CN116232577B - Firewall application structure of enterprise management software - Google Patents

Firewall application structure of enterprise management software Download PDF

Info

Publication number
CN116232577B
CN116232577B CN202310023462.4A CN202310023462A CN116232577B CN 116232577 B CN116232577 B CN 116232577B CN 202310023462 A CN202310023462 A CN 202310023462A CN 116232577 B CN116232577 B CN 116232577B
Authority
CN
China
Prior art keywords
database
unit
client
file
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310023462.4A
Other languages
Chinese (zh)
Other versions
CN116232577A (en
Inventor
张正德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Safety Technology Co Ltd
Original Assignee
Tianyi Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Safety Technology Co Ltd filed Critical Tianyi Safety Technology Co Ltd
Priority to CN202310023462.4A priority Critical patent/CN116232577B/en
Publication of CN116232577A publication Critical patent/CN116232577A/en
Application granted granted Critical
Publication of CN116232577B publication Critical patent/CN116232577B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention relates to the field of enterprise firewall, and discloses a firewall application structure of enterprise management software, which comprises a client, an intelligent networking module, a firewall and a database, wherein the client is connected with the intelligent networking module and used for a user to send an access request to a file library and browse files transmitted in the file library, the intelligent networking module belongs to a regional network, the client can only carry out data transmission with the database when being connected with the intelligent networking module or within the range of the regional network, the firewall comprises a quantum key encryption module and a monitoring module, the quantum key encryption module is used for encryption transmission in the process of transmitting files in the database to the client, the monitoring module is a third party monitoring program independent of the file transmission and used for monitoring and safety protection of the database and the client in the process of transmitting the data under the condition that the quantum key encryption module is additionally arranged, and the database comprises all data requiring the access request in enterprise management and is used for transmitting the files to the client.

Description

Firewall application structure of enterprise management software
Technical Field
The invention relates to the field of enterprise firewalls, in particular to a firewall application structure of enterprise management software.
Background
The quantum key ensures the communication security by utilizing the quantum mechanical property. It enables both parties in communication to generate and share a random, secure key to encrypt and decrypt messages, the security of quantum key distribution being based on the basic principles of quantum mechanics, whereas traditional cryptography is based on the computational complexity of certain mathematical algorithms. Traditional cryptography cannot detect eavesdropping, and therefore the security of the secret key cannot be guaranteed. Quantum key distribution is used only to generate and distribute keys and does not transmit any substantial messages. The key may be used in some encryption algorithms to encrypt messages, which may be transmitted in standard channels. The most common related algorithm to quantum key distribution is the one-time codebook, which is provably secure if secret and random keys are used.
In enterprise management, there is a database for collecting enterprise file data, the database contains internal files and non-leaked confidential files of the enterprise, a large number of clients send file viewing requests to the database every moment in a large enterprise, and because of too many access people, there is a risk of file leakage, the risk exists on a browsed data port and in the data file conveying process, in addition, the database in the enterprise can also receive external program attack, and the risk of file leakage exists. Therefore, in view of the above, there is a need for related innovative designs.
Disclosure of Invention
In order to solve the above technical problems, the present invention provides a firewall application structure of enterprise management software, where the firewall application structure of enterprise management software includes: client, intelligent network connection module, firewall and database.
The client is connected with the intelligent network system and is used for sending an access request to the file library by a user and browsing the files transmitted from the file library;
the intelligent network connection module belongs to a regional network, and the client can only carry out data transmission with the database when being connected with the intelligent network connection module or within the range of the regional network;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database in the process of transmitting the files to a client; the monitoring module is a third party monitoring program independent of file delivery and is used for monitoring and protecting safety in the data transmission process under the condition that the database and the client are held by the quantum key encryption module;
the database contains all data which need to be accessed in enterprise management and is used for conveying files to the client.
Preferably, the client includes a plurality of login devices, the login devices include computers or intelligent mobile terminals, each login device is connected with the intelligent network system, the client includes a labeling unit, the labeling unit is used for labeling a GPS locator on each login device, the labeled GPS locators on the login devices are denoted as Ti, i=1, 2, 3 … …, and the labeled GPS locators on each login device are labeled differently.
Preferably, the client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through interfaces of the operation display screen, the intelligent network connection system comprises a router or a 5G network, the client is connected with the intelligent network connection system, the operation display screen is used for displaying data transmission in a database, and login personnel can receive files in the database through the operation display screen.
Preferably, the blacklist unit includes a marking unit, the marking unit marks and stores a user or a login website which is forbidden to log in the access database, the marked user or the login website is forbidden to log in and access again, the visitor access unit monitors unregistered users, and the user login unit is used for monitoring registered or authenticated users.
Preferably, the database includes a grading unit, the grading unit grades the files in the database, the data in the database is divided into a class i file library and a class ii file library, the file data in the class i file library is available for users who have rights in the guest access unit, the file data in the class ii file library is available for users who have rights in the user login unit, and the class i file library is included in the class ii file library.
Preferably, the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database to the client, the second verification unit is used for verifying labels of data requests sent from the client by the database, and the destruction unit is used for automatically destroying the file data.
Preferably, the client sends a data request signal to the database, the signal is recorded as F, the signal F is firstly transmitted to the firewall, the first verification unit identifies the signal F, then the signal F is quantum-encrypted and then transmitted to the database, the quantum key encryption module simultaneously distributes visa to the file in the database, the visa can decrypt the encryption algorithm in the signal F, if the encryption algorithm in the signal F is countedIf the verification signature in the database is successfully decrypted, indicating that the request conveying process is normal, outputting a signal for requesting to be normal and passing, and marking the signal as H a Signal H a Sending a file delivery instruction to a database, downloading or caching a requested file in the database in advance into a file package, recording the file package as S, and if the encryption algorithm in the signal F is not successfully decrypted by the verification in the database, indicating that the delivery requesting process is abnormal, outputting a signal for requesting abnormality and termination, recording as H w Signal H w The file delivery instruction sent to the database will be interrupted.
Preferably, the signal H a When the command sent to the database is normal, the second verification unit receives the command, sends a quantum certificate to the file package S for encryption, and sends a corresponding verification sign to the client, the verification sign can decrypt and verify the quantum certificate, the encrypted file package S is sent to the client, and meanwhile, a verification request command Q is sent to the client, after the client receives the command Q, the verification sign distributed by the second verification unit can run simultaneously, if decryption is successful, the data cached in the file package S can be opened, if decryption is unsuccessful, a pairing unsuccessful signal can be output, the signal is recorded as M, and the signal M can send the command to the destruction unit.
Preferably, the monitoring module is a third party monitoring program independent of file delivery, and is used for monitoring and protecting safety of the database and the client in the data transmission process when the quantum key encryption module is added and held, when the monitoring module detects that the data of the client is downloaded, tampered or leaked, the data content of the client is closed, the file delivery is interrupted, the monitoring module comprises a warning unit, the warning unit sends a warning signal to be marked as Y and sends the warning signal to a background operation and maintenance personnel, and meanwhile, the authority of an access user is limited and monitored.
Preferably, the monitoring module includes an interception unit and a security protection unit, the interception unit is used for blocking attack of external programs or invasion of viruses, when the interception unit identifies programs not belonging to the local operation, an attacked warning signal is sent out, recorded as P, and sent to an operation and maintenance personnel, meanwhile, the warning signal P can send an instruction to the quantum key encryption module, interrupt files or access requests in transmission, and destroy the files in transmission.
The invention has the technical effects and advantages that: the firewall comprises a quantum key encryption module and a monitoring module, encryption transportation in a bidirectional transportation process between a file in a database and a client is realized, a data transmission process of the database and the client under the quantum key encryption module is realized through a third party monitoring program independent of the file transportation, a layer of protection wall is added, the integrity and confidentiality of data transmission are enhanced, when the client is marked and positioned, the client is convenient to leak data, the leaked client is quickly controlled and limited, fault leakage information is marked and stored through the monitoring module, the observation of operation and maintenance personnel is facilitated, and the maintenance of operation and maintenance personnel is assisted.
Drawings
Fig. 1 is a block diagram of a firewall application structure of enterprise management software according to the present invention.
Detailed Description
The invention will be described in further detail with reference to the drawings and the detailed description. The embodiments of the invention have been presented for purposes of illustration and description, and are not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Example 1
Referring to fig. 1, in this embodiment, a firewall application structure of enterprise management software is provided, and a quantum key encryption module and a monitoring module in a firewall are designed to dynamically encrypt a file transmission process, so that the problem that confidential file transmission is leaked by an attack or a user is leaked in enterprise management is solved, and the authenticity and the confidentiality of the file transmitted in a database are ensured, including a client, an intelligent networking module, the firewall and the database.
The client comprises a plurality of login devices, and the login devices comprise computers or intelligent mobile terminals. Each login device is connected with an intelligent network connection system, the intelligent network connection module belongs to a regional network, the login device can carry out data transmission with a database only when the intelligent network connection module is connected or within the range of the regional network, the client comprises a marking unit, the marking unit is used for marking a GPS (global positioning system) locator on each login device, and the marked GPS locator on the login device is marked as T i I=1, 2, 3 … …, the numbered GPS locator on the first login device is denoted T 1 The GPS locator marked on the second login device is marked as T 2 … …, and so on, and the GPS locator labels marked on each login device are different. The real-time position displayed by the GPS locator can be displayed on background monitoring equipment for operation and maintenance personnel to observe.
The client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through the operation display screen, the intelligent network system comprises a router or a 5G network, the client is connected with the intelligent network system, the operation display screen is used for displaying data transmission in a database and can be used for a login person to receive files in the database through the operation display screen, the blacklist unit comprises a marking unit, the marking unit is used for marking and storing a user or login website which is forbidden to login the database, when the marked user or login website logs in again, access is forbidden, when a monitoring module in a firewall detects that the data transmitted to the client by the database is downloaded, tampered or leaked, the user or web site receiving the information can be marked and the web content is closed, the files which are being transmitted in the database are interrupted, or the files which are already transmitted are locked, so that confidential files are prevented from being leaked, a warning unit in the monitoring unit can generate a red warning sign through operating a display screen and can transmit a warning signal to a background operation and maintenance personnel, the warning signal is recorded as Y, the warning signal Y comprises the time logged in by the marked user, the web site is logged in, the files which are downloaded and transmitted and the files which are leaked or tampered, a record sheet is formed and is sent to the background operation and maintenance personnel, the operation and maintenance personnel is helped to carry out follow-up investigation and file restoration, a visitor access unit monitors unregistered users, the database comprises a grading unit, the grading unit can grade the files in the database, the method comprises the steps that authority grading is carried out on data in a database according to a visitor access unit and a user login unit, namely, the data in the database is divided into a level I file library and a level II file library, file data in the level I file library can be used for browsing unregistered users in the visitor access unit, the visitor access unit can monitor the browsed contents of the unregistered users, meanwhile, limits the authority of the unregistered users on file operation, the limits comprise content browsing only without downloading or forwarding and the like, when the users in the visitor access unit operate outside the authority range, a red warning sign appears in a warning unit in the monitoring unit through an operation display screen, warning is carried out on the users, or when the conditions are serious and meet the conditions in the blacklist unit, a marking unit in the blacklist unit marks the users, the file data in the level II file library is used for monitoring the registered users or authenticated users, the level I file library is contained in the level II file library, and the level I file library comprises all the data of the level I file library and all accounts are opened.
The firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database by the client, the second verification unit is used for verifying labels of data requests sent by the client by the database, when the client sends browsing requests to the database, a data request signal is sent, the signal is recorded as F, and the signal F is conveyed firstlyThe first verification unit in the quantum key encryption module recognizes the signal F, namely, determines whether the I-level file library or the II-level file library in the database is opened according to the user data access right carried in the signal F, the first verification unit in the quantum key encryption module recognizes the signal F, then carries out quantum encryption on the signal F, the encrypted signal F is transmitted to the database, the first verification unit in the quantum key encryption module encrypts the signal F and simultaneously distributes visa for the I-level file library or the II-level file library in the database at the corresponding level, the visa can decrypt the encryption algorithm in the signal F, and if the encryption algorithm in the signal F is successfully decrypted by the verification in the database, which indicates that the transmission process is required to be normal, then outputs a signal which is required to be normal and passed, and the signal is marked as H a Signal H a A file delivery instruction is sent to a database, a requested file in the database is downloaded in advance or cached into a file package, the file package is recorded as S, if the encryption algorithm in a signal F is not successfully decrypted by the verification in the database, which means that the delivery requesting process is abnormal, a signal for requesting abnormality and ending is output and recorded as H w Signal H w The file delivery instruction sent to the database is interrupted, and meanwhile, a verification error signal is also sent to the client to prompt the client to re-input and send a request, the number of times of re-verification is set to be three, and if the number of times exceeds three and is unsuccessful, the input window of the client is locked through the operation display screen, and the input of the file is terminated.
If signal H a The second verification unit in the quantum key encryption module can issue a quantum certificate to the file package S to encrypt the file package S, and can send a corresponding signature verification to the client, wherein the signature verification can decrypt and verify the quantum certificate, and the transmission process is as follows: the database receives signal H a After the sent file delivery instruction, the requested file in the database is cached into a file package S in advance, a second verification unit in the quantum key encryption module issues a quantum certificate to the file package S, encrypts the file package S, and encryptsThe method comprises the steps that a file package S is sent to a client, a verification request instruction Q is sent to the client, after the client receives the instruction Q, a verification tag distributed by a second verification unit operates simultaneously, the verification tag decrypts and pairs encryption programs carried on the file package S, if decryption is successful, data cached in the file package S are displayed on an operation display screen of the client for browsing, if decryption is unsuccessful, a pairing unsuccessful signal is output, the signal is recorded as M, the signal M gives an instruction to a destruction unit, and after the destruction unit receives the instruction, the data carried in the file package S are automatically destroyed through the destruction program of the destruction unit, so that confidential file data leakage is prevented.
The monitoring module is a third party monitoring program independent of file delivery and used for monitoring and protecting the database and the client in the data transmission process under the control of the quantum key encryption module, and comprises an interception unit and a safety protection unit, wherein the interception unit is used for identifying the external program when being attacked by the external program or invaded by viruses in the file transmission process, when the interception unit identifies the program which does not belong to the running of the client, one surface of the interception unit can send out an attacked warning signal which is recorded as P, the signal P can contain the attacked time, the GPS locator mark of login equipment in the attacked client and the attacked strength, and the signal P is sent to an operation staff, the other surface can intercept the external invaded program and kill the external invaded program through the self-carried disinfection program, and then the warning signal P can send an instruction to the quantum key encryption module, and after the quantum key encryption module receives the instruction, the file or the access request in transmission can be interrupted, and the file in transmission can be destroyed.
In summary, the encryption and transportation of confidential files in enterprise management are realized, and file leakage is prevented, so that enterprise loss is caused.
It will be apparent that the described embodiments are only some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art and which are included in the embodiments of the present invention without the inventive step, are intended to be within the scope of the present invention. Structures, devices and methods of operation not specifically described and illustrated herein, unless otherwise indicated and limited, are implemented according to conventional means in the art.

Claims (3)

1. A firewall application structure of enterprise management software, the firewall application structure of enterprise management software comprising: the system comprises a client, an intelligent networking module, a firewall and a database;
the client is connected with the intelligent network system and is used for sending an access request to the file library by a user and browsing the files transmitted from the file library;
the intelligent network connection module belongs to a regional network, and the client can only carry out data transmission with the database when being connected with the intelligent network connection module or within the range of the regional network;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database in the process of transmitting the files to a client; the monitoring module is independent of a third party monitoring program except file delivery and is used for monitoring and protecting safety of the database and the client in the data transmission process under the condition that the quantum key encryption module is added;
the database comprises all data which need to be accessed in enterprise management and is used for conveying files to the client;
the client comprises a plurality of login devices, each login device comprises a computer or an intelligent mobile terminal, each login device is connected with an intelligent network system, the client comprises a marking unit, the marking unit is used for marking a GPS (global positioning system) locator on each login device, the marked GPS locators on the login devices are marked as Ti, i=1, 2 and 3 … …, and the marked GPS locators on each login device are different in marks;
the client comprises an operation display screen, the client comprises a blacklist unit, a tourist access unit and a user login unit, the blacklist unit, the tourist access unit and the user login unit are all displayed through interfaces of the operation display screen, the intelligent network system comprises a router or a 5G network, the client is connected with the intelligent network system, the operation display screen is used for displaying data transmission in a database, and login personnel can receive files in the database through the operation display screen;
the blacklist unit comprises a marking unit, the marking unit is used for marking and storing a user or a login website which is forbidden to log in the access database, the marked user or the login website is forbidden to log in and access again, the visitor access unit is used for monitoring unregistered users, and the user login unit is used for monitoring registered or real-name authenticated users;
the database comprises a grading unit, wherein the grading unit grades files in the database, the data in the database is divided into a class I file library and a class II file library, the file data in the class I file library can be used by users with rights in a visitor access unit, the file data in the class II file library can be used by users with rights in a user login unit, and the class I file library is contained in the class II file library;
the firewall comprises a quantum key encryption module and a monitoring module, wherein the quantum key encryption module is used for encrypting and conveying files in a database to a client in the process of conveying the files to the client, the quantum key encryption module comprises a first verification unit, a second verification unit and a destruction unit, the first verification unit is used for verifying labels of the files conveyed from the database by the client, the second verification unit is used for verifying labels of data requests sent by the client by the database, and the destruction unit is used for automatically destroying file data;
the client sends a data request signal to the database, the data request signal is recorded as F, the signal F is firstly transmitted to the firewall, the first verification unit identifies the signal F, then the signal F is transmitted to the database after quantum encryption, the quantum key encryption module distributes visa to files in the database at the same time, the visa can decrypt the encryption algorithm in the signal F, if the encryption algorithm in the signal F is successfully decrypted by the verification in the database, the normal request transmission process is indicated, the normal request and passing signal is outputIs denoted as H a Signal H a Sending a file delivery instruction to a database, downloading or caching a requested file in the database in advance into a file package, recording the file package as S, and if the encryption algorithm in the signal F is not successfully decrypted by the verification in the database, indicating that the delivery requesting process is abnormal, outputting a signal for requesting abnormality and termination, recording as H w Signal H w Interrupting the file delivery instruction sent to the database;
the signal H a When the command sent to the database is normal, the second verification unit receives the command, sends a quantum certificate to the file package S for encryption, and sends a corresponding verification sign to the client, the verification sign can decrypt and verify the quantum certificate, the encrypted file package S is sent to the client, and meanwhile, a verification request command Q is sent to the client, after the client receives the command Q, the verification sign distributed by the second verification unit can run simultaneously, if decryption is successful, the data cached in the file package S can be opened, if decryption is unsuccessful, a pairing unsuccessful signal can be output, the signal is recorded as M, and the signal M can send the command to the destruction unit.
2. The firewall application structure of enterprise management software according to claim 1, wherein the monitoring module is a third party monitoring program independent of file delivery, and is used for monitoring and protecting safety of the database and the client in the process of data transmission under the action of the quantum key encryption module, and when the monitoring module detects that the data of the client is downloaded, tampered or leaked, the monitoring module closes the data content of the client and interrupts file delivery, and the monitoring module comprises a warning unit, and the warning unit sends a warning signal to be marked as Y and sends the warning signal to a background operation and maintenance personnel, and limits and monitors the authority of an access user.
3. The firewall application structure of enterprise management software according to claim 2, wherein the monitoring module comprises an interception unit and a security protection unit, the interception unit is used for intercepting an attack of an external program or an invasion of virus, when the interception unit recognizes a program which does not belong to a local running, an attacked warning signal is sent out and recorded as P, and sent to an operation staff, and meanwhile, the warning signal P sends an instruction to the quantum key encryption module to interrupt a file or an access request in transmission and destroy the file in transmission.
CN202310023462.4A 2023-01-09 2023-01-09 Firewall application structure of enterprise management software Active CN116232577B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310023462.4A CN116232577B (en) 2023-01-09 2023-01-09 Firewall application structure of enterprise management software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310023462.4A CN116232577B (en) 2023-01-09 2023-01-09 Firewall application structure of enterprise management software

Publications (2)

Publication Number Publication Date
CN116232577A CN116232577A (en) 2023-06-06
CN116232577B true CN116232577B (en) 2024-03-08

Family

ID=86586560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310023462.4A Active CN116232577B (en) 2023-01-09 2023-01-09 Firewall application structure of enterprise management software

Country Status (1)

Country Link
CN (1) CN116232577B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789029A (en) * 2017-01-04 2017-05-31 浙江神州量子网络科技有限公司 A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine
CN107563221A (en) * 2017-09-04 2018-01-09 安徽爱她有果电子商务有限公司 A kind of certification decoding security management system for encrypting database
CN111711640A (en) * 2020-06-30 2020-09-25 郑州工业应用技术学院 Safe computer network communication system
CN112532705A (en) * 2020-11-20 2021-03-19 季速漫 Smart city service system based on big data
CN114297684A (en) * 2021-12-29 2022-04-08 广州睿冠信息科技有限公司 Engineering document safety management system
CN114374689A (en) * 2022-01-14 2022-04-19 太宙(上海)网络科技有限公司 Integrated network management system for local area networks
CN115221538A (en) * 2022-06-24 2022-10-21 西安宝博企业管理服务有限公司 Encryption method and system suitable for financial data
CN115348068A (en) * 2022-08-09 2022-11-15 梁潇静 Computer network information safety control system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2017201850B2 (en) * 2016-03-21 2020-10-29 Vireshwar K. ADHAR Method and system for digital privacy management

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789029A (en) * 2017-01-04 2017-05-31 浙江神州量子网络科技有限公司 A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine
CN107563221A (en) * 2017-09-04 2018-01-09 安徽爱她有果电子商务有限公司 A kind of certification decoding security management system for encrypting database
CN111711640A (en) * 2020-06-30 2020-09-25 郑州工业应用技术学院 Safe computer network communication system
CN112532705A (en) * 2020-11-20 2021-03-19 季速漫 Smart city service system based on big data
CN114297684A (en) * 2021-12-29 2022-04-08 广州睿冠信息科技有限公司 Engineering document safety management system
CN114374689A (en) * 2022-01-14 2022-04-19 太宙(上海)网络科技有限公司 Integrated network management system for local area networks
CN115221538A (en) * 2022-06-24 2022-10-21 西安宝博企业管理服务有限公司 Encryption method and system suitable for financial data
CN115348068A (en) * 2022-08-09 2022-11-15 梁潇静 Computer network information safety control system

Also Published As

Publication number Publication date
CN116232577A (en) 2023-06-06

Similar Documents

Publication Publication Date Title
CN109561047B (en) Encrypted data storage system and method based on key remote storage
Kesh et al. A framework for analyzing e‐commerce security
US7885413B2 (en) Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
CN103001976A (en) Safe network information transmission method
US20020046350A1 (en) Method and system for establishing an audit trail to protect objects distributed over a network
US20110173443A1 (en) Secure extranet server
CN101695038A (en) Method and device for detecting SSL enciphered data safety
US8583943B2 (en) Method and system for providing data field encryption and storage
US20030237005A1 (en) Method and system for protecting digital objects distributed over a network by electronic mail
CN106789029A (en) A kind of auditing system and auditing method and quantum fort machine system based on quantum fort machine
US8401183B2 (en) Method and system for keying and securely storing data
CN117081815A (en) Method, device, computer equipment and storage medium for data security transmission
CN116743470A (en) Service data encryption processing method and device
CN112989320B (en) User state management system and method for password equipment
CN116232577B (en) Firewall application structure of enterprise management software
JPH11161321A (en) Plant monitor device
JP3877388B2 (en) Information provision system
CN108270601B (en) Mobile terminal, alarm information acquisition method and device and alarm information sending method and device
Han et al. Scalable and secure virtualization of HSM with ScaleTrust
CN107230081A (en) A kind of secure payment encryption system
CN115883211B (en) File transfer system oriented to enterprise data security
CN112305986B (en) PLC protection system, method and medium based on verification separation
CN117786734B (en) Method, device and storage medium for preventing personal sensitive information of examinee from leakage
Kumar et al. Analysis of Network Security Issue and Its Attack and Defence
Pangalos Development of an Internet Security Policy for health care establishments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240126

Address after: Chinatelecom tower, No. 19, Chaoyangmen North Street, Dongcheng District, Beijing 100010

Applicant after: Tianyi Safety Technology Co.,Ltd.

Country or region after: China

Address before: 404, No. 44, Yuexiu Garden, Binhu District, Wuxi, Jiangsu Province, 214000

Applicant before: Jiangsu Hengde Network Technology Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant