Cloud security access system and method

A security access and cloud technology, applied in the field of network security management, can solve the problems of information leakage and easy interception of data transmission process by others, and achieve the effect of high comparison efficiency and accurate comparison efficiency.

Active Publication Date: 2021-10-15
连云港飞扬网络科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of network data transmission, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; the existing public protection methods generally rely on more mature Security software for data protection to ensure that transactions are carried out under monitoring; however, the operators who provide this service are also subject to many restrictions, so there will be many means of information theft that can bypass security methods
[0004] Now there is such a means of information theft. When a user wants to open a certain service, there will be a pre-set illegal interface that is very similar to the normal login interface, and then the user can easily enter the account information without noticing it Illegal business has been hit, it can be imagined that this must have caused information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security access system and method
  • Cloud security access system and method
  • Cloud security access system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] figure 1 A block diagram of a cloud security access system is shown. In an embodiment of the present invention, a cloud security access system is provided. The system 10 includes:

[0072] A risk level determining module 11, configured to receive an access request, acquire location information, and determine a risk level according to the location information;

[0073] Monitoring module 12, used for real-time monitoring information entry port when the risk level reaches a preset level threshold;

[0074] The image information acquisition module 13 is used to lock the information input port when monitoring the information input port, determine the cloud address, and obtain the image information of the information input interface;

[0075] Comparison and verification module 14, used to obtain the base image according to the cloud address, and compare and verify the image information based on the base image;

[0076] The data transmission module 15 is configured to unlock...

Embodiment 2

[0122] Figure 8 A block flow diagram of a cloud security access system and method is shown. In an embodiment of the present invention, a cloud security access method is provided, and the method includes:

[0123] Step S100: receiving an access request, acquiring location information, and determining a risk level according to the location information;

[0124] Step S200: When the risk level reaches a preset level threshold, real-time monitoring information is entered into the port;

[0125] Step S300: When the information input port is detected, lock the information input port, determine the cloud address, and acquire the image information of the information input interface;

[0126] Step S400: Obtain a base image according to the cloud address, and compare and verify the image information based on the base image;

[0127] Step S500: When the image information passes the comparison and verification, unlock the information input port, acquire user account information, and sen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security management, and particularly discloses a cloud security access system and method. The system comprises a risk level determining module, a monitoring module, an image information obtaining module, a comparison and verification module and a data transmission module, wherein the image information obtaining module is used for, when an information input port is monitored, locking the information input port, determining a cloud address, and obtaining image information of an information input interface; and the comparison and verification module is used for acquiring a substrate image according to the cloud address, and performing comparison and verification on the image information based on the substrate image. According to the invention, the monitoring information input port is detected for the access request with a relatively high risk level, so that the image information of the information input interface is obtained, and the image information and the substrate image are compared and verified; according to the invention, the interface similarity degree is compared by means of a computer, and the comparison efficiency is extremely high and accurate.

Description

technical field [0001] The invention relates to the technical field of network security management, in particular to a cloud security access system and method. Background technique [0002] With the development of computer technology, it has gradually become the mainstream way for people to exchange information through smart devices. With the development of network technology, the speed of the above-mentioned information exchange is also getting faster and faster. It is the concept of the cloud to store files and obtain the desired content directly through the network when needed. [0003] In the process of network data transmission, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; the existing public protection methods generally rely on more mature Security software for data protection to ensure that tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/36
CPCH04L63/105H04L63/107G06F21/36
Inventor 范浩阳秦征
Owner 连云港飞扬网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products