| Along with the rapid development of computer and the network technology, the Internet as a means of access to information and communication exchange platform has been inextricably linked with human. Video chat, e-commerce and remote network education technology have greatly enriched and convenience to people’s lives. At the same time, the network resource sharing will also brings about the security hidden risks in the transmission of information. A variety of viruses, Trojans, invasion and other mode of attacks result in leakage and tampering of information within the organization. In order to solve the problem of information security, people invented the firewall and intrusion detection systems. However, with the constant development of security technology, many organizations see these technologies are not able to completely solve the problems encountered.1990s people started to change the management of errors "heavy technology and light management", and become concerned about the information security management.Information assets safe and effective coding management mechanism also becomes premise of strengthen enterprise management. However, there is no uniform requirement in information asset management, mostly to the encoding of the physical assets of the plane which can’t meet the security requirement of information system. It is for the understanding, in theory, the author creates a model of information assets from the perspective of management attributes, the encoding to be identified, and highly practical.Along with growing demand of the information system operation and maintenance management, the information asset management requirements are more and more high, and the complication management way can’t meet the information system security needs.This paper based on the research of information security and information asset management as the breakthrough point, combined with the ISO/IEC2700series standard, information security risk assessment standard theory and information security technology methods and other related knowledge that are needed in information asset management. The author puts forward a hierarchical information asset management model to associate all information assets and based on many kinds of angle, such as identifying, management responsibility, class, assignment and logic bearing, access control, threatening analysis and CIA (usability, confidentiality and integrity) and so on to research the public management attribute of information assets; Through two-dimensional coding the way for the information assets on the recognition only coding, combined with the business process role, the process and the data from the perspectives of the production and use of two analysis in the process of information asset management attribute bar-code mode; According to data from the XML technology descriptive, program is easy to realize and data structure of the advantages of the adaptability, from a security perspective structured information assets that realize attribute information, and the encryption and integrity of the information asset protection needs attribute symmetrical encryption and signature verification design, guarantee the document of the CIA security attributes, the identification and authentication. Then encrypted two dimensional bar-code paste in information assets, when need to decode using XML technology when decryption and signature verification and professional decoder decoding read information; The router as case study object, and through the detailed analysis of the attribute, the use of XML signature verification and paste in planar bar code on the router entity to the way information asset management, not only ensure the safety of the router assets, and also satisfy the enterprise efficient and work demand, for information security management and information system operation and maintenance management provide good method and means, and for the two dimensional bar-code in the information management of assets is of certain practical significance, which has verified the feasibility of the paper and security. |