage region of the assessment of bids USBkey terminals is deposited including the virtual optical panel, the general memory area, the safety
Storage area and the immune memory block.
4. the identification of assessment of bids USBkey terminals, method for managing security according to claim 3, it is characterised in that described in access
Before the storage region of assessment of bids USBkey terminals, this method also includes:
According to the stipulated time set in advance, switch the open/close states of the secure storage areas.
5. the identification of assessment of bids USBkey terminals, method for managing security according to claim 2, it is characterised in that described in triggering
After safe preservation program, this method also includes:
The environment of the assessment of bids terminal is detected, generates testing result.
6. the identification of assessment of bids USBkey terminals, method for managing security according to claim 5, it is characterised in that to institute's commentary
The environment of mark terminal is detected, and is generated testing result, is specifically included:
The network environment of the assessment of bids terminal is detected, generates network connection testing result;
The component or control of the assessment of bids terminal are detected, generate software environment testing result.
A kind of 7. assessment of bids USBkey terminals, it is characterised in that including:
The virtual optical panel set gradually and expansion area,
The expansion area includes general memory area, secure storage areas and immune memory block,
The virtual optical panel, for storing safe preservation program, business tool and intelligent control of authority subsystem, the intelligence
Control of authority subsystem controls switch the state of assessment of bids USBkey terminals,
The expansion area, in the virtual optical panel insufficient space, storage information,
Each assessment of bids USBkey one McCode identification code of terminal built-in.
8. a kind of identification of assessment of bids USBkey terminals, safety management system, it is characterised in that including:
The self-service sign-in machine of expert, assessment of bids USBkey terminals, assessment of bids terminal, assessment of bids all-in-one and cloud resource pool server,
The self-service sign-in machine of expert is connected with the cloud resource pool server signal,
The assessment of bids USBkey terminals are plugged in the assessment of bids terminal,
The assessment of bids terminal, the assessment of bids all-in-one connect with the cloud resource pool server successively signal,
The McCode identification codes of each assessment of bids USBkey terminals correspond with the numbering of each assessment of bids terminal,
The self-service sign-in machine of expert, for identifying user identity certificate information, and according to recognition result and incidence relation, it is determined that
The McCode identification codes of the assessment of bids USBkey terminals,
The cloud resource pool server, for according to recognition result and incidence relation, it is determined that project information to be participated in evaluation and electing, and pass through
The assessment of bids all-in-one is transmitted to the assessment of bids terminal,
The assessment of bids terminal, for starting business tool by the safe preservation program of the assessment of bids USBkey terminals, access institute
The storage region of commentary mark USBkey terminals.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711166919.8A CN107798222A (en) | 2017-11-21 | 2017-11-21 | Assessment of bids USBkey terminals and identification, method for managing security, system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711166919.8A CN107798222A (en) | 2017-11-21 | 2017-11-21 | Assessment of bids USBkey terminals and identification, method for managing security, system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107798222A true CN107798222A (en) | 2018-03-13 |
Family
ID=61535442
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711166919.8A Pending CN107798222A (en) | 2017-11-21 | 2017-11-21 | Assessment of bids USBkey terminals and identification, method for managing security, system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107798222A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117638A (en) * | 2018-07-13 | 2019-01-01 | 中国电子科技集团公司第三十研究所 | A kind of credible and secure mainboard of height and its control method based on physics switching |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1591438A (en) * | 2004-06-10 | 2005-03-09 | 上海正前信息科技发展有限公司 | Method for electronic ID card USB key identification in computer network bar |
US8249938B2 (en) * | 2004-09-22 | 2012-08-21 | Sap Ag | Fuzzy evaluation of responses to provide degree of satisfaction |
CN103632080A (en) * | 2013-11-06 | 2014-03-12 | 国家电网公司 | Mobile data application safety protection system and mobile data application safety protection method based on USBKey |
CN105913295A (en) * | 2016-04-01 | 2016-08-31 | 福建随行软件有限公司 | Electronic bid inquiring method, system and tendering and bidding system |
-
2017
- 2017-11-21 CN CN201711166919.8A patent/CN107798222A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1591438A (en) * | 2004-06-10 | 2005-03-09 | 上海正前信息科技发展有限公司 | Method for electronic ID card USB key identification in computer network bar |
US8249938B2 (en) * | 2004-09-22 | 2012-08-21 | Sap Ag | Fuzzy evaluation of responses to provide degree of satisfaction |
CN103632080A (en) * | 2013-11-06 | 2014-03-12 | 国家电网公司 | Mobile data application safety protection system and mobile data application safety protection method based on USBKey |
CN105913295A (en) * | 2016-04-01 | 2016-08-31 | 福建随行软件有限公司 | Electronic bid inquiring method, system and tendering and bidding system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109117638A (en) * | 2018-07-13 | 2019-01-01 | 中国电子科技集团公司第三十研究所 | A kind of credible and secure mainboard of height and its control method based on physics switching |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chaudhry et al. | Personal data: thinking inside the box | |
US8424061B2 (en) | Method, system and program product for authenticating a user seeking to perform an electronic service request | |
Garfinkel et al. | Practical UNIX and Internet security | |
Katzan Jr | On the privacy of cloud computing | |
KR20200018230A (en) | Method and system for preventing leakage of surveyor information based on virtual code | |
US20030101072A1 (en) | Document protection system | |
CN110245940B (en) | Information processing method in digital asset certificate inheritance transfer and related device | |
CN103530106B (en) | Method and system of context-dependent transactional management for separation of duties | |
CN110781468A (en) | Identity authentication processing method and device, electronic equipment and storage medium | |
CN107015895A (en) | Data-centered monitoring to the conjunction rule of Distributed Application | |
WO2014187118A1 (en) | Verification method, apparatus, server and system | |
KR102310840B1 (en) | Method of providing real estate transaction platform that supports direct transactions between sellers and buyers | |
Massacci et al. | Detecting conflicts between functional and security requirements with secure tropos: John rusnak and the allied irish bank | |
CN110414246B (en) | Shared file security management method, device, terminal and storage medium | |
KR20190107601A (en) | Method and system for the generation of user-initiated federated identities | |
CN107563748A (en) | For the processing method and processing device of account, medium and computing device | |
CN107798222A (en) | Assessment of bids USBkey terminals and identification, method for managing security, system | |
US20200344111A1 (en) | System and method for obtaining consensus in a distributed ledger network | |
CN106897078A (en) | Information obtaining method and device | |
Goanta | The private governance of identity on the silk road | |
Tang | The implementation of Deming's system model to improve security management: A case study | |
Wang et al. | PDAS: a digital-signature-based authorization platform for digital personal data | |
Braithwaite | Securing e-business systems: A guide for managers and executives | |
US20220309599A1 (en) | System and method for authorizing transfer requests of physical locations | |
Malisow | (ISC) 2 CCSP Certified Cloud Security Professional Official Practice Tests |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180313 |