Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security management method applied to operation and maintenance auditing system

A management method and data security technology, applied in the field of security management, can solve the problems of insufficient security, low operation and maintenance efficiency, and inability to meet the actual needs of users, so as to reduce duplication of work, protect security, and facilitate user identity authentication. Effect

Inactive Publication Date: 2020-11-10
安徽长泰科技有限公司
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is: how to solve the existing data security management method, the security is not good enough, and the operation and maintenance efficiency is low, which cannot meet the actual use needs of users, which brings certain difficulties to the use of the data security management method. It provides a data security management method applied to the operation and maintenance audit system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security management method applied to operation and maintenance auditing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0024] Such as figure 1 As shown, this embodiment provides a technical solution: a data security management method applied to an operation and maintenance audit system, including the following steps:

[0025] Step 1: Set the audit scope to filter the review information;

[0026] Step 2: The user logs in to the management system for data extraction, and the user account is centralized for centralized management;

[0027] Step 3: Perform identity verification on the account logged in by the user, and data extraction can be performed after the verification is passed;

[0028] Step 4: After the identity authenticati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security management method applied to an operation and maintenance auditing system, which comprises the following steps of: 1, setting an auditing range to filter auditing information; 2, a user logs in the management system for data extraction, and user accounts are centrally managed; 3, identity verification is made on an account logged in by the user, and data isextracted after verification passes; 4, after identity authentication is completed, unified resource authorization is carried out, resources needed by the user are extracted from unified resources, and centralized access control is carried out; 5, the data extracted by the user is audited 6, when the specific server equipment is accessed, an administrator carries out temporary approval and authorization and then carries out operation and maintenance operation; and 7, a planned task is generated and then an architecture is deployed. According to the invention, the security of a user authentication link is improved, operation and maintenance personnel can maintain resources conveniently, repeated work is reduced, and the operation and maintenance efficiency is improved.

Description

technical field [0001] The invention relates to the field of security management, in particular to a data security management method applied to an operation and maintenance audit system. Background technique [0002] Data security management can protect the security of technology and management established and adopted by the data processing system, and protect computer hardware, software and data from being damaged, changed and leaked due to accidental and malicious reasons. Therefore, the security of computer networks can be understood as : By adopting various technical and management measures to make the network system operate normally, thereby ensuring the availability, integrity and confidentiality of network data. Therefore, the purpose of establishing network security protection measures is to ensure that the data transmitted and exchanged through the network will not be added, modified, lost and leaked. [0003] The existing data security management methods are not s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/62G06F21/64
CPCG06F21/31G06F21/6218G06F21/64
Inventor 廉明
Owner 安徽长泰科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products