Information security management method
A management method and information security technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve problems such as database system crash, neglect of information data security, information leakage, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples cited are only used to explain the present invention, and are not used to limit the scope of the present invention.
[0015] Such as figure 1 As shown, an information security management method includes the following steps:
[0016] Step 1: Identity verification of the user platform;
[0017] Step 2. Transcoding and encryption of database information;
[0018] Step 3. Iris confirmation on the user platform;
[0019] Step 4. Dynamic log filing and prompting of database information access.
[0020] The feature of step 1 is that the user logs in to the security management system homepage through the account, and the system analyzes and judges the user level. The content opened on the homepage is the system operation platform corresponding to the user level, which effectively hides the database information. .
[0021] The feature of step 2 is that the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com