A cloud security access system and method

A secure access and cloud technology, applied in the field of network security management, can solve the problems of data transmission process being easily intercepted by others, information leakage, etc., and achieve the effect of accurate comparison and high comparison efficiency

Active Publication Date: 2022-07-29
连云港飞扬网络科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the process of network data transmission, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; the existing public protection methods generally rely on more mature Security software for data protection to ensure that transactions are carried out under monitoring; however, the operators who provide this service are also subject to many restrictions, so there will be many means of information theft that can bypass security methods
[0004] Now there is such a means of information theft. When a user wants to open a certain service, there will be a pre-set illegal interface that is very similar to the normal login interface, and then the user can easily enter the account information without noticing it Illegal business has been hit, it can be imagined that this must have caused information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cloud security access system and method
  • A cloud security access system and method
  • A cloud security access system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] figure 1 A block diagram of the composition and structure of a cloud security access system is shown. In this embodiment of the present invention, a cloud security access system is provided, and the system 10 includes:

[0072] a risk level determination module 11, configured to receive an access request, obtain location information, and determine a risk level according to the location information;

[0073] The monitoring module 12 is used for real-time monitoring information input port when the risk level reaches a preset level threshold;

[0074] The image information acquisition module 13 is used to lock the information input port, determine the cloud address, and obtain the image information of the information input interface when the information input port is monitored;

[0075] A comparison verification module 14, configured to obtain a base image according to the cloud address, and compare and verify the image information based on the base image;

[0076] The d...

Embodiment 2

[0122] Figure 8 A flow block diagram of a cloud security access system and method is shown. In an embodiment of the present invention, a cloud security access method is provided, and the method includes:

[0123] Step S100: receiving an access request, acquiring location information, and determining a risk level according to the location information;

[0124] Step S200: when the risk level reaches a preset level threshold, real-time monitoring information is entered into the port;

[0125] Step S300: when the information entry port is monitored, the information entry port is locked, the cloud address is determined, and the image information of the information entry interface is obtained;

[0126] Step S400: Acquire a base image according to the cloud address, and compare and verify the image information based on the base image;

[0127] Step S500: After the image information passes the comparison and verification, unlock the information entry port, obtain user account infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security management, and specifically discloses a cloud security access system and method. The system includes a risk level determination module, a monitoring module, an image information acquisition module, a comparison verification module and a data transmission module. The information acquisition module is used to lock the information input port when monitoring the information input port, determine the cloud address, and obtain the image information of the information input interface; the comparison verification module is used to obtain the base image according to the cloud address, and based on the cloud address The base image is used to compare and verify the image information. In the present invention, the monitoring information input port is detected for the access request with higher risk level, and then the image information of the information input interface is obtained, and the image information is compared and verified with the base image; the present invention uses the computer comparison interface The degree of similarity is extremely efficient and accurate.

Description

technical field [0001] The invention relates to the technical field of network security management, in particular to a cloud security access system and method. Background technique [0002] With the development of computer technology, people's information exchange through smart devices has gradually become the mainstream way. With the development of network technology, the speed of the above-mentioned information exchange is also getting faster and faster. Therefore, some people propose that local storage can be eliminated and unified Storing files and obtaining the desired content directly with the help of the network when needed is the concept of the cloud. [0003] In the process of data transmission on the network, information security is a point that needs to be paid attention to. The data transmission process is easily intercepted by others, resulting in information leakage. Among them, account information is the most important; However, the operators who provide this...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/36
CPCH04L63/105H04L63/107G06F21/36
Inventor 范浩阳秦征
Owner 连云港飞扬网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products