CN112420146A - Information security management method and system - Google Patents
Information security management method and system Download PDFInfo
- Publication number
- CN112420146A CN112420146A CN202011491791.4A CN202011491791A CN112420146A CN 112420146 A CN112420146 A CN 112420146A CN 202011491791 A CN202011491791 A CN 202011491791A CN 112420146 A CN112420146 A CN 112420146A
- Authority
- CN
- China
- Prior art keywords
- module
- information
- network
- image
- security management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/13—Sensors therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Engineering & Computer Science (AREA)
- Epidemiology (AREA)
- Medical Informatics (AREA)
- Primary Health Care (AREA)
- Public Health (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention belongs to the technical field of information management, and discloses an information security management method and an information security management system, wherein the information security management system comprises: the system comprises a human-computer interaction module, a human face/fingerprint image acquisition module, a network monitoring module, a registration module, a display module, a central processing module, a signal transmission module, a cloud service module, an information storage module, an identity verification module, a network security diagnosis module and an image processing module. According to the information security management method provided by the invention, the information interaction with the system is realized through the man-machine interaction module through man-machine conversation and hardware operation, and the intellectualization of the whole system is improved. The accuracy of identity recognition is improved through the face/fingerprint image acquisition module and the image processing module; through the network monitoring module and the network security diagnosis module, malicious intrusion of a network can be detected in real time, and the security of patient information is ensured; through the signal transmission module, the whole system has various network connections, and the reliability of the network connection is ensured.
Description
Technical Field
The invention belongs to the technical field of information management, and particularly relates to an information security management method and system.
Background
At present, a patient refers to a person suffering from a disease or suffering from a disease. The patient needs to protect his own privacy during the treatment process. The so-called privacy is a personal affair that a person concerned is unwilling to know by others or inconvenient to know by others (only a person with a privacy obligation can be disclosed), and a personal field that a person concerned is unwilling to intrude by others or inconvenient to intrude by others, regardless of public interests or group interests. Privacy is the natural right of our individual. Privacy is naturally created from the time when the human grabs the leaves to cover the shy. At the present stage, various hospitals record the treatment information of patients through computers. When storing treatment information of a patient, information security management is required.
Information Management (IM) is an activity in which humans comprehensively adopt technical, economic, policy, legal, and human methods and means to control Information flows (including informal flows and formal flows) in order to improve Information utilization efficiency and maximize the utility value of Information. Information is a representation of the presence and movement attributes of things. "things" broadly refers to all possible objects of human society, mental activities, and nature. "Presence" refers to the internal structure and external connections of things. "motion" broadly refers to any change in meaning, including mechanical, physical, chemical, biological, mental, and social movements. "motion state" refers to the features, situations and laws exhibited by things that vary in time and space. Information is typically passed from the information producer to the information consumer via two ways. One is the direct flow from the message producer to the message consumer, called denormal flow; the other is the flow of information to information users under the control of the information system, called the regular flow. The information management refers to a process of scientifically planning, organizing, controlling and coordinating various relevant factors (mainly people, information, technologies and organizations) of human social information activities so as to realize reasonable development and effective utilization of information resources. It includes both microscopic management of information content-organization, retrieval, processing, service, etc., and macroscopic management of information organization and information system. The working process of effective operation of the information system is ensured by formulating a perfect information management system and adopting a modern information technology. There are both static and dynamic management, but more importantly, dynamic management. It not only ensures the integrity of the information material, but also ensures the normal operation of the information system in the cycle of "information input-information output". Information management is a social activity performed by humans to collect, process and utilize information. It is the inevitable result and inevitable trend caused by the development of science and technology, the change of social environment and the progress of human thought. However, the existing information security management system can only use a keyboard to input information, thereby reducing the intellectualization of the whole system. Meanwhile, the accuracy of identity authentication is reduced in the use process of the existing information security management system.
Through the above analysis, the problems and defects of the prior art are as follows:
(1) the existing information security management system can only use a keyboard to input information, so that the intellectualization of the whole system is reduced.
(2) The existing information security management system reduces the accuracy of identity authentication in the using process.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides an information security management method and system.
The invention is realized in such a way that an information security management method comprises the following steps:
firstly, a patient registers information through a registration module by utilizing a personal registration interface, and inputs personal related information to log in the information security management system; acquiring control information conveyed by a user by using man-machine interaction hardware operation through a man-machine interaction module, wherein the control information comprises voice information;
extracting text features of the voice information, and determining text feature vectors corresponding to the text features; determining a voice sample matched with the text feature vector according to a pre-trained voice classification model; the voice classification model represents the attribution probability of a text feature vector and a corresponding voice sample;
step three, using the voice control instruction corresponding to the determined voice sample as the voice control instruction of the voice information; generating a target control instruction according to the voice control instruction, and realizing information interaction operation between the patient and the information safety management system;
step four, acquiring corresponding identity card information by using an identity recognizer through an identity verification module, and verifying the information of the user; acquiring a face image by a face/fingerprint image acquisition module by using a camera; acquiring a corresponding fingerprint image through a fingerprint pickup device;
establishing a corresponding image set for the acquired face and fingerprint images through an image processing module; carrying out noise identification on images in the image set, extracting images containing noise, and carrying out preprocessing of gray level change, filtering, edge detection and segmentation; after the image preprocessing is finished, extracting and identifying image features by using an image processing program to realize the processing of the acquired face and fingerprint images;
monitoring specific network viruses by a network monitoring module by using a network monitoring program; the network security diagnosis module simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion;
seventhly, the central processing module is respectively connected with the human-computer interaction module, the face/fingerprint image acquisition module, the network monitoring module, the registration module, the display module, the signal transmission module, the information storage module, the identity verification module, the network security diagnosis module and the image processing module, and the central processing unit is used for coordinately controlling the normal operation of each module of the information security management system;
step eight, storing real-time data of human-computer interaction information, human face images, fingerprint images, image processing results, network monitoring information, identity verification results and network security diagnosis results by using a storage through an information storage module; information interaction between the central control module and the cloud service module is realized by the signal transmission module through network transmission equipment;
processing and analyzing corresponding data of the whole system by utilizing a cloud server through a cloud service module and utilizing a big data processing technology; and the display module is used for displaying the man-machine interaction information, the face image, the fingerprint image, the image processing result, the network monitoring information, the identity verification result and the network security diagnosis result by using a display screen.
Further, in step two, the determining the speech sample matched with the text feature vector according to the pre-trained speech classification model includes:
(1) determining voice samples to which the text feature vectors are possibly attributed and attribution probability of each voice sample to which the text feature vectors are possibly attributed according to the voice classification model;
(2) and selecting the voice sample with the highest attribution probability as the voice sample matched with the text feature vector.
Further, in the fifth step, the filtering the face image and the fingerprint image includes:
(1) analyzing the images in the image set to obtain the corresponding sizes of the face and the fingerprint images;
(2) determining a memory buffer area and initializing; scanning pixel points in the image through an image scanning program;
(3) sequencing the pixel values of all elements, and determining an intermediate value auxiliary value to a pixel point corresponding to the current point in the target image; and repeating the operation until all the pixel points are processed.
Further, in the fifth step, the segmenting the face and the fingerprint image includes:
(1) decomposing the histogram of the face and fingerprint images into wavelet coefficients of different levels by binary wavelet transform;
(2) and selecting a threshold according to a given segmentation criterion and the wavelet coefficient, and marking out the image segmentation area by using the threshold.
Further, in step eight, the network transmission device passing through the signal transmission module includes: repeaters, hubs, switches, and routers.
Furthermore, the repeater is provided with two ports, receives corresponding signals, copies, adjusts and amplifies the signals and then sends the signals out;
the concentrator is a central device of a local area network, a plurality of ports are arranged on the concentrator, and each port is connected with a data information safety management system;
a switching hub in the network for completing the switching of data units between the lines connected to it, based on MAC identification, completing the encapsulation and forwarding of data packets;
the router is connected with network devices of a plurality of networks or network segments and translates data information between different networks or network segments.
Another object of the present invention is to provide an information security management system for implementing the information security management method, the information security management system comprising:
the man-machine interaction module is connected with the central processing module and realizes information interaction with the system through man-machine conversation and hardware operation;
the face/fingerprint image acquisition module is connected with the central processing module and acquires a face image through a camera; acquiring a corresponding fingerprint image through a fingerprint pickup device;
the network monitoring module is connected with the central processing module and monitors specific network viruses through a network monitoring program;
the registration module is connected with the central processing module, registers information through a personal registration interface, and inputs personal related information to log in the information security management system;
the display module is connected with the central processing module and displays the real-time data of the man-machine interaction information, the face image, the fingerprint image, the image processing result, the network monitoring information, the identity verification result and the network security diagnosis result through a display screen;
and the central processing module is respectively connected with the human-computer interaction module, the face/fingerprint image acquisition module, the network monitoring module, the registration module, the display module, the signal transmission module, the information storage module, the identity verification module, the network security diagnosis module and the image processing module and is used for coordinating and controlling the normal operation of each module of the information security management system through the central processing unit.
Further, the information security management system further includes:
the signal transmission module is connected with the central processing module and realizes information interaction between the central control module and the cloud service module through network transmission equipment;
the cloud service module is connected with the signal transmission module and used for processing and analyzing corresponding data of the whole system by utilizing a big data processing technology through the cloud server;
the information storage module is connected with the central processing module and stores human-computer interaction information, a human face image, a fingerprint image, an image processing result, network monitoring information, an identity verification result and a network security diagnosis result through a storage;
the identity authentication module is connected with the central processing module, acquires corresponding identity card information through the identity recognizer and authenticates the information of the user;
the network security diagnosis module is connected with the central processing module, simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion;
and the image processing module is connected with the central processing module and is used for processing the acquired face and fingerprint images through an image processing program.
Another object of the present invention is to provide a computer program product stored on a computer readable medium, which includes a computer readable program for providing a user input interface to implement the information security management method when the computer program product is executed on an electronic device.
Another object of the present invention is to provide a computer-readable storage medium storing instructions that, when executed on a computer, cause the computer to execute the information security management method.
By combining all the technical schemes, the invention has the advantages and positive effects that: according to the information security management method provided by the invention, the information interaction with the system is realized through the man-machine interaction module through man-machine conversation and hardware operation, and the intellectualization of the whole system is improved. The accuracy of identity recognition is improved through the face/fingerprint image acquisition module and the image processing module; through the network monitoring module and the network security diagnosis module, malicious intrusion of a network can be detected in real time, and the security of patient information is ensured; through the signal transmission module, the whole system has various network connections, and the reliability of the network connection is ensured; by the cloud service module, the cloud server processes and analyzes corresponding data of the whole system by utilizing a big data processing technology, and accuracy and efficiency of data processing are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained from the drawings without creative efforts.
Fig. 1 is a flowchart of an information security management method according to an embodiment of the present invention.
FIG. 2 is a schematic structural diagram of an information security management system according to an embodiment of the present invention;
in the figure: 1. a human-computer interaction module; 2. a face/fingerprint image acquisition module; 3. a network monitoring module; 4. a registration module; 5. a display module; 6. a central processing module; 7. a signal transmission module; 8. a cloud service module; 9. an information storage module; 10. an identity verification module; 11. a network security diagnostic module; 12. and an image processing module.
Fig. 3 is a flowchart of a method for implementing information interaction with a system by using a human-computer interaction module and using a human-computer dialogue hardware operation according to an embodiment of the present invention.
Fig. 4 is a flowchart of a method for determining a speech sample matched with the text feature vector according to a pre-trained speech classification model according to an embodiment of the present invention.
Fig. 5 is a flowchart of a method for processing an acquired face and fingerprint image by an image processing module according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail with reference to the following embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In view of the problems in the prior art, the present invention provides a method and a system for information security management, which are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, the information security management method provided in the embodiment of the present invention includes the following steps:
s101, a patient registers information through a registration module by using a personal registration interface, and inputs personal related information to log in the information security management system; the information interaction with the system is realized by utilizing man-machine conversation hardware operation through a man-machine interaction module;
s102, acquiring corresponding identity card information by using an identity recognizer through an identity verification module, and verifying the information of a user; the normal operation of each module of the information safety management system is coordinated and controlled by a central processing module and a central processor;
s103, acquiring a face image by using a camera through a face/fingerprint image acquisition module; acquiring a corresponding fingerprint image through a fingerprint pickup device; processing the acquired face and fingerprint images by an image processing program through an image processing module;
s104, monitoring specific network viruses by using a network monitoring program through a network monitoring module; the network security diagnosis module simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion;
s105, storing real-time data of human-computer interaction information, human face images, fingerprint images, image processing results, network monitoring information, identity verification results and network security diagnosis results by using a storage through an information storage module;
s106, information interaction between the central control module and the cloud service module is achieved through the signal transmission module and the network transmission equipment; processing and analyzing corresponding data of the whole system by using a cloud server through a cloud service module and using a big data processing technology;
and S107, displaying the man-machine interaction information, the face image, the fingerprint image, the image processing result, the network monitoring information, the identity verification result and the network security diagnosis result by using a display screen through a display module.
In step S106 provided in the embodiment of the present invention, the network transmission device of the signal transmission module includes: repeaters, hubs, switches, and routers.
The repeater is provided with two ports, receives corresponding signals, copies, adjusts and amplifies the signals, and then sends the signals out.
The concentrator is a central device of a local area network, a plurality of ports are arranged on the concentrator, and each port is connected with a data information safety management system.
The switching hub is used for completing the switching of data units between the lines connected with the switching hub in the network, and completing the encapsulation and the forwarding of data packets based on the MAC (hardware address of a network card) identification.
The router is connected with network devices of a plurality of networks or network segments and translates data information between different networks or network segments.
As shown in fig. 2, an information security management system provided in an embodiment of the present invention includes:
and the human-computer interaction module 1 is connected with the central processing module 6 and realizes information interaction with the system through human-computer dialogue hardware operation.
The face/fingerprint image acquisition module 2 is connected with the central processing module 6 and acquires a face image through a camera; and acquiring a corresponding fingerprint image through the fingerprint pickup device.
And the network monitoring module 3 is connected with the central processing module 6 and monitors specific network viruses through a network monitoring program.
And the registration module 4 is connected with the central processing module 6, registers the personal interface through the patient registration module and inputs the related information of the person.
And the display module 5 is connected with the central processing module 6 and is used for displaying relevant data information of the whole system through a display screen.
And the central processing module 6 is respectively connected with the human-computer interaction module 1, the face/fingerprint image acquisition module 2, the network monitoring module 3, the registration module 4, the display module 5, the signal transmission module 7, the information storage module 9, the identity verification module 10, the network security diagnosis module 11 and the image processing module 12, and is used for coordinating and controlling the normal operation of each module of the information security management system.
And the signal transmission module 7 is connected with the central processing module 6, and realizes information interaction between the central control module and the cloud service module through network transmission equipment.
And the cloud service module 8 is connected with the signal transmission module 7, and processes and analyzes corresponding data of the whole system by using a big data processing technology through a cloud server.
And the information storage module 9 is connected with the central processing module 6 and used for storing corresponding information of the whole system through a memory.
And the identity authentication module 10 is connected with the central processing module 6, acquires corresponding identity card information through the identity recognizer and authenticates the information of the user.
And the network security diagnosis module 11 is connected with the central processing module 6, simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion.
And the image processing module 12 is connected with the central processing module 6 and processes the acquired face and fingerprint images through an image processing program.
The invention is further described with reference to specific examples.
Example 1
Fig. 1 shows an information security management method according to an embodiment of the present invention, and fig. 3 shows a preferred embodiment of the information security management method according to an embodiment of the present invention, where a man-machine interaction module performs information interaction with a system by using a man-machine interaction hardware operation, the method includes:
s201, acquiring control information conveyed by a user through a man-machine interaction module by using man-machine conversation hardware operation, wherein the control information comprises voice information;
s202, extracting text features of the voice information, and determining text feature vectors corresponding to the text features; determining a voice sample matched with the text feature vector according to a pre-trained voice classification model; the voice classification model represents the attribution probability of a text feature vector and a corresponding voice sample;
s203, using the voice control instruction corresponding to the determined voice sample as the voice control instruction of the voice information; and generating a target control instruction according to the voice control instruction, and realizing information interaction operation between the patient and the information safety management system.
As shown in fig. 4, the determining the speech sample matched with the text feature vector according to the pre-trained speech classification model according to the embodiment of the present invention includes:
s301, determining voice samples to which the text feature vectors may belong and the attribution probability of each voice sample to which the text feature vectors may belong according to the voice classification model;
s302, selecting the voice sample with the highest attribution probability as the voice sample matched with the text feature vector.
Example 2
As shown in fig. 1 and fig. 5, the method for managing information security according to the embodiment of the present invention for processing an acquired face image and a fingerprint image by an image processing module includes:
s401, establishing a corresponding image set for the acquired face and fingerprint images;
s402, carrying out noise identification on the images in the image set, extracting the images containing noise, and carrying out gray level change, filtering, edge detection and segmentation;
and S403, after the preprocessing of the face and the fingerprint images is finished, extracting and identifying the features.
The filtering of the face and fingerprint images provided by the embodiment of the invention comprises the following steps:
(1) analyzing the images in the image set to obtain the corresponding sizes of the face and the fingerprint images;
(2) determining a memory buffer area and initializing; scanning pixel points in the image through an image scanning program;
(3) sequencing the pixel values of all elements, and determining an intermediate value auxiliary value to a pixel point corresponding to the current point in the target image; and repeating the operation until all the pixel points are processed.
The segmentation of the face and fingerprint images provided by the embodiment of the invention comprises the following steps:
(1) decomposing the histogram of the face and fingerprint images into wavelet coefficients of different levels by binary wavelet transform;
(2) and selecting a threshold according to a given segmentation criterion and the wavelet coefficient, and marking out the image segmentation area by using the threshold.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When used in whole or in part, can be implemented in a computer program product that includes one or more computer instructions. When loaded or executed on a computer, cause the flow or functions according to embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL), or wireless (e.g., infrared, wireless, microwave, etc.)). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention, and the scope of the present invention is not limited thereto, and any modification, equivalent replacement, and improvement made by those skilled in the art within the technical scope of the present invention disclosed herein, which is within the spirit and principle of the present invention, should be covered by the present invention.
Claims (10)
1. An information security management method, characterized by comprising the steps of:
firstly, a patient registers information through a registration module by utilizing a personal registration interface, and inputs personal related information to log in the information security management system; acquiring control information conveyed by a user by using man-machine interaction hardware operation through a man-machine interaction module, wherein the control information comprises voice information;
extracting text features of the voice information, and determining text feature vectors corresponding to the text features; determining a voice sample matched with the text feature vector according to a pre-trained voice classification model; the voice classification model represents the attribution probability of a text feature vector and a corresponding voice sample;
step three, using the voice control instruction corresponding to the determined voice sample as the voice control instruction of the voice information; generating a target control instruction according to the voice control instruction, and realizing information interaction operation between the patient and the information safety management system;
step four, acquiring corresponding identity card information by using an identity recognizer through an identity verification module, and verifying the information of the user; acquiring a face image by a face/fingerprint image acquisition module by using a camera; acquiring a corresponding fingerprint image through a fingerprint pickup device;
establishing a corresponding image set for the acquired face and fingerprint images through an image processing module; carrying out noise identification on images in the image set, extracting images containing noise, and carrying out preprocessing of gray level change, filtering, edge detection and segmentation; after the image preprocessing is finished, extracting and identifying image features by using an image processing program to realize the processing of the acquired face and fingerprint images;
monitoring specific network viruses by a network monitoring module by using a network monitoring program; the network security diagnosis module simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion;
seventhly, the central processing module is respectively connected with the human-computer interaction module, the face/fingerprint image acquisition module, the network monitoring module, the registration module, the display module, the signal transmission module, the information storage module, the identity verification module, the network security diagnosis module and the image processing module, and the central processing unit is used for coordinately controlling the normal operation of each module of the information security management system;
step eight, storing real-time data of human-computer interaction information, human face images, fingerprint images, image processing results, network monitoring information, identity verification results and network security diagnosis results by using a storage through an information storage module; information interaction between the central control module and the cloud service module is realized by the signal transmission module through network transmission equipment;
processing and analyzing corresponding data of the whole system by utilizing a cloud server through a cloud service module and utilizing a big data processing technology; and the display module is used for displaying the man-machine interaction information, the face image, the fingerprint image, the image processing result, the network monitoring information, the identity verification result and the network security diagnosis result by using a display screen.
2. The information security management method according to claim 1, wherein in step two, the determining the voice sample matched with the text feature vector according to the pre-trained voice classification model comprises:
(1) determining voice samples to which the text feature vectors are possibly attributed and attribution probability of each voice sample to which the text feature vectors are possibly attributed according to the voice classification model;
(2) and selecting the voice sample with the highest attribution probability as the voice sample matched with the text feature vector.
3. The information security management method according to claim 1, wherein in step five, the filtering the face and fingerprint images includes:
(1) analyzing the images in the image set to obtain the corresponding sizes of the face and the fingerprint images;
(2) determining a memory buffer area and initializing; scanning pixel points in the image through an image scanning program;
(3) sequencing the pixel values of all elements, and determining an intermediate value auxiliary value to a pixel point corresponding to the current point in the target image; and repeating the operation until all the pixel points are processed.
4. The information security management method according to claim 1, wherein in step five, the segmenting the face and the fingerprint image includes:
(1) decomposing the histogram of the face and fingerprint images into wavelet coefficients of different levels by binary wavelet transform;
(2) and selecting a threshold according to a given segmentation criterion and the wavelet coefficient, and marking out the image segmentation area by using the threshold.
5. The information security management method according to claim 1, wherein in step eight, the network transmission device passing through the signal transmission module comprises: repeaters, hubs, switches, and routers.
6. The information security management method of claim 5, wherein the repeater has two ports for receiving corresponding signals, copying, adjusting and amplifying the signals, and then transmitting the signals;
the concentrator is a central device of a local area network, a plurality of ports are arranged on the concentrator, and each port is connected with a data information safety management system;
a switching hub in the network for completing the switching of data units between the lines connected to it, based on MAC identification, completing the encapsulation and forwarding of data packets;
the router is connected with network devices of a plurality of networks or network segments and translates data information between different networks or network segments.
7. An information security management system for implementing the information security management method according to any one of claims 1 to 6, the information security management system comprising:
the man-machine interaction module is connected with the central processing module and realizes information interaction with the system through man-machine conversation and hardware operation;
the face/fingerprint image acquisition module is connected with the central processing module and acquires a face image through a camera; acquiring a corresponding fingerprint image through a fingerprint pickup device;
the network monitoring module is connected with the central processing module and monitors specific network viruses through a network monitoring program;
the registration module is connected with the central processing module, registers information through a personal registration interface, and inputs personal related information to log in the information security management system;
the display module is connected with the central processing module and displays the real-time data of the man-machine interaction information, the face image, the fingerprint image, the image processing result, the network monitoring information, the identity verification result and the network security diagnosis result through a display screen;
and the central processing module is respectively connected with the human-computer interaction module, the face/fingerprint image acquisition module, the network monitoring module, the registration module, the display module, the signal transmission module, the information storage module, the identity verification module, the network security diagnosis module and the image processing module and is used for coordinating and controlling the normal operation of each module of the information security management system through the central processing unit.
8. The information security management system according to claim 7, further comprising:
the signal transmission module is connected with the central processing module and realizes information interaction between the central control module and the cloud service module through network transmission equipment;
the cloud service module is connected with the signal transmission module and used for processing and analyzing corresponding data of the whole system by utilizing a big data processing technology through the cloud server;
the information storage module is connected with the central processing module and stores human-computer interaction information, a human face image, a fingerprint image, an image processing result, network monitoring information, an identity verification result and a network security diagnosis result through a storage;
the identity authentication module is connected with the central processing module, acquires corresponding identity card information through the identity recognizer and authenticates the information of the user;
the network security diagnosis module is connected with the central processing module, simulates the access of a user, and compares the response of the request with the normal response by analyzing the response of the request so as to obtain whether the network has malicious intrusion;
and the image processing module is connected with the central processing module and is used for processing the acquired face and fingerprint images through an image processing program.
9. A computer program product stored on a computer readable medium, comprising a computer readable program for providing a user input interface for implementing the information security management method of any one of claims 1 to 6 when executed on an electronic device.
10. A computer-readable storage medium storing instructions that, when executed on a computer, cause the computer to perform the information security management method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011491791.4A CN112420146A (en) | 2020-12-17 | 2020-12-17 | Information security management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011491791.4A CN112420146A (en) | 2020-12-17 | 2020-12-17 | Information security management method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112420146A true CN112420146A (en) | 2021-02-26 |
Family
ID=74775720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011491791.4A Withdrawn CN112420146A (en) | 2020-12-17 | 2020-12-17 | Information security management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112420146A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112799897A (en) * | 2021-02-23 | 2021-05-14 | 青岛海科虚拟现实研究院 | Information management method, management system and storage medium based on big data |
-
2020
- 2020-12-17 CN CN202011491791.4A patent/CN112420146A/en not_active Withdrawn
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112799897A (en) * | 2021-02-23 | 2021-05-14 | 青岛海科虚拟现实研究院 | Information management method, management system and storage medium based on big data |
CN112799897B (en) * | 2021-02-23 | 2022-11-01 | 青岛海科虚拟现实研究院 | Information management method, management system and storage medium based on big data |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200195694A1 (en) | Method and computing device for identifying suspicious users in message exchange systems | |
CN107545241A (en) | Neural network model is trained and biopsy method, device and storage medium | |
Karie et al. | Toward a general ontology for digital forensic disciplines | |
US20190319957A1 (en) | Utilizing transport layer security (tls) fingerprints to determine agents and operating systems | |
CN109658579A (en) | A kind of access control method, system, equipment and storage medium | |
CN106941506A (en) | Data processing method and device based on biological characteristic | |
CN110991246A (en) | Video detection method and system | |
Sohrawardi et al. | Defaking DeepFakes: Understanding journalists’ needs for DeepFake detection | |
CN115632862A (en) | Information security management method and system | |
WO2022269504A1 (en) | System and method for privacy risk assessment and mitigatory recommendation | |
CN113285945B (en) | Communication security monitoring method, device, equipment and storage medium | |
CN109634554B (en) | Method and device for outputting information | |
CN112420146A (en) | Information security management method and system | |
CN118070324A (en) | Data desensitization optimization method based on multi-modal algorithm network | |
CN113420295A (en) | Malicious software detection method and device | |
CN110855675B (en) | Mail safety consciousness testing method, device, equipment and storage medium | |
WO2019187107A1 (en) | Information processing device, control method, and program | |
CN113312619B (en) | Malicious process detection method and device based on small sample learning, electronic equipment and storage medium | |
CN114090650A (en) | Sample data identification method and device, electronic equipment and storage medium | |
US11714970B2 (en) | Systems and methods for detecting deception in computer-mediated communications | |
CN112989083B (en) | Personnel identity analysis method, device, equipment and storage medium | |
Lin et al. | Edge Artificial Intelligence (AI) for real-time automatic quantification of filariasis in mobile microscopy | |
Canelón et al. | Unstructured data for cybersecurity and internal control | |
CN117473511B (en) | Edge node vulnerability data processing method, device, equipment and storage medium | |
CN115292696B (en) | Information transmission path monitoring method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20210226 |
|
WW01 | Invention patent application withdrawn after publication |