Golden Wisdom Customer Relationship Management Customer profile information security?

Source: Internet
Author: User
Tags md5 encryption backup

1, login password + authentication code certification-Jin-chi software based on ASP.net technology research and development, configured to use Forms authentication, the use of MD5 encryption algorithm to protect the user landing security.

2, data encryption transmission-to achieve sensitive data encryption, such as user password. The user enters the sensitive module to need two times authentication, to the sensitive data encryption and the restriction, may prevent the internal personnel to obtain by the legal method not to obtain the sensitive data.

3, the digital certificate--------Golden intelligence software Configure secure channel (SSL), the client uses HTTPS to access the system. Secure the server identity (using the server certificate) and the identity of the client. The system uses the authenticated user information directly. Where SSL provides a secure channel to protect confidential data that is passed between the client and the server.

4, the mobile phone short message Authentication code authentication--On the basis of password authentication, the system will send a message to tell the user a confirmation password, the user use this password to be able to log in.

5, IP Address security Control-the system records the client sent the requested IP address and physical address, through the IP switch, can effectively prevent hackers through other routes into the Golden Intelligence system.

6, software operations logging-important modules all the operations are recorded in the log, the important data system in the form of recycling bin retention, the system administrator can restore the deleted data.

7, accidental risk control-for important business processes, the system to adopt an emergency approach, encountered unexpected conditions (such as power outages) occurred, so that the business data processing will not be lost.

8, data redundancy backup-system automatic backup data, different servers, such as natural disasters (such as earthquakes), such as force majeure, resulting in computer room hardware failure or damage, other servers can restore user data.

Jin-Wisdom software through the above eight "fortress" to protect the customer data "impregnable" to ensure that customers data storage, data backup, data query, and so no risk, and protect the customer data transmission from any organization and individual interception and crack.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.