Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method and device, security system and electronic equipment

A data processing and data technology, applied in the field of data security, can solve the problems of difficult to detect data theft and low security.

Pending Publication Date: 2021-07-30
四川坤翔科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the purpose of this application is to provide a data processing method, device and electronic equipment, so as to improve the existing data security methods, it is difficult to find data theft behaviors such as reptiles and plug-ins that simulate the normal operation of users, resulting in low security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, security system and electronic equipment
  • Data processing method and device, security system and electronic equipment
  • Data processing method and device, security system and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0033] In view of the defects existing in the existing data security methods, the embodiment of the present application provides a security system, which builds a security system based on the dual data sources of the keystroke data generated by the user's keyboard stroke and the user input data generated by normal business access. A security system based on keystroke data that cannot be forged. It is very difficult for an attacker to simulate the operation mechanism of dual data sources. For example, to generate keystroke data, physical keystroke behavior is required, which makes remote operation impossible and greatly improves the security of the entire system. like figure 1 As shown, the security system includes a first server, a second server and a user terminal. It should be noted that, in an implementation manner, the security system may not include a user terminal, but only include the first server and the second server. The user terminal communicates with the first se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data processing method and device, a security system and electronic equipment, and belongs to the technical field of data security. The method is applied to a first server, the first server communicates with a second server and a user terminal, and the user terminal further communicates with the second server. The method comprises the following steps: acquiring user input data from a user terminal; acquiring keyboard clicking data corresponding to the user input data from a second server, and performing security processing operation based on the keyboard clicking data and the user input data, the security processing operation comprises at least one of authentication operation of the user of the user terminal, abnormal behavior monitoring operation of the user of the user terminal, abnormal behavior analysis of the user of the user terminal and system security audit operation. According to the method, the system security is improved, and the problem that data stealing behaviors such as crawlers and plug-in simulating normal operation of a user are difficult to find in an existing data security method is solved.

Description

technical field [0001] The application belongs to the technical field of data security, and in particular relates to a data processing method, device, security system and electronic equipment. Background technique [0002] Existing security technologies rely on business system data or general system log data, and these data come from the user terminal network. After the user terminal is attacked by an attacker, the operation of a real user can be simulated through a Trojan horse program or remote control means. Furthermore, security analysis based on business system data or general system log data obtained from the server will cause security technical defects in various links (such as authentication, abnormal behavior monitoring, system security audit, etc.), such as it is difficult to find crawlers, Plug-ins and other data theft behaviors that simulate normal user operations. Contents of the invention [0003] In view of this, the purpose of this application is to provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/121G06F21/602G06F21/606
Inventor 张冰
Owner 四川坤翔科技有限公司