CN106022042A - Internet safety net technology - Google Patents

Internet safety net technology Download PDF

Info

Publication number
CN106022042A
CN106022042A CN201610335775.3A CN201610335775A CN106022042A CN 106022042 A CN106022042 A CN 106022042A CN 201610335775 A CN201610335775 A CN 201610335775A CN 106022042 A CN106022042 A CN 106022042A
Authority
CN
China
Prior art keywords
input device
chip microcomputer
finger print
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610335775.3A
Other languages
Chinese (zh)
Inventor
何怀文
陈丽梅
李旺和
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongshan Houyuan Electronic Technology Co Ltd
Original Assignee
Zhongshan Houyuan Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongshan Houyuan Electronic Technology Co Ltd filed Critical Zhongshan Houyuan Electronic Technology Co Ltd
Priority to CN201610335775.3A priority Critical patent/CN106022042A/en
Publication of CN106022042A publication Critical patent/CN106022042A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/08Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2218/00Aspects of pattern recognition specially adapted for signal processing
    • G06F2218/12Classification; Matching

Abstract

The invention provides an internet safety net technology. The internet safety net technology comprises an induction layer, a processing layer and a network layer, wherein the induction layer is composed of a fingerprint input device or an audio input device; the processing layer is composed of a single chip microcomputer and a VPN (Virtual Private Network) chip; the network layer is an internal local area network; the induction layer receives user data; the user data are processed through the processing layer; and the processed user data finally enter the network layer. Compared with the prior art, the internet safety net technology has the following beneficial effects that the safety protection of the intranet starts from initial connection of an intranet, a user can enter the network layer only by inputting correct information through the induction layer, the safety of the intranet is guaranteed, the purposes of removing an illegal user in time and preventing risks are achieved, thus the invasion of unsafe factors for the intranet is avoided from the source, and the technology has the positive effects of safety, efficiency and high intelligent degree.

Description

A kind of internet security network technology
Technical field
The present invention is a kind of internet security network technology, belongs to internet security technical field.
Background technology
Intranet have employed the technology of the Internet, but it is different from the Internet of international interconnection, and it is a kind of enterprise " in-house network ".Applied the most widely.Intranet can be equipped on the Internet, but it is only intended to enterprise and mutually transmits information, so, it belongs to the network of stand-alone nature, it is possible to open to the society.
The function that Intranet can realize is extremely wide and powerful, and this includes: can utilize Email, reduces communication cost, and enterprise staff can use Email quickly and easily, transmit information;Electronic publishing can be utilized to issue the various information of enterprise, for enterprises or given client;Can be at WEB(World Wide Web) on carry out electronic trade, such as the product exhibition in global range, information service of sale etc.;Long-distance user can be provided to log in, and enterprise branch office can access the information of general headquarters by telephone line;Can be sent on the work station of user process by the information of enterprise headquarters with remote information transmission.
Along with the level of application of Intranet constantly promotes; Intranet safety becomes more and more important; it is more and more frequent that the attack of Intranet or security threat occur; but the safeguard procedures currently for Intranet safety are short of relatively; the safety protection problem in Intranet field, it would be highly desirable to solve.
Summary of the invention
The deficiency existed for prior art, it is an object of the present invention to provide a kind of internet security network technology, and the present invention started with from initial connection of Intranet, to solve the problem proposed in above-mentioned background technology, the present invention is easy to use, it is simple to operation, good stability, reliability is high.
To achieve these goals, the present invention is to realize by the following technical solutions: a kind of internet security network technology, including inductive layer, processes layer and Internet, and described inductive layer is made up of finger print input device or voice input device;Described process layer is made up of single-chip microcomputer and VPN chip;Described Internet is a kind of internal lan;Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
Further, described finger print input device is worked in coordination with single-chip microcomputer and is received user data, finger print input device gathers the finger print information of user, and generates fingerprint image, transmits to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
Further, described finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exiting and operate before this, feedback information is in finger print input device simultaneously, reminds user to re-enter.
Further, described voice input device is worked in coordination with single-chip microcomputer and is received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
Further, described voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
Beneficial effects of the present invention: a kind of internet security network technology of the present invention, the present invention started with from initial connection of Intranet, only input correct information by inductive layer, Internet could be entered, ensure that the safety to Intranet, reach the purpose of the defence of eliminating, risk in time of illegal entrance, and then from source, avoided the intrusion that Intranet is carried out by unsafe factor, there is good effect safe and efficient, that intelligence degree is high.
Accompanying drawing explanation
The detailed description with reference to the following drawings, non-limiting example made by reading, the other features, objects and advantages of the present invention will become more apparent upon:
Fig. 1 is the theory diagram of the present invention a kind of internet security network technology.
Detailed description of the invention
For the technological means making the present invention realize, creation characteristic, reach purpose and be easy to understand with effect, below in conjunction with detailed description of the invention, the present invention is expanded on further.
Referring to Fig. 1, the present invention provides a kind of technical scheme: a kind of internet security network technology, including inductive layer, process layer and Internet, inductive layer is made up of finger print input device or voice input device;Process layer to be made up of single-chip microcomputer and VPN chip;Internet is a kind of internal lan;Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
Finger print input device is worked in coordination with single-chip microcomputer and is received user data, finger print input device gathers the finger print information of user, and generate fingerprint image, transmitting to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
Finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exit and operate before this, feedback information is in finger print input device simultaneously, reminds user to re-enter.
Voice input device is worked in coordination with single-chip microcomputer and is received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
Voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
The present invention started with from initial connection of Intranet, only input correct information by inductive layer, Internet could be entered, ensure that the safety to Intranet, reach the purpose of the defence of eliminating, risk in time of illegal entrance, and then from source, avoid the intrusion that Intranet is carried out by unsafe factor, there is good effect safe and efficient, that intelligence degree is high.
The ultimate principle of the present invention and principal character and advantages of the present invention have more than been shown and described, to those skilled in the art, obviously the invention is not restricted to the details of above-mentioned one exemplary embodiment, and without departing from the spirit or essential characteristics of the present invention, it is possible to realize the present invention in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is limited by claims rather than described above, it is intended that all changes fallen in the implication of equivalency and scope of claim included in the present invention.Should not be considered as limiting involved claim by any reference in claim.
In addition, it is to be understood that, although this specification is been described by according to embodiment, but the most each embodiment only comprises an independent technical scheme, this narrating mode of description is only for clarity sake, description should can also be formed, through appropriately combined, other embodiments that it will be appreciated by those skilled in the art that as an entirety, the technical scheme in each embodiment by those skilled in the art.

Claims (5)

1. an internet security network technology, including inductive layer, processes layer and Internet, it is characterised in that: described inductive layer is made up of finger print input device or voice input device;
Described process layer is made up of single-chip microcomputer and VPN chip;
Described Internet is a kind of internal lan;
Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
A kind of internet security network technology the most according to claim 1, it is characterized in that: described finger print input device is worked in coordination with single-chip microcomputer and received user data, finger print input device gathers the finger print information of user, and generate fingerprint image, transmit to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
A kind of internet security network technology the most according to claim 1 and 2, it is characterized in that: described finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exit and operate before this, feedback information is in finger print input device simultaneously, user is reminded to re-enter.
A kind of internet security network technology the most according to claim 1, it is characterized in that: described voice input device is worked in coordination with single-chip microcomputer and received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
5. according to a kind of internet security network technology described in claim 1 or 4, it is characterized in that: described voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
CN201610335775.3A 2016-05-20 2016-05-20 Internet safety net technology Pending CN106022042A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610335775.3A CN106022042A (en) 2016-05-20 2016-05-20 Internet safety net technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610335775.3A CN106022042A (en) 2016-05-20 2016-05-20 Internet safety net technology

Publications (1)

Publication Number Publication Date
CN106022042A true CN106022042A (en) 2016-10-12

Family

ID=57095459

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610335775.3A Pending CN106022042A (en) 2016-05-20 2016-05-20 Internet safety net technology

Country Status (1)

Country Link
CN (1) CN106022042A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101556713A (en) * 2009-05-08 2009-10-14 抚顺金道科技有限公司 Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser
CN101714918A (en) * 2009-10-23 2010-05-26 浙江维尔生物识别技术股份有限公司 Safety system for logging in VPN and safety method for logging in VPN
CN101901332A (en) * 2009-05-31 2010-12-01 上海点佰趣信息科技有限公司 Fingerprint identification system and method
CN102195949A (en) * 2010-03-16 2011-09-21 邵宇 Fingerprint verification method for virtual private network (VPN)
US20120110658A1 (en) * 2008-07-09 2012-05-03 Zte Corporation Authentication server and method for controlling mobile communication terminal access to virtual private network
CN103761502A (en) * 2013-12-26 2014-04-30 福建伊时代信息科技股份有限公司 Safety certification device and method
CN104732972A (en) * 2015-03-12 2015-06-24 广东外语外贸大学 HMM voiceprint recognition signing-in method and system based on grouping statistics
US20150188916A1 (en) * 2012-09-14 2015-07-02 Kabushiki Kaisha Toshiba Vpn connection authentication system, user terminal, authentication server, biometric authentication result evidence information verification server, vpn connection server, and computer program product

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120110658A1 (en) * 2008-07-09 2012-05-03 Zte Corporation Authentication server and method for controlling mobile communication terminal access to virtual private network
CN101556713A (en) * 2009-05-08 2009-10-14 抚顺金道科技有限公司 Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser
CN101901332A (en) * 2009-05-31 2010-12-01 上海点佰趣信息科技有限公司 Fingerprint identification system and method
CN101714918A (en) * 2009-10-23 2010-05-26 浙江维尔生物识别技术股份有限公司 Safety system for logging in VPN and safety method for logging in VPN
CN102195949A (en) * 2010-03-16 2011-09-21 邵宇 Fingerprint verification method for virtual private network (VPN)
US20150188916A1 (en) * 2012-09-14 2015-07-02 Kabushiki Kaisha Toshiba Vpn connection authentication system, user terminal, authentication server, biometric authentication result evidence information verification server, vpn connection server, and computer program product
CN103761502A (en) * 2013-12-26 2014-04-30 福建伊时代信息科技股份有限公司 Safety certification device and method
CN104732972A (en) * 2015-03-12 2015-06-24 广东外语外贸大学 HMM voiceprint recognition signing-in method and system based on grouping statistics

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郝玉洁等: ""基于指纹识别的VPN身份认证研究"", 《计算机应用》 *

Similar Documents

Publication Publication Date Title
JP7466711B2 (en) System and method for using relationship structures for email classification - Patents.com
CN107004090A (en) For determining the dangerous statistical analysis technique that the content based on file is brought
CN103842985A (en) Security-enhanced cloud system and security management method thereby
CN103294939B (en) For the method and system of virtual avatar authentication
Dash et al. Are ChatGPT and deepfake algorithms endangering the cybersecurity industry? A review
WO2008033236A2 (en) System and methods for an identity theft protection bot
CN104954138B (en) Based on the dynamic password formation method of iris information
WO2014145395A2 (en) System and method for consumer fraud protection
Chertoff Exploding Data: Reclaiming Our Cyber Security in the Digital Age
CN103081411A (en) Network service
CN104657650A (en) Method and device for data input or authentication
CN108881230A (en) A kind of safe transmission method and device of government affairs big data
CN106611133A (en) Risk identification method and equipment
US9432344B2 (en) Secure storage and sharing of user objects
CN103870502A (en) Enterprise mobile social network system based on face recognition
CN108650289A (en) A kind of method and apparatus of the management data based on block chain
Shackelford et al. Have you updated your toaster? Transatlantic approaches to governing the internet of everything
CN104486310A (en) Method and system for authenticating finger veins and finger vein information acquisition instrument
CN114090994A (en) Face recognition authentication method and system based on block chain
CN106022042A (en) Internet safety net technology
Shackelford et al. Is it time for a national cybersecurity safety board? Examining the policy implications and political pushback
Zajko Canada’s cyber security and the changing threat landscape
CN110381037B (en) Safety protection system based on electronic bidding purchase transaction platform
CN106919855A (en) A kind of law enforcement evidence-obtaining system and its evidence collecting method based on USB flash disk
US9379897B1 (en) Method and apparatus for providing an interactive hierarchical entitlement map

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012

RJ01 Rejection of invention patent application after publication