Safety principle enterprise instant messaging system

With the rapid development of Internet, network information security is becoming a potentially huge problem, serious security incidents affecting the normal operation of enterprises, thus requiring multi-dimensional, three-dimensional information security on the system architecture design.
Need to address the main server to store information security, end the use of mobile communications security between security, client and server side of these three areas
1, server information storage security: messages stored records related to the company's confidential information, the system uses the first all you need is able to support the deployment of privatization, followed by the message of each session should be independently stored encrypted, even if the server is compromised, others can not crack the encryption of data.
2, the mobile terminal information security: Now mobile office more common, so the use of safe end of the phone also need special attention, moving end of documents, pictures, news, organizational structure, all related to information security data all encrypted storage, even if the user phone is lost or stolen, others can not view files and data directly from the file management tool, in addition to the system should also have data erase function, the phone without a network, the need to support the security code to enter the APP, the mobile client not locally store passwords or password hash, only locally stored login ticket, the server can control the login ticket is valid. Management background can be set by the client login secondary verification, in the case of authentication username and password, and then verify through SMS verification code once, in order to ensure foolproof.
3, the network communication security: clients and servers throughout the network communication is encrypted using a long connection TLS Socket, using the HTTPS connection is short, the data transmission encryption TLS1.2 meet international standards, the key lengths are: 2048-bit RSA public and private key and 256-bit AES symmetric key. Phone client logs and server communications, transport networks are not password or password hash.

More information on

Guess you like

Origin blog.51cto.com/14735721/2477051