Unlock instant, AI-driven research and patent intelligence for your innovation.
A cloud security access system and method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A secure access and cloud technology, applied in the field of network security management, can solve the problems of data transmission process being easily intercepted by others, information leakage, etc., and achieve the effect of accurate comparison and high comparison efficiency
Active Publication Date: 2022-07-29
连云港飞扬网络科技有限公司
View PDF5 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] In the process of network data transmission, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; the existing public protection methods generally rely on more mature Security software for data protection to ensure that transactions are carried out under monitoring; however, the operators who provide this service are also subject to many restrictions, so there will be many means of information theft that can bypass security methods
[0004] Now there is such a means of information theft. When a user wants to open a certain service, there will be a pre-set illegal interface that is very similar to the normal login interface, and then the user can easily enter the account information without noticing it Illegal business has been hit, it can be imagined that this must have caused information leakage
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0071] figure 1 A block diagram of the composition and structure of a cloud security access system is shown. In this embodiment of the present invention, a cloud security access system is provided, and the system 10 includes:
[0072] a risk level determination module 11, configured to receive an access request, obtain location information, and determine a risk level according to the location information;
[0073] The monitoring module 12 is used for real-time monitoring information input port when the risk level reaches a preset level threshold;
[0074] The image information acquisition module 13 is used to lock the information input port, determine the cloud address, and obtain the image information of the information input interface when the information input port is monitored;
[0075] A comparison verification module 14, configured to obtain a base image according to the cloud address, and compare and verify the image information based on the base image;
[0076] The d...
Embodiment 2
[0122] Figure 8 A flow block diagram of a cloud security access system and method is shown. In an embodiment of the present invention, a cloud security access method is provided, and the method includes:
[0123] Step S100: receiving an access request, acquiring location information, and determining a risk level according to the location information;
[0124] Step S200: when the risk level reaches a preset level threshold, real-time monitoring information is entered into the port;
[0125] Step S300: when the information entry port is monitored, the information entry port is locked, the cloud address is determined, and the image information of the information entry interface is obtained;
[0126] Step S400: Acquire a base image according to the cloud address, and compare and verify the image information based on the base image;
[0127] Step S500: After the image information passes the comparison and verification, unlock the information entry port, obtain user account infor...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to the technical field of network security management, and specifically discloses a cloud security access system and method. The system includes a risk level determination module, a monitoring module, an image information acquisition module, a comparison verification module and a data transmission module. The information acquisition module is used to lock the information input port when monitoring the information input port, determine the cloud address, and obtain the image information of the information input interface; the comparison verification module is used to obtain the base image according to the cloud address, and based on the cloud address The base image is used to compare and verify the image information. In the present invention, the monitoring information input port is detected for the access request with higher risk level, and then the image information of the information input interface is obtained, and the image information is compared and verified with the base image; the present invention uses the computer comparison interface The degree of similarity is extremely efficient and accurate.
Description
technical field [0001] The invention relates to the technical field of network security management, in particular to a cloud security access system and method. Background technique [0002] With the development of computer technology, people's information exchange through smart devices has gradually become the mainstream way. With the development of network technology, the speed of the above-mentioned information exchange is also getting faster and faster. Therefore, some people propose that local storage can be eliminated and unified Storing files and obtaining the desired content directly with the help of the network when needed is the concept of the cloud. [0003] In the process of data transmission on the network, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; However, the operators who provide this...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.