⎝⎛韦德足球⎞⎠

Tianjin Optoelectronics Group (State-owned 754 Factory)
Tianjin Optoelectronics Anchen Information Technology Co., Ltd.

Focus on information security for 70 years
Stock code: 871339

Service Hotline: 4009999754

Copy Security Management Subsystem

Copy of safety management subsystem

Product Description

Tianjin Optoelectronics Anchen Information Technology Co., Ltd. develops ...

The copy security management subsystem developed by Tianjin Optoelectronics Anchen Information Technology Co., Ltd. centralizes the copier in the copy room for unified management, and realizes the monitoring and management of the entire life process of the submission, approval, output, and recovery of copied documents, forming a complete Copy log records are convenient for statistics and traceability. The system practically implements the security and confidentiality system for the output of documents from technical means to prevent the possibility of leaking the copy output.

The main function

Centralized management: All copiers are centrally managed in the printing room ...

1. Centralized management All photocopiers are centrally managed in the printing room. The system does not allow users to install printers at their office PCs. Users cannot print out documents without passing the card authentication card.
2. User identity authentication comprehensively manages user information. In combination with passwords and identification cards, only legal users in this system can copy documents, and illegal users cannot use copiers to output documents.
3. Real-time monitoring uses driver development technology and multi-thread design technology to monitor copy tasks in real time to prevent unauthorized copying by unauthorized users and unauthorized copying machines.
4. Information encryption Copy information encryption processing, using high security encryption and decryption algorithms (can support the National Secret Bureau password algorithm), high-intensity encryption of copy information to ensure transmission and storage security.
5. Detailed log Save all print records in the database, providing detailed information for the management and traceability of print output behavior. The information includes user name, file name, number of printed pages, number of copies printed, printing time, printer name, approver name, approval time, approval result, etc.

System advantage

High security: The system uses a high security password algorithm ...

1. High-security system adopts high-security password algorithm to protect user information and copy information. It supports the password algorithm approved by the State Password Administration and has a high level of security.
2. The strict protection system uses bottom-level drive design technology and multi-thread design technology, which can effectively prevent users from bypassing the copy monitoring and auditing system to perform copy output by ordinary means. For example, it is impossible to stop the monitoring process through the task manager to protect the system. Complete the monitoring function normally.
3. Separation of authority The approver, security auditor, and system administrator are independent of each other and each has its own responsibility, which effectively prevents potential security risks caused by a single centralized administrator's authority.

Product parameter Spec

Product parameters ...

Honor Rertificate

Award certificate...

    ...

    ...

    真人游戏平台注册 七乐彩 欢乐拼三张 欢乐拼三张