Enterprise information security management system
Technical Field
The invention relates to the technical field of enterprise information security management, in particular to an enterprise information security management system.
Background
With the development of society and science and technology, people pay more and more attention to the timeliness of information exchange and communication. With the advent of the network big data era, a bridge is established for information exchange of enterprises. The information is transmitted and received by the network, remote cooperation and communication are carried out, convenience is brought to operation and development of enterprises, meanwhile, hidden dangers are caused to the enterprise management to a certain extent, information leakage caused by endless network viruses and personnel flow is caused, and threats are always formed on internal information resources of the enterprises.
At present, most information management systems of enterprises deal with the phenomenon of illegal invasion of an information base in a firewall deployment mode, and the arrangement of a firewall can play a role in preventing enterprise information from being maliciously read; however, for some potential clients who want to know the enterprise information deeply to seek cooperation, the enterprise-related information cannot be queried conveniently and quickly, and the security management system for the enterprise information lacks pertinence.
Disclosure of Invention
The invention aims to provide an enterprise information security management system which can prevent an enterprise information base from being illegally invaded, and can meet the requirement that potential clients seeking cooperation conveniently access the enterprise information base so as to ensure the pertinence of enterprise information security management.
In order to achieve the purpose, the invention provides the following technical scheme: the enterprise information security management system comprises a firewall module, a central control module, a database module, a login module, a permission management module and an identity recognition module, wherein the central control module is respectively associated with the database module, the firewall module, the login module, the permission management module and the identity recognition module;
the database module is used for uploading and reading enterprise information and storing the uploaded enterprise information data in a classified manner;
the login module is used for providing a registration and login platform for a user to access the information management system;
the authority management module is used for setting the authority of the user for accessing the enterprise information system according to the registration information of the user, and is used for the user to apply for improving the authority for accessing the enterprise information system and the authorization for applying;
the identity identification module is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registered identity information of the user.
Preferably, the database module comprises a storage unit, an input unit, a classification unit and a reading unit, wherein the storage unit is used for storing enterprise information data;
the input unit is used for uploading enterprise information data to the storage unit by enterprise information management personnel;
the classification unit is used for classifying and storing the enterprise information data uploaded by the input unit in the storage unit;
the reading unit is used for the user to retrieve and read the needed enterprise information data from the storage unit.
Preferably, the login module comprises a registration unit, a biological information acquisition unit and a login portal, wherein the registration unit is used for providing a platform for a user to register and login an enterprise information management system account;
the biological information acquisition unit is used for acquiring biological information of a user when the user registers an account through the registration unit, and the biological information acquired by the biological information acquisition unit comprises a front head portrait and a finger fingerprint of the user;
the login portal is used for providing a login platform for accessing the enterprise information management system for a user who registers an account through the registration unit and is acquired biological information through the biological information acquisition unit.
Preferably, the authority management module comprises an authority presetting unit, a key unit and an authorization unit, wherein the authority presetting unit is used for classifying the enterprise information data according to the classification unit and dividing the enterprise information data into access authority levels;
the key unit is used for providing a password input platform for retrieving and reading enterprise information data with different access permission levels;
the authorization unit is used for providing passwords for retrieving and reading enterprise information materials with different access permission levels.
Preferably, the identity recognition module comprises a face recognition unit, a fingerprint recognition unit and a verification unit, wherein the face recognition unit is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit;
the fingerprint identification unit is used for judging the consistency of the finger fingerprint of a user logging in the enterprise information management system and the finger fingerprint of a registered user collected by the biological information collection unit;
the verification unit is used for judging the correctness of the identity of the login user according to the judgment results of the face recognition unit and the fingerprint recognition unit.
Preferably, the system further comprises an information acquisition module, wherein the information acquisition module is used for potential collaborating clients to enter the collaboration intention and enterprise information data corresponding to the potential collaborating clients, and the entered enterprise information data and the collaboration intention are classified and stored.
Preferably, the information acquisition module comprises a client information base, an information input unit and an information dividing unit, wherein the information input unit is used for potential cooperative clients to input the cooperation intention and enterprise information data corresponding to the potential cooperative clients;
the client information base is used for storing the cooperation intention of potential cooperative clients input by the information input unit and enterprise information data corresponding to the potential cooperative clients;
the information dividing unit is used for classifying the cooperation intention of the potential cooperation client, which is input by the information input unit, and the enterprise information data corresponding to the potential cooperation client.
Preferably, the system further comprises an interactive interface module, wherein the interactive interface module is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients.
Preferably, the interactive interface module comprises an interactive platform unit and an information sharing unit, wherein the interactive platform unit is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients;
the information sharing unit is used for establishing a sharing channel with an enterprise information management system of a cooperative client successfully negotiated by the interactive platform unit.
Preferably, the system further comprises an alarm module, wherein the alarm module comprises a warning unit, a shielding unit and an alarm unit, and the alarm module is used for warning a user who illegally logs in the enterprise information management system platform, shielding IP (Internet protocol) and reporting illegal behaviors of the user to a public security system;
the warning unit is used for sending warning information to a user who tries to input an error password to the key unit for multiple times;
the shielding unit is used for shielding the IP of the user who still tries to input the wrong password to the key unit after the warning unit sends the warning information;
the alarm unit uploads the registration and login information of the corresponding user, which is shielded by the shielding unit to the public security system for reporting and reporting.
Compared with the prior art, the invention has the beneficial effects that:
1. the enterprise information security management system related by the invention not only can prevent the illegal invasion of hackers and viruses through a firewall, but also enriches the modes of seeking cooperation among enterprises, so that potential cooperative clients can seek cooperative intention and complete cooperative negotiation through the enterprise information security management system;
2. the enterprise information security management system can provide access authority which accords with the identity of different visitors aiming at different visitors, and improves the pertinence of enterprise information security management;
3. the enterprise information management system can prevent and inhibit the snooping action of confidential enterprise information of registered and logged-in users.
Drawings
FIG. 1 is a schematic diagram of a frame structure according to the principles of the present invention;
FIG. 2 is a schematic internal framework diagram of the database module of the present invention;
FIG. 3 is a diagram of the internal schematic framework of the login module of the present invention;
FIG. 4 is a schematic internal block diagram of an information acquisition module according to the present invention;
FIG. 5 is a diagram of the internal schematic framework of the rights management module of the present invention;
FIG. 6 is a block diagram of the internal principles of the identity module of the present invention;
FIG. 7 is a schematic internal framework diagram of the interactive interface module of the present invention;
fig. 8 is a block diagram of the internal principle of the alarm module of the present invention.
In the figure: 1-a central control module; 2-a database module; 21-a storage unit; 22-an input unit; 23-a classification unit; 24-a reading unit; 3-firewall module; 4-a login module; 41-a registration unit; 42-a biological information acquisition unit; 43-login portal; 5-an information acquisition module; 51-customer information base; 52-information entry unit; 53-information partitioning unit; 6-a rights management module; 61-permission presetting unit; 62-a key unit; 63-an authorization unit; 7-an identity recognition module; 71-a face recognition unit; 72-fingerprint identification unit; 73-a verification unit; 8-an interactive interface module; 81-interactive platform unit; 82-an information sharing unit; 9-an alarm module; 91-a warning unit; 92-a shielding unit; 93-alarm unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1 referring to fig. 1-3 and 5-6, the present invention provides a technical solution: the enterprise information security management system comprises a firewall module 3, a central control module 1, a database module 2, a login module 4, a permission management module 6 and an identity recognition module 7, wherein the central control module 1 is respectively associated with the database module 2, the firewall module 3, the login module 4, the permission management module 6 and the identity recognition module 7; the database module 2 is used for uploading and reading enterprise information and classifying and storing the uploaded enterprise information data, the login module 4 is used for providing a registration and login platform for a user to access the information management system, the authority management module 6 is used for setting the authority of the user to access the enterprise information system according to the registration information of the user and applying for improving the authority of accessing the enterprise information system and the authorization of applying for the user, and the identity recognition module 7 is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registration identity information thereof;
the database module 2 comprises a storage unit 21, an input unit 22, a classification unit 23 and a reading unit 24, wherein the storage unit 21 is used for storing enterprise information materials, the input unit 22 is used for enterprise information managers to upload the enterprise information materials to the storage unit 21, the classification unit 23 is used for classifying and storing the enterprise information materials uploaded by the input unit 22 in the storage unit 21, and the reading unit 24 is used for users to retrieve and read the required enterprise information materials from the storage unit 21;
the login module 4 comprises a registration unit 41, a biological information acquisition unit 42 and a login portal 43, the registration unit 41 is used for providing a platform for a user to register and login an enterprise information management system account, the biological information acquisition unit 42 is used for acquiring biological information of the user when the user registers the account through the registration unit 41, the biological information acquired by the biological information acquisition unit 42 comprises a front head portrait and a finger fingerprint of the user, and the login portal 43 is used for providing a login platform for accessing the enterprise information management system for the user who registers the account through the registration unit 41 and is acquired the biological information through the biological information acquisition unit 42;
the authority management module 6 comprises an authority presetting unit 61, a key unit 62 and an authorization unit 63, wherein the authority presetting unit 61 is used for classifying enterprise information data according to the classification unit 23 and dividing access authority levels for the enterprise information data, the key unit 62 is used for providing a password input platform for retrieving and reading the enterprise information data with different access authority levels, and the authorization unit 63 is used for providing passwords for retrieving and reading the enterprise information data with different access authority levels;
the identity recognition module 7 comprises a face recognition unit 71, a fingerprint recognition unit 72 and a verification unit 73, wherein the face recognition unit 71 is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit 42, the fingerprint recognition unit 72 is used for judging the consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user collected by the biological information collection unit 42, and the verification unit 73 is used for judging the correctness of the identity of the logged-in user according to the judgment results of the face recognition unit 71 and the fingerprint recognition unit 72.
In summary, when in use, a user inputs basic information of an individual and an enterprise through the registration unit 41, after the basic information is input, the registered user is subjected to front face head portrait and finger fingerprint acquisition through the biological information acquisition unit 42, when the user logs in through the login portal 43 through an account, the face recognition unit 71 judges consistency between the front face head portrait of the user logging in the enterprise information management system and the front face head portrait of the registered user acquired by the biological information acquisition unit 42, the fingerprint recognition unit 72 judges consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user acquired by the biological information acquisition unit 42, the verification unit 73 judges correctness of the identity of the logged in user according to judgment results of the face recognition unit 71 and the fingerprint recognition unit 72, and when the identity of the user accords with the account login; enterprise information management personnel divide access authority levels aiming at enterprise information data through an authority presetting unit 61, a user needs to apply for a password to an authorization unit 63 when the user wants to obtain the access authority of corresponding level information, and after the authorization unit 63 issues the password to the user, the user enters a system through a key unit 62 to access; enterprise information management personnel upload enterprise information data through the input unit 22, the classification unit 23 classifies the enterprise information data uploaded by the input unit 22 and stores the enterprise information data in the storage unit 21, and a user entering the system can retrieve and read the required enterprise information data from the storage unit 21 through the reading unit 24.
Another preferred embodiment of example 1: referring to fig. 1 to 6, the information collecting module 5 is further included, the information collecting module 5 is used for a potential collaborating client to enter an collaboration intention and enterprise information data corresponding to the potential collaborating client, and classify and store the entered enterprise information data and the collaboration intention, the information collecting module 5 includes a client information base 51, an information entering unit 52 and an information dividing unit 53, the information entering unit 52 is used for the potential collaborating client to enter the collaboration intention and the enterprise information data corresponding to the potential collaborating client, the client information base 51 is used for storing the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are entered by the potential collaborating client through the information entering unit 52, and the information dividing unit 53 is used for classifying the collaboration intention and the enterprise information data corresponding to the potential collaborating client through the information entering unit 52.
To sum up, in use, the potential collaborating client classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client by the information input unit 52, and the information dividing unit 53 classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are input by the information input unit 52, and stores the classified collaboration intention and enterprise information data in the client information base 51.
Yet another preferred embodiment of example 1: referring to fig. 1-3 and 5-7, the system further includes an interactive interface module 8, where the interactive interface module 8 is configured to provide an online communication, cooperation negotiation and message leaving platform for potential collaborating clients, the interactive interface module 8 includes an interactive platform unit 81 and an information sharing unit 82, the interactive platform unit 81 is configured to provide an online communication, cooperation negotiation and message leaving platform for the potential collaborating clients, and the information sharing unit 82 is configured to construct a sharing channel with an enterprise information management system of the collaborating clients successfully negotiated through the interactive platform unit 81.
To sum up, when in use, the potential cooperation client communicates with the enterprise manager on line through the interaction platform unit 81, cooperates and negotiates, and leaves a message; when the potential collaborating clients negotiate with the enterprise manager via the interactive platform unit 81 and determine the collaboration relationship, the information sharing unit 82 establishes an enterprise information management system mutual access and sharing channel for the collaborating clients.
Yet another preferred embodiment of example 1: referring to fig. 1-3, 5-6, and 8, the system further includes an alarm module 9, where the alarm module 9 includes an alarm unit 91, a shielding unit 92, and an alarm unit 93, the alarm module 9 is configured to warn a user who illegally logs in the enterprise information management system platform, shield an IP, and report an illegal action of the user to the public security system, the alarm unit 91 is configured to send alarm information to the user who attempts to input an incorrect password to the key unit 62 for multiple times, the shielding unit 92 is configured to shield an IP of the user who continues to attempt to input the incorrect password to the key unit 62 after the alarm unit 91 sends the alarm information, and the alarm unit 93 uploads the registration and login information of the user who is shielded by the shielding unit 92 to the public security system for reporting and reporting.
In summary, when some clients who complete registration and login attempt to hack enterprise information beyond the access right of the clients by attempting to input passwords, the warning unit 91 is configured to send warning information to users who attempt to input wrong passwords to the key unit 62 for multiple times, the shielding unit 92 shields the IPs of users who continue to attempt to input wrong passwords to the key unit 62 after sending the warning information, and the alarm unit 93 uploads the registration and login information of users who are shielded by the shielding unit 92 to the public security system for reporting and reporting.
The central control module 1 adopts an x86 architecture, is provided with an i3 CPU, a 4G memory and 4 standard USB interfaces, is a gigabit network port, is used as a central control unit, is responsible for docking all peripherals, is provided with an operating system and various drivers, and is provided with an intelligent self-service machine software system;
in the several embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate components may or may not be physically separate, and components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.