CN109743320A - A computer network information security system and information protection method - Google Patents
A computer network information security system and information protection method Download PDFInfo
- Publication number
- CN109743320A CN109743320A CN201910004571.5A CN201910004571A CN109743320A CN 109743320 A CN109743320 A CN 109743320A CN 201910004571 A CN201910004571 A CN 201910004571A CN 109743320 A CN109743320 A CN 109743320A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- information
- identifying code
- computer network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 19
- 238000012544 monitoring process Methods 0.000 claims abstract description 11
- 238000012795 verification Methods 0.000 claims description 17
- 230000001815 facial effect Effects 0.000 claims description 6
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to internet areas, more specifically, it is a kind of information security of computer network system and information protecting method, including network login module, identifying code sending module, identifying code authentication module, face recognition module, face matching module, alarm module, processor, monitoring modular, photographing module, iris recognition module and information storage module, the present invention passes through setting identifying code sending module, identifying code authentication module and face recognition module, the identity of user is identified when logging in, prevent other people malice login systems, simultaneously, during user reads information, utilize monitoring modular, iris recognition module is in real time monitored user, midway is avoided to replace user, substantially increase the safety of system.
Description
Technical field
The present invention relates to internet areas, are that a kind of information security of computer network system and information are protected more specifically
Maintaining method.
Background technique
Internet is the huge network being concatenated between network and network, these networks are with one group of general agreement phase
Even, single huge international network in logic is formed, covering global global internetwork is developed on the basis of this and is claimed
Internet is the network structure interconnected together.And the network information service refers to provide the information content as main means
Internet information business.The network information service is based on network information query.Modern network information service is be unable to do without because of spy
Net environment, network service are inevitable based on Internet Information Services.
The safety of the network information is increasingly valued by people, however existing network information security system cannot be accomplished
To the real-time monitoring of user, safety cannot be effectively ensured.
Summary of the invention
The purpose of the present invention is to provide a kind of information security of computer network system and information protecting methods, on solving
State the problem of proposing in background technique.
To achieve the above object, the invention provides the following technical scheme:
A kind of information security of computer network system, including network login module, identifying code sending module, identifying code verify mould
Block, face recognition module, face matching module, alarm module, processor, monitoring modular, photographing module, iris recognition module and
Information storage module, user are logged in by network login module, and identifying code sending module in process of user login for generating
Dynamic verification code, while dynamic verification code is sent to user, identifying code authentication module is for verifying identifying code, face
The facial characteristics of identification module user for identification, face matching module are used to carry out the user's face feature recognized
Match, processor is used to handle the operational order that user reads information, and the process that monitoring modular is used to read user information carries out
Monitored over time, information storage module are used to carry out user whole shooting, iris recognition module for storing information, photographing module
The iris of user for identification, whole process locking user.
Further: further including password authentication module and information export module, password authentication module is for verifying number
Password, information export module is for the information in derived information memory module.
Further: the network login module accesses internet.
Further: the alarm module accesses internet.
Further: dynamic verification code is sent to by the identifying code sending module while generating dynamic verification code
The mobile phone of user.
A kind of information protecting method of computer network, specific steps are as follows:
S1, information security of computer network system is connected by internet;
S2, this system is logged in, system sends dynamic verification code to user, and system verifies dynamic verification code;
S3, the camera for starting user end computer, identify the facial characteristics of user, and with the face information that is prestored in system into
Row matching;
S4, user read information during, the iris of user is identified, user is monitored in real time.
Further: in step S2, dynamic verification code is sent to the mobile phone of user by system.
Using technical solution provided by the invention, compared with prior art, have the following beneficial effects: the present invention by setting
Identifying code sending module, identifying code authentication module and face recognition module are set, the identity of user is identified when logging in, is prevented
Only other people malice login systems, meanwhile, it is real-time using monitoring modular, iris recognition module during user reads information
User is monitored, avoids midway from replacing user, substantially increases the safety of system.
Detailed description of the invention
Fig. 1 is the module map of information security of computer network system.
Label declaration in schematic diagram: 1- network login module;2- identifying code sending module;3- identifying code authentication module;
4- face recognition module;5- face matching module;6- alarm module;7- processor;8- monitoring modular;9- photographing module;10- rainbow
Film identification module;11- information storage module;12- password authentication module;13- information export module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention, and the present invention will be further described with reference to the examples below.
Embodiment 1
Referring to Fig. 1, in the embodiment of the present invention, a kind of information security of computer network system, including network login module 1, test
Demonstrate,prove code sending module 2, identifying code authentication module 3, face recognition module 4, face matching module 5, alarm module 6, processor 7,
Monitoring modular 8, photographing module 9, iris recognition module 10 and information storage module 11, user can connect this by internet and be
System logs in this system by network login module 1, and identifying code sending module 2 is used in process of user login, automatically generates dynamic
State identifying code, while dynamic verification code being sent to the mobile phone of user, after user receives identifying code, input identifying code, identifying code
For authentication module 3 for verifying to identifying code, face recognition module 4 is used to start the camera of user end computer, identification
The facial characteristics of user, face matching module 5 is for matching the user's face feature recognized, if identifying code verifying is lost
Lose, face matching it is unsuccessful, then start alarm module 6, alarm module 6 accesses internet, can sound an alarm on network, together
When close system, prevent user from entering system.
Processor 7 is used to handle the operational order that user reads information, and monitoring modular 8 is used to read user the mistake of information
Cheng Jinhang monitored over time, information storage module 11 are used to start the camera shooting of user end computer for storing information, photographing module 9
Head carries out whole shooting to user, and the iris of the user for identification of iris recognition module 10, whole process locking user prevents from reading
The midway of information in information storage module 11 is taken to change user, if iris recognition module 10 identifies that midway is changed to other use
Family can then trigger alarm module 6, sound an alarm.
A kind of information security of computer network guard method, comprising the following steps:
S1, information security of computer network system is connected by internet;
S2, this system being logged in, system sends dynamic verification code to the mobile phone of user, after user inputs dynamic verification code, system pair
Dynamic verification code is verified;
S3, the camera for starting user end computer, identify the facial characteristics of user, and with the face information that is prestored in system into
Row matching, if it fails to match for identifying code authentication failed, face, triggers alarm;
S4, during user reads information, the iris of user is identified, user is monitored in real time, prevented
Way change user, if midway change user, triggers alarm.
Embodiment 2
On the basis of embodiment 1, information security of computer network system further includes password authentication module 12 and information export mould
Block 13, when user needs the information in derived information memory module 11, system prompt user's input numerical ciphers, password authentification
Module 12 is for verifying numerical ciphers, after being verified, information is allowed to export by information export module 13, downloaded for user.
Schematically the present invention and embodiments thereof are described above, description is not limiting, institute in attached drawing
What is shown is also one of embodiments of the present invention, and actual structure is not limited to this.So if the common skill of this field
Art personnel are enlightened by it, without departing from the spirit of the invention, are not inventively designed and the technical solution
Similar frame mode and embodiment, are within the scope of protection of the invention.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped
Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should
It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art
The other embodiments being understood that.
Claims (7)
1. a kind of information security of computer network system, which is characterized in that send mould including network login module (1), identifying code
Block (2), identifying code authentication module (3), face recognition module (4), face matching module (5), alarm module (6), processor
(7), monitoring modular (8), photographing module (9), iris recognition module (10) and information storage module (11), user is stepped on by network
It records module (1) to log in, identifying code sending module (2) is used to generate dynamic verification code in process of user login, while will dynamic
Identifying code is sent to user, and identifying code authentication module (3) is for verifying identifying code, and face recognition module (4) is for knowing
The facial characteristics of other user, face matching module (5) is for matching the user's face feature recognized, processor (7)
The operational order of information is read for handling user, the process that monitoring modular (8) is used to read user information carries out whole prison
It surveys, information storage module (11) is used to carry out user whole shooting, iris recognition mould for storing information, photographing module (9)
The iris of block (10) user for identification, whole process locking user.
2. information security of computer network system according to claim 1, which is characterized in that further include password authentication module
(12) and information export module (13), password authentication module (12) are used to verify numerical ciphers, and information export module (13) is used for
Information in derived information memory module (11).
3. information security of computer network system according to claim 1, which is characterized in that the network login module
(1) internet is accessed.
4. information security of computer network system according to claim 1, which is characterized in that the alarm module (6) connects
Enter internet.
5. information security of computer network system according to claim 1, which is characterized in that the identifying code sending module
(2) while generating dynamic verification code, dynamic verification code is sent to the mobile phone of user.
6. a kind of information protecting method using any information security of computer network system of claim 1-5, special
Sign is, specific steps are as follows:
S1, information security of computer network system is connected by internet;
S2, this system is logged in, system sends dynamic verification code to user, and system verifies dynamic verification code;
S3, the camera for starting user end computer, identify the facial characteristics of user, and with the face information that is prestored in system into
Row matching;
S4, user read information during, the iris of user is identified, user is monitored in real time.
7. the information protecting method of information security of computer network system according to claim 6, which is characterized in that step
In S2, dynamic verification code is sent to the mobile phone of user by system.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910004571.5A CN109743320A (en) | 2019-01-03 | 2019-01-03 | A computer network information security system and information protection method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910004571.5A CN109743320A (en) | 2019-01-03 | 2019-01-03 | A computer network information security system and information protection method |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN109743320A true CN109743320A (en) | 2019-05-10 |
Family
ID=66363326
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910004571.5A Pending CN109743320A (en) | 2019-01-03 | 2019-01-03 | A computer network information security system and information protection method |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109743320A (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111079111A (en) * | 2019-12-04 | 2020-04-28 | 重庆工程职业技术学院 | Computer network identity verification system |
| CN111277584A (en) * | 2020-01-16 | 2020-06-12 | 焦作大学 | A computer network authentication system |
| CN111935160A (en) * | 2020-08-13 | 2020-11-13 | 山东工业职业学院 | Computer security login system based on Internet of things |
| CN112905976A (en) * | 2021-01-27 | 2021-06-04 | 嘉兴迪迈科技有限公司 | User data protection method for security computer |
| CN112926039A (en) * | 2021-04-08 | 2021-06-08 | 深圳市优服信息技术有限公司 | Computing device management software with high safety |
| CN113268718A (en) * | 2021-04-12 | 2021-08-17 | 武汉晋鹏达信息技术有限公司 | Computer information security monitoring system |
| CN114254388A (en) * | 2021-12-21 | 2022-03-29 | 星杰云家居科技(上海)有限公司 | User scheme construction material auditing and quoting system |
| CN116757900A (en) * | 2023-08-23 | 2023-09-15 | 四川国消云科技有限公司 | Smart city information security guarantee system and implementation method |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011072717A1 (en) * | 2009-12-15 | 2011-06-23 | Novelty Group Limited | Authorizing system, comparing device, and method for authorizing a subject |
| US8738921B2 (en) * | 2006-05-16 | 2014-05-27 | Transactionsecure Llc | System and method for authenticating a person's identity using a trusted entity |
| CN104518876A (en) * | 2013-09-29 | 2015-04-15 | 腾讯科技(深圳)有限公司 | Service login method and device |
| CN107147609A (en) * | 2016-03-01 | 2017-09-08 | 中兴通讯股份有限公司 | A kind of method and cloud terminal, Cloud Server for lifting cloud terminal security energy-conservation |
| CN108229125A (en) * | 2018-02-07 | 2018-06-29 | 合肥联宝信息技术有限公司 | A kind of control method and electronic equipment |
| CN108809992A (en) * | 2018-06-15 | 2018-11-13 | 黄玉新 | A kind of recognition of face verification system and its correlating method with goal systems |
-
2019
- 2019-01-03 CN CN201910004571.5A patent/CN109743320A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8738921B2 (en) * | 2006-05-16 | 2014-05-27 | Transactionsecure Llc | System and method for authenticating a person's identity using a trusted entity |
| WO2011072717A1 (en) * | 2009-12-15 | 2011-06-23 | Novelty Group Limited | Authorizing system, comparing device, and method for authorizing a subject |
| CN104518876A (en) * | 2013-09-29 | 2015-04-15 | 腾讯科技(深圳)有限公司 | Service login method and device |
| CN107147609A (en) * | 2016-03-01 | 2017-09-08 | 中兴通讯股份有限公司 | A kind of method and cloud terminal, Cloud Server for lifting cloud terminal security energy-conservation |
| CN108229125A (en) * | 2018-02-07 | 2018-06-29 | 合肥联宝信息技术有限公司 | A kind of control method and electronic equipment |
| CN108809992A (en) * | 2018-06-15 | 2018-11-13 | 黄玉新 | A kind of recognition of face verification system and its correlating method with goal systems |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111079111A (en) * | 2019-12-04 | 2020-04-28 | 重庆工程职业技术学院 | Computer network identity verification system |
| CN111277584A (en) * | 2020-01-16 | 2020-06-12 | 焦作大学 | A computer network authentication system |
| CN111935160A (en) * | 2020-08-13 | 2020-11-13 | 山东工业职业学院 | Computer security login system based on Internet of things |
| CN112905976A (en) * | 2021-01-27 | 2021-06-04 | 嘉兴迪迈科技有限公司 | User data protection method for security computer |
| CN112926039A (en) * | 2021-04-08 | 2021-06-08 | 深圳市优服信息技术有限公司 | Computing device management software with high safety |
| CN113268718A (en) * | 2021-04-12 | 2021-08-17 | 武汉晋鹏达信息技术有限公司 | Computer information security monitoring system |
| CN114254388A (en) * | 2021-12-21 | 2022-03-29 | 星杰云家居科技(上海)有限公司 | User scheme construction material auditing and quoting system |
| CN116757900A (en) * | 2023-08-23 | 2023-09-15 | 四川国消云科技有限公司 | Smart city information security guarantee system and implementation method |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109743320A (en) | A computer network information security system and information protection method | |
| US10231124B2 (en) | Anti-theft method and client for a mobile terminal | |
| CN101051908B (en) | Dynamic cipher certifying system and method | |
| CN103501228A (en) | Dynamic two-dimension code token and authentication method of dynamic two-dimension code instruction | |
| CN108600154A (en) | A kind of government affairs remote authentication system and method | |
| CN106878250B (en) | Cross-application single-state login method and device | |
| CN108010150A (en) | Intelligent Checking on Work Attendance recording method, electric terminal and computer-readable recording medium | |
| CN105162757A (en) | External network log-in method for multi-authentication government virtual office platform | |
| CN114143066A (en) | An internal and external network docking system and method based on proxy isolation device | |
| US20190166130A1 (en) | Enhanced Security Using Wearable Device with Authentication System | |
| CN109726531A (en) | A marketing terminal security control method based on blockchain smart contract | |
| CN110995661A (en) | Network card platform | |
| CN107846406A (en) | A kind of account logon method and device | |
| JP2002229951A (en) | Person identification system | |
| CN111814130B (en) | Single sign-on method and system | |
| CN111698196A (en) | Authentication method and micro-service system | |
| CN111478875A (en) | Block chain-based biological sign mixed mode authentication method and system | |
| CN108769981A (en) | A kind of a kind of personal information protecting method for after the encryption SIM card of terminal device and SIM card loss based on encryption | |
| CN101854357B (en) | Method and system for monitoring network authentication | |
| CN109829321A (en) | A kind of method, apparatus of authenticating identity, equipment and storage medium | |
| CN109933974A (en) | Cryptographic initialization method, apparatus, computer equipment and storage medium | |
| CN112165458B (en) | Real-name authentication method, device and terminal | |
| CN112751800A (en) | Authentication method and device | |
| CN111932751B (en) | Intelligent park Internet of things comprehensive management platform and management method | |
| CN113766028A (en) | Content copyright encryption traceability system and method based on cloud network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190510 |