CN110263517A - The information safety system of enterprise intelligent equipment - Google Patents

The information safety system of enterprise intelligent equipment Download PDF

Info

Publication number
CN110263517A
CN110263517A CN201910446902.0A CN201910446902A CN110263517A CN 110263517 A CN110263517 A CN 110263517A CN 201910446902 A CN201910446902 A CN 201910446902A CN 110263517 A CN110263517 A CN 110263517A
Authority
CN
China
Prior art keywords
information
module
safety
network
intelligent equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910446902.0A
Other languages
Chinese (zh)
Inventor
贺明华
贺超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Technical College of Railway High Speed
Original Assignee
Hunan Technical College of Railway High Speed
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Technical College of Railway High Speed filed Critical Hunan Technical College of Railway High Speed
Priority to CN201910446902.0A priority Critical patent/CN110263517A/en
Publication of CN110263517A publication Critical patent/CN110263517A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention discloses the information safety systems of enterprise intelligent equipment, including central processing unit, central processing unit is connected separately with encrypting module, authentication module, monitoring module, safety management module, safety protection module and security protocol module, encrypting module encrypts when being to information exchange, wherein encrypting module is also divided into symmetric cryptography and asymmetric encryption, authentication module is the authenticity of confirmation transmitting information, for the certification to information, monitoring module is monitored and records to information, and safety management module is used to distribute key to each Network Security Device.The encrypting module and authentication module that the present invention is equipped with, information can be encrypted and be authenticated, improve the safety of information, the monitoring module being equipped with simultaneously can preferably be monitored information, prevent the appearance of abnormal conditions, the safety protection module being equipped with simultaneously can protect information, improve the safety of information when in use.

Description

The information safety system of enterprise intelligent equipment
Technical field
The present invention relates to field of security systems, the in particular to information safety system of enterprise intelligent equipment.
Background technique
Existing smart machine uses more and more extensive, and too busy to get away smart machine makes for our daily life With smart machine uses the life that can make us to become more convenient, while smart machine also gives our information Exchange brings considerable ease, and information is enabled more to be rapidly performed by propagation, is carrying out information biography using smart machine During broadcasting, our information is usually easy to be stolen, using and distort so that information is very dangerous, to influence The normal propagation of information.
Summary of the invention
The purpose of the present invention is to provide the information safety systems of enterprise intelligent equipment, to solve to mention in above-mentioned background technique Out the problem of.
To achieve the above object, the invention provides the following technical scheme: the information safety system of enterprise intelligent equipment, including Central processing unit, the central processing unit are connected separately with encrypting module, authentication module, monitoring module, safety management module, peace Full protection module and security protocol module, the encrypting module encrypt when being to information exchange, and wherein encrypting module also divides For symmetric cryptography and asymmetric encryption, the authentication module is the authenticity of confirmation transmitting information, for the certification to information, institute It states monitoring module information is monitored and is recorded, the safety management module is used to distribute key to each Network Security Device, The operating status of Network Security Device is monitored, the audit information of collection network safety equipment is responsible for, the safety protection module is used In the security protection to information, the security protocol module can guarantee the confidentiality of system, the integrality of data and identity Legitimacy.
Preferably, the safety protection module include user identity identification, firewall, E-VISA and network security every From.
Preferably, the user identity identification further includes static password, dynamic password, digital certificate, fingerprint iris and people Face identification, for the identification to user identity.
Preferably, the firewall includes filtering technique, application gateway technology and agency service technology, and firewall can be prevented Only attack of the hacker using unsafe service to internal network, and can be realized monitoring, filtering, record and the report of data flow Function is accused, the connection of internal network and external network is separated.
Preferably, the security server is used to distribute the Network Security Device in regional network key, monitoring network peace The operating status of full equipment, is responsible for the audit information of collection network safety equipment.
Preferably, the E-VISA is communicating third parties, provides the authentication service of information.
Preferably, the network security isolation is for the isolation to network.
Preferably, the security protocol module can be divided into secure socket layer protocol and Secure Electronics Transactions protocol.
Preferably, the safety management module further includes intruding detection system, intrusion prevention system and safety database.
Technical effect and advantage of the invention:
The encrypting module and authentication module that the present invention is equipped with can be encrypted and be authenticated to information, improve the peace of information Quan Xing, while the monitoring module being equipped with can preferably be monitored information, prevent the appearance of abnormal conditions, while being equipped with Safety protection module can protect information, improve the safety of information when in use.
Detailed description of the invention
Fig. 1 is one of present system block diagram.
Fig. 2 is the two of present system block diagram.
In figure: 1, central processing unit;2, encrypting module;3, authentication module;4, monitoring module;5, safety management module;6, Safety protection module;601, user identity identification;602, firewall;603, security server;604, E-VISA;605, network Security isolation;7, security protocol module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The present invention provides the information safety system of enterprise intelligent equipment as shown in Figs. 1-2, including central processing unit 1, When information passes through central processing unit 1, can be handled by multiple modules, central processing unit 1 be connected separately with encrypting module 2, Authentication module 3, monitoring module 4, safety management module 5, safety protection module 6 and security protocol module 7, encrypting module 2 are pair It is encrypted when information exchange, wherein encrypting module is also divided into symmetric cryptography and asymmetric encryption, passes through different types of encryption Mode encrypts the information under varying environment, improves the practicability of the system, and authentication module 3 is confirmation transmitting information Authenticity, for the certification to information, by the further safety for improving information of certification to information, monitoring module 4 is right Information is monitored and records, and safety management module 5 is used to distribute key to each Network Security Device, monitors Network Security Device Operating status, be responsible for collection network safety equipment audit information can be to network by the management of safety management module 5 The management that safety equipment is classified so that equipment it is more orderly work, safety protection module 6 is used for the peace of information Full protection, security protocol module 7 can guarantee that the confidentiality of system, guarantee system will not divulge a secret, the integrality and identity of data Legitimacy, carry out the identification of system, improper system excluded.
Further have, safety protection module 6 includes user identity identification 601, firewall 602,604 and of E-VISA Network security isolation 605, user identity identification 601 further includes static password, dynamic password, digital certificate, fingerprint iris and people Face identification improves the accurate of user identity by carrying out various identifications to user identity for the identification to user identity Property, firewall 602 includes filtering technique, application gateway technology and agency service technology, and firewall 602 can prevent hacker from utilizing Attack of unsafe service to internal network, and can be realized monitoring, filtering, record and the function of reporting of data flow, every The connection of disconnected internal network and external network, the firewall 602 being equipped with can be very good to resist external threat, security server 603, for distributing key to the Network Security Device in regional network, monitor the operating status of Network Security Device, are responsible for collecting net The audit information of network safety equipment, E-VISA 604 are communicating third parties, provide the authentication service of information, network security isolation 605 can be divided into secure socket layer protocol and Secure Electronics Transactions protocol for the isolation to network, security protocol module 7, safety Management module 5 further includes intruding detection system, intrusion prevention system and safety database, by being equipped in safety management module 5 Intruding detection system, intrusion prevention system and safety database, intrusion system can be detected and be defendd, further Safety is improved, while the safety database being equipped with can further guarantee the safety of information.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features, All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (9)

1. the information safety system of enterprise intelligent equipment, including central processing unit (1), it is characterised in that: the central processing unit (1) encrypting module (2), authentication module (3), monitoring module (4), safety management module (5), safety protection module are connected separately with (6) it is encrypted when being to information exchange with security protocol module (7), the encrypting module (2), wherein encrypting module is also divided into Symmetric cryptography and asymmetric encryption, the authentication module (3) is the authenticity of confirmation transmitting information, for the certification to information, The monitoring module (4) is monitored and records to information, and the safety management module (5) is used for each Network Security Device point Key is sent out, the operating status of Network Security Device is monitored, is responsible for the audit information of collection network safety equipment, the security protection Module (6) for security protection to information, the security protocol module (7) can guarantee the confidentiality of system, data it is complete The legitimacy of whole property and identity.
2. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the security protection mould Block (6) includes user identity identification (601), firewall (602), E-VISA (604) and network security isolation (605).
3. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the user identity is known (601) do not further include static password, dynamic password, digital certificate, fingerprint iris and recognition of face, for the knowledge to user identity Not.
4. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the firewall It (602) include filtering technique, application gateway technology and agency service technology, firewall (602) can prevent hacker using uneasiness Attack of the full service to internal network, and can be realized monitoring, filtering, record and the function of reporting of data flow, in partition The connection of portion's network and external network.
5. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the security server (603) for distributing key to the Network Security Device in regional network, the operating status of Network Security Device is monitored, collection is responsible for The audit information of Network Security Device.
6. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the E-VISA (604) it is communicating third parties, the authentication service of information is provided.
7. the information safety system of enterprise intelligent equipment according to claim 2, it is characterised in that: the network security every From (605) for the isolation to network.
8. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the security protocol mould Block (7) can be divided into secure socket layer protocol and Secure Electronics Transactions protocol.
9. the information safety system of enterprise intelligent equipment according to claim 1, it is characterised in that: the safety management mould Block (5) further includes intruding detection system, intrusion prevention system and safety database.
CN201910446902.0A 2019-05-27 2019-05-27 The information safety system of enterprise intelligent equipment Pending CN110263517A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910446902.0A CN110263517A (en) 2019-05-27 2019-05-27 The information safety system of enterprise intelligent equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910446902.0A CN110263517A (en) 2019-05-27 2019-05-27 The information safety system of enterprise intelligent equipment

Publications (1)

Publication Number Publication Date
CN110263517A true CN110263517A (en) 2019-09-20

Family

ID=67915506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910446902.0A Pending CN110263517A (en) 2019-05-27 2019-05-27 The information safety system of enterprise intelligent equipment

Country Status (1)

Country Link
CN (1) CN110263517A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114374532A (en) * 2021-12-06 2022-04-19 国网山东省电力公司聊城供电公司 Network security monitoring system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227797A (en) * 2013-05-08 2013-07-31 上海电机学院 Distributive management system of information network security for power enterprises
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN106936829A (en) * 2017-03-04 2017-07-07 平顶山学院 A kind of security system of computer network
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN109120619A (en) * 2018-08-17 2019-01-01 西安科技大学 A kind of computer network communications system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103227797A (en) * 2013-05-08 2013-07-31 上海电机学院 Distributive management system of information network security for power enterprises
CN105430000A (en) * 2015-12-17 2016-03-23 北京华油信通科技有限公司 Cloud computing security management system
CN106936829A (en) * 2017-03-04 2017-07-07 平顶山学院 A kind of security system of computer network
CN107888609A (en) * 2017-11-29 2018-04-06 滁州市华晨软件科技有限公司 A kind of information security of computer network system
CN109120619A (en) * 2018-08-17 2019-01-01 西安科技大学 A kind of computer network communications system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114374532A (en) * 2021-12-06 2022-04-19 国网山东省电力公司聊城供电公司 Network security monitoring system

Similar Documents

Publication Publication Date Title
CN108600236B (en) Intelligent information safety comprehensive management system of video monitoring network
CN101094056B (en) Security system of wireless industrial control network, and method for implementing security policy
CN105550562B (en) A kind of information management system and method based on iris recognition identification certification
CN106789029B (en) A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine
KR101294280B1 (en) System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring
CN110069918A (en) A kind of efficient double factor cross-domain authentication method based on block chain technology
CN105553666B (en) Intelligent power terminal safety authentication system and method
CN109905371A (en) Two-way encrypted authentication system and its application method
CA2403488A1 (en) Automatic identity protection system with remote third party monitoring
EP2992646B1 (en) Handling of performance monitoring data
CN107947937A (en) A kind of safe audio-video encryption system and terminal authentication implementation method
CN109617875A (en) A kind of the secure accessing platform and its implementation of terminal communication network
CN102882850A (en) Cryptographic device and method thereof for isolating data by employing non-network way
CN117040896A (en) Internet of things management method and Internet of things management platform
Thomas et al. A secure way of exchanging the secret keys in advanced metering infrastructure
CN114238897A (en) Internet of things data acquisition system and method based on distributed digital identity
CN107872324A (en) A kind of safe audio-video encryption client and certification implementation method
CN117061556B (en) Remote operation and maintenance safety protection device for power monitoring system
CN110263517A (en) The information safety system of enterprise intelligent equipment
CN116684875A (en) Communication security authentication method for electric power 5G network slice
Ma et al. Research on data security and privacy protection of smart grid based on alliance chain
Maerien et al. Access control in multi-party wireless sensor networks
CN116170143A (en) Intelligent community data safe transmission, storage and fusion use system based on national encryption algorithm
Griffin Telebiometric information security and safety management
CN113922961A (en) Data encryption and decryption transmission method in intelligent security community platform data issuing and gathering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190920