Network information security protection method and system

A technology for security protection and network information, applied in the field of network information security protection methods and systems, can solve the problems of no informatization and no modernization, and achieve the effects of reducing losses, improving security levels, and improving security.

Inactive Publication Date: 2019-08-06
瑞森网安(福建)信息科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] There is no national security without network se...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network information security protection method and system
  • Network information security protection method and system
  • Network information security protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] refer to figure 1 As shown, it is a flow chart of Embodiment 1, a network information security protection method according to a preferred embodiment of the present invention, which includes the following steps,

[0038] Step S1, using multi-factor authentication to log in to the server, and record the behavior of logging in to the server. The multi-authentication in this embodiment includes digital password authentication, SMS password authentication and face recognition. When registering an account, the user enters the digital password corresponding to the account, the mobile phone number, the face image and the permissions corresponding to the account. When the user logs in to the server, enter the account number and digital password for confirmation. After the digital password is correct, an SMS password is sent to the mobile phone number corresponding to the account. The user enters the SMS password for confirmation. After the SMS password is correct, face recognit...

Embodiment 2

[0047] refer to figure 2 Shown is the flowchart of Embodiment 2. A network information security protection method, it comprises the following steps,

[0048] Step S1, using multi-authentication method to log in to the server, and record the behavior of logging in to the server. In this embodiment, multi-authentication includes digital password authentication, SMS password authentication and voice password authentication. When registering an account, the user enters the digital password corresponding to the account, the mobile phone number, voice information and the permissions corresponding to the account. When the user logs in to the server, enter the account number and digital password for confirmation. After the digital password is correct, an SMS password is sent to the mobile phone number corresponding to the account. The user enters the SMS password for confirmation. After the SMS password is correct, the voice information verification is performed. Account permission...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network security, and particularly relates to a network information security protection method and system. According to the method, real-time monitoringand active protection can be carried out on data in a network system, and when external invasion is monitored, protection measures can be actively adopted to protect the server and the information security on the server. According to the method and system, comprehensive resource supervision, login behavior recording, attack recording, file tamper-proofing, emergency supervision and security supervision can be conveniently and intensively carried out on various information systems, and operation conditions, security situations, risk identification, threat perception and security disposal-attack event traceability of all the information systems can be fully grasped..

Description

technical field [0001] The invention belongs to the technical field of network security, and more specifically relates to a network information security protection method and system. Background technique [0002] There will be no national security without network security, and no modernization without informatization. To build a strong network country, we will continue to advance towards the goals of basic popularization of network infrastructure, significant enhancement of independent innovation capabilities, comprehensive development of the information economy, and strong network security guarantees. The "Regulations on Internet Security Protection Technical Measures" also clearly states: "Guarantee Internet network security and information security." The National People's Congress and the Ministry of Industry and Information Technology have also successively issued relevant laws and regulations, requiring anti-tampering and anti-attack work. [0003] Network security me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/083H04L63/0838H04L63/0861H04L63/10H04L63/1416H04L63/1425H04L63/1441H04L63/145H04L63/1466H04L63/20
Inventor 林少鹏张祺飞高凯强
Owner 瑞森网安(福建)信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products