CN112257007B - Enterprise financial information management system - Google Patents
Enterprise financial information management system Download PDFInfo
- Publication number
- CN112257007B CN112257007B CN202011506217.1A CN202011506217A CN112257007B CN 112257007 B CN112257007 B CN 112257007B CN 202011506217 A CN202011506217 A CN 202011506217A CN 112257007 B CN112257007 B CN 112257007B
- Authority
- CN
- China
- Prior art keywords
- module
- enterprise
- login
- account
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013519 translation Methods 0.000 claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 16
- 230000002265 prevention Effects 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims description 24
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 claims description 21
- 230000000903 blocking effect Effects 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 9
- 238000003709 image segmentation Methods 0.000 claims description 6
- 210000001503 joint Anatomy 0.000 claims description 6
- 238000003860 storage Methods 0.000 claims description 5
- 238000005336 cracking Methods 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 2
- 238000011161 development Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 12
- 238000004364 calculation method Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 241000700605 Viruses Species 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000005856 abnormality Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 231100000572 poisoning Toxicity 0.000 description 1
- 230000000607 poisoning effect Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
- G06Q40/125—Finance or payroll
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Bioethics (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Technology Law (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses an enterprise financial information management system which comprises a host used for translation, a login module, a prevention module, an alarm module and a safety module, wherein the host, the login module, the prevention module, the alarm module and the safety module are all connected with an enterprise server, when the host logs in the system, a user account and a login timestamp are obtained, a watermark is generated according to the account and the timestamp, if the host verification and the login account and the password of the translation are not accordant with a preset value, the host cannot enter the enterprise server, and the login information can be traced according to the watermark, so that an enterprise obtains a benign development environment.
Description
Technical Field
The invention belongs to the technical field of enterprise security, and particularly relates to an enterprise financial information management system.
Background
The management of the enterprise financial management information mostly adopts a traditional password mode, the method cannot confirm the identity of the user, the user has many scenes to use the password at present, and the user is easy to forget if different passwords are used respectively; if the unified password is used, people can easily log in the system in a database-collision attack mode, more and more enterprise financial management information security systems adopt biological authentication to carry out login identity authentication independently or simultaneously, and the biological authentication is also called biological identification and carries out personal identity authentication by utilizing inherent physiological characteristics or behavior characteristics of a human body through a computer.
However, biometric authentication usually uses a single biometric feature, and even if a plurality of biometric features are used, an attacker can still take a means of breaking one by one, such as a voice recording attack voice print recognition system, a video recording attack face recognition system, and the like. In recent years, enterprise system information security accidents of various industrial industries are frequent, the occurrence of the accidents shows that the enterprise systems become the attack targets of illegal organizations and hackers, and the security protection for the enterprise systems is urgent.
Chinese patent document CN105975826A discloses an enterprise financial information management system, which includes a registration module, a human-machine operation module, an identity authentication module, a central processing unit, a data processing module, an enterprise financial management information database, a virus feature database, a timing inspection module, a virus feature matching module, a system abnormality evaluation module, a data isolation uploading module, and a data analysis module.
Chinese patent document CN107451478A discloses an enterprise financial information management system, which includes a registration module, a vulnerability detection module, and a virus prevention module, and improves the security of system information by performing real-time vulnerability detection, virus prevention, poisoning, and isolation on the system.
Chinese patent document CN108881289A discloses an enterprise financial management information security system, which includes a human-machine operation module, a basic network security management module, a system security management module, a data security management module, and an exception alarm module, and comprehensively guarantees the security of enterprise financial management information.
Chinese patent document CN109598113A discloses a financial management cost control system, which includes a central processing unit, a cost budget module, a fingerprint collection module, a power module, a login unit, a comparison module, a first feedback module, a cost distribution analysis module, a second feedback module, an early warning unit, a display unit, an input module, an expert analysis module, a cost input unit, and a data security management module.
In these existing security systems, both local security processing and bidirectional processing by connecting servers are performed, and no security system combining end clouds has been found yet.
On the other hand, when logging in the system, the user usually inputs numbers, letters, characters and the like through a logging module, however, a hacker can easily log in the system by hitting a library or trojan horse. The biometric technology can be cracked through technical means such as sound recording or video recording, however, if the translation is carried out through an AI algorithm, the translation is verified through voice input after the translation, and the verification is not allowed to log in, the biometric technology cannot be used for hackers and other interlopers. On the other hand, the problem of information leakage is easily caused after the login of the login user, however, in the prior art, a technical scheme capable of tracing the login is rarely provided.
Disclosure of Invention
The invention aims to provide an enterprise financial information management system, which ensures the safety of information without loss through voice input verification of AI translation, password input and combination of biological identification multipoint cloud, and further avoids information leakage events by adopting watermarks for tracing.
In order to achieve the purpose, the invention provides the following technical scheme:
according to one aspect of the invention, the invention provides a central processing system for enterprise financial information management, the central processing system comprises a login module, a blocking module, an alarm module and a security module, the login module, the blocking module, the alarm module and the security module are all connected with an enterprise server, the enterprise server comprises an enterprise account and an enterprise database, wherein,
the login module comprises a network login unit, a login account and a password are input, the login account is compared with the password and a preset value, if the login account is in accordance with the preset value, the login account enters the enterprise server, and if the login account is not in accordance with the password and the preset value, the login account cannot enter the enterprise server;
the login unit further comprises a timestamp generation module and a watermark generation module, and when the information security system is logged in, the timestamp for logging in the information security system is obtained, the watermark is generated according to the timestamp, and the watermark is encrypted.
According to the central processing system, the login unit further comprises a theme acquisition module, an image segmentation module and a theme combination module, wherein the theme acquisition module is used for acquiring the desktop theme of the information security system, the size of the theme is matched with the size of the watermark, the image segmentation module segments the theme and the watermark into the same number respectively to form a one-to-one correspondence relationship, and the theme combination module embeds the watermarks into the theme one by one and combines the watermarks into the desktop theme of the information security system.
The central processing system is characterized in that the login module further comprises an identification unit, the identification unit is connected with an external security device of an enterprise, the security device comprises face scanning and fingerprint inputting, the employee or visitor is distinguished when the enterprise needs to scan the fingerprint and the face when entering the enterprise, the identification unit is connected with the offline locking unit, and if the blacklist user appears, the alarm is given out.
According to another aspect of the invention, the invention provides an enterprise financial information management system, which comprises the central processing system, and further comprises a host for translation, wherein the host for translation and the central processing system are connected with each other, the host for translation comprises a computing chip, a communication module, a microphone, a loudspeaker, a battery, a camera and a display panel, and the host for translation is used as a verification unit to verify whether the read voiceprint translation information of the login user is correct.
According to the enterprise financial information management system, the blocking module comprises a network locking unit and an offline locking unit, wherein the network locking unit comprises a risk server and a login address which are recorded into a blacklist, and a permanent forbidding access to an enterprise website is set;
the offline locking unit inputs face features and fingerprint information of blacklist personnel, and sets up a prohibition for offline entering an enterprise, and the entering enterprise can start to give an alarm.
According to the enterprise financial information management system, the alarm module comprises a buzzer and a website locking unit;
the buzzer is arranged in an enterprise and is connected with the identification unit and the offline locking unit, and an alarm can be given out when the buzzer receives a signal;
and a website locking unit for locking a login place where the user illegally accesses the enterprise website or is prohibited from accessing the website, and determining the position information of the user.
According to the enterprise financial information management system, the safety module comprises a data protection unit and an account information protection unit, the safety locking module is in butt joint with a database of an enterprise server, a manager password is required to log in account information when logging in the database, the protection unit is in butt joint with account information of an enterprise website, the manager password is required to log in when checking the running water of the enterprise account and is connected with the alarm module, if the enterprise account needs to log in the enterprise server, a mark for illegally cracking the Trojan is carried, an alarm is triggered, a log-in place is rapidly locked, access is prohibited for the enterprise account, and position information of the enterprise account is determined through the website locking unit.
According to the above-mentioned enterprise financial information management system, characterized in that: the alarm module also comprises a network map, wherein the network map covers province level, urban district and county, and is transmitted and displayed on a display panel connected with the host for translation through the network.
According to the enterprise financial information management system, the security module further comprises a risk identification unit;
the risk identification unit is connected with a safety system terminal through the Internet, the safety system terminal comprises Trojan horse clearing, Trojan horse checking and killing and Trojan horse interception, the risk identification unit identifies attacks from a remote network before a risk accident occurs and analyzes threats of the risk accident, and the enterprise server is also connected with a background cloud database;
the security module grades the Trojan, and when the Trojan which causes damage to the system at the highest grade is attacked, the enterprise server counts and transfers the enterprise account information and the enterprise database information to the platform cloud database.
According to the enterprise financial information management system, the security module automatically generates the attack logs after being attacked, the attack logs are stored in the storage unit of the enterprise server, the attack logs are automatically taken to be compared when being attacked by Trojan horse again, if the attack logs are the same, a solution is immediately generated, and if the attack logs are different, the solution is re-formulated.
According to the enterprise financial information management system, the operation safety of the enterprise server is effectively improved through multiple protection of the blocking module, the alarm module and the safety module, the damage to production and operation of the enterprise is reduced, the damage to the enterprise caused by external network attack is avoided, the enterprise obtains a benign development environment, the whole system is convenient to use, the safety and reliability are high, the effect of on-line and off-line synchronous protection is achieved, and the enterprise financial information management system can be widely popularized.
According to the enterprise financial information management system, verification, password input and biological identification multipoint cloud combination are performed through voice input of AI translation, so that the information security system is prevented from being attacked by illegal invasion.
According to the enterprise financial information management system, the watermarks are used for tracing, once a user takes a picture or captures an image of information in the information security system, the identity can be logged in correspondingly according to the information carried by the extracted watermarks, a deterrent effect is achieved on a logger, and an information leakage event can be further avoided.
Drawings
FIG. 1 is a schematic diagram of an enterprise financial information management system according to an embodiment of the present invention;
FIG. 2 is a block diagram of a security module of an enterprise financial information management system according to an embodiment of the present invention;
FIG. 3 is a block diagram of an alarm module of an enterprise financial information management system according to an embodiment of the present invention;
FIG. 4 is a block diagram of a blocking module of an enterprise financial information management system in accordance with an embodiment of the present invention;
FIG. 5 is a block diagram of a login module of the enterprise financial information management system according to an embodiment of the present invention.
Fig. 6 is a block diagram of a login unit of the enterprise financial information management system according to an embodiment of the present invention.
In the figure: the system comprises a host computer 1 for translation, a login module 2, a block module 3, an alarm module 4 and a security module 5.
Detailed Description
While the present invention will be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown and described, it is to be understood by those skilled in the art that the foregoing description is by way of illustration and not of limitation.
Fig. 1 is a schematic structural diagram of an enterprise financial information management system according to an embodiment.
As shown in fig. 1, the enterprise financial information management system includes a host 1 for translation, and a central processing system, where the host 1 for translation and the central processing system are connected to each other, where the host 1 for translation includes a computing chip, a communication module, a microphone, a speaker, a battery, a camera, and a display panel; the central processing system comprises a login module 2, a prevention module 3, an alarm module 4 and a safety module 5, wherein the login module 2, the prevention module 3, the alarm module 4 and the safety module 5 are all connected with an enterprise server, and the enterprise server comprises an enterprise account and an enterprise database. The host 1 for translation functions as an authentication unit for authenticating whether the read registrant translation information is correct. The login module 2, the blocking module 3, the alarm module 4 and the security module 5 are all connected with an enterprise server, and the enterprise server comprises an enterprise account and an enterprise database. A calculation chip, communication module, microphone, loudspeaker, battery, camera and display panel for host computer 1 of translation realize the electricity and connect, the camera is used for the image and the login image information of the foreign language of ingesting the input, the calculation chip is used for calculating and handling the information that the camera was ingested carries out calculation translation processing, the microphone is used for the input pronunciation to verify information, and passes through the calculation chip is compared, through this calculation chip feedback output comparison result to judge whether the verification passes. The computing chip comprises image shooting software, image processing software, audio processing software, communication signal processing software, a signal transceiving system and a storage system. The communication module comprises a modem, a coder-decoder, a signal transceiver and a memory. The system administrator opens the enterprise financial management information security system, writes foreign language to be translated sentences such as 'Guten tag', 'are you' or other recognizable foreign language contents of the computing chip with pen and paper, the camera captures the foreign language image, the paper is delivered to a security responsible person for storage and filing and is changed regularly, the computing chip carries out image recognition on the foreign language image, the recognized image is converted into a text format, the text is sent to a communication module for modulation and demodulation, the modulated and demodulated text information is sent to the cloud end through a signal transceiver, the corresponding language is judged, the target language is translated into Chinese 'you' or 'you' and 'Do' through a target language translation engine, the target language is displayed on a display panel, and when 'you' or 'Do' is input by voice, the verification is passed, starting a password input interface of the central processing system and starting the biological identification equipment. On the contrary, when the microphone fails to input the voiceprint information to be identified, the security system login interface cannot be accessed if the authentication is not passed. The text contents are only examples, short sentences with more than three words are arranged as much as possible during setting, and the effect of arranging languages such as Japanese, Korean and Arabic which are not met by the public is better. Preferably, statements that do not conform to the Chinese statement convention are arranged. In another preferred embodiment of the present invention, the dual verification of the foreign language content and the translated text further improves the security of the system, i.e. the dual verification is performed by inputting both the foreign language content and the translated text content. In a further preferred embodiment of the present invention, the translation engine is started and then turned on continuously after the administrator registers the translated text. In a further preferred embodiment of the present invention, the translation engine is in a shutdown state after the translation is started and completed.
FIG. 2 is a block diagram of the security modules of the enterprise financial information management system of an embodiment.
As shown in fig. 2, the security module 5 includes a data protection unit and an account information protection unit, the security locking module is in butt joint with a database of the enterprise server, the login of the database requires the login of an administrator password to account information, the protection unit is in butt joint with the account information of the enterprise website, the login of the administrator password required by the enterprise account flow is checked, the security locking module is connected with the alarm module 4, if the security locking module carries a mark for illegally cracking the login of the Trojan horse and triggers an alarm, the login place is quickly locked, the access is prohibited, and the position information of the security locking module is determined through the website locking unit.
In a preferred embodiment of the present invention, the security module 5 further includes a risk identification unit, the risk identification unit is connected to a security system terminal through the internet, the security system terminal includes trojan removal, trojan killing, and trojan interception, the risk identification unit identifies an attack from a remote network before a risk accident occurs, and analyzes a threat of the risk accident, and the enterprise server is further connected to a background cloud database. The security module 5 grades the Trojan horse, and when the Trojan horse which can cause damage to the system at the highest grade attacks, the enterprise server counts and transfers the enterprise account information and the enterprise database information to the cloud database. In this embodiment, the security module 5 automatically generates an attack log after being attacked, the attack log is stored in a storage unit of the enterprise server, the attack log is automatically retrieved for comparison when being attacked by a Trojan horse again, if the attack log is the same as the Trojan horse, a solution is immediately generated, and if the attack log is different from the Trojan horse, the solution is re-formulated.
FIG. 3 is a block diagram of an alarm module of the enterprise financial information management system according to an embodiment.
As shown in fig. 3, the alarm module 4 includes a buzzer and a website locking unit; the buzzer is arranged in an enterprise and is connected with the identification unit and the offline locking unit, and an alarm can be given out when the buzzer receives a signal; and a website locking unit for locking a login place where the user illegally accesses the enterprise website or is prohibited from accessing the website, and determining the position information of the user.
The alarm module 4 also comprises a network map inside, the network map covers province level, urban district and county, and is transmitted and displayed on a display panel connected with the host 1 for translation through a network, and the target position can be quickly found by connecting with the network map. The network can adopt a wired network or a wireless network. The wireless network can share the communication module of the host 1 for connection.
FIG. 4 is a block diagram of a blocking module of the enterprise financial information management system according to an embodiment of the present invention. The blocking module 3 comprises a network locking unit and an offline locking unit, wherein the network locking unit comprises a risk server and a login address which are recorded into a blacklist, and is set to permanently prohibit access to an enterprise website; the offline locking unit inputs face features and fingerprint information of blacklist personnel, and sets up a prohibition for offline entering an enterprise, and the entering enterprise can start to give an alarm. The alarm can be in a mode of audio alarm or in a mode of cloud alarm to inform the program control unit of alarm.
FIG. 5 is a block diagram of a login module of the enterprise financial information management system according to an embodiment of the present invention.
As shown in fig. 5, the login module 2 includes: the network login unit needs to input a login account and a password, the login account and the password are compared with a preset value, if the login account and the password accord with the preset value, the network login unit enters the enterprise server, and if the login account and the password do not accord with the preset value, the network login unit cannot enter the enterprise server; the identification element is connected with the external security equipment of enterprise, and security equipment includes that face scanning and fingerprint are typeeed, and it is staff or visitor to get into the scanning that the enterprise need carry out fingerprint and face and distinguish to the identification element is connected with the off-line locking unit, if the blacklist user then triggers the warning.
For the enterprise financial information management system of the specific embodiment, in actual use, the effect of online and offline synchronous protection is realized, the security of an enterprise is ensured, the system enters the enterprise server through the login module 2, translation text verification and management password verification are required when account running information and a database inside the enterprise server are checked, if the server receives external illegal attacks, all-around protection is implemented through the blocking module 3, the alarm module 4 and the security module 5, and not only online users who lose credits and are blacklisted online cannot enter the enterprise, the protection range of the enterprise is wide, the whole system is convenient to use, and the security and reliability are high.
Fig. 6 is a block diagram of a login unit of the enterprise financial information management system according to an embodiment of the present invention.
In fig. 5, the login module 2 includes a network login unit, which inputs a login account and a password, compares the login account with the password with a preset value, if the login account and the password meet the preset value, the user enters the enterprise server, and if the login account and the password do not meet the preset value, the user cannot enter the enterprise server; in fig. 6, it is shown that the login unit further includes a timestamp generation module and a watermark generation module, and when logging in an information security system, the login unit further includes a topic acquisition module, an image segmentation module and a topic combination module, and the topic acquisition module is configured to acquire a desktop topic of the information security system, the topic size is adapted to the watermark size, the image segmentation module segments the topic and the watermark into the same number respectively to form a one-to-one correspondence relationship, and the topic combination module embeds the watermarks one-to-one into the topic and combines the topics into the desktop topic of the information security system.
In one embodiment of the invention, the login mode of the login interface of the information security system adopts means of password input, biological identification, voiceprint identification, translation verification and the like, when the login interface is logged in any mode, a timestamp of a corresponding account number is obtained on the login terminal through a timestamp generation module, and a corresponding watermark is generated and encrypted according to the login account number and the timestamp, wherein the watermark can be a gray level image or a binary image, and the image is represented as the darkest gray level to the brightest gray level or is represented as the bit value of each pixel. In one embodiment, after the account and the timestamp are obtained, the account and the timestamp of the user are combined into an information table and a corresponding watermark is generated, and then the generated watermark is encrypted through an encryption function. The encryption function may employ a fourier transform function, a hilbert transform function, or the like. When the theme and the watermark are divided, the number of the divided themes and the number of the divided watermarks have a one-to-one relationship, and the sizes of the divided themes and the divided watermarks have an integral multiple size relationship, so that a plurality of the watermarks can be assembled and embedded into the theme.
In summary, the present invention has been described in detail with reference to the specific embodiments, however, it will be apparent to those skilled in the art that modifications can be made to the technical solutions described in the foregoing embodiments or equivalent substitutions for some technical features, and any modifications, equivalent substitutions, improvements and the like made without departing from the spirit and the spirit of the present invention shall fall within the protection scope of the present invention, which is defined by the appended claims.
Claims (6)
1. An enterprise financial information management system, characterized by: the system comprises a host (1) for translation and a central processing system connected with the host (1) for translation, wherein the host (1) for translation comprises a computing chip, a communication module, a microphone, a loudspeaker, a battery, a camera and a display panel, and the host (1) for translation is used as a verification unit to verify whether the read voiceprint translation information of the login user is correct;
when the system is used, a system administrator opens the enterprise financial information management system, a foreign language sentence to be translated is written by a pen and a paper, a foreign language image is shot by the camera, the paper is delivered to a safety responsible person to be stored and filed and is changed regularly, the foreign language image is subjected to image recognition by the computing chip, the recognized image is converted into a text format, the text is sent to the communication module for modulation and demodulation, the modulated and demodulated text information is sent to the cloud end through the signal transceiver, the corresponding language is judged, the target language translation engine is utilized to translate the text into Chinese, and the target text is displayed on the display panel;
when the microphone fails to input the voiceprint information to be identified and the verification fails, the central processing system can not enter a login interface; when the voice input corresponds to the Chinese content, the verification is passed, a password input interface of the central processing system is opened, and the biological recognition equipment is started; and the foreign language sentence to be translated is a language which is not met by the public;
the host (1) for translation is capable of performing double verification of foreign language content and translated text;
the central processing system is used for enterprise financial information management and comprises a login module (2), a prevention module (3), an alarm module (4) and a security module (5), wherein the login module (2), the prevention module (3), the alarm module (4) and the security module (5) are all connected with an enterprise server, and the enterprise server comprises an enterprise account and an enterprise database;
the login module (2) comprises a network login unit, a login account and a password are input, the login account and the password are compared with a preset value, if the login account and the password are in accordance with the preset value, the login account is accessed to the enterprise server, and if the login account and the password are not in accordance with the preset value, the login account is not accessed to the enterprise server; the network login unit comprises a theme acquisition module, an image segmentation module and a theme combination module, wherein the theme acquisition module is used for acquiring a desktop theme of a central processing system, the size of the theme is matched with the size of a watermark, the image segmentation module divides the theme and the watermark into the same number respectively to form a one-to-one correspondence relationship, and the theme combination module embeds the watermarks into the theme one by one and combines the watermarks into the desktop theme of the central processing system; the login module further comprises an identification unit, the identification unit is connected with safety equipment externally connected with an enterprise, the safety equipment comprises face scanning and fingerprint inputting, whether the enterprise needs to scan fingerprints and faces to distinguish the employee or visitor is entered, the identification unit is connected with an offline locking unit of the prevention module (3), and if the blacklist user appears, the alarm is given out;
the network login unit further comprises a timestamp generation module and a watermark generation module, when logging in the central processing system, the timestamp for logging in the central processing system is obtained, the watermark is generated according to the timestamp, and the watermark is encrypted.
2. An enterprise financial information management system according to claim 1 wherein: the blocking module (3) further comprises a network locking unit which comprises a risk server and a login address which are recorded into a blacklist and which establishes a permanent prohibition of access to enterprise websites;
the offline locking unit inputs face features and fingerprint information of blacklist personnel, and sets up a prohibition for offline entering an enterprise, and the entering enterprise can start to give an alarm.
3. An enterprise financial information management system according to claim 1 wherein: the alarm module (4) comprises a buzzer and a website locking unit;
the buzzer is arranged in an enterprise and is connected with the identification unit and the offline locking unit, and an alarm can be given out when the buzzer receives a signal; and a website locking unit for locking a login place where the user illegally accesses the enterprise website or is prohibited from accessing the website, and determining the position information of the user.
4. An enterprise financial information management system according to claim 1 wherein: the safety module (5) comprises a data protection unit and an account information protection unit, the safety module is in butt joint with a database of an enterprise server, a manager password is required to log in account information when logging in the database, the account information protection unit is in butt joint with account information of an enterprise website, the manager password login is required to check the running water of the enterprise account and is connected with the alarm module (4), if the safety module carries a mark for illegally cracking Trojan login and triggers an alarm, the login place is quickly locked, access prohibition work is carried out on the login place, and the position information of the safety module is determined through the website locking unit.
5. An enterprise financial information management system according to claim 1 wherein: the alarm module (4) also comprises a network map, wherein the network map covers province, urban area and county, and is transmitted and displayed on a display panel connected with the host (1) for translation through the network.
6. An enterprise financial information management system according to claim 1 wherein: the security module (5) automatically generates an attack log after being attacked, the attack log is stored in a storage unit of the enterprise server, the attack log is automatically called for comparison when being attacked by the Trojan horse again, if the attack log is attacked by the Trojan horse, a solution is immediately generated, and if the attack log is not attacked by the Trojan horse, the solution is re-formulated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011506217.1A CN112257007B (en) | 2020-12-18 | 2020-12-18 | Enterprise financial information management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011506217.1A CN112257007B (en) | 2020-12-18 | 2020-12-18 | Enterprise financial information management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112257007A CN112257007A (en) | 2021-01-22 |
CN112257007B true CN112257007B (en) | 2021-10-15 |
Family
ID=74225305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011506217.1A Active CN112257007B (en) | 2020-12-18 | 2020-12-18 | Enterprise financial information management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112257007B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113315786B (en) * | 2021-06-25 | 2023-05-26 | 郑州信源信息技术股份有限公司 | Security authentication method and system |
CN113793216A (en) * | 2021-09-02 | 2021-12-14 | 国网河北省电力有限公司石家庄供电分公司 | Big data-based financial data management system and account checking method for power enterprise |
CN114120466B (en) * | 2021-11-22 | 2024-07-16 | 浙江嘉科电子有限公司 | Encoding and decoding device and method for patrol information exchange |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108881289B (en) * | 2018-07-18 | 2020-09-01 | 南阳理工学院 | Enterprise economic management information safety system |
CN109635741A (en) * | 2018-12-13 | 2019-04-16 | 安徽圆舟率创新科技有限公司 | A kind of recognition of face big data management system |
CN109711129A (en) * | 2018-12-15 | 2019-05-03 | 深圳壹账通智能科技有限公司 | Login validation method, device, equipment and storage medium based on Application on Voiceprint Recognition |
CN110489944A (en) * | 2019-07-17 | 2019-11-22 | 招联消费金融有限公司 | Background picture generation method, device and the storage medium of information management system |
-
2020
- 2020-12-18 CN CN202011506217.1A patent/CN112257007B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN112257007A (en) | 2021-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112257007B (en) | Enterprise financial information management system | |
Hauer | Data and information leakage prevention within the scope of information security | |
Jain | Biometric recognition: how do I know who you are? | |
US9961077B2 (en) | System and method for biometric authentication with device attestation | |
CN112671700B (en) | Enterprise economic management information security system | |
Andress | Foundations of information security: a straightforward introduction | |
Matyas Jr et al. | A biometric standard for information management and security | |
WO2008027247A2 (en) | A method and system for authenticating and validating identities based on multi-modal biometric templates and special codes in a substantially anonymous process | |
CN105975826A (en) | Enterprise economic management information security system | |
CN110677415A (en) | Network information safety protection system | |
Singh et al. | The security implications of data subject rights | |
CN204680024U (en) | Computer security based on dynamic human face recognition technology is taken precautions against and early warning system | |
Latha et al. | A study on attacks and security against fingerprint template database | |
CN115017480A (en) | Computer safety protection management and control system based on intelligent control | |
Andronikou et al. | Biometric implementations and the implications for security and privacy | |
Li | Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions: Methods and Solutions | |
Gupta et al. | Machine learning forensics: A New Branch of digital forensics | |
Zibran | Biometric authentication: The security issues | |
Tetteh | A Systematic Performance Review of Security Methods for the Cyberworld | |
CN117336102B (en) | Identity authentication system with multiple verification and authentication method thereof | |
Maheshwari et al. | Ten security practices to a formidable ERP system | |
US12107854B2 (en) | Continuous multifactor authentication system integration with corporate security systems | |
Popoveniuc | Speakup: remote unsupervised voting | |
Liu et al. | A Hybrid Iris Recognition System Model Based on Presentation Attack Detection and Traffic Monitoring Module on AIoT System | |
Bhargav et al. | Exploring Tools For Vulnerability Management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Jiang Shuqing Inventor before: Jiang Shuqing |