Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security management method

A management method and information security technology, applied in computer security devices, electronic digital data processing, instruments, etc., can solve problems such as database system crash, neglect of information data security, information leakage, etc.

Inactive Publication Date: 2014-04-02
柳州市欧博科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while technicians pay attention to the classified management and utilization of data, they ignore the security of information data. Most of the security management measures are to set up identity authentication windows on the information platform to control user access.
In this way, due to the singleness of security measures and the fixedness of designated user access, it is easy to cause the collapse of the entire database system and the leakage of information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The principles and features of the present invention will be described below with reference to the accompanying drawings. The examples cited are only used to explain the present invention, and are not used to limit the scope of the present invention.

[0015] Such as figure 1 As shown, an information security management method includes the following steps:

[0016] Step 1: Identity verification of the user platform;

[0017] Step 2. Transcoding and encryption of database information;

[0018] Step 3. Iris confirmation on the user platform;

[0019] Step 4. Dynamic log filing and prompting of database information access.

[0020] The feature of step 1 is that the user logs in to the security management system homepage through the account, and the system analyzes and judges the user level. The content opened on the homepage is the system operation platform corresponding to the user level, which effectively hides the database information. .

[0021] The feature of step 2 is that the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information security management method. The information security management method comprises the following steps of (1) authentication of a user platform, (2) transcoding and encryption of information of a database, (3) iris confirmation of the user platform, and (4) log filing and prompting on information storage and retrieval dynamic states of the database. By using the information security management method, the problem that information management is not safe in the prior art is solved.

Description

Technical field [0001] The invention relates to an information safety management method. Background technique [0002] With the rapid development of digital information technology, computers play different important roles in people's lives and work. People are increasingly inseparable from computers and digital information technology. However, things have two sides. While it brings us quick and convenient life and work, it also brings us many security risks. The user's privacy may be stolen due to system flaws or malicious attacks, or unauthorized use of the database by the head of the household. [0003] At present, as far as the current information management technology is concerned, information management is gradually using databases and big data as the endorsements, and the big data is managed in a library unit by classifying and managing the types of information, which is not only clear and clear. , It also reduces the complexity of information. However, while the technicia...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6218
Inventor 张增芳张媛张竞
Owner 柳州市欧博科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products