CN106022042A - Internet safety net technology - Google Patents
Internet safety net technology Download PDFInfo
- Publication number
- CN106022042A CN106022042A CN201610335775.3A CN201610335775A CN106022042A CN 106022042 A CN106022042 A CN 106022042A CN 201610335775 A CN201610335775 A CN 201610335775A CN 106022042 A CN106022042 A CN 106022042A
- Authority
- CN
- China
- Prior art keywords
- input device
- chip microcomputer
- finger print
- information
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/08—Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2218/00—Aspects of pattern recognition specially adapted for signal processing
- G06F2218/12—Classification; Matching
Abstract
The invention provides an internet safety net technology. The internet safety net technology comprises an induction layer, a processing layer and a network layer, wherein the induction layer is composed of a fingerprint input device or an audio input device; the processing layer is composed of a single chip microcomputer and a VPN (Virtual Private Network) chip; the network layer is an internal local area network; the induction layer receives user data; the user data are processed through the processing layer; and the processed user data finally enter the network layer. Compared with the prior art, the internet safety net technology has the following beneficial effects that the safety protection of the intranet starts from initial connection of an intranet, a user can enter the network layer only by inputting correct information through the induction layer, the safety of the intranet is guaranteed, the purposes of removing an illegal user in time and preventing risks are achieved, thus the invasion of unsafe factors for the intranet is avoided from the source, and the technology has the positive effects of safety, efficiency and high intelligent degree.
Description
Technical field
The present invention is a kind of internet security network technology, belongs to internet security technical field.
Background technology
Intranet have employed the technology of the Internet, but it is different from the Internet of international interconnection, and it is a kind of enterprise " in-house network ".Applied the most widely.Intranet can be equipped on the Internet, but it is only intended to enterprise and mutually transmits information, so, it belongs to the network of stand-alone nature, it is possible to open to the society.
The function that Intranet can realize is extremely wide and powerful, and this includes: can utilize Email, reduces communication cost, and enterprise staff can use Email quickly and easily, transmit information;Electronic publishing can be utilized to issue the various information of enterprise, for enterprises or given client;Can be at WEB(World Wide Web) on carry out electronic trade, such as the product exhibition in global range, information service of sale etc.;Long-distance user can be provided to log in, and enterprise branch office can access the information of general headquarters by telephone line;Can be sent on the work station of user process by the information of enterprise headquarters with remote information transmission.
Along with the level of application of Intranet constantly promotes; Intranet safety becomes more and more important; it is more and more frequent that the attack of Intranet or security threat occur; but the safeguard procedures currently for Intranet safety are short of relatively; the safety protection problem in Intranet field, it would be highly desirable to solve.
Summary of the invention
The deficiency existed for prior art, it is an object of the present invention to provide a kind of internet security network technology, and the present invention started with from initial connection of Intranet, to solve the problem proposed in above-mentioned background technology, the present invention is easy to use, it is simple to operation, good stability, reliability is high.
To achieve these goals, the present invention is to realize by the following technical solutions: a kind of internet security network technology, including inductive layer, processes layer and Internet, and described inductive layer is made up of finger print input device or voice input device;Described process layer is made up of single-chip microcomputer and VPN chip;Described Internet is a kind of internal lan;Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
Further, described finger print input device is worked in coordination with single-chip microcomputer and is received user data, finger print input device gathers the finger print information of user, and generates fingerprint image, transmits to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
Further, described finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exiting and operate before this, feedback information is in finger print input device simultaneously, reminds user to re-enter.
Further, described voice input device is worked in coordination with single-chip microcomputer and is received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
Further, described voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
Beneficial effects of the present invention: a kind of internet security network technology of the present invention, the present invention started with from initial connection of Intranet, only input correct information by inductive layer, Internet could be entered, ensure that the safety to Intranet, reach the purpose of the defence of eliminating, risk in time of illegal entrance, and then from source, avoided the intrusion that Intranet is carried out by unsafe factor, there is good effect safe and efficient, that intelligence degree is high.
Accompanying drawing explanation
The detailed description with reference to the following drawings, non-limiting example made by reading, the other features, objects and advantages of the present invention will become more apparent upon:
Fig. 1 is the theory diagram of the present invention a kind of internet security network technology.
Detailed description of the invention
For the technological means making the present invention realize, creation characteristic, reach purpose and be easy to understand with effect, below in conjunction with detailed description of the invention, the present invention is expanded on further.
Referring to Fig. 1, the present invention provides a kind of technical scheme: a kind of internet security network technology, including inductive layer, process layer and Internet, inductive layer is made up of finger print input device or voice input device;Process layer to be made up of single-chip microcomputer and VPN chip;Internet is a kind of internal lan;Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
Finger print input device is worked in coordination with single-chip microcomputer and is received user data, finger print input device gathers the finger print information of user, and generate fingerprint image, transmitting to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
Finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exit and operate before this, feedback information is in finger print input device simultaneously, reminds user to re-enter.
Voice input device is worked in coordination with single-chip microcomputer and is received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
Voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
The present invention started with from initial connection of Intranet, only input correct information by inductive layer, Internet could be entered, ensure that the safety to Intranet, reach the purpose of the defence of eliminating, risk in time of illegal entrance, and then from source, avoid the intrusion that Intranet is carried out by unsafe factor, there is good effect safe and efficient, that intelligence degree is high.
The ultimate principle of the present invention and principal character and advantages of the present invention have more than been shown and described, to those skilled in the art, obviously the invention is not restricted to the details of above-mentioned one exemplary embodiment, and without departing from the spirit or essential characteristics of the present invention, it is possible to realize the present invention in other specific forms.Therefore, no matter from the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is limited by claims rather than described above, it is intended that all changes fallen in the implication of equivalency and scope of claim included in the present invention.Should not be considered as limiting involved claim by any reference in claim.
In addition, it is to be understood that, although this specification is been described by according to embodiment, but the most each embodiment only comprises an independent technical scheme, this narrating mode of description is only for clarity sake, description should can also be formed, through appropriately combined, other embodiments that it will be appreciated by those skilled in the art that as an entirety, the technical scheme in each embodiment by those skilled in the art.
Claims (5)
1. an internet security network technology, including inductive layer, processes layer and Internet, it is characterised in that: described inductive layer is made up of finger print input device or voice input device;
Described process layer is made up of single-chip microcomputer and VPN chip;
Described Internet is a kind of internal lan;
Inductive layer receives user data, processes by processing layer, eventually enters into Internet.
A kind of internet security network technology the most according to claim 1, it is characterized in that: described finger print input device is worked in coordination with single-chip microcomputer and received user data, finger print input device gathers the finger print information of user, and generate fingerprint image, transmit to single-chip microcomputer, single-chip microcomputer is to this fingerprint image preprocessing, after carrying out extreme value filtering, once smooth, sharpening and secondary smooth operation, carry out binaryzation calculating, then micronization processes, the characteristic point taken the fingerprint carries out fingerprint matching and is then stored in fingerprint base, completes the operation of fingerprint pre-entered.
A kind of internet security network technology the most according to claim 1 and 2, it is characterized in that: described finger print input device works in coordination with single-chip microcomputer processes user data, user inputs finger print information by finger print input device, finger print input device carries out extraction process to this finger print information, it is then transmit in single-chip microcomputer, single-chip microcomputer is by mating this fingerprint, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this finger print information is strengthened template database to fingerprint base simultaneously, if it fails to match, then exit and operate before this, feedback information is in finger print input device simultaneously, user is reminded to re-enter.
A kind of internet security network technology the most according to claim 1, it is characterized in that: described voice input device is worked in coordination with single-chip microcomputer and received user data, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out framing, preemphasis, windowing, FFT, MEL filtering, LOG, DCT and MFCC process to this information of acoustic wave, then sets up sound model and is stored in voice bank.
5. according to a kind of internet security network technology described in claim 1 or 4, it is characterized in that: described voice input device works in coordination with single-chip microcomputer processes user data, user inputs information of acoustic wave by voice input device, voice input device gathers the information of acoustic wave of user, and transmit to single-chip microcomputer, single-chip microcomputer carries out feature extraction to this information of acoustic wave, then contrast with the sound model being stored in voice bank, if the match is successful, then complete checking, by VPN chip, user is introduced Internet, the transmission of this acoustic information is strengthened template database to voice bank simultaneously, if it fails to match, then exit and operate before this, feedback information is in acoustic input device simultaneously, user is reminded to re-enter.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610335775.3A CN106022042A (en) | 2016-05-20 | 2016-05-20 | Internet safety net technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610335775.3A CN106022042A (en) | 2016-05-20 | 2016-05-20 | Internet safety net technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106022042A true CN106022042A (en) | 2016-10-12 |
Family
ID=57095459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610335775.3A Pending CN106022042A (en) | 2016-05-20 | 2016-05-20 | Internet safety net technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022042A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101556713A (en) * | 2009-05-08 | 2009-10-14 | 抚顺金道科技有限公司 | Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser |
CN101714918A (en) * | 2009-10-23 | 2010-05-26 | 浙江维尔生物识别技术股份有限公司 | Safety system for logging in VPN and safety method for logging in VPN |
CN101901332A (en) * | 2009-05-31 | 2010-12-01 | 上海点佰趣信息科技有限公司 | Fingerprint identification system and method |
CN102195949A (en) * | 2010-03-16 | 2011-09-21 | 邵宇 | Fingerprint verification method for virtual private network (VPN) |
US20120110658A1 (en) * | 2008-07-09 | 2012-05-03 | Zte Corporation | Authentication server and method for controlling mobile communication terminal access to virtual private network |
CN103761502A (en) * | 2013-12-26 | 2014-04-30 | 福建伊时代信息科技股份有限公司 | Safety certification device and method |
CN104732972A (en) * | 2015-03-12 | 2015-06-24 | 广东外语外贸大学 | HMM voiceprint recognition signing-in method and system based on grouping statistics |
US20150188916A1 (en) * | 2012-09-14 | 2015-07-02 | Kabushiki Kaisha Toshiba | Vpn connection authentication system, user terminal, authentication server, biometric authentication result evidence information verification server, vpn connection server, and computer program product |
-
2016
- 2016-05-20 CN CN201610335775.3A patent/CN106022042A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120110658A1 (en) * | 2008-07-09 | 2012-05-03 | Zte Corporation | Authentication server and method for controlling mobile communication terminal access to virtual private network |
CN101556713A (en) * | 2009-05-08 | 2009-10-14 | 抚顺金道科技有限公司 | Application process of fingerprint identification technology on POS machine, imprinter and cash dispenser |
CN101901332A (en) * | 2009-05-31 | 2010-12-01 | 上海点佰趣信息科技有限公司 | Fingerprint identification system and method |
CN101714918A (en) * | 2009-10-23 | 2010-05-26 | 浙江维尔生物识别技术股份有限公司 | Safety system for logging in VPN and safety method for logging in VPN |
CN102195949A (en) * | 2010-03-16 | 2011-09-21 | 邵宇 | Fingerprint verification method for virtual private network (VPN) |
US20150188916A1 (en) * | 2012-09-14 | 2015-07-02 | Kabushiki Kaisha Toshiba | Vpn connection authentication system, user terminal, authentication server, biometric authentication result evidence information verification server, vpn connection server, and computer program product |
CN103761502A (en) * | 2013-12-26 | 2014-04-30 | 福建伊时代信息科技股份有限公司 | Safety certification device and method |
CN104732972A (en) * | 2015-03-12 | 2015-06-24 | 广东外语外贸大学 | HMM voiceprint recognition signing-in method and system based on grouping statistics |
Non-Patent Citations (1)
Title |
---|
郝玉洁等: ""基于指纹识别的VPN身份认证研究"", 《计算机应用》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7466711B2 (en) | System and method for using relationship structures for email classification - Patents.com | |
CN107004090A (en) | For determining the dangerous statistical analysis technique that the content based on file is brought | |
CN103842985A (en) | Security-enhanced cloud system and security management method thereby | |
CN103294939B (en) | For the method and system of virtual avatar authentication | |
Dash et al. | Are ChatGPT and deepfake algorithms endangering the cybersecurity industry? A review | |
WO2008033236A2 (en) | System and methods for an identity theft protection bot | |
CN104954138B (en) | Based on the dynamic password formation method of iris information | |
WO2014145395A2 (en) | System and method for consumer fraud protection | |
Chertoff | Exploding Data: Reclaiming Our Cyber Security in the Digital Age | |
CN103081411A (en) | Network service | |
CN104657650A (en) | Method and device for data input or authentication | |
CN108881230A (en) | A kind of safe transmission method and device of government affairs big data | |
CN106611133A (en) | Risk identification method and equipment | |
US9432344B2 (en) | Secure storage and sharing of user objects | |
CN103870502A (en) | Enterprise mobile social network system based on face recognition | |
CN108650289A (en) | A kind of method and apparatus of the management data based on block chain | |
Shackelford et al. | Have you updated your toaster? Transatlantic approaches to governing the internet of everything | |
CN104486310A (en) | Method and system for authenticating finger veins and finger vein information acquisition instrument | |
CN114090994A (en) | Face recognition authentication method and system based on block chain | |
CN106022042A (en) | Internet safety net technology | |
Shackelford et al. | Is it time for a national cybersecurity safety board? Examining the policy implications and political pushback | |
Zajko | Canada’s cyber security and the changing threat landscape | |
CN110381037B (en) | Safety protection system based on electronic bidding purchase transaction platform | |
CN106919855A (en) | A kind of law enforcement evidence-obtaining system and its evidence collecting method based on USB flash disk | |
US9379897B1 (en) | Method and apparatus for providing an interactive hierarchical entitlement map |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |
|
RJ01 | Rejection of invention patent application after publication |