Network information security protection method and system
A technology for security protection and network information, applied in the field of network information security protection methods and systems, can solve the problems of no informatization and no modernization, and achieve the effects of reducing losses, improving security levels, and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] refer to figure 1 As shown, it is a flow chart of Embodiment 1, a network information security protection method according to a preferred embodiment of the present invention, which includes the following steps,
[0038] Step S1, using multi-factor authentication to log in to the server, and record the behavior of logging in to the server. The multi-authentication in this embodiment includes digital password authentication, SMS password authentication and face recognition. When registering an account, the user enters the digital password corresponding to the account, the mobile phone number, the face image and the permissions corresponding to the account. When the user logs in to the server, enter the account number and digital password for confirmation. After the digital password is correct, an SMS password is sent to the mobile phone number corresponding to the account. The user enters the SMS password for confirmation. After the SMS password is correct, face recognit...
Embodiment 2
[0047] refer to figure 2 Shown is the flowchart of Embodiment 2. A network information security protection method, it comprises the following steps,
[0048] Step S1, using multi-authentication method to log in to the server, and record the behavior of logging in to the server. In this embodiment, multi-authentication includes digital password authentication, SMS password authentication and voice password authentication. When registering an account, the user enters the digital password corresponding to the account, the mobile phone number, voice information and the permissions corresponding to the account. When the user logs in to the server, enter the account number and digital password for confirmation. After the digital password is correct, an SMS password is sent to the mobile phone number corresponding to the account. The user enters the SMS password for confirmation. After the SMS password is correct, the voice information verification is performed. Account permission...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com