Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network security protection method and system based on big data platform

A big data platform and network security technology, applied in the field of network security protection based on the big data platform, can solve problems such as weak user security awareness, malicious mistakes, network security threats, etc., and achieve the effect of improving the effect of network security protection

Inactive Publication Date: 2017-09-08
广东青年职业学院
View PDF5 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows users (user devices) who are authorized for accessing their own computer or other device with specific identities to be identified before granting them certain privileges such as logins from different locations. It then checks if these identify matches against stored databases about people they donate resources during times when someone tries to gain unauthorised entry into your organization. Once approved, any attempts made at outside networks will go unnoved until authorization has passed again.

Problems solved by technology

Technologies aiming towards better control over access rights within computers involve managing complex relationships between different components like servers, routers, databases, etc., making it difficult if only limited options exist without compromising any safety measures provided against potential cyberattacks. Additionally, increasingly sophisticated hackings techniques make traditional methods less effective due to vulnerability issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and system based on big data platform
  • Network security protection method and system based on big data platform
  • Network security protection method and system based on big data platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0048] figure 1 is a schematic diagram of the method flow of the network security protection method in the embodiment of the present invention, such as figure 1 As shown, the network security protection method includes:

[0049] S1: The user sends user identity authentication request information to the authentication server through the user terminal;

[0050]S2: The authentication server receives the user identity authentication request information sent by the us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security protection method and system based on a big data platform. The network security protection method comprises the following steps that: a user transmits user identity authentication request information to an authentication server through a user terminal; the authentication server receives the user identity authentication request information transmitted by the user, and performs user identity authentication on the user; if the user passes the identity authentication, performing a next step; acquiring network environment data and/or network security threat data of a user access network; performing a big data security analysis on the network environment data and/or network security threat data of the network, and acquiring security threat information in the network; and clearing information of the security threat information in the network. In the embodiment of the invention, the network security is protected through user identity authentication, user access network monitoring and data analysis, thereby effectively ensuring the security of an Internet surfing network environment of the user.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner 广东青年职业学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products