Secretarial knowledge > Construction plan

Online office system security solution


With the rapid development of computer technology and communication technology, the wave of informationization has swept the world, and more and more traditional affairs of enterprises, institutions and government agencies have changed to automation and networking. Office automation is based on the concept of workflow, based on the concept of workflow, so that the internal staff of enterprises or governments can share information conveniently and quickly, and work together efficiently; change the complex and inefficient manual office methods in the past to achieve rapid and comprehensive Information collection and information processing provide a scientific basis for the management and decision-making of enterprises or governments. The degree to which an enterprise or government achieves office automation is also a measure of its modern management.

Because of the many contents of corporate or government information, such as accounts, vouchers, purchase sales, capital use, production plans, personnel information, confidential files, customers, etc., all of them are related to the success or failure of the enterprise and the government. In the minds of the general public, if this information is distorted or stolen by insiders, unscrupulous people, hackers and commercial espionage, it may have serious consequences. Therefore, it is especially important to take strong security measures to protect the information security of enterprises or governments.

The information security risks that enterprise information applies are:

Identity authentication: Because illegal users can falsify and impersonate corporate websites, employees, and customers, corporate employees and customers who log in to corporate websites cannot know whether the website they are logged into is a trusted corporate website, and corporate websites cannot verify. Whether the enterprise employees and customers who log in to the website are authenticated and legitimate users, illegal users can take the opportunity to destroy. The traditional authentication method of "username + password" is weak, and the user password is easily stolen and causes loss. Confidentiality of information: Enterprise sensitive information and data transmitted on internal and external networks of the enterprise may be intercepted by illegal users during transmission. Information integrity: Sensitive, confidential information and data may be maliciously altered during transmission. Non-repudiation of information: Once an electronic file such as a company's financial statements, purchase list, purchase and sales contract, production plan, etc. is denied by one party, the other party does not have a signed record as the basis for arbitration. Faced with many hidden dangers of office automation, Beijing x Integrity E-Commerce Services Co., Ltd. has launched a pek-based, easy-to-implement, and complete security oa system solution. Use x-integrity products and services, build customer's ca certification system or provide certificate service for customers, and issue digital certificates for oa system users. oa system users use digital certificates to complete various operations of office automation to ensure the security of user oa system.


As shown in the figure: through the secure oa system solution, the server certificate and user certificate are issued to the end user, which can solve the security requirements of the oa system. When the user logs in to the oa system, the identity of the oa system is verified by the server certificate, and then the user is submitted. Certificate, to log in to the oa system, the system verifies the user certificate to determine the user's true identity, completes the two-way authentication of the user and the server; grants corresponding authorization according to the user's identity, implements access control, and establishes a secure channel; when the user submits office data, the user uses The user certificate digitally signs the data and encrypts it through a secure channel to achieve confidentiality and integrity when transmitting data. In order to solve the needs of mobile office, the user certificate can be saved to the usb key, and the user can use himself anytime and anywhere. The certificate securely logs into the oa system and conducts online office operations.

x Integrity and security oa system solution builds a safe working platform for office automation and accelerates the speed of information construction of various units. By using digital certificates, the security of the oa system can be ensured. The system user and the oa system server use two-way identity authentication to ensure the authenticity of the user and at the same time prove the authenticity and effectiveness of the system server; prevent office data leakage, prevent unauthorized operation, and improve The security of office business and office data meets the needs of users' mobile office, providing reliable guarantee for customer information construction and paperless office promotion.

Scope of application:

Enterprises, government departments, and institutions.

Product and service composition:

Hosting mode: Anzhentong, server certificate, certificate application development interface, usb key; Self-built mode: itrusca system, server certificate, certificate application development interface, usb key Success case:

[1] [2]

recommended article

popular articles