CN111708996A - Enterprise internal management consultation information sharing system based on Internet - Google Patents

Enterprise internal management consultation information sharing system based on Internet Download PDF

Info

Publication number
CN111708996A
CN111708996A CN202010541410.2A CN202010541410A CN111708996A CN 111708996 A CN111708996 A CN 111708996A CN 202010541410 A CN202010541410 A CN 202010541410A CN 111708996 A CN111708996 A CN 111708996A
Authority
CN
China
Prior art keywords
information
sharing
identity
unit
consultation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010541410.2A
Other languages
Chinese (zh)
Other versions
CN111708996B (en
Inventor
汪红兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Beishijia Information Technology Co ltd
Original Assignee
Nanjing Beishijia Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Beishijia Information Technology Co ltd filed Critical Nanjing Beishijia Information Technology Co ltd
Priority to CN202010541410.2A priority Critical patent/CN111708996B/en
Publication of CN111708996A publication Critical patent/CN111708996A/en
Application granted granted Critical
Publication of CN111708996B publication Critical patent/CN111708996B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an enterprise internal management consultation information sharing system based on the Internet, and relates to the technical field of management consultation information sharing. The system comprises a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit. The invention carries out identity verification on the received identity information through the verification unit; the processor obtains the sharing correction level, finally selects an information sharing channel corresponding to the sharing correction level through the node selecting unit according to the sharing correction level, obtains sharing information details corresponding to the consultation information in the consultation information level corresponding to the information sharing channel from the information sharing library, reduces the risk of leakage of the internal information of the enterprise through identity verification and setting of the consultation information level and the information sharing channel, and ensures the safety of the internal information of the enterprise.

Description

Enterprise internal management consultation information sharing system based on Internet
Technical Field
The invention belongs to the technical field of management consultation information sharing, and particularly relates to an enterprise internal management consultation information sharing system based on the Internet.
Background
With the development of mobile internet and smart phones, more and more enterprises choose to share management information on an enterprise platform in order to improve office efficiency and save office cost. The efficiency of information sharing depends on the technical development of information systems and the improvement of transmission technology, and must be realized strictly under the conditions of information security and confidentiality, in particular to the sharing of enterprise internal management consultation information.
Information sharing is necessary in enterprise management consultation, and is beneficial to improving the utilization rate of enterprise information resources. The existing management platform is not well done in the aspect of secret leakage prevention, information leakage is easily caused, and an enterprise internal management consultation information sharing system based on the Internet is provided at present to solve the problems.
Disclosure of Invention
The invention aims to provide an enterprise internal management consultation information sharing system based on the internet, which carries out identity verification on received identity information through a verification unit according to the identity information in an identity library, and carries out identity verification on the identity information, the consultation information and a corresponding sharing grade Q after the identity verification is passedkTransmitting to a processor; the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxFinally, the grade Q is corrected according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkThe details of the shared information corresponding to the consultation information are shared, and the problems that the existing management platform is not good enough in secret disclosure prevention and information leakage is easy to cause are solved.
In order to solve the technical problems, the invention is realized by the following technical scheme:
the invention relates to an enterprise internal management consultation information sharing system based on the internet, which comprises a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit, wherein the self-classification unit is used for classifying the information; the system comprises a request unit, a verification unit and a verification unit, wherein the request unit is used for a user to log in the enterprise internal management consultation information sharing system, the request unit is used for inputting identity information and consultation information during logging in and generating an anti-theft symbol according to the identity information and logging time, and the request unit transmits the identity information, the consultation information and the anti-theft symbol to the verification unit; the identity isThe information comprises a user name and a corresponding password; the identity information of personnel in the enterprise and the corresponding sharing level Q are stored in the identity libraryk(ii) a The information sharing library stores various kinds of sharing consultation information, and the sharing consultation information is classified by the self-classification unit, namely the consultation information is classified into X1 grades which are respectively marked as A in sequencekAnd each grade of consultation information corresponds to an information sharing channel GkWherein k is 1, 2, 3, …, X1, X1 is a preset value, ak、Qk、GkOne-to-one correspondence is realized; the verification unit carries out identity verification on the received identity information according to the identity information in the identity library, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q are obtainedkTransmitting to a processor; the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxThe grade correcting step is as follows:
step S001: calculating Fc/X2, and rounding the calculation result, and marking the obtained integer as a correction value ZxWherein, X2 is a preset adjustment value;
step S002: when the correction value Z isxWhen X3 is ≧ X, a correction value Z is obtainedxX3; otherwise the correction value ZxNo adjustment is made, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Qkx=Qk+Zx
The processor compares the advisory information with the shared correction level QkxTransmitting to the information acquisition unit, and correcting the grade Q according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkSharing the shared information details corresponding to the advisory information.
Further, the verification unit performs identity verification on the received identity information according to the identity information in the identity library in the following manner:
step SS 01: comparing the received identity information with identity information in an identity library;
step SS 02: if the identity information in the identity library has identity information which is consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS 1: sequencing the received identity information according to a form of a user name and a password to obtain a character string Di, wherein i is 1, 2, 3, … and n, and n is an integer;
step SS 2: acquiring a time node requested to be logged by a user, and sequencing the time node according to a form of year, month, day, time and division to obtain a character string Mj, wherein j is 1, 2, 3, … and m, and m is an integer;
step SS 3: calculating characteristic value according to formula
Figure BDA0002538979850000031
Rounding the characteristic value and defining the integer as a key sequence number;
step SS 4: circularly arranging the character strings Di, and marking the characters corresponding to the key serial numbers as keys;
step SS 5: when the key is consistent with the anti-theft symbol, the anti-theft check is passed, namely the identity authentication is passed;
otherwise, the authentication fails.
Further, the anti-theft symbol is generated in the following mode:
the intelligent equipment used by the user is integrated with an antitheft symbol generation rule, and the antitheft symbol generation rule is the same as the SS 1-SS 4 rules in the antitheft verification step.
Further, the mode of grading the consultation information through the self-classification unit is as follows:
step S1: when the consultation information is recorded, the recording format is 'consultation information + k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classification unit;
step S3: grade ofClassifying the counseling information with same code into a grade, and marking the grade of the counseling information as Ak
Wherein k is 1, 2, 3, …, X1, wherein X1 is a preset highest-level numerical value.
Further, the management unit is used for inputting and modifying preset values.
Further, the display is used for receiving and displaying the sharing correction grade Q transmitted by the processorkxInformation sharing channel GkAdvisory information level AkAnd sharing information details.
Further, the storage unit is used for storing the time of each login and the information of consultation of each user.
The invention has the following beneficial effects:
the invention carries out identity verification on the received identity information according to the identity information in the identity library through the verification unit, and after the identity verification is passed, the identity information, the consultation information and the corresponding sharing grade Q are obtainedkTransmitting to a processor; the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxFinally, the grade Q is corrected according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkSharing details of shared information corresponding to the consultation information, passing through identity verification and consultation information level AkInformation sharing channel GkThe risk of leakage of the internal information of the enterprise is reduced, and the safety of the internal information of the enterprise is guaranteed.
Of course, it is not necessary for any product in which the invention is practiced to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an internet-based system for sharing information for managing and consulting in an enterprise.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is an enterprise internal management consultation information sharing system based on internet, including a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library, and a self-classification unit; the request unit is used for logging in an enterprise internal management consultation information sharing system by a user, and is used for inputting identity information and consultation information during logging in, namely sharing information which is required to be consulted; the identity information comprises a user name and a corresponding password; the identity information of the personnel in the enterprise and the corresponding sharing level Q are stored in the identity libraryk(ii) a The information sharing library stores various kinds of sharing consultation information, and the sharing consultation information is classified by the self-classification unit, namely the consultation information is classified into X1 grades which are respectively marked as AkAnd each grade of consultation information corresponds to an information sharing channel GkWherein k is 1, 2, 3, …, X1, X1 is a preset value, ak、Qk、GkOne-to-one correspondence is realized; the verification unit performs identity verification on the received identity information according to the identity information in the identity library, and verifies the identity information, the consultation information and the corresponding sharing level Q after the identity verification is passedkTransmitting to a processor; the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxThe grade correcting step is as follows:
step S001: calculating Fc/X2, and rounding the calculation result, and marking the obtained integer as a correction value ZxWherein, X2 is a preset adjustment value;
step S002: when the correction value Z isxWhen X3 is ≧ X, a correction value Z is obtainedxX3; otherwise the correction value ZxNo adjustment is made, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Qkx=Qk+Zx
The processor will consult information and share correction grade QkxTransmitting to the information acquisition unit, and correcting the grade Q according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkSharing the shared information details corresponding to the advisory information.
The verification unit performs identity verification on the received identity information according to the identity information in the identity library in the following manner:
step SS 01: comparing the received identity information with identity information in an identity library;
step SS 02: if the identity information in the identity library has identity information which is consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS 1: sequencing the received identity information according to a form of a user name and a password to obtain a character string Di, wherein i is 1, 2, 3, …, n is an integer, and if the user name yuangngzhang and the password zhang256381 are used, the character string Di is yuanggongzhang + zhang256381, and the character corresponding to D3 is 'a';
step SS 2: acquiring a time node requested to be logged in by a user, and sequencing the time nodes in a form of year, month, day, time and minute to obtain a character string Mj, wherein j is 1, 2, 3, … and M is an integer, if the login time is 2020, 6, month, 1 and 18 hours and 6 minutes, the character string Mj is '202006011806', and a character corresponding to M5 is '0';
step SS 3: calculating characteristic value according to formula
Figure BDA0002538979850000071
And rounding the characteristic value and defining the integer as the key number, i.e.
Figure BDA0002538979850000072
The key sequence number is 3;
step SS 4: circularly arranging character strings Di, marking the characters corresponding to the key serial number as a key, and obtaining Di corresponding to the key serial number 3 as 'a';
step SS 5: when the key is consistent with the anti-theft symbol, the anti-theft check is passed, namely the identity authentication is passed;
otherwise, the authentication fails (possibly, the identity information is stolen).
The generation mode of the anti-theft symbol is as follows:
the intelligent equipment used by the user is integrated with an antitheft symbol generation rule, and the antitheft symbol generation rule is the same as the SS 1-SS 4 rules in the antitheft verification step.
The mode of carrying out grade division on the consultation information through the self-classification unit is as follows:
step S1: when the consultation information is recorded, the recording format is 'consultation information + k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classification unit;
step S3: classifying the consulting information with the same grade code into one grade, and waiting the grade consulting informationStage number is Ak
Wherein k is 1, 2, 3, …, X1, wherein X1 is a preset highest-level numerical value.
The management unit is used for inputting and modifying preset values.
Wherein the display is used for receiving and displaying the sharing correction grade Q transmitted by the processorkxInformation sharing channel GkAdvisory information level AkAnd sharing information details.
The storage unit is used for storing the time of each user logging in and the information of consultation.
An enterprise internal management consultation information sharing system based on the internet carries out identity verification on received identity information through a verification unit according to the identity information in an identity library, and after the identity verification is passed, the identity information, the consultation information and a corresponding sharing grade Q are usedkTransmitting to a processor; the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxFinally, the grade Q is corrected according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkSharing details of shared information corresponding to the consultation information, passing through identity verification and consultation information level AkInformation sharing channel GkThe risk of leakage of the internal information of the enterprise is reduced, and the safety of the internal information of the enterprise is guaranteed.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.

Claims (7)

1. An enterprise internal management consultation information sharing system based on the Internet is characterized by comprising a request unit, a verification unit, an identity library, a processor, a display, a storage unit, a management unit, an information acquisition unit, a node selection unit, an information sharing library and a self-classification unit;
the system comprises a request unit, a verification unit and a verification unit, wherein the request unit is used for a user to log in the enterprise internal management consultation information sharing system, the request unit is used for inputting identity information and consultation information during logging in and generating an anti-theft symbol according to the identity information and logging time, and the request unit transmits the identity information, the consultation information and the anti-theft symbol to the verification unit; the identity information comprises a user name and a corresponding password;
the identity information of personnel in the enterprise and the corresponding sharing level Q are stored in the identity libraryk
The information sharing library stores various kinds of sharing consultation information, and the sharing consultation information is classified by the self-classification unit, namely the consultation information is classified into X1 grades which are respectively marked as A in sequencekAnd each grade of consultation information corresponds to an information sharing channel GkWherein k is 1, 2, 3, …, X1, X1 is a preset value, ak、Qk、GkOne-to-one correspondence is realized;
the verification unit performs identity verification on the received identity information according to the identity information in the identity library, and verifies the identity information, the consultation information and the corresponding information after the identity verification is passedSharing level QkTransmitting to a processor;
the processor obtains the access times F of the usercAnd a grade correction step is carried out to obtain a sharing correction grade QkxThe grade correcting step is as follows:
step S001: calculating Fc/X2, and rounding the calculation result, and marking the obtained integer as a correction value ZxWherein, X2 is a preset adjustment value;
step S002: when the correction value Z isxWhen X3 is ≧ X, a correction value Z is obtainedxX3; otherwise the correction value ZxNo adjustment is made, wherein X3 is a preset correction upper limit value;
step S003: shared correction level Qkx=Qk+Zx
The processor compares the advisory information with the shared correction level QkxTransmitting to the information acquisition unit, and correcting the grade Q according to the sharingkxSelecting and sharing a revision level Q by a node election unitkxCorresponding information sharing channel GkAnd obtaining the information sharing channel G in the information sharing librarykCorresponding advisory information level AkSharing the shared information details corresponding to the advisory information.
2. The system of claim 1, wherein the verification unit performs authentication on the received identity information according to the identity information in the identity repository in a manner that:
step SS 01: comparing the received identity information with identity information in an identity library;
step SS 02: if the identity information in the identity library has identity information which is consistent with the received identity information, the comparison result is consistent, the identity authentication step is completed, and the anti-theft verification step is carried out;
the anti-theft verification steps are as follows:
step SS 1: sequencing the received identity information according to a form of a user name and a password to obtain a character string Di, wherein i is 1, 2, 3, … and n, and n is an integer;
step SS 2: acquiring a time node requested to be logged by a user, and sequencing the time node according to a form of year, month, day, time and division to obtain a character string Mj, wherein j is 1, 2, 3, … and m, and m is an integer;
step SS 3: calculating characteristic value according to formula
Figure FDA0002538979840000021
Rounding the characteristic value and defining the integer as a key sequence number;
step SS 4: circularly arranging the character strings Di, and marking the characters corresponding to the key serial numbers as keys;
step SS 5: when the key is consistent with the anti-theft symbol, the anti-theft check is passed, namely the identity authentication is passed;
otherwise, the authentication fails.
3. The system as claimed in claim 1, wherein the burglar alarm is generated in a manner of:
the intelligent equipment used by the user is integrated with an antitheft symbol generation rule, and the antitheft symbol generation rule is the same as the SS 1-SS 4 rules in the antitheft verification step.
4. The system of claim 1, wherein the consulting information is classified by the self-classifying unit in a manner of:
step S1: when the consultation information is recorded, the recording format is 'consultation information + k', wherein k is defined as a grade code of the consultation information;
step S2: extracting a grade code k corresponding to the consultation information from the classification unit;
step S3: classifying the advisory information with the same grade code into one grade, and marking the grade of the advisory information as Ak
Wherein k is 1, 2, 3, …, X1, wherein X1 is a preset highest-level numerical value.
5. The system as claimed in claim 1, wherein the management unit is used for inputting and modifying preset values.
6. The system as claimed in claim 1, wherein the display is adapted to receive and display the sharing revision level Q transmitted from the processorkxInformation sharing channel GkAdvisory information level AkAnd sharing information details.
7. The system as claimed in claim 1, wherein the storage unit is used for storing the time of each user logging in and consulting information.
CN202010541410.2A 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet Active CN111708996B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010541410.2A CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010541410.2A CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Publications (2)

Publication Number Publication Date
CN111708996A true CN111708996A (en) 2020-09-25
CN111708996B CN111708996B (en) 2024-03-15

Family

ID=72540149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010541410.2A Active CN111708996B (en) 2020-06-15 2020-06-15 Enterprise internal management consultation information sharing system based on Internet

Country Status (1)

Country Link
CN (1) CN111708996B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113139198A (en) * 2021-05-08 2021-07-20 钦州云之汇大数据科技有限公司 Enterprise management information sharing system based on Internet

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145897A1 (en) * 2009-12-14 2011-06-16 Verizon Patent And Licensing, Inc. Ubiquitous webtoken
JP2013097512A (en) * 2011-10-31 2013-05-20 Sumitomo Mitsui Banking Corp Login authentication system and method
CN109214164A (en) * 2018-09-07 2019-01-15 河北地质大学 Computer communication security login method Internet-based and system
CN110675124A (en) * 2019-09-23 2020-01-10 江西毕姆工程技术有限公司 Engineering management promotes service system based on internet
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110145897A1 (en) * 2009-12-14 2011-06-16 Verizon Patent And Licensing, Inc. Ubiquitous webtoken
JP2013097512A (en) * 2011-10-31 2013-05-20 Sumitomo Mitsui Banking Corp Login authentication system and method
CN109214164A (en) * 2018-09-07 2019-01-15 河北地质大学 Computer communication security login method Internet-based and system
CN110675124A (en) * 2019-09-23 2020-01-10 江西毕姆工程技术有限公司 Engineering management promotes service system based on internet
CN110795753A (en) * 2019-11-08 2020-02-14 深圳市理约云信息管理有限公司 File security protection system, file security sharing method and security reading method
CN111163104A (en) * 2020-01-02 2020-05-15 深圳市高德信通信股份有限公司 Network security protection system for enterprise

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113139198A (en) * 2021-05-08 2021-07-20 钦州云之汇大数据科技有限公司 Enterprise management information sharing system based on Internet

Also Published As

Publication number Publication date
CN111708996B (en) 2024-03-15

Similar Documents

Publication Publication Date Title
CN107423632B (en) Customizable sensitive data desensitization method and system
CN102761551B (en) System and method for multilevel cross-domain access control
CN110473078A (en) Information processing method, device, gateway server and medium in invoice issuing
CN106779527A (en) Commodity circulation information inquiry system and method based on block chain
CN110957025A (en) Medical health information safety management system
CN105868369B (en) A kind of data model verifying System and method for based on Merkle tree construction
US10243740B2 (en) Multi-use long string authentication keys
CN108428141A (en) A kind of foodstuff traceability information management system based on ERP system Yu block chain
CN105593867B (en) Method for assessing certificate
CN110753016B (en) Real name authentication method based on block chain
CN105207780B (en) A kind of certification user method and device
CN106850228A (en) A kind of foundation of portable intelligent password management system and operating method
CN105989426A (en) Customer relationship management system facing standard information service industry
CN103218723B (en) Product anti-fake system and method by means of machine vision and on basis of two-dimensional figure
CN103294938A (en) Access request verification method and system, authorization information generation method, hardware equipment
CN112765627B (en) Business report data authority control method based on double-layer authority control
KR102301478B1 (en) Smart lock device, lock management system including the device, and lock management method using the system
CN110472012A (en) A kind of block chain sensitivity word treatment method, device, storage medium and equipment
CN111339141A (en) Data transmission method, block link node equipment and medium
CN106817217B (en) A kind of dynamic password Encryption Algorithm of interrupted aging
CN111708996A (en) Enterprise internal management consultation information sharing system based on Internet
CN117332453B (en) Safety management system for product database
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN113010909A (en) Data security classification method and device for scientific data sharing platform
KR101687480B1 (en) A secure server for an energy management system, and a method for controlling thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant