CN113094678A - Enterprise information security management system - Google Patents

Enterprise information security management system Download PDF

Info

Publication number
CN113094678A
CN113094678A CN201911342761.4A CN201911342761A CN113094678A CN 113094678 A CN113094678 A CN 113094678A CN 201911342761 A CN201911342761 A CN 201911342761A CN 113094678 A CN113094678 A CN 113094678A
Authority
CN
China
Prior art keywords
unit
information
module
enterprise information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911342761.4A
Other languages
Chinese (zh)
Other versions
CN113094678B (en
Inventor
陈力
方进锋
陈洁松
邓少宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Tianyuan Dike Information Technology Co ltd
Original Assignee
Hefei Tianyuan Dike Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Tianyuan Dike Information Technology Co ltd filed Critical Hefei Tianyuan Dike Information Technology Co ltd
Priority to CN201911342761.4A priority Critical patent/CN113094678B/en
Publication of CN113094678A publication Critical patent/CN113094678A/en
Application granted granted Critical
Publication of CN113094678B publication Critical patent/CN113094678B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The invention discloses an enterprise information security management system, which comprises a firewall module, a central control module, a database module, a login module, a permission management module and an identity identification module, wherein the central control module is used for controlling the central control module to log in; when the system is used, not only can the illegal invasion of hackers and viruses be prevented through the firewall, but also the modes of seeking cooperation among enterprises are enriched, so that potential cooperative clients can seek the intention of cooperation and complete cooperative negotiation through the enterprise information security management system; the access right according with the identity of different visitors can be provided, and the pertinence of enterprise information safety management is improved; in addition, the snooping action of the confidential information of the enterprise by the registered and logged-in user can be prevented and restrained.

Description

Enterprise information security management system
Technical Field
The invention relates to the technical field of enterprise information security management, in particular to an enterprise information security management system.
Background
With the development of society and science and technology, people pay more and more attention to the timeliness of information exchange and communication. With the advent of the network big data era, a bridge is established for information exchange of enterprises. The information is transmitted and received by the network, remote cooperation and communication are carried out, convenience is brought to operation and development of enterprises, meanwhile, hidden dangers are caused to the enterprise management to a certain extent, information leakage caused by endless network viruses and personnel flow is caused, and threats are always formed on internal information resources of the enterprises.
At present, most information management systems of enterprises deal with the phenomenon of illegal invasion of an information base in a firewall deployment mode, and the arrangement of a firewall can play a role in preventing enterprise information from being maliciously read; however, for some potential clients who want to know the enterprise information deeply to seek cooperation, the enterprise-related information cannot be queried conveniently and quickly, and the security management system for the enterprise information lacks pertinence.
Disclosure of Invention
The invention aims to provide an enterprise information security management system which can prevent an enterprise information base from being illegally invaded, and can meet the requirement that potential clients seeking cooperation conveniently access the enterprise information base so as to ensure the pertinence of enterprise information security management.
In order to achieve the purpose, the invention provides the following technical scheme: the enterprise information security management system comprises a firewall module, a central control module, a database module, a login module, a permission management module and an identity recognition module, wherein the central control module is respectively associated with the database module, the firewall module, the login module, the permission management module and the identity recognition module;
the database module is used for uploading and reading enterprise information and storing the uploaded enterprise information data in a classified manner;
the login module is used for providing a registration and login platform for a user to access the information management system;
the authority management module is used for setting the authority of the user for accessing the enterprise information system according to the registration information of the user, and is used for the user to apply for improving the authority for accessing the enterprise information system and the authorization for applying;
the identity identification module is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registered identity information of the user.
Preferably, the database module comprises a storage unit, an input unit, a classification unit and a reading unit, wherein the storage unit is used for storing enterprise information data;
the input unit is used for uploading enterprise information data to the storage unit by enterprise information management personnel;
the classification unit is used for classifying and storing the enterprise information data uploaded by the input unit in the storage unit;
the reading unit is used for the user to retrieve and read the needed enterprise information data from the storage unit.
Preferably, the login module comprises a registration unit, a biological information acquisition unit and a login portal, wherein the registration unit is used for providing a platform for a user to register and login an enterprise information management system account;
the biological information acquisition unit is used for acquiring biological information of a user when the user registers an account through the registration unit, and the biological information acquired by the biological information acquisition unit comprises a front head portrait and a finger fingerprint of the user;
the login portal is used for providing a login platform for accessing the enterprise information management system for a user who registers an account through the registration unit and is acquired biological information through the biological information acquisition unit.
Preferably, the authority management module comprises an authority presetting unit, a key unit and an authorization unit, wherein the authority presetting unit is used for classifying the enterprise information data according to the classification unit and dividing the enterprise information data into access authority levels;
the key unit is used for providing a password input platform for retrieving and reading enterprise information data with different access permission levels;
the authorization unit is used for providing passwords for retrieving and reading enterprise information materials with different access permission levels.
Preferably, the identity recognition module comprises a face recognition unit, a fingerprint recognition unit and a verification unit, wherein the face recognition unit is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit;
the fingerprint identification unit is used for judging the consistency of the finger fingerprint of a user logging in the enterprise information management system and the finger fingerprint of a registered user collected by the biological information collection unit;
the verification unit is used for judging the correctness of the identity of the login user according to the judgment results of the face recognition unit and the fingerprint recognition unit.
Preferably, the system further comprises an information acquisition module, wherein the information acquisition module is used for potential collaborating clients to enter the collaboration intention and enterprise information data corresponding to the potential collaborating clients, and the entered enterprise information data and the collaboration intention are classified and stored.
Preferably, the information acquisition module comprises a client information base, an information input unit and an information dividing unit, wherein the information input unit is used for potential cooperative clients to input the cooperation intention and enterprise information data corresponding to the potential cooperative clients;
the client information base is used for storing the cooperation intention of potential cooperative clients input by the information input unit and enterprise information data corresponding to the potential cooperative clients;
the information dividing unit is used for classifying the cooperation intention of the potential cooperation client, which is input by the information input unit, and the enterprise information data corresponding to the potential cooperation client.
Preferably, the system further comprises an interactive interface module, wherein the interactive interface module is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients.
Preferably, the interactive interface module comprises an interactive platform unit and an information sharing unit, wherein the interactive platform unit is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients;
the information sharing unit is used for establishing a sharing channel with an enterprise information management system of a cooperative client successfully negotiated by the interactive platform unit.
Preferably, the system further comprises an alarm module, wherein the alarm module comprises a warning unit, a shielding unit and an alarm unit, and the alarm module is used for warning a user who illegally logs in the enterprise information management system platform, shielding IP (Internet protocol) and reporting illegal behaviors of the user to a public security system;
the warning unit is used for sending warning information to a user who tries to input an error password to the key unit for multiple times;
the shielding unit is used for shielding the IP of the user who still tries to input the wrong password to the key unit after the warning unit sends the warning information;
the alarm unit uploads the registration and login information of the corresponding user, which is shielded by the shielding unit to the public security system for reporting and reporting.
Compared with the prior art, the invention has the beneficial effects that:
1. the enterprise information security management system related by the invention not only can prevent the illegal invasion of hackers and viruses through a firewall, but also enriches the modes of seeking cooperation among enterprises, so that potential cooperative clients can seek cooperative intention and complete cooperative negotiation through the enterprise information security management system;
2. the enterprise information security management system can provide access authority which accords with the identity of different visitors aiming at different visitors, and improves the pertinence of enterprise information security management;
3. the enterprise information management system can prevent and inhibit the snooping action of confidential enterprise information of registered and logged-in users.
Drawings
FIG. 1 is a schematic diagram of a frame structure according to the principles of the present invention;
FIG. 2 is a schematic internal framework diagram of the database module of the present invention;
FIG. 3 is a diagram of the internal schematic framework of the login module of the present invention;
FIG. 4 is a schematic internal block diagram of an information acquisition module according to the present invention;
FIG. 5 is a diagram of the internal schematic framework of the rights management module of the present invention;
FIG. 6 is a block diagram of the internal principles of the identity module of the present invention;
FIG. 7 is a schematic internal framework diagram of the interactive interface module of the present invention;
fig. 8 is a block diagram of the internal principle of the alarm module of the present invention.
In the figure: 1-a central control module; 2-a database module; 21-a storage unit; 22-an input unit; 23-a classification unit; 24-a reading unit; 3-firewall module; 4-a login module; 41-a registration unit; 42-a biological information acquisition unit; 43-login portal; 5-an information acquisition module; 51-customer information base; 52-information entry unit; 53-information partitioning unit; 6-a rights management module; 61-permission presetting unit; 62-a key unit; 63-an authorization unit; 7-an identity recognition module; 71-a face recognition unit; 72-fingerprint identification unit; 73-a verification unit; 8-an interactive interface module; 81-interactive platform unit; 82-an information sharing unit; 9-an alarm module; 91-a warning unit; 92-a shielding unit; 93-alarm unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1 referring to fig. 1-3 and 5-6, the present invention provides a technical solution: the enterprise information security management system comprises a firewall module 3, a central control module 1, a database module 2, a login module 4, a permission management module 6 and an identity recognition module 7, wherein the central control module 1 is respectively associated with the database module 2, the firewall module 3, the login module 4, the permission management module 6 and the identity recognition module 7; the database module 2 is used for uploading and reading enterprise information and classifying and storing the uploaded enterprise information data, the login module 4 is used for providing a registration and login platform for a user to access the information management system, the authority management module 6 is used for setting the authority of the user to access the enterprise information system according to the registration information of the user and applying for improving the authority of accessing the enterprise information system and the authorization of applying for the user, and the identity recognition module 7 is used for verifying and judging the consistency of the identity information of the user accessing the enterprise information system and the registration identity information thereof;
the database module 2 comprises a storage unit 21, an input unit 22, a classification unit 23 and a reading unit 24, wherein the storage unit 21 is used for storing enterprise information materials, the input unit 22 is used for enterprise information managers to upload the enterprise information materials to the storage unit 21, the classification unit 23 is used for classifying and storing the enterprise information materials uploaded by the input unit 22 in the storage unit 21, and the reading unit 24 is used for users to retrieve and read the required enterprise information materials from the storage unit 21;
the login module 4 comprises a registration unit 41, a biological information acquisition unit 42 and a login portal 43, the registration unit 41 is used for providing a platform for a user to register and login an enterprise information management system account, the biological information acquisition unit 42 is used for acquiring biological information of the user when the user registers the account through the registration unit 41, the biological information acquired by the biological information acquisition unit 42 comprises a front head portrait and a finger fingerprint of the user, and the login portal 43 is used for providing a login platform for accessing the enterprise information management system for the user who registers the account through the registration unit 41 and is acquired the biological information through the biological information acquisition unit 42;
the authority management module 6 comprises an authority presetting unit 61, a key unit 62 and an authorization unit 63, wherein the authority presetting unit 61 is used for classifying enterprise information data according to the classification unit 23 and dividing access authority levels for the enterprise information data, the key unit 62 is used for providing a password input platform for retrieving and reading the enterprise information data with different access authority levels, and the authorization unit 63 is used for providing passwords for retrieving and reading the enterprise information data with different access authority levels;
the identity recognition module 7 comprises a face recognition unit 71, a fingerprint recognition unit 72 and a verification unit 73, wherein the face recognition unit 71 is used for judging the consistency between the head portrait of the front face of the user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit 42, the fingerprint recognition unit 72 is used for judging the consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user collected by the biological information collection unit 42, and the verification unit 73 is used for judging the correctness of the identity of the logged-in user according to the judgment results of the face recognition unit 71 and the fingerprint recognition unit 72.
In summary, when in use, a user inputs basic information of an individual and an enterprise through the registration unit 41, after the basic information is input, the registered user is subjected to front face head portrait and finger fingerprint acquisition through the biological information acquisition unit 42, when the user logs in through the login portal 43 through an account, the face recognition unit 71 judges consistency between the front face head portrait of the user logging in the enterprise information management system and the front face head portrait of the registered user acquired by the biological information acquisition unit 42, the fingerprint recognition unit 72 judges consistency between the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user acquired by the biological information acquisition unit 42, the verification unit 73 judges correctness of the identity of the logged in user according to judgment results of the face recognition unit 71 and the fingerprint recognition unit 72, and when the identity of the user accords with the account login; enterprise information management personnel divide access authority levels aiming at enterprise information data through an authority presetting unit 61, a user needs to apply for a password to an authorization unit 63 when the user wants to obtain the access authority of corresponding level information, and after the authorization unit 63 issues the password to the user, the user enters a system through a key unit 62 to access; enterprise information management personnel upload enterprise information data through the input unit 22, the classification unit 23 classifies the enterprise information data uploaded by the input unit 22 and stores the enterprise information data in the storage unit 21, and a user entering the system can retrieve and read the required enterprise information data from the storage unit 21 through the reading unit 24.
Another preferred embodiment of example 1: referring to fig. 1 to 6, the information collecting module 5 is further included, the information collecting module 5 is used for a potential collaborating client to enter an collaboration intention and enterprise information data corresponding to the potential collaborating client, and classify and store the entered enterprise information data and the collaboration intention, the information collecting module 5 includes a client information base 51, an information entering unit 52 and an information dividing unit 53, the information entering unit 52 is used for the potential collaborating client to enter the collaboration intention and the enterprise information data corresponding to the potential collaborating client, the client information base 51 is used for storing the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are entered by the potential collaborating client through the information entering unit 52, and the information dividing unit 53 is used for classifying the collaboration intention and the enterprise information data corresponding to the potential collaborating client through the information entering unit 52.
To sum up, in use, the potential collaborating client classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client by the information input unit 52, and the information dividing unit 53 classifies the collaboration intention and the enterprise information data corresponding to the potential collaborating client, which are input by the information input unit 52, and stores the classified collaboration intention and enterprise information data in the client information base 51.
Yet another preferred embodiment of example 1: referring to fig. 1-3 and 5-7, the system further includes an interactive interface module 8, where the interactive interface module 8 is configured to provide an online communication, cooperation negotiation and message leaving platform for potential collaborating clients, the interactive interface module 8 includes an interactive platform unit 81 and an information sharing unit 82, the interactive platform unit 81 is configured to provide an online communication, cooperation negotiation and message leaving platform for the potential collaborating clients, and the information sharing unit 82 is configured to construct a sharing channel with an enterprise information management system of the collaborating clients successfully negotiated through the interactive platform unit 81.
To sum up, when in use, the potential cooperation client communicates with the enterprise manager on line through the interaction platform unit 81, cooperates and negotiates, and leaves a message; when the potential collaborating clients negotiate with the enterprise manager via the interactive platform unit 81 and determine the collaboration relationship, the information sharing unit 82 establishes an enterprise information management system mutual access and sharing channel for the collaborating clients.
Yet another preferred embodiment of example 1: referring to fig. 1-3, 5-6, and 8, the system further includes an alarm module 9, where the alarm module 9 includes an alarm unit 91, a shielding unit 92, and an alarm unit 93, the alarm module 9 is configured to warn a user who illegally logs in the enterprise information management system platform, shield an IP, and report an illegal action of the user to the public security system, the alarm unit 91 is configured to send alarm information to the user who attempts to input an incorrect password to the key unit 62 for multiple times, the shielding unit 92 is configured to shield an IP of the user who continues to attempt to input the incorrect password to the key unit 62 after the alarm unit 91 sends the alarm information, and the alarm unit 93 uploads the registration and login information of the user who is shielded by the shielding unit 92 to the public security system for reporting and reporting.
In summary, when some clients who complete registration and login attempt to hack enterprise information beyond the access right of the clients by attempting to input passwords, the warning unit 91 is configured to send warning information to users who attempt to input wrong passwords to the key unit 62 for multiple times, the shielding unit 92 shields the IPs of users who continue to attempt to input wrong passwords to the key unit 62 after sending the warning information, and the alarm unit 93 uploads the registration and login information of users who are shielded by the shielding unit 92 to the public security system for reporting and reporting.
The central control module 1 adopts an x86 architecture, is provided with an i3 CPU, a 4G memory and 4 standard USB interfaces, is a gigabit network port, is used as a central control unit, is responsible for docking all peripherals, is provided with an operating system and various drivers, and is provided with an intelligent self-service machine software system;
in the several embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate components may or may not be physically separate, and components displayed as units may or may not be physical units, may be located in one place, or may be distributed on multiple units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. Enterprise information security management system, including preventing hot wall module (3), its characterized in that still includes:
a central control module (1);
a database module (2);
a login module (4);
rights management module (6) and
the central control module (1) is respectively associated with the database module (2), the firewall module (3), the login module (4), the authority management module (6) and the identity recognition module (7);
the database module (2) is used for uploading and reading enterprise information and storing the uploaded enterprise information data in a classified manner;
the login module (4) is used for providing a registration and login platform for a user to access the information management system;
the authority management module (6) is used for setting the authority of the user for accessing the enterprise information system according to the registration information of the user, and is used for the user to apply for improving the authority for accessing the enterprise information system and the authorization for applying;
the identity recognition module (7) is used for verifying and judging the consistency between the identity information of the user accessing the enterprise information system and the registered identity information of the user.
2. An enterprise information security management system according to claim 1, characterized in that said database module (2) comprises:
a storage unit (21);
an input unit (22);
a classification unit (23) and
the reading unit (24), the said memory cell (21) is used for storing the information material of enterprises;
the input unit (22) is used for uploading enterprise information data to the storage unit (21) by enterprise information management personnel;
the classification unit (23) is used for classifying and storing the enterprise information data uploaded by the input unit (22) in the storage unit (21);
the reading unit (24) is used for a user to retrieve and read required enterprise information materials from the storage unit (21).
3. An enterprise information security management system according to claim 1, characterized in that said login module (4) comprises:
a registration unit (41);
biological information acquisition unit (42) and
a login portal (43), the registration unit (41) being configured to provide a platform for a user to register for a login to an enterprise information management system account;
the biological information acquisition unit (42) is used for acquiring biological information of a user when the user registers an account through the registration unit (41), and the biological information acquired by the biological information acquisition unit (42) comprises a front head portrait and a finger fingerprint of the user;
wherein the login portal (43) is used for providing a login platform for accessing the enterprise information management system for the user who registers an account through the registration unit (41) and is collected with the biological information through the biological information collection unit (42).
4. An enterprise information security management system according to claim 1, wherein said rights management module (6) comprises:
a permission presetting unit (61);
a key unit (62) and
the authorization unit (63), the permission presetting unit (61) is used for classifying the enterprise information data according to the classification unit (23) and classifying the enterprise information data into the accessed permission level;
the key unit (62) is used for providing a password input platform for retrieving and reading enterprise information data with different access permission levels;
the authorization unit (63) is used for providing passwords for retrieving and reading enterprise information materials with different access permission levels.
5. An enterprise information security management system according to claim 3, characterized in that the identity module (7) comprises:
a face recognition unit (71);
fingerprint recognition unit (72) and
the face recognition unit (71) is used for judging the consistency between the head portrait of the front face of a user logging in the enterprise information management system and the head portrait of the front face of the registered user collected by the biological information collection unit (42);
the fingerprint identification unit (72) is used for judging the consistency of the finger fingerprint of the user logging in the enterprise information management system and the finger fingerprint of the registered user collected by the biological information collection unit (42);
the verification unit (73) is used for judging the correctness of the identity of the login user according to the judgment results of the face recognition unit (71) and the fingerprint recognition unit (72).
6. The system for enterprise information security management according to claim 1, further comprising:
the information acquisition module (5) is used for potential collaborating clients to input the collaboration intention and enterprise information data corresponding to the potential collaborating clients, and the input enterprise information data and the collaboration intention are classified and stored.
7. An enterprise information security management system according to claim 6, wherein the information collection module (5) comprises:
a customer information base (51);
information recording means (52) and
the information input unit (52) is used for potential collaborating clients to input the collaboration intention and enterprise information data corresponding to the potential collaborating clients;
the client information base (51) is used for storing the collaboration intention of potential collaborating clients and the enterprise information data corresponding to the potential collaborating clients, wherein the collaboration intention is input by the information input unit (52);
the information dividing unit (53) is used for classifying the collaboration intention of the potential collaborating clients, which is input by the information input unit (52), and the enterprise information data corresponding to the potential collaborating clients.
8. The system for enterprise information security management according to claim 1, further comprising:
an interactive interface module (8), the interactive interface module (8) is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients.
9. An enterprise information security management system according to claim 8, wherein said interactive interface module (8) comprises:
an interactive platform unit (81) and
an information sharing unit (82), wherein the interaction platform unit (81) is used for providing an online communication, cooperation negotiation and message leaving platform for potential cooperation clients;
the information sharing unit (82) is used for constructing a sharing channel with the enterprise information management system of the cooperative client successfully negotiated through the interaction platform unit (81).
10. The enterprise information security management system according to claim 4, further comprising an alarm module (9), wherein the alarm module (9) comprises:
a warning unit (91);
shield unit (92) and
the alarm module (9) is used for warning a user who illegally logs in the enterprise information management system platform, shielding IP (Internet protocol) and reporting illegal behaviors of the user to a public security system;
wherein the warning unit (91) is used for sending warning information to a user who tries to input an error password to the key unit (62) for multiple times;
the shielding unit (92) is used for shielding the IP of the user who still continuously tries to input the wrong password into the key unit (62) after the warning unit (91) sends out warning information;
the alarm unit (93) uploads the registration and login information of the corresponding user, which is shielded by the shielding unit (92) to a public security system for reporting and reporting.
CN201911342761.4A 2019-12-23 2019-12-23 Enterprise information security management system Active CN113094678B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911342761.4A CN113094678B (en) 2019-12-23 2019-12-23 Enterprise information security management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911342761.4A CN113094678B (en) 2019-12-23 2019-12-23 Enterprise information security management system

Publications (2)

Publication Number Publication Date
CN113094678A true CN113094678A (en) 2021-07-09
CN113094678B CN113094678B (en) 2023-02-28

Family

ID=76663115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911342761.4A Active CN113094678B (en) 2019-12-23 2019-12-23 Enterprise information security management system

Country Status (1)

Country Link
CN (1) CN113094678B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564710A (en) * 2022-03-28 2022-05-31 国网山东省电力公司信息通信公司 Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information
CN116502806A (en) * 2023-06-26 2023-07-28 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US20090157863A1 (en) * 2005-04-01 2009-06-18 International Business Machines Corporation System and Method of Enforcing Hierarchical Management Policy
CN106294704A (en) * 2016-08-08 2017-01-04 武君 A kind of exhibitions trade information retrieval server, client, system and method
CN108182596A (en) * 2017-12-22 2018-06-19 合肥天源迪科信息技术有限公司 One kind is based on enterprise marketing management method under big data environment
CN108347423A (en) * 2017-07-25 2018-07-31 深圳壹账通智能科技有限公司 Enterprise portal manages system, method and storage medium
CN109885596A (en) * 2019-01-23 2019-06-14 广州市聚星源科技有限公司 Big data is pressed into extracting method
CN110490463A (en) * 2019-08-21 2019-11-22 合肥天源迪科信息技术有限公司 A kind of wisdom operation management system for enterprise
CN110490009A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of enterprise management platform system
CN110490407A (en) * 2019-07-04 2019-11-22 民乐县正和商务服务有限公司 A kind of scientific and technical innovation integrated service system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US20090157863A1 (en) * 2005-04-01 2009-06-18 International Business Machines Corporation System and Method of Enforcing Hierarchical Management Policy
CN106294704A (en) * 2016-08-08 2017-01-04 武君 A kind of exhibitions trade information retrieval server, client, system and method
CN108347423A (en) * 2017-07-25 2018-07-31 深圳壹账通智能科技有限公司 Enterprise portal manages system, method and storage medium
CN108182596A (en) * 2017-12-22 2018-06-19 合肥天源迪科信息技术有限公司 One kind is based on enterprise marketing management method under big data environment
CN109885596A (en) * 2019-01-23 2019-06-14 广州市聚星源科技有限公司 Big data is pressed into extracting method
CN110490009A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of enterprise management platform system
CN110490407A (en) * 2019-07-04 2019-11-22 民乐县正和商务服务有限公司 A kind of scientific and technical innovation integrated service system
CN110490463A (en) * 2019-08-21 2019-11-22 合肥天源迪科信息技术有限公司 A kind of wisdom operation management system for enterprise

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PHIL JAKUBOWSKI等: "Enterprise Risk Management: An improvement journey in nuclear decommissioning", 《ASSET MANAGEMENT CONFERENCE 2015》 *
朱少敏等: "基于LDAP的企业级统一用户身份管理系统的设计与实现", 《核电子学与探测技术》 *
李坤: "基于ASP.NET的班组人员及工时信息管理系统研究与实现", 《机电信息》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114564710A (en) * 2022-03-28 2022-05-31 国网山东省电力公司信息通信公司 Information thing allies oneself with intelligence management and control platform with function is prevented leaking by information
CN116561092A (en) * 2023-04-04 2023-08-08 苏州小猫花网络科技有限公司 Block chain data storage method with guide function
CN116502806A (en) * 2023-06-26 2023-07-28 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform
CN116502806B (en) * 2023-06-26 2023-09-05 辰风策划(深圳)有限公司 Enterprise information management method and system based on cloud computing platform

Also Published As

Publication number Publication date
CN113094678B (en) 2023-02-28

Similar Documents

Publication Publication Date Title
US20220229886A1 (en) Methods and systems for generating history data of system use and replay mode for identifying security events showing data and user bindings
CN113094678B (en) Enterprise information security management system
US9047464B2 (en) Continuous monitoring of computer user and computer activities
US20190012440A1 (en) Security Device, Methods, and Systems for Continuous Authentication
CN104484617B (en) A kind of Access and control strategy of database method based on many strategy fusions
US8732856B2 (en) Cross-domain security for data vault
US7593942B2 (en) Mandatory access control base
US7831570B2 (en) Mandatory access control label security
DE60213314T2 (en) Methods and arrangements for controlled access to resources are based on an authentication method
US7814076B2 (en) Data vault
US20170054711A1 (en) Systems and methods for authenticating users accessing a secure network with one-session-only, on-demand login credentials
JP6932175B2 (en) Personal number management device, personal number management method, and personal number management program
CN107770191B (en) Enterprise financial management system with safety protection
US20140282965A1 (en) Ongoing Authentication and Access Control with Network Access Device
US20060248084A1 (en) Dynamic auditing
DE202013102441U1 (en) System for checking digital certificates
WO2008157759A1 (en) Mapping of physical and logical coordinates of users with that of the network elements
CN105027498A (en) A method, system and device for securely storing data files at a remote location by splitting and reassembling said files
EP4178155A1 (en) Blockchain-based certification audit data sharing and integrity verification system, device, and method thereof
CN112905965A (en) Financial big data processing system based on block chain
Kumari Procurement, management and use of e-resource in current library trends: common issues
Michelberger et al. A possible tool for development of information security-SIEM system
US11086643B1 (en) System and method for providing request driven, trigger-based, machine learning enriched contextual access and mutation on a data graph of connected nodes
Onyesolu et al. Enhancing security in a distributed examination using biometrics and distributed firewall system
Neil CompTIA Security+ Certification Guide: Master IT security essentials and exam topics for CompTIA Security+ SY0-501 certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant