Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network safety system and method based on identity authentication

A network security system and identity verification technology, applied in transmission systems, data exchange networks, digital transmission systems, etc., can solve problems such as network speed fluctuations, inability to effectively confirm identity information, network intrusion, etc.

Inactive Publication Date: 2021-03-09
BINZHOU UNIV
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, due to the diversification of the network environment, network fraud and network false information are flooding the network. When conducting information transactions and network transactions, Internet users cannot effectively confirm the identity information of the other party; in the process of using the network, due to Many private network devices lack corresponding functions such as network supervision, network speed analysis, regular inspection, network supervision, and file inspection and killing supervision. There will be situations such as slow network speed, network intrusion, and network speed fluctuations, which usually require additional installation of anti-virus software In order to achieve the above functions, we propose a network security system and method based on identity verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network safety system and method based on identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0054] see figure 1 As shown, a network security system based on identity verification includes a registration and login module, a regular inspection module, a file monitoring module, a network analysis module, an identity verification module, a background management module, and a data acquisition module;

[0055] The registration and login module is used for users to register and log in after inputting personal information, and send the personal information to the server for storage;

[0056] Among them, personal informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network safety system and method based on identity verification. The system comprises a file monitoring module, a network analysis module, and an identity verification module, and the identity verification module receives real-time personal information, and carries out the comparison and verification of the real-time personal information with personal information stored in a server; the network analysis module is used for receiving the network real-time data and performing comparative analysis on the network real-time data and network preset data stored in a server; according to the system and the method, identity information can be effectively recognized and verified. Meanwhile, a network supervision function, a network speed analysis function, a network supervision function, a file searching, killing and supervision function and the like are added, so that the situations of network intrusion, network speed fluctuation and the like are avoided.

Description

technical field [0001] The invention belongs to the technical field of network security, relates to a network security system and method, in particular to a network security system and method based on identity verification. Background technique [0002] Network security usually refers to the security of computer networks, but in fact it can also refer to the security of computer communication networks. Computer communication network is a system that interconnects several computers with independent functions through communication equipment and transmission media, and realizes information transmission and exchange between computers with the support of communication software. The computer network refers to a system that uses communication means to connect several independent computer systems, terminal devices and data devices that are relatively dispersed in the region for the purpose of sharing resources, and exchanges data under the control of the protocol. The fundamental p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06F21/31G06F21/32G06K9/00G06K9/62H04L12/24H04L12/26H04L29/06
CPCG06Q20/4014G06Q20/40145G06F21/31G06F21/32H04L41/083H04L43/12H04L63/1416G06V40/193G06F18/22
Inventor 孙强强
Owner BINZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products