CN110263517A - The information safety system of enterprise intelligent equipment - Google Patents
The information safety system of enterprise intelligent equipment Download PDFInfo
- Publication number
- CN110263517A CN110263517A CN201910446902.0A CN201910446902A CN110263517A CN 110263517 A CN110263517 A CN 110263517A CN 201910446902 A CN201910446902 A CN 201910446902A CN 110263517 A CN110263517 A CN 110263517A
- Authority
- CN
- China
- Prior art keywords
- information
- module
- safety
- network
- intelligent equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The invention discloses the information safety systems of enterprise intelligent equipment, including central processing unit, central processing unit is connected separately with encrypting module, authentication module, monitoring module, safety management module, safety protection module and security protocol module, encrypting module encrypts when being to information exchange, wherein encrypting module is also divided into symmetric cryptography and asymmetric encryption, authentication module is the authenticity of confirmation transmitting information, for the certification to information, monitoring module is monitored and records to information, and safety management module is used to distribute key to each Network Security Device.The encrypting module and authentication module that the present invention is equipped with, information can be encrypted and be authenticated, improve the safety of information, the monitoring module being equipped with simultaneously can preferably be monitored information, prevent the appearance of abnormal conditions, the safety protection module being equipped with simultaneously can protect information, improve the safety of information when in use.
Description
Technical field
The present invention relates to field of security systems, the in particular to information safety system of enterprise intelligent equipment.
Background technique
Existing smart machine uses more and more extensive, and too busy to get away smart machine makes for our daily life
With smart machine uses the life that can make us to become more convenient, while smart machine also gives our information
Exchange brings considerable ease, and information is enabled more to be rapidly performed by propagation, is carrying out information biography using smart machine
During broadcasting, our information is usually easy to be stolen, using and distort so that information is very dangerous, to influence
The normal propagation of information.
Summary of the invention
The purpose of the present invention is to provide the information safety systems of enterprise intelligent equipment, to solve to mention in above-mentioned background technique
Out the problem of.
To achieve the above object, the invention provides the following technical scheme: the information safety system of enterprise intelligent equipment, including
Central processing unit, the central processing unit are connected separately with encrypting module, authentication module, monitoring module, safety management module, peace
Full protection module and security protocol module, the encrypting module encrypt when being to information exchange, and wherein encrypting module also divides
For symmetric cryptography and asymmetric encryption, the authentication module is the authenticity of confirmation transmitting information, for the certification to information, institute
It states monitoring module information is monitored and is recorded, the safety management module is used to distribute key to each Network Security Device,
The operating status of Network Security Device is monitored, the audit information of collection network safety equipment is responsible for, the safety protection module is used
In the security protection to information, the security protocol module can guarantee the confidentiality of system, the integrality of data and identity
Legitimacy.
Preferably, the safety protection module include user identity identification, firewall, E-VISA and network security every
From.
Preferably, the user identity identification further includes static password, dynamic password, digital certificate, fingerprint iris and people
Face identification, for the identification to user identity.
Preferably, the firewall includes filtering technique, application gateway technology and agency service technology, and firewall can be prevented
Only attack of the hacker using unsafe service to internal network, and can be realized monitoring, filtering, record and the report of data flow
Function is accused, the connection of internal network and external network is separated.
Preferably, the security server is used to distribute the Network Security Device in regional network key, monitoring network peace
The operating status of full equipment, is responsible for the audit information of collection network safety equipment.
Preferably, the E-VISA is communicating third parties, provides the authentication service of information.
Preferably, the network security isolation is for the isolation to network.
Preferably, the security protocol module can be divided into secure socket layer protocol and Secure Electronics Transactions protocol.
Preferably, the safety management module further includes intruding detection system, intrusion prevention system and safety database.
Technical effect and advantage of the invention:
The encrypting module and authentication module that the present invention is equipped with can be encrypted and be authenticated to information, improve the peace of information
Quan Xing, while the monitoring module being equipped with can preferably be monitored information, prevent the appearance of abnormal conditions, while being equipped with
Safety protection module can protect information, improve the safety of information when in use.
Detailed description of the invention
Fig. 1 is one of present system block diagram.
Fig. 2 is the two of present system block diagram.
In figure: 1, central processing unit;2, encrypting module;3, authentication module;4, monitoring module;5, safety management module;6,
Safety protection module;601, user identity identification;602, firewall;603, security server;604, E-VISA;605, network
Security isolation;7, security protocol module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The present invention provides the information safety system of enterprise intelligent equipment as shown in Figs. 1-2, including central processing unit 1,
When information passes through central processing unit 1, can be handled by multiple modules, central processing unit 1 be connected separately with encrypting module 2,
Authentication module 3, monitoring module 4, safety management module 5, safety protection module 6 and security protocol module 7, encrypting module 2 are pair
It is encrypted when information exchange, wherein encrypting module is also divided into symmetric cryptography and asymmetric encryption, passes through different types of encryption
Mode encrypts the information under varying environment, improves the practicability of the system, and authentication module 3 is confirmation transmitting information
Authenticity, for the certification to information, by the further safety for improving information of certification to information, monitoring module 4 is right
Information is monitored and records, and safety management module 5 is used to distribute key to each Network Security Device, monitors Network Security Device
Operating status, be responsible for collection network safety equipment audit information can be to network by the management of safety management module 5
The management that safety equipment is classified so that equipment it is more orderly work, safety protection module 6 is used for the peace of information
Full protection, security protocol module 7 can guarantee that the confidentiality of system, guarantee system will not divulge a secret, the integrality and identity of data
Legitimacy, carry out the identification of system, improper system excluded.
Further have, safety protection module 6 includes user identity identification 601, firewall 602,604 and of E-VISA
Network security isolation 605, user identity identification 601 further includes static password, dynamic password, digital certificate, fingerprint iris and people
Face identification improves the accurate of user identity by carrying out various identifications to user identity for the identification to user identity
Property, firewall 602 includes filtering technique, application gateway technology and agency service technology, and firewall 602 can prevent hacker from utilizing
Attack of unsafe service to internal network, and can be realized monitoring, filtering, record and the function of reporting of data flow, every
The connection of disconnected internal network and external network, the firewall 602 being equipped with can be very good to resist external threat, security server
603, for distributing key to the Network Security Device in regional network, monitor the operating status of Network Security Device, are responsible for collecting net
The audit information of network safety equipment, E-VISA 604 are communicating third parties, provide the authentication service of information, network security isolation
605 can be divided into secure socket layer protocol and Secure Electronics Transactions protocol for the isolation to network, security protocol module 7, safety
Management module 5 further includes intruding detection system, intrusion prevention system and safety database, by being equipped in safety management module 5
Intruding detection system, intrusion prevention system and safety database, intrusion system can be detected and be defendd, further
Safety is improved, while the safety database being equipped with can further guarantee the safety of information.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features,
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (9)
1. the information safety system of enterprise intelligent equipment, including central processing unit (1), it is characterised in that: the central processing unit
(1) encrypting module (2), authentication module (3), monitoring module (4), safety management module (5), safety protection module are connected separately with
(6) it is encrypted when being to information exchange with security protocol module (7), the encrypting module (2), wherein encrypting module is also divided into
Symmetric cryptography and asymmetric encryption, the authentication module (3) is the authenticity of confirmation transmitting information, for the certification to information,
The monitoring module (4) is monitored and records to information, and the safety management module (5) is used for each Network Security Device point
Key is sent out, the operating status of Network Security Device is monitored, is responsible for the audit information of collection network safety equipment, the security protection
Module (6) for security protection to information, the security protocol module (7) can guarantee the confidentiality of system, data it is complete
The legitimacy of whole property and identity.
2. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the security protection mould
Block (6) includes user identity identification (601), firewall (602), E-VISA (604) and network security isolation (605).
3. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the user identity is known
(601) do not further include static password, dynamic password, digital certificate, fingerprint iris and recognition of face, for the knowledge to user identity
Not.
4. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the firewall
It (602) include filtering technique, application gateway technology and agency service technology, firewall (602) can prevent hacker using uneasiness
Attack of the full service to internal network, and can be realized monitoring, filtering, record and the function of reporting of data flow, in partition
The connection of portion's network and external network.
5. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the security server
(603) for distributing key to the Network Security Device in regional network, the operating status of Network Security Device is monitored, collection is responsible for
The audit information of Network Security Device.
6. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the E-VISA
(604) it is communicating third parties, the authentication service of information is provided.
7. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the network security every
From (605) for the isolation to network.
8. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the security protocol mould
Block (7) can be divided into secure socket layer protocol and Secure Electronics Transactions protocol.
9. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the safety management mould
Block (5) further includes intruding detection system, intrusion prevention system and safety database.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910446902.0A CN110263517A (en) | 2019-05-27 | 2019-05-27 | The information safety system of enterprise intelligent equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910446902.0A CN110263517A (en) | 2019-05-27 | 2019-05-27 | The information safety system of enterprise intelligent equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110263517A true CN110263517A (en) | 2019-09-20 |
Family
ID=67915506
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910446902.0A Pending CN110263517A (en) | 2019-05-27 | 2019-05-27 | The information safety system of enterprise intelligent equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110263517A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114374532A (en) * | 2021-12-06 | 2022-04-19 | 国网山东省电力公司聊城供电公司 | Network security monitoring system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103227797A (en) * | 2013-05-08 | 2013-07-31 | 上海电机学院 | Distributive management system of information network security for power enterprises |
CN105430000A (en) * | 2015-12-17 | 2016-03-23 | 北京华油信通科技有限公司 | Cloud computing security management system |
CN106936829A (en) * | 2017-03-04 | 2017-07-07 | 平顶山学院 | A kind of security system of computer network |
CN107888609A (en) * | 2017-11-29 | 2018-04-06 | 滁州市华晨软件科技有限公司 | A kind of information security of computer network system |
CN109120619A (en) * | 2018-08-17 | 2019-01-01 | 西安科技大学 | A kind of computer network communications system |
-
2019
- 2019-05-27 CN CN201910446902.0A patent/CN110263517A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103227797A (en) * | 2013-05-08 | 2013-07-31 | 上海电机学院 | Distributive management system of information network security for power enterprises |
CN105430000A (en) * | 2015-12-17 | 2016-03-23 | 北京华油信通科技有限公司 | Cloud computing security management system |
CN106936829A (en) * | 2017-03-04 | 2017-07-07 | 平顶山学院 | A kind of security system of computer network |
CN107888609A (en) * | 2017-11-29 | 2018-04-06 | 滁州市华晨软件科技有限公司 | A kind of information security of computer network system |
CN109120619A (en) * | 2018-08-17 | 2019-01-01 | 西安科技大学 | A kind of computer network communications system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114374532A (en) * | 2021-12-06 | 2022-04-19 | 国网山东省电力公司聊城供电公司 | Network security monitoring system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108600236B (en) | Intelligent information safety comprehensive management system of video monitoring network | |
CN101094056B (en) | Security system of wireless industrial control network, and method for implementing security policy | |
CN105550562B (en) | A kind of information management system and method based on iris recognition identification certification | |
CN106789029B (en) | A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine | |
KR101294280B1 (en) | System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring | |
CN110069918A (en) | A kind of efficient double factor cross-domain authentication method based on block chain technology | |
CN105553666B (en) | Intelligent power terminal safety authentication system and method | |
CN109905371A (en) | Two-way encrypted authentication system and its application method | |
CA2403488A1 (en) | Automatic identity protection system with remote third party monitoring | |
EP2992646B1 (en) | Handling of performance monitoring data | |
CN107947937A (en) | A kind of safe audio-video encryption system and terminal authentication implementation method | |
CN109617875A (en) | A kind of the secure accessing platform and its implementation of terminal communication network | |
CN102882850A (en) | Cryptographic device and method thereof for isolating data by employing non-network way | |
CN117040896A (en) | Internet of things management method and Internet of things management platform | |
Thomas et al. | A secure way of exchanging the secret keys in advanced metering infrastructure | |
CN114238897A (en) | Internet of things data acquisition system and method based on distributed digital identity | |
CN107872324A (en) | A kind of safe audio-video encryption client and certification implementation method | |
CN117061556B (en) | Remote operation and maintenance safety protection device for power monitoring system | |
CN110263517A (en) | The information safety system of enterprise intelligent equipment | |
CN116684875A (en) | Communication security authentication method for electric power 5G network slice | |
Ma et al. | Research on data security and privacy protection of smart grid based on alliance chain | |
Maerien et al. | Access control in multi-party wireless sensor networks | |
CN116170143A (en) | Intelligent community data safe transmission, storage and fusion use system based on national encryption algorithm | |
Griffin | Telebiometric information security and safety management | |
CN113922961A (en) | Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190920 |