CN113094678A - Enterprise information security management system - Google Patents

Enterprise information security management system Download PDF

Info

Publication number
CN113094678A
CN113094678A CN201911342761.4A CN201911342761A CN113094678A CN 113094678 A CN113094678 A CN 113094678A CN 201911342761 A CN201911342761 A CN 201911342761A CN 113094678 A CN113094678 A CN 113094678A
Authority
CN
China
Prior art keywords
unit
information
module
enterprise information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911342761.4A
Other languages
Chinese (zh)
Other versions
CN113094678B (en
Inventor
陈力
方进锋
陈洁松
邓少宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Tianyuan Dike Information Technology Co ltd
Original Assignee
Hefei Tianyuan Dike Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Tianyuan Dike Information Technology Co ltd filed Critical Hefei Tianyuan Dike Information Technology Co ltd
Priority to CN201911342761.4A priority Critical patent/CN113094678B/en
Publication of CN113094678A publication Critical patent/CN113094678A/en
Application granted granted Critical
Publication of CN113094678B publication Critical patent/CN113094678B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

本发明公开了企业信息安全管理系统,包括防火墙模块,中央控制模块、数据库模块、登录模块、权限管理模块以及身份识别模块;使用时,不仅能够通过防火墙阻止黑客、病毒的非法入侵,而且丰富了企业之间寻求合作的方式,使得潜在合作客户能够通过该企业信息安全管理系统寻求合作意向以及完成合作谈判;能够针对不同访客提供符合其身份的访问权限,提高了企业信息安全管理的针对性;另外,能够防止、制止完成注册、登录的用户进行企业机密信息的窥探行为。

Figure 201911342761

The invention discloses an enterprise information security management system, including a firewall module, a central control module, a database module, a login module, an authority management module and an identity identification module; when used, it can not only prevent the illegal intrusion of hackers and viruses through the firewall, but also enrich the The way of seeking cooperation between enterprises enables potential cooperative customers to seek cooperation intentions and complete cooperation negotiations through the enterprise information security management system; it can provide different visitors with access rights in line with their identities, which improves the pertinence of enterprise information security management; In addition, it is possible to prevent or restrain users who have completed registration and login from snooping on the company's confidential information.

Figure 201911342761

Description

Enterprise information security management system
Technical Field
The invention relates to the technical field of enterprise information security management, in particular to an enterprise information security management system.
Background
With the development of society and science and technology, people pay more and more attention to the timeliness of information exchange and communication. With the advent of the network big data era, a bridge is established for information exchange of enterprises. The information is transmitted and received by the network, remote cooperation and communication are carried out, convenience is brought to operation and development of enterprises, meanwhile, hidden dangers are caused to the enterprise management to a certain extent, information leakage caused by endless network viruses and personnel flow is caused, and threats are always formed on internal information resources of the enterprises.
At present, most information management systems of enterprises deal with the phenomenon of illegal invasion of an information base in a firewall deployment mode, and the arrangement of a firewall can play a role in preventing enterprise information from being maliciously read; however, for some potential clients who want to know the enterprise information deeply to seek cooperation, the enterprise-related information cannot be queried conveniently and quickly, and the security management system for the enterprise information lacks pertinence.
Disclosure of Invention
The invention aims to provide an enterprise information security management system which can prevent an enterprise information base from being illegally invaded, and can meet the requirement that potential clients seeking cooperation conveniently access the enterprise information base so as to ensure the pertinence of enterprise information security management.
In order to achieve the purpose, the invention provides the following technical scheme: the enterprise information security management system comprises a firewall module, a central control module, a database module, a login module, a permission management module and an identity recognition module, wherein the central control module is respectively associated with the database module, the firewall module, the login module, the permission management module and the identity recognition module;
the database module is used for uploading and reading enterprise information and storing the uploaded enterprise information data in a classified manner;
the login module is used for providing a registration and login platform for a user to access the information management system;
the authority management module is used for setting the authority of the user for accessing the enterprise information system according to the registration information of the user, and is used for the user to apply for improving the authority for accessing the enterprise information system and the authorization for applying;
the identity identification module is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registered identity information of the user.
Preferably, the database module comprises a storage unit, an input unit, a classification unit and a reading unit, wherein the storage unit is used for storing enterprise information data;
the input unit is used for uploading enterprise information data to the storage unit by enterprise information management personnel;
the classification unit is used for classifying and storing the enterprise information data uploaded by the input unit in the storage unit;
the reading unit is used for the user to retrieve and read the needed enterprise information data from the storage unit.
Preferably, the login module comprises a registration unit, a biological information acquisition unit and a login portal, wherein the registration unit is used for providing a platform for a user to register and login an enterprise information management system account;
the biological information acquisition unit is used for acquiring biological information of a user when the user registers an account through the registration unit, and the biological information acquired by the biological information acquisition unit comprises a front head portrait and a finger fingerprint of the user;
the login portal is used for providing a login platform for accessing the enterprise information management system for a user who registers an account through the registration unit and is acquired biological information through the biological information acquisition unit.
Preferably, the authority management module comprises an authority presetting unit, a key unit and an authorization unit, wherein the authority presetting unit is used for classifying the enterprise information data according to the classification unit and dividing the enterprise information data into access authority levels;
the key unit is used for providing a password input platform for retrieving and reading enterprise information data with different access permission levels;
the authorization unit is used for providing passwords for retrieving and reading enterprise information materials with different access permission levels.
Preferably, the identity recognition module comprises a face recognition unit, a fingerprint recognition unit and a verification unit, wherein the face recognition unit is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit;
the fingerprint identification unit is used for judging the consistency of the finger fingerprint of a user logging in the enterprise information management system and the finger fingerprint of a registered user collected by the biological information collection unit;
the verification unit is used for judging the correctness of the identity of the login user according to the judgment results of the face recognition unit and the fingerprint recognition unit.
Preferably, the system further comprises an information acquisition module, wherein the information acquisition module is used for potential collaborating clients to enter the collaboration intention and enterprise information data corresponding to the potential collaborating clients, and the entered enterprise information data and the collaboration intention are classified and stored.
Preferably, the information acquisition module comprises a client information base, an information input unit and an information dividing unit, wherein the information input unit is used for potential cooperative clients to input the cooperation intention and enterprise information data corresponding to the potential cooperative clients;
the client information base is used for storing the cooperation intention of potential cooperative clients input by the information input unit and enterprise information data corresponding to the potential cooperative clients;
the information dividing unit is used for classifying the cooperation intention of the potential cooperation client, which is input by the information input unit, and the enterprise information data corresponding to the potential cooperation client.
Preferably, the system further comprises an interactive interface module, wherein the interactive interface module is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients.
Preferably, the interactive interface module comprises an interactive platform unit and an information sharing unit, wherein the interactive platform unit is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients;
the information sharing unit is used for establishing a sharing channel with an enterprise information management system of a cooperative client successfully negotiated by the interactive platform unit.
Preferably, the system further comprises an alarm module, wherein the alarm module comprises a warning unit, a shielding unit and an alarm unit, and the alarm module is used for warning a user who illegally logs in the enterprise information management system platform, shielding IP (Internet protocol) and reporting illegal behaviors of the user to a public security system;
the warning unit is used for sending warning information to a user who tries to input an error password to the key unit for multiple times;
the shielding unit is used for shielding the IP of the user who still tries to input the wrong password to the key unit after the warning unit sends the warning information;
the alarm unit uploads the registration and login information of the corresponding user, which is shielded by the shielding unit to the public security system for reporting and reporting.
Compared with the prior art, the invention has the beneficial effects that:
1. the enterprise information security management system related by the invention not only can prevent the illegal invasion of hackers and viruses through a firewall, but also enriches the modes of seeking cooperation among enterprises, so that potential cooperative clients can seek cooperative intention and complete cooperative negotiation through the enterprise information security management system;
2. the enterprise information security management system can provide access authority which accords with the identity of different visitors aiming at different visitors, and improves the pertinence of enterprise information security management;
3. the enterprise information management system can prevent and inhibit the snooping action of confidential enterprise information of registered and logged-in users.
Drawings
FIG. 1 is a schematic diagram of a frame structure according to the principles of the present invention;
FIG. 2 is a schematic internal framework diagram of the database module of the present invention;
FIG. 3 is a diagram of the internal schematic framework of the login module of the present invention;
FIG. 4 is a schematic internal block diagram of an information acquisition module according to the present invention;
FIG. 5 is a diagram of the internal schematic framework of the rights management module of the present invention;
FIG. 6 is a block diagram of the internal principles of the identity module of the present invention;
FIG. 7 is a schematic internal framework diagram of the interactive interface module of the present invention;
fig. 8 is a block diagram of the internal principle of the alarm module of the present invention.
In the figure: 1-a central control module; 2-a database module; 21-a storage unit; 22-an input unit; 23-a classification unit; 24-a reading unit; 3-firewall module; 4-a login module; 41-a registration unit; 42-a biological information acquisition unit; 43-login portal; 5-an information acquisition module; 51-customer information base; 52-information entry unit; 53-information partitioning unit; 6-a rights management module; 61-permission presetting unit; 62-a key unit; 63-an authorization unit; 7-an identity recognition module; 71-a face recognition unit; 72-fingerprint identification unit; 73-a verification unit; 8-an interactive interface module; 81-interactive platform unit; 82-an information sharing unit; 9-an alarm module; 91-a warning unit; 92-a shielding unit; 93-alarm unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1 referring to fig. 1-3 and 5-6, the present invention provides a technical solution: the enterprise information security management system comprises a firewall module 3, a central control module 1, a database module 2, a login module 4, a permission management module 6 and an identity recognition module 7, wherein the central control module 1 is respectively associated with the database module 2, the firewall module 3, the login module 4, the permission management module 6 and the identity recognition module 7; the database module 2 is used for uploading and reading enterprise information and classifying and storing the uploaded enterprise information data, the login module 4 is used for providing a registration and login platform for a user to access the information management system, the authority management module 6 is used for setting the authority of the user to access the enterprise information system according to the registration information of the user and applying for improving the authority of accessing the enterprise information system and the authorization of applying for the user, and the identity recognition module 7 is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registration identity information thereof;
the database module 2 comprises a storage unit 21, an input unit 22, a classification unit 23 and a reading unit 24, wherein the storage unit 21 is used for storing enterprise information materials, the input unit 22 is used for enterprise information managers to upload the enterprise information materials to the storage unit 21, the classification unit 23 is used for classifying and storing the enterprise information materials uploaded by the input unit 22 in the storage unit 21, and the reading unit 24 is used for users to retrieve and read the required enterprise information materials from the storage unit 21;
the login module 4 comprises a registration unit 41, a biological information acquisition unit 42 and a login portal 43, the registration unit 41 is used for providing a platform for a user to register and login an enterprise information management system account, the biological information acquisition unit 42 is used for acquiring biological information of the user when the user registers the account through the registration unit 41, the biological information acquired by the biological information acquisition unit 42 comprises a front head portrait and a finger fingerprint of the user, and the login portal 43 is used for providing a login platform for accessing the enterprise information management system for the user who registers the account through the registration unit 41 and is acquired the biological information through the biological information acquisition unit 42;
the authority management module 6 comprises an authority presetting unit 61, a key unit 62 and an authorization unit 63, wherein the authority presetting unit 61 is used for classifying enterprise information data according to the classification unit 23 and dividing access authority levels for the enterprise information data, the key unit 62 is used for providing a password input platform for retrieving and reading the enterprise information data with different access authority levels, and the authorization unit 63 is used for providing passwords for retrieving and reading the enterprise information data with different access authority levels;
the identity recognition module 7 comprises a face recognition unit 71, a fingerprint recognition unit 72 and a verification unit 73, wherein the face recognition unit 71 is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit 42, the fingerprint recognition unit 72 is used for judging the consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user collected by the biological information collection unit 42, and the verification unit 73 is used for judging the correctness of the identity of the logged-in user according to the judgment results of the face recognition unit 71 and the fingerprint recognition unit 72.
In summary, when in use, a user inputs basic information of an individual and an enterprise through the registration unit 41, after the basic information is input, the registered user is subjected to front face head portrait and finger fingerprint acquisition through the biological information acquisition unit 42, when the user logs in through the login portal 43 through an account, the face recognition unit 71 judges consistency between the front face head portrait of the user logging in the enterprise information management system and the front face head portrait of the registered user acquired by the biological information acquisition unit 42, the fingerprint recognition unit 72 judges consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user acquired by the biological information acquisition unit 42, the verification unit 73 judges correctness of the identity of the logged in user according to judgment results of the face recognition unit 71 and the fingerprint recognition unit 72, and when the identity of the user accords with the account login; enterprise information management personnel divide access authority levels aiming at enterprise information data through an authority presetting unit 61, a user needs to apply for a password to an authorization unit 63 when the user wants to obtain the access authority of corresponding level information, and after the authorization unit 63 issues the password to the user, the user enters a system through a key unit 62 to access; enterprise information management personnel upload enterprise information data through the input unit 22, the classification unit 23 classifies the enterprise information data uploaded by the input unit 22 and stores the enterprise information data in the storage unit 21, and a user entering the system can retrieve and read the required enterprise information data from the storage unit 21 through the reading unit 24.
Another preferred embodiment of example 1: referring to fig. 1 to 6, the information collecting module 5 is further included, the information collecting module 5 is used for a potential collaborating client to enter an collaboration intention and enterprise information data corresponding to the potential collaborating client, and classify and store the entered enterprise information data and the collaboration intention, the information collecting module 5 includes a client information base 51, an information entering unit 52 and an information dividing unit 53, the information entering unit 52 is used for the potential collaborating client to enter the collaboration intention and the enterprise information data corresponding to the potential collaborating client, the client information base 51 is used for storing the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are entered by the potential collaborating client through the information entering unit 52, and the information dividing unit 53 is used for classifying the collaboration intention and the enterprise information data corresponding to the potential collaborating client through the information entering unit 52.
To sum up, in use, the potential collaborating client classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client by the information input unit 52, and the information dividing unit 53 classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are input by the information input unit 52, and stores the classified collaboration intention and enterprise information data in the client information base 51.
Yet another preferred embodiment of example 1: referring to fig. 1-3 and 5-7, the system further includes an interactive interface module 8, where the interactive interface module 8 is configured to provide an online communication, cooperation negotiation and message leaving platform for potential collaborating clients, the interactive interface module 8 includes an interactive platform unit 81 and an information sharing unit 82, the interactive platform unit 81 is configured to provide an online communication, cooperation negotiation and message leaving platform for the potential collaborating clients, and the information sharing unit 82 is configured to construct a sharing channel with an enterprise information management system of the collaborating clients successfully negotiated through the interactive platform unit 81.
To sum up, when in use, the potential cooperation client communicates with the enterprise manager on line through the interaction platform unit 81, cooperates and negotiates, and leaves a message; when the potential collaborating clients negotiate with the enterprise manager via the interactive platform unit 81 and determine the collaboration relationship, the information sharing unit 82 establishes an enterprise information management system mutual access and sharing channel for the collaborating clients.
Yet another preferred embodiment of example 1: referring to fig. 1-3, 5-6, and 8, the system further includes an alarm module 9, where the alarm module 9 includes an alarm unit 91, a shielding unit 92, and an alarm unit 93, the alarm module 9 is configured to warn a user who illegally logs in the enterprise information management system platform, shield an IP, and report an illegal action of the user to the public security system, the alarm unit 91 is configured to send alarm information to the user who attempts to input an incorrect password to the key unit 62 for multiple times, the shielding unit 92 is configured to shield an IP of the user who continues to attempt to input the incorrect password to the key unit 62 after the alarm unit 91 sends the alarm information, and the alarm unit 93 uploads the registration and login information of the user who is shielded by the shielding unit 92 to the public security system for reporting and reporting.
In summary, when some clients who complete registration and login attempt to hack enterprise information beyond the access right of the clients by attempting to input passwords, the warning unit 91 is configured to send warning information to users who attempt to input wrong passwords to the key unit 62 for multiple times, the shielding unit 92 shields the IPs of users who continue to attempt to input wrong passwords to the key unit 62 after sending the warning information, and the alarm unit 93 uploads the registration and login information of users who are shielded by the shielding unit 92 to the public security system for reporting and reporting.
The central control module 1 adopts an x86 architecture, is provided with an i3 CPU, a 4G memory and 4 standard USB interfaces, is a gigabit network port, is used as a central control unit, is responsible for docking all peripherals, is provided with an operating system and various drivers, and is provided with an intelligent self-service machine software system;
in the several embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate components may or may not be physically separate, and components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1.企业信息安全管理系统,包括防火墙模块(3),其特征在于,还包括:1. an enterprise information security management system, comprising a firewall module (3), characterized in that, also comprising: 中央控制模块(1);Central control module (1); 数据库模块(2);database module (2); 登录模块(4);login module(4); 权限管理模块(6)以及rights management module (6) and 身份识别模块(7),所述中央控制模块(1)分别与所述数据库模块(2)、防火墙模块(3)、登录模块(4)、权限管理模块(6)和身份识别模块(7)关联;An identity recognition module (7), the central control module (1) is respectively connected with the database module (2), the firewall module (3), the login module (4), the authority management module (6) and the identity recognition module (7) association; 其中,所述数据库模块(2)用于上传和读取企业信息,并对上传的企业信息资料进行分类存储;Wherein, the database module (2) is used for uploading and reading enterprise information, and classifying and storing the uploaded enterprise information materials; 其中,所述登录模块(4)用于提供用户访问信息管理系统的注册和登录平台;Wherein, the login module (4) is used to provide a registration and login platform for the user to access the information management system; 其中,所述权限管理模块(6)用于根据用户的注册信息设定用户访问企业信息系统的权限,并用于用户申请提高访问企业信息系统的权限以及申请的授权;Wherein, the authority management module (6) is used for setting the authority of the user to access the enterprise information system according to the user's registration information, and for the user to apply for improving the authority to access the enterprise information system and the authorization of the application; 其中,所述身份识别模块(7)用于验证、判断访问企业信息系统用户的身份信息与其注册身份信息的一致性。Wherein, the identity recognition module (7) is used for verifying and judging the consistency between the identity information of the user accessing the enterprise information system and the registered identity information. 2.根据权利要求1所述的企业信息安全管理系统,其特征在于,所述数据库模块(2)包括:2. The enterprise information security management system according to claim 1, wherein the database module (2) comprises: 存储单元(21);storage unit (21); 输入单元(22);input unit (22); 分类单元(23)以及taxon (23) and 读取单元(24),所述存储单元(21)用于存储企业信息资料;a reading unit (24), the storage unit (21) is used for storing enterprise information materials; 其中,所述输入单元(22)用于企业信息管理人员向所述存储单元(21)上传企业信息资料;Wherein, the input unit (22) is used for enterprise information management personnel to upload enterprise information materials to the storage unit (21); 其中,所述分类单元(23)用于对所述输入单元(22)上传的企业信息资料进行分类存储在所述存储单元(21)中;Wherein, the classification unit (23) is configured to classify and store the enterprise information materials uploaded by the input unit (22) in the storage unit (21); 其中,所述读取单元(24)用于用户从所述存储单元(21)中检索、读取需要的企业信息资料。Wherein, the reading unit (24) is used for the user to retrieve and read the required enterprise information materials from the storage unit (21). 3.根据权利要求1所述的企业信息安全管理系统,其特征在于,所述登录模块(4)包括:3. The enterprise information security management system according to claim 1, wherein the login module (4) comprises: 注册单元(41);registration unit (41); 生物信息采集单元(42)以及a biological information collection unit (42) and 登录门户(43),所述注册单元(41)用于提供用户注册登录企业信息管理系统账户的平台;a login portal (43), where the registration unit (41) is used to provide a platform for users to register and log in to an enterprise information management system account; 其中,所述生物信息采集单元(42)用于用户通过注册单元(41)进行注册账户时采集用户的生物信息,所述生物信息采集单元(42)采集的生物信息包括用户的正面头像和手指指纹;Wherein, the biometric information collection unit (42) is used to collect the user's biometric information when the user registers an account through the registration unit (41), and the biometric information collected by the biometric information collection unit (42) includes the user's frontal avatar and fingers fingerprint; 其中,所述登录门户(43)用于为经过所述注册单元(41)进行注册账户且通过所述生物信息采集单元(42)被采集生物信息的用户提供访问企业信息管理系统的登录平台。The login portal (43) is used to provide a login platform for accessing the enterprise information management system for users who have registered accounts through the registration unit (41) and whose biological information has been collected through the biological information collection unit (42). 4.根据权利要求1所述的企业信息安全管理系统,其特征在于,所述权限管理模块(6)包括:4. The enterprise information security management system according to claim 1, wherein the rights management module (6) comprises: 权限预设单元(61);authority preset unit (61); 密匙单元(62)以及key unit (62) and 授权单元(63),所述权限预设单元(61)用于根据所述分类单元(23)对企业信息资料进行的分类,对企业信息资料划分被访问权限等级;an authorization unit (63), wherein the authority presetting unit (61) is configured to classify the enterprise information material into an access authority level according to the classification of the enterprise information material by the classification unit (23); 其中,密匙单元(62)用于提供对不同被访问权限等级的企业信息资料进行检索、读取的密码输入平台;Wherein, the key unit (62) is used to provide a password input platform for retrieving and reading enterprise information materials of different access authority levels; 其中,所述授权单元(63)用于提供对不同被访问权限等级的企业信息资料进行检索、读取的密码。Wherein, the authorization unit (63) is used to provide a password for retrieving and reading enterprise information materials of different access authority levels. 5.根据权利要求3所述的企业信息安全管理系统,其特征在于,所述身份识别模块(7)包括:5. The enterprise information security management system according to claim 3, wherein the identity recognition module (7) comprises: 人脸识别单元(71);face recognition unit (71); 指纹识别单元(72)以及a fingerprint recognition unit (72) and 验证单元(73),所述人脸识别单元(71)用于判断登录企业信息管理系统用户的正面头像与所述生物信息采集单元(42)采集的注册用户正面头像的一致性;a verification unit (73), wherein the face recognition unit (71) is used to judge the consistency between the frontal avatar of the user logging in to the enterprise information management system and the frontal avatar of the registered user collected by the biological information collection unit (42); 其中,所述指纹识别单元(72)用于判断登录企业信息管理系统用户的手指指纹与所述生物信息采集单元(42)采集的注册用户手指指纹的一致性;Wherein, the fingerprint identification unit (72) is used to judge the consistency between the fingerprint of the user logging in to the enterprise information management system and the fingerprint of the registered user collected by the biometric information collection unit (42); 其中,所述验证单元(73)用于通过人脸识别单元(71)和指纹识别单元(72)的判断结果判断登录用户身份的正确性。Wherein, the verification unit (73) is configured to judge the correctness of the logged-in user identity according to the judgment results of the face recognition unit (71) and the fingerprint recognition unit (72). 6.根据权利要求1所述的企业信息安全管理系统,其特征在于,还包括:6. The enterprise information security management system according to claim 1, further comprising: 信息采集模块(5),所述信息采集模块(5)用于潜在合作客户录入合作意向以及自身对应的企业信息资料,并对录入的企业信息资料和合作意向进行分类存储。An information collection module (5), the information collection module (5) is used for potential cooperative customers to enter cooperation intentions and their corresponding enterprise information materials, and to classify and store the entered enterprise information materials and cooperation intentions. 7.根据权利要求6所述的企业信息安全管理系统,其特征在于,所述信息采集模块(5)包括:7. The enterprise information security management system according to claim 6, wherein the information collection module (5) comprises: 客户信息库(51);customer information base (51); 信息录入单元(52)以及an information entry unit (52) and 信息划分单元(53),所述信息录入单元(52)用于潜在合作客户录入合作意向以及自身对应的企业信息资料;an information dividing unit (53), the information input unit (52) is used for potential cooperative customers to input cooperation intentions and their corresponding enterprise information materials; 其中,所述客户信息库(51)用于存储潜在合作客户通过所述信息录入单元(52)录入的合作意向以及自身对应的企业信息资料;Wherein, the customer information database (51) is used to store the cooperation intention entered by the potential cooperative customer through the information input unit (52) and the corresponding enterprise information; 其中,所述信息划分单元(53)用于对潜在合作客户通过所述信息录入单元(52)录入的合作意向以及自身对应的企业信息资料进行分类。Wherein, the information dividing unit (53) is used for classifying the cooperation intention entered by the potential cooperative customer through the information input unit (52) and the corresponding enterprise information. 8.根据权利要求1所述的企业信息安全管理系统,其特征在于,还包括:8. The enterprise information security management system according to claim 1, further comprising: 交互界面模块(8),所述交互界面模块(8)用于提供潜在合作客户的在线交流、合作谈判和留言平台。An interactive interface module (8), the interactive interface module (8) is used to provide an online communication, cooperative negotiation and message platform for potential cooperative customers. 9.根据权利要求8所述的企业信息安全管理系统,其特征在于,所述交互界面模块(8)包括:9. The enterprise information security management system according to claim 8, wherein the interactive interface module (8) comprises: 交互平台单元(81)以及an interactive platform unit (81) and 信息共享单元(82),所述交互平台单元(81)用于提供潜在合作客户的在线交流、合作谈判和留言平台;an information sharing unit (82), the interactive platform unit (81) is used to provide an online communication, cooperation negotiation and message platform for potential cooperative customers; 其中,所述信息共享单元(82)用于同经过交互平台单元(81)谈判成功的合作客户的企业信息管理系统之间构建共享通道。Wherein, the information sharing unit (82) is used for constructing a sharing channel with the enterprise information management system of the cooperative client who has successfully negotiated through the interactive platform unit (81). 10.根据权利要求4所述的企业信息安全管理系统,其特征在于,还包括警报模块(9),所述警报模块(9)包括:10. The enterprise information security management system according to claim 4, further comprising an alarm module (9), the alarm module (9) comprising: 警示单元(91);warning unit (91); 屏蔽单元(92)以及shielding unit (92) and 报警单元(93),所述警报模块(9)用于对违规登录企业信息管理系统平台的用户进行警告、屏蔽IP以及向公安系统举报该用户的违法行为;an alarm unit (93), wherein the alarm module (9) is used to warn users who log into the enterprise information management system platform in violation of regulations, block IP, and report the illegal behavior of the user to the public security system; 其中,所述警示单元(91)用于对多次尝试向所述密匙单元(62)输入错误密码的用户发出警示信息;Wherein, the warning unit (91) is configured to issue warning information to a user who tries to input an incorrect password to the encryption key unit (62) for many times; 其中,所述屏蔽单元(92)用于对所述警示单元(91)发出警示信息后仍继续尝试向所述密匙单元(62)输入错误密码的用户的IP进行屏蔽;Wherein, the shielding unit (92) is configured to shield the IPs of users who continue to try to input an incorrect password to the encryption key unit (62) after the warning unit (91) sends out warning information; 其中,报警单元(93)将被所述屏蔽单元(92)屏蔽IP的对应用户的注册、登录信息上传至公安系统进行举报、报案。The alarm unit (93) uploads the registration and login information of the corresponding user whose IP is shielded by the shielding unit (92) to the public security system for reporting and reporting.
CN201911342761.4A 2019-12-23 2019-12-23 Enterprise Information Security Management System Expired - Fee Related CN113094678B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911342761.4A CN113094678B (en) 2019-12-23 2019-12-23 Enterprise Information Security Management System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911342761.4A CN113094678B (en) 2019-12-23 2019-12-23 Enterprise Information Security Management System

Publications (2)

Publication Number Publication Date
CN113094678A true CN113094678A (en) 2021-07-09
CN113094678B CN113094678B (en) 2023-02-28

Family

ID=76663115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911342761.4A Expired - Fee Related CN113094678B (en) 2019-12-23 2019-12-23 Enterprise Information Security Management System

Country Status (1)

Country Link
CN (1) CN113094678B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564710A (en) * 2022-03-28 2022-05-31 国网山东省电力公司信息通信公司 Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information
CN116502806A (en) * 2023-06-26 2023-07-28 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US20090157863A1 (en) * 2005-04-01 2009-06-18 International Business Machines Corporation System and Method of Enforcing Hierarchical Management Policy
CN106294704A (en) * 2016-08-08 2017-01-04 武君 A kind of exhibitions trade information retrieval server, client, system and method
CN108182596A (en) * 2017-12-22 2018-06-19 合肥天源迪科信息技术有限公司 One kind is based on enterprise marketing management method under big data environment
CN108347423A (en) * 2017-07-25 2018-07-31 深圳壹账通智能科技有限公司 Enterprise portal manages system, method and storage medium
CN109885596A (en) * 2019-01-23 2019-06-14 广州市聚星源科技有限公司 Big data is pressed into extracting method
CN110490463A (en) * 2019-08-21 2019-11-22 合肥天源迪科信息技术有限公司 A kind of wisdom operation management system for enterprise
CN110490009A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of enterprise management platform system
CN110490407A (en) * 2019-07-04 2019-11-22 民乐县正和商务服务有限公司 A kind of scientific and technical innovation integrated service system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US20090157863A1 (en) * 2005-04-01 2009-06-18 International Business Machines Corporation System and Method of Enforcing Hierarchical Management Policy
CN106294704A (en) * 2016-08-08 2017-01-04 武君 A kind of exhibitions trade information retrieval server, client, system and method
CN108347423A (en) * 2017-07-25 2018-07-31 深圳壹账通智能科技有限公司 Enterprise portal manages system, method and storage medium
CN108182596A (en) * 2017-12-22 2018-06-19 合肥天源迪科信息技术有限公司 One kind is based on enterprise marketing management method under big data environment
CN109885596A (en) * 2019-01-23 2019-06-14 广州市聚星源科技有限公司 Big data is pressed into extracting method
CN110490009A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of enterprise management platform system
CN110490407A (en) * 2019-07-04 2019-11-22 民乐县正和商务服务有限公司 A kind of scientific and technical innovation integrated service system
CN110490463A (en) * 2019-08-21 2019-11-22 合肥天源迪科信息技术有限公司 A kind of wisdom operation management system for enterprise

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PHIL JAKUBOWSKI等: "Enterprise Risk Management: An improvement journey in nuclear decommissioning", 《ASSET MANAGEMENT CONFERENCE 2015》 *
朱少敏等: "基于LDAP的企业级统一用户身份管理系统的设计与实现", 《核电子学与探测技术》 *
李坤: "基于ASP.NET的班组人员及工时信息管理系统研究与实现", 《机电信息》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564710A (en) * 2022-03-28 2022-05-31 国网山东省电力公司信息通信公司 Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function
CN116561092B (en) * 2023-04-04 2024-11-26 珠海禧铺商贸有限公司 Block chain data storage method with guide function
CN116502806A (en) * 2023-06-26 2023-07-28 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform
CN116502806B (en) * 2023-06-26 2023-09-05 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform

Also Published As

Publication number Publication date
CN113094678B (en) 2023-02-28

Similar Documents

Publication Publication Date Title
US11106768B2 (en) Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings
US11689529B2 (en) Systems and methods for online third-party authentication of credentials
US11520922B2 (en) Method for personal data administration in a multi-actor environment
US10606988B2 (en) Security device, methods, and systems for continuous authentication
US20140283059A1 (en) Continuous Monitoring of Computer User and Computer Activities
US20140282965A1 (en) Ongoing Authentication and Access Control with Network Access Device
US20080066165A1 (en) Method, system and program product for authenticating a user seeking to perform an electronic service request
DE202013102441U1 (en) System for checking digital certificates
CN111434084A (en) Permission to access information from an entity
CN113094678A (en) Enterprise information security management system
CN106789964A (en) Cloud resource pool data safety detection method and system
CN107770191A (en) A kind of finicial administration of enterprise system with security protection
CN105027498A (en) A method, system and device for securely storing data files at a remote location by splitting and reassembling said files
Kolomeets et al. Analysis of the malicious bots market
CN112905965A (en) Financial big data processing system based on block chain
Kizza Access control and authorization
Michelberger et al. A possible tool for development of information security-SIEM system
CN102509057B (en) Mark-based method for safely filtering unstructured data
RU2434283C1 (en) System for protecting information containing state secrets from unauthorised access
CN108521431A (en) A computer network information security system
KR102656375B1 (en) System and method for operating digital rights management for enhancing security of shared contents
CN115330341A (en) Authorization approval process method, system and equipment for data asset operation platform
RU2751315C2 (en) Universal system of distributed secure remote voting
CN109889583A (en) The network platform of decentralization administers full powers technology of sharing
CN119180005A (en) A digital product certificate authorization management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20230228