CN116232577B - Firewall application structure of enterprise management software - Google Patents
Firewall application structure of enterprise management software Download PDFInfo
- Publication number
- CN116232577B CN116232577B CN202310023462.4A CN202310023462A CN116232577B CN 116232577 B CN116232577 B CN 116232577B CN 202310023462 A CN202310023462 A CN 202310023462A CN 116232577 B CN116232577 B CN 116232577B
- Authority
- CN
- China
- Prior art keywords
- database
- unit
- client
- file
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 claims abstract description 36
- 230000005540 biological transmission Effects 0.000 claims abstract description 28
- 238000000034 method Methods 0.000 claims abstract description 17
- 230000006855 networking Effects 0.000 claims abstract description 6
- 238000012795 verification Methods 0.000 claims description 45
- 230000006378 damage Effects 0.000 claims description 11
- 238000012423 maintenance Methods 0.000 claims description 10
- 238000007726 management method Methods 0.000 claims description 5
- 241000700605 Viruses Species 0.000 claims description 3
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 230000005856 abnormality Effects 0.000 claims description 3
- 230000009545 invasion Effects 0.000 claims description 2
- 238000002372 labelling Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000005610 quantum mechanics Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention relates to the field of enterprise firewall, and discloses a firewall application structure of enterprise management software, which comprises a client, an intelligent networking module, a firewall and a database, wherein the client is connected with the intelligent networking module and used for a user to send an access request to a file library and browse files transmitted in the file library, the intelligent networking module belongs to a regional network, the client can only carry out data transmission with the database when being connected with the intelligent networking module or within the range of the regional network, the firewall comprises a quantum key encryption module and a monitoring module, the quantum key encryption module is used for encryption transmission in the process of transmitting files in the database to the client, the monitoring module is a third party monitoring program independent of the file transmission and used for monitoring and safety protection of the database and the client in the process of transmitting the data under the condition that the quantum key encryption module is additionally arranged, and the database comprises all data requiring the access request in enterprise management and is used for transmitting the files to the client.
Description
Technical Field
The invention relates to the field of enterprise firewalls, in particular to a firewall application structure of enterprise management software.
Background
The quantum key ensures the communication security by utilizing the quantum mechanical property. It enables both parties in communication to generate and share a random, secure key to encrypt and decrypt messages, the security of quantum key distribution being based on the basic principles of quantum mechanics, whereas traditional cryptography is based on the computational complexity of certain mathematical algorithms. Traditional cryptography cannot detect eavesdropping, and therefore the security of the secret key cannot be guaranteed. Quantum key distribution is used only to generate and distribute keys and does not transmit any substantial messages. The key may be used in some encryption algorithms to encrypt messages, which may be transmitted in standard channels. The most common related algorithm to quantum key distribution is the one-time codebook, which is provably secure if secret and random keys are used.
In enterprise management, there is a database for collecting enterprise file data, the database contains internal files and non-leaked confidential files of the enterprise, a large number of clients send file viewing requests to the database every moment in a large enterprise, and because of too many access people, there is a risk of file leakage, the risk exists on a browsed data port and in the data file conveying process, in addition, the database in the enterprise can also receive external program attack, and the risk of file leakage exists. Therefore, in view of the above, there is a need for related innovative designs.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a firewall application structure of enterprise management software, where the firewall application structure of enterprise management software includes: client, intelligent network connection module, firewall and database.
The client is connected with the intelligent network system and is used for sending an access request to the file library by a user and browsing the files transmitted from the file library;
the intelligent network connection module belongs to a regional network, and the client can only carry out data transmission with the database when being connected with the intelligent network connection module or within the range of the regional network;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database in the process of transmitting the files to a client; the monitoring module is a third party monitoring program independent of file delivery and is used for monitoring and protecting safety in the data transmission process under the condition that the database and the client are held by the quantum key encryption module;
the database contains all data which need to be accessed in enterprise management and is used for conveying files to the client.
Preferably, the client includes a plurality of login devices, the login devices include computers or intelligent mobile terminals, each login device is connected with the intelligent network system, the client includes a labeling unit, the labeling unit is used for labeling a GPS locator on each login device, the labeled GPS locators on the login devices are denoted as Ti, i=1, 2, 3 … …, and the labeled GPS locators on each login device are labeled differently.
Preferably, the client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through interfaces of the operation display screen, the intelligent network connection system comprises a router or a 5G network, the client is connected with the intelligent network connection system, the operation display screen is used for displaying data transmission in a database, and login personnel can receive files in the database through the operation display screen.
Preferably, the blacklist unit includes a marking unit, the marking unit marks and stores a user or a login website which is forbidden to log in the access database, the marked user or the login website is forbidden to log in and access again, the visitor access unit monitors unregistered users, and the user login unit is used for monitoring registered or authenticated users.
Preferably, the database includes a grading unit, the grading unit grades the files in the database, the data in the database is divided into a class i file library and a class ii file library, the file data in the class i file library is available for users who have rights in the guest access unit, the file data in the class ii file library is available for users who have rights in the user login unit, and the class i file library is included in the class ii file library.
Preferably, the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database to the client, the second verification unit is used for verifying labels of data requests sent from the client by the database, and the destruction unit is used for automatically destroying the file data.
Preferably, the client sends a data request signal to the database, the signal is recorded as F, the signal F is firstly transmitted to the firewall, the first verification unit identifies the signal F, then the signal F is quantum-encrypted and then transmitted to the database, the quantum key encryption module simultaneously distributes visa to the file in the database, the visa can decrypt the encryption algorithm in the signal F, if the encryption algorithm in the signal F is countedIf the verification signature in the database is successfully decrypted, indicating that the request conveying process is normal, outputting a signal for requesting to be normal and passing, and marking the signal as H a Signal H a Sending a file delivery instruction to a database, downloading or caching a requested file in the database in advance into a file package, recording the file package as S, and if the encryption algorithm in the signal F is not successfully decrypted by the verification in the database, indicating that the delivery requesting process is abnormal, outputting a signal for requesting abnormality and termination, recording as H w Signal H w The file delivery instruction sent to the database will be interrupted.
Preferably, the signal H a When the command sent to the database is normal, the second verification unit receives the command, sends a quantum certificate to the file package S for encryption, and sends a corresponding verification sign to the client, the verification sign can decrypt and verify the quantum certificate, the encrypted file package S is sent to the client, and meanwhile, a verification request command Q is sent to the client, after the client receives the command Q, the verification sign distributed by the second verification unit can run simultaneously, if decryption is successful, the data cached in the file package S can be opened, if decryption is unsuccessful, a pairing unsuccessful signal can be output, the signal is recorded as M, and the signal M can send the command to the destruction unit.
Preferably, the monitoring module is a third party monitoring program independent of file delivery, and is used for monitoring and protecting safety of the database and the client in the data transmission process when the quantum key encryption module is added and held, when the monitoring module detects that the data of the client is downloaded, tampered or leaked, the data content of the client is closed, the file delivery is interrupted, the monitoring module comprises a warning unit, the warning unit sends a warning signal to be marked as Y and sends the warning signal to a background operation and maintenance personnel, and meanwhile, the authority of an access user is limited and monitored.
Preferably, the monitoring module includes an interception unit and a security protection unit, the interception unit is used for blocking attack of external programs or invasion of viruses, when the interception unit identifies programs not belonging to the local operation, an attacked warning signal is sent out, recorded as P, and sent to an operation and maintenance personnel, meanwhile, the warning signal P can send an instruction to the quantum key encryption module, interrupt files or access requests in transmission, and destroy the files in transmission.
The invention has the technical effects and advantages that: the firewall comprises a quantum key encryption module and a monitoring module, encryption transportation in a bidirectional transportation process between a file in a database and a client is realized, a data transmission process of the database and the client under the quantum key encryption module is realized through a third party monitoring program independent of the file transportation, a layer of protection wall is added, the integrity and confidentiality of data transmission are enhanced, when the client is marked and positioned, the client is convenient to leak data, the leaked client is quickly controlled and limited, fault leakage information is marked and stored through the monitoring module, the observation of operation and maintenance personnel is facilitated, and the maintenance of operation and maintenance personnel is assisted.
Drawings
Fig. 1 is a block diagram of a firewall application structure of enterprise management software according to the present invention.
Detailed Description
The invention will be described in further detail with reference to the drawings and the detailed description. The embodiments of the invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
Referring to fig. 1, in this embodiment, a firewall application structure of enterprise management software is provided, and a quantum key encryption module and a monitoring module in a firewall are designed to dynamically encrypt a file transmission process, so that the problem that confidential file transmission is leaked by an attack or a user is leaked in enterprise management is solved, and the authenticity and the confidentiality of the file transmitted in a database are ensured, including a client, an intelligent networking module, the firewall and the database.
The client comprises a plurality of login devices, and the login devices comprise computers or intelligent mobile terminals. Each login device is connected with an intelligent network connection system, the intelligent network connection module belongs to a regional network, the login device can carry out data transmission with a database only when the intelligent network connection module is connected or within the range of the regional network, the client comprises a marking unit, the marking unit is used for marking a GPS (global positioning system) locator on each login device, and the marked GPS locator on the login device is marked as T i I=1, 2, 3 … …, the numbered GPS locator on the first login device is denoted T 1 The GPS locator marked on the second login device is marked as T 2 … …, and so on, and the GPS locator labels marked on each login device are different. The real-time position displayed by the GPS locator can be displayed on background monitoring equipment for operation and maintenance personnel to observe.
The client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through the operation display screen, the intelligent network system comprises a router or a 5G network, the client is connected with the intelligent network system, the operation display screen is used for displaying data transmission in a database and can be used for a login person to receive files in the database through the operation display screen, the blacklist unit comprises a marking unit, the marking unit is used for marking and storing a user or login website which is forbidden to login the database, when the marked user or login website logs in again, access is forbidden, when a monitoring module in a firewall detects that the data transmitted to the client by the database is downloaded, tampered or leaked, the user or web site receiving the information can be marked and the web content is closed, the files which are being transmitted in the database are interrupted, or the files which are already transmitted are locked, so that confidential files are prevented from being leaked, a warning unit in the monitoring unit can generate a red warning sign through operating a display screen and can transmit a warning signal to a background operation and maintenance personnel, the warning signal is recorded as Y, the warning signal Y comprises the time logged in by the marked user, the web site is logged in, the files which are downloaded and transmitted and the files which are leaked or tampered, a record sheet is formed and is sent to the background operation and maintenance personnel, the operation and maintenance personnel is helped to carry out follow-up investigation and file restoration, a visitor access unit monitors unregistered users, the database comprises a grading unit, the grading unit can grade the files in the database, the method comprises the steps that authority grading is carried out on data in a database according to a visitor access unit and a user login unit, namely, the data in the database is divided into a level I file library and a level II file library, file data in the level I file library can be used for browsing unregistered users in the visitor access unit, the visitor access unit can monitor the browsed contents of the unregistered users, meanwhile, limits the authority of the unregistered users on file operation, the limits comprise content browsing only without downloading or forwarding and the like, when the users in the visitor access unit operate outside the authority range, a red warning sign appears in a warning unit in the monitoring unit through an operation display screen, warning is carried out on the users, or when the conditions are serious and meet the conditions in the blacklist unit, a marking unit in the blacklist unit marks the users, the file data in the level II file library is used for monitoring the registered users or authenticated users, the level I file library is contained in the level II file library, and the level I file library comprises all the data of the level I file library and all accounts are opened.
The firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database by the client, the second verification unit is used for verifying labels of data requests sent by the client by the database, when the client sends browsing requests to the database, a data request signal is sent, the signal is recorded as F, and the signal F is conveyed firstlyThe first verification unit in the quantum key encryption module recognizes the signal F, namely, determines whether the I-level file library or the II-level file library in the database is opened according to the user data access right carried in the signal F, the first verification unit in the quantum key encryption module recognizes the signal F, then carries out quantum encryption on the signal F, the encrypted signal F is transmitted to the database, the first verification unit in the quantum key encryption module encrypts the signal F and simultaneously distributes visa for the I-level file library or the II-level file library in the database at the corresponding level, the visa can decrypt the encryption algorithm in the signal F, and if the encryption algorithm in the signal F is successfully decrypted by the verification in the database, which indicates that the transmission process is required to be normal, then outputs a signal which is required to be normal and passed, and the signal is marked as H a Signal H a A file delivery instruction is sent to a database, a requested file in the database is downloaded in advance or cached into a file package, the file package is recorded as S, if the encryption algorithm in a signal F is not successfully decrypted by the verification in the database, which means that the delivery requesting process is abnormal, a signal for requesting abnormality and ending is output and recorded as H w Signal H w The file delivery instruction sent to the database is interrupted, and meanwhile, a verification error signal is also sent to the client to prompt the client to re-input and send a request, the number of times of re-verification is set to be three, and if the number of times exceeds three and is unsuccessful, the input window of the client is locked through the operation display screen, and the input of the file is terminated.
If signal H a The second verification unit in the quantum key encryption module can issue a quantum certificate to the file package S to encrypt the file package S, and can send a corresponding signature verification to the client, wherein the signature verification can decrypt and verify the quantum certificate, and the transmission process is as follows: the database receives signal H a After the sent file delivery instruction, the requested file in the database is cached into a file package S in advance, a second verification unit in the quantum key encryption module issues a quantum certificate to the file package S, encrypts the file package S, and encryptsThe method comprises the steps that a file package S is sent to a client, a verification request instruction Q is sent to the client, after the client receives the instruction Q, a verification tag distributed by a second verification unit operates simultaneously, the verification tag decrypts and pairs encryption programs carried on the file package S, if decryption is successful, data cached in the file package S are displayed on an operation display screen of the client for browsing, if decryption is unsuccessful, a pairing unsuccessful signal is output, the signal is recorded as M, the signal M gives an instruction to a destruction unit, and after the destruction unit receives the instruction, the data carried in the file package S are automatically destroyed through the destruction program of the destruction unit, so that confidential file data leakage is prevented.
The monitoring module is a third party monitoring program independent of file delivery and used for monitoring and protecting the database and the client in the data transmission process under the control of the quantum key encryption module, and comprises an interception unit and a safety protection unit, wherein the interception unit is used for identifying the external program when being attacked by the external program or invaded by viruses in the file transmission process, when the interception unit identifies the program which does not belong to the running of the client, one surface of the interception unit can send out an attacked warning signal which is recorded as P, the signal P can contain the attacked time, the GPS locator mark of login equipment in the attacked client and the attacked strength, and the signal P is sent to an operation staff, the other surface can intercept the external invaded program and kill the external invaded program through the self-carried disinfection program, and then the warning signal P can send an instruction to the quantum key encryption module, and after the quantum key encryption module receives the instruction, the file or the access request in transmission can be interrupted, and the file in transmission can be destroyed.
In summary, the encryption and transportation of confidential files in enterprise management are realized, and file leakage is prevented, so that enterprise loss is caused.
It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art and which are included in the embodiments of the present invention without the inventive step, are intended to be within the scope of the present invention. Structures, devices and methods of operation not specifically described and illustrated herein, unless otherwise indicated and limited, are implemented according to conventional means in the art.
Claims (3)
1. A firewall application structure of enterprise management software, the firewall application structure of enterprise management software comprising: the system comprises a client, an intelligent networking module, a firewall and a database;
the client is connected with the intelligent network system and is used for sending an access request to the file library by a user and browsing the files transmitted from the file library;
the intelligent network connection module belongs to a regional network, and the client can only carry out data transmission with the database when being connected with the intelligent network connection module or within the range of the regional network;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database in the process of transmitting the files to a client; the monitoring module is independent of a third party monitoring program except file delivery and is used for monitoring and protecting safety of the database and the client in the data transmission process under the condition that the quantum key encryption module is added;
the database comprises all data which need to be accessed in enterprise management and is used for conveying files to the client;
the client comprises a plurality of login devices, each login device comprises a computer or an intelligent mobile terminal, each login device is connected with an intelligent network system, the client comprises a marking unit, the marking unit is used for marking a GPS (global positioning system) locator on each login device, the marked GPS locators on the login devices are marked as Ti, i=1, 2 and 3 … …, and the marked GPS locators on each login device are different in marks;
the client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through interfaces of the operation display screen, the intelligent network system comprises a router or a 5G network, the client is connected with the intelligent network system, the operation display screen is used for displaying data transmission in a database, and login personnel can receive files in the database through the operation display screen;
the blacklist unit comprises a marking unit, the marking unit is used for marking and storing a user or a login website which is forbidden to log in the access database, the marked user or the login website is forbidden to log in and access again, the visitor access unit is used for monitoring unregistered users, and the user login unit is used for monitoring registered or real-name authenticated users;
the database comprises a grading unit, wherein the grading unit grades files in the database, the data in the database is divided into a class I file library and a class II file library, the file data in the class I file library can be used by users with rights in a visitor access unit, the file data in the class II file library can be used by users with rights in a user login unit, and the class I file library is contained in the class II file library;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database by the client, the second verification unit is used for verifying labels of data requests sent by the client by the database, and the destruction unit is used for automatically destroying file data;
the client sends a data request signal to the database, the data request signal is recorded as F, the signal F is firstly transmitted to the firewall, the first verification unit identifies the signal F, then the signal F is transmitted to the database after quantum encryption, the quantum key encryption module distributes visa to files in the database at the same time, the visa can decrypt the encryption algorithm in the signal F, if the encryption algorithm in the signal F is successfully decrypted by the verification in the database, the normal request transmission process is indicated, the normal request and passing signal is outputIs denoted as H a Signal H a Sending a file delivery instruction to a database, downloading or caching a requested file in the database in advance into a file package, recording the file package as S, and if the encryption algorithm in the signal F is not successfully decrypted by the verification in the database, indicating that the delivery requesting process is abnormal, outputting a signal for requesting abnormality and termination, recording as H w Signal H w Interrupting the file delivery instruction sent to the database;
the signal H a When the command sent to the database is normal, the second verification unit receives the command, sends a quantum certificate to the file package S for encryption, and sends a corresponding verification sign to the client, the verification sign can decrypt and verify the quantum certificate, the encrypted file package S is sent to the client, and meanwhile, a verification request command Q is sent to the client, after the client receives the command Q, the verification sign distributed by the second verification unit can run simultaneously, if decryption is successful, the data cached in the file package S can be opened, if decryption is unsuccessful, a pairing unsuccessful signal can be output, the signal is recorded as M, and the signal M can send the command to the destruction unit.
2. The firewall application structure of enterprise management software according to claim 1, wherein the monitoring module is a third party monitoring program independent of file delivery, and is used for monitoring and protecting safety of the database and the client in the process of data transmission under the action of the quantum key encryption module, and when the monitoring module detects that the data of the client is downloaded, tampered or leaked, the monitoring module closes the data content of the client and interrupts file delivery, and the monitoring module comprises a warning unit, and the warning unit sends a warning signal to be marked as Y and sends the warning signal to a background operation and maintenance personnel, and limits and monitors the authority of an access user.
3. The firewall application structure of enterprise management software according to claim 2, wherein the monitoring module comprises an interception unit and a security protection unit, the interception unit is used for intercepting an attack of an external program or an invasion of virus, when the interception unit recognizes a program which does not belong to a local running, an attacked warning signal is sent out and recorded as P, and sent to an operation staff, and meanwhile, the warning signal P sends an instruction to the quantum key encryption module to interrupt a file or an access request in transmission and destroy the file in transmission.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310023462.4A CN116232577B (en) | 2023-01-09 | 2023-01-09 | Firewall application structure of enterprise management software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310023462.4A CN116232577B (en) | 2023-01-09 | 2023-01-09 | Firewall application structure of enterprise management software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116232577A CN116232577A (en) | 2023-06-06 |
CN116232577B true CN116232577B (en) | 2024-03-08 |
Family
ID=86586560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310023462.4A Active CN116232577B (en) | 2023-01-09 | 2023-01-09 | Firewall application structure of enterprise management software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116232577B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789029A (en) * | 2017-01-04 | 2017-05-31 | 浙江神州量子网络科技有限公司 | A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine |
CN107563221A (en) * | 2017-09-04 | 2018-01-09 | 安徽爱她有果电子商务有限公司 | A kind of certification decoding security management system for encrypting database |
CN111711640A (en) * | 2020-06-30 | 2020-09-25 | 郑州工业应用技术学院 | Safe computer network communication system |
CN112532705A (en) * | 2020-11-20 | 2021-03-19 | 季速漫 | Smart city service system based on big data |
CN114297684A (en) * | 2021-12-29 | 2022-04-08 | 广州睿冠信息科技有限公司 | Engineering document safety management system |
CN114374689A (en) * | 2022-01-14 | 2022-04-19 | 太宙(上海)网络科技有限公司 | Integrated network management system for local area networks |
CN115221538A (en) * | 2022-06-24 | 2022-10-21 | 西安宝博企业管理服务有限公司 | Encryption method and system suitable for financial data |
CN115348068A (en) * | 2022-08-09 | 2022-11-15 | 梁潇静 | Computer network information safety control system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2017201850B2 (en) * | 2016-03-21 | 2020-10-29 | Vireshwar K. ADHAR | Method and system for digital privacy management |
-
2023
- 2023-01-09 CN CN202310023462.4A patent/CN116232577B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789029A (en) * | 2017-01-04 | 2017-05-31 | 浙江神州量子网络科技有限公司 | A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine |
CN107563221A (en) * | 2017-09-04 | 2018-01-09 | 安徽爱她有果电子商务有限公司 | A kind of certification decoding security management system for encrypting database |
CN111711640A (en) * | 2020-06-30 | 2020-09-25 | 郑州工业应用技术学院 | Safe computer network communication system |
CN112532705A (en) * | 2020-11-20 | 2021-03-19 | 季速漫 | Smart city service system based on big data |
CN114297684A (en) * | 2021-12-29 | 2022-04-08 | 广州睿冠信息科技有限公司 | Engineering document safety management system |
CN114374689A (en) * | 2022-01-14 | 2022-04-19 | 太宙(上海)网络科技有限公司 | Integrated network management system for local area networks |
CN115221538A (en) * | 2022-06-24 | 2022-10-21 | 西安宝博企业管理服务有限公司 | Encryption method and system suitable for financial data |
CN115348068A (en) * | 2022-08-09 | 2022-11-15 | 梁潇静 | Computer network information safety control system |
Also Published As
Publication number | Publication date |
---|---|
CN116232577A (en) | 2023-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109561047B (en) | Encrypted data storage system and method based on key remote storage | |
Kesh et al. | A framework for analyzing e‐commerce security | |
US7885413B2 (en) | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data | |
CN103001976A (en) | Safe network information transmission method | |
US20020046350A1 (en) | Method and system for establishing an audit trail to protect objects distributed over a network | |
US20110173443A1 (en) | Secure extranet server | |
CN101695038A (en) | Method and device for detecting SSL enciphered data safety | |
US8583943B2 (en) | Method and system for providing data field encryption and storage | |
US20030237005A1 (en) | Method and system for protecting digital objects distributed over a network by electronic mail | |
CN106789029A (en) | A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine | |
US8401183B2 (en) | Method and system for keying and securely storing data | |
CN117081815A (en) | Method, device, computer equipment and storage medium for data security transmission | |
CN116743470A (en) | Service data encryption processing method and device | |
CN112989320B (en) | User state management system and method for password equipment | |
CN116232577B (en) | Firewall application structure of enterprise management software | |
JPH11161321A (en) | Plant monitor device | |
JP3877388B2 (en) | Information provision system | |
CN108270601B (en) | Mobile terminal, alarm information acquisition method and device and alarm information sending method and device | |
Han et al. | Scalable and secure virtualization of HSM with ScaleTrust | |
CN107230081A (en) | A kind of secure payment encryption system | |
CN115883211B (en) | File transfer system oriented to enterprise data security | |
CN112305986B (en) | PLC protection system, method and medium based on verification separation | |
CN117786734B (en) | Method, device and storage medium for preventing personal sensitive information of examinee from leakage | |
Kumar et al. | Analysis of Network Security Issue and Its Attack and Defence | |
Pangalos | Development of an Internet Security Policy for health care establishments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20240126 Address after: Chinatelecom tower, No. 19, Chaoyangmen North Street, Dongcheng District, Beijing 100010 Applicant after: Tianyi Safety Technology Co.,Ltd. Country or region after: China Address before: 404, No. 44, Yuexiu Garden, Binhu District, Wuxi, Jiangsu Province, 214000 Applicant before: Jiangsu Hengde Network Technology Co.,Ltd. Country or region before: China |
|
GR01 | Patent grant | ||
GR01 | Patent grant |