CN110868417A - Network management system and network management method - Google Patents
Network management system and network management method Download PDFInfo
- Publication number
- CN110868417A CN110868417A CN201911126599.2A CN201911126599A CN110868417A CN 110868417 A CN110868417 A CN 110868417A CN 201911126599 A CN201911126599 A CN 201911126599A CN 110868417 A CN110868417 A CN 110868417A
- Authority
- CN
- China
- Prior art keywords
- module
- user
- network management
- management system
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
The invention provides a network management system and a network management method, wherein the network management system comprises an identity authentication module, a password authentication strengthening module and a security scanning module, wherein the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of a user and match the password input by the user; the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user; the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to guarantee the security of the network management system. Compared with the prior art, the network management system has the advantages of identity authentication, password authentication enhancement and safety scanning, and the safety of the network management system is further enhanced.
Description
Technical Field
The invention relates to a network management system and a network management method, belonging to the technical field of network management.
Background
Network management involves the use, integration and coordination of hardware, software and human resources to monitor, test, configure, analyze, evaluate and control network resources so that certain network needs, such as real-time performance, quality of service, etc., can be met at a reasonable price. In addition, when the network fails, the system can report and process in time, and can coordinate and maintain the efficient operation of the network system.
The safety factor of the existing network management system is low when the system is used, the user login is not verified, and the account number and the password are easy to steal by people, so that any person can use the network; the cross-site script refers to data with malicious purpose in a remote Web page, and when the browser downloads the page, the malicious script embedded in the page is interpreted and executed, so that a client user is injured.
In view of the above, it is necessary to provide a network management system and a network management method to solve the above problems.
Disclosure of Invention
The invention aims to provide a network management system with higher safety coefficient.
To achieve the above object, the present invention provides a network management system, including:
the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of the user and match the password input by the user;
the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user;
and the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to ensure the security of the network management system.
Optionally, the password login module is configured to input a password, where the password includes a character type input and a coding symbol type input;
the data analysis module is used for comparing and analyzing user names input by users;
the number checking and seating module is used for generating a dialog box for inputting a password and generating a graphic verification code.
Optionally, the login request display module is used for limiting unfamiliar access;
the face recognition module logs in by matching the face of the user;
the login limiting module limits the user to log in when the user continuously inputs wrong passwords twice;
the inertial operation module is used for logging in according to the operation habit of the user.
Optionally, the password authentication enhancing module may be selectively turned on or off.
Optionally, the website identification module includes a notification interception module, so that when a malicious script is identified, the malicious script is intercepted by the notification interception module;
the self-security module is used for controlling the identity of a user, the function points allowed to be used, the integrity of a relevant scanning strategy and configuration files and the legality of software use;
the virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting external similar malicious script information.
Optionally, the network management system further includes a user login module, so that a user can register and log in.
Optionally, the network management system further includes a Web server for reading the database and the related file.
The invention also aims to provide a network management method for carrying out safety management on the network management system.
In order to achieve the above object, the present invention provides a network management method, which mainly comprises the following steps:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
Optionally, the password authentication enhancing module may be selectively turned on or off.
Optionally, the password authentication enhancing module includes:
the login request display module is used for limiting unfamiliar access;
the face recognition module is used for logging in by matching the face of the user;
the login limiting module is used for limiting the user to log in when the user continuously inputs wrong passwords twice;
and the inertia operation module is used for logging in according to the operation habit of the user.
The invention has the beneficial effects that: the network management system has the advantages of identity authentication, password authentication enhancement and safety scanning, and further enhances the safety of the network management system.
Drawings
Fig. 1 is a schematic structural diagram of the network management system of the present invention.
Fig. 2 is a schematic structural diagram of the identity verification module in fig. 1.
Fig. 3 is a schematic structural diagram of the password authentication enhancing module in fig. 1.
Fig. 4 is a schematic structural diagram of the security scanning module in fig. 1.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
As shown in fig. 1, the present invention discloses a network management system, which includes a user login module, an authentication module, a password authentication enhancement module, a security scanning module, and a Web server. After the user passes identity authentication, password enhanced authentication and security scanning, the user can browse the network through the Web server.
The Web server is a working module of the network management system, after logging in through a user login module, a user sends a browsing request to the Web server through a browser, the Web server receives the browsing request, runs a program according to the content of the request, generates a corresponding page, and finally sends the page back to the browser so as to read a database and related files.
As shown in fig. 2, the authentication module includes a data analysis module, a password login module, and a number-checking module to verify the user identity and match the password input by the user. The password login module is used for inputting passwords, and comprises character type input and coding symbol type input.
The data analysis module is used for analyzing the user name input by the user, analyzing and comparing the user name with the data input last time, inputting the password after the user name is successfully matched, and finally inputting the graphic verification code through the number matching module for verification.
The number matching and seating module is used for generating a dialog box for inputting a password, when the password is input and matched unsuccessfully, a character pattern with a wrong password can be popped up and matched again, after the password is matched successfully, a graphic verification code can be displayed on a screen, and the system can allow a user to log in when all the users pass through the given graphic input corresponding verification code, so that the safety factor of identity authentication is greatly enhanced.
As shown in fig. 3, the password authentication enhancing module includes a login request display module, a face recognition module, a login limiting module and an inertial operation module, and is used to enhance the authentication to protect the login security of the user.
Generally, when the password strength is weak or the password is not authorized, anyone can log in through password authentication, so in order to enhance the security of the system, a login request display module is used for limiting unfamiliar access, in other words, after the password login is successfully matched, a login request needs to be sent to a mobile phone of a user, and the user can log in through authentication after the password is allowed to be successfully matched.
The face recognition module is used for inputting the face of a user in advance, analyzing the proportion of the facial features of the current login person in the login process, matching the facial features of the face of the user which is input in advance in the system, and logging in through verification after matching is successful.
The login limiting module is used for limiting the user to log in, in other words, when the user inputs the password error twice continuously, the user is limited to log in within a period of time.
The inertial operation module sets and memorizes according to the operation habit of a user, after a password is successfully input and login is carried out, a circular ring-shaped pattern can be displayed on a screen, the user needs to rotate anticlockwise or clockwise, and if the user carries out wrong operation, the user is limited to login.
It will be appreciated that the password authentication enforcement module may be selectively turned on or off. In other words, the user may open or close the password authentication enhancing module according to the needs of the user, and may be opened all the time, or may be closed all the time, or may be opened when needed, or may be closed when not needed, which is not limited herein.
As shown in fig. 4, the security scanning module includes a website identification module, a self security module, and a virus matching analysis module, and is configured to scan and intercept a malicious script to ensure the security of the network management system.
The website identification module comprises a notification interception module, and when the webpage is sent back to the browser, the website identification module identifies the malicious script possibly embedded in the webpage and then intercepts the malicious script through the notification interception module.
The self-security module is responsible for controlling the identity of a user, the allowed function points, the integrity of related scanning strategies and configuration files and the legality of software use.
The virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting similar malicious script information in the outside.
In combination with the above description of the network management system, the present invention further provides a network management method for performing security management on the network management system, which mainly includes the following steps:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
In summary, compared with the prior art, the network management system of the present invention has the advantages of identity authentication, enhanced password authentication and security scanning, and further enhances the security of the network management system.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.
Claims (10)
1. A network management system, comprising:
the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of the user and match the password input by the user;
the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user;
and the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to ensure the security of the network management system.
2. The network management system according to claim 1, wherein: the password login module is used for inputting passwords, and comprises character type input and coding symbol type input;
the data analysis module is used for comparing and analyzing user names input by users;
the number checking and seating module is used for generating a dialog box for inputting a password and generating a graphic verification code.
3. The network management system according to claim 1, wherein: the login request display module is used for limiting unfamiliar access;
the face recognition module logs in by matching the face of the user;
the login limiting module limits the user to log in when the user continuously inputs wrong passwords twice;
the inertial operation module is used for logging in according to the operation habit of the user.
4. The network management system according to claim 1, wherein: the password authentication enhancement module can be selectively turned on or off.
5. The network management system according to claim 1, wherein: the website identification module comprises a notification interception module, and the notification interception module is used for intercepting the malicious script when the malicious script is identified;
the self-security module is used for controlling the identity of a user, the function points allowed to be used, the integrity of a relevant scanning strategy and configuration files and the legality of software use;
the virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting external similar malicious script information.
6. The network management system according to claim 1, wherein: the network management system also comprises a user login module so that a user can register and log in.
7. The network management system according to claim 1, wherein: the network management system also comprises a Web server used for reading the database and the related files.
8. A network management method applied to the network management system according to any one of claims 1 to 7, the network management method mainly comprising the steps of:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
9. The network management method according to claim 8, wherein: the password authentication enhancement module can be selectively turned on or off.
10. The network management method of claim 9, wherein the cryptographic authentication enforcement module comprises:
the login request display module is used for limiting unfamiliar access;
the face recognition module is used for logging in by matching the face of the user;
the login limiting module is used for limiting the user to log in when the user continuously inputs wrong passwords twice;
and the inertia operation module is used for logging in according to the operation habit of the user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911126599.2A CN110868417A (en) | 2019-11-18 | 2019-11-18 | Network management system and network management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911126599.2A CN110868417A (en) | 2019-11-18 | 2019-11-18 | Network management system and network management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110868417A true CN110868417A (en) | 2020-03-06 |
Family
ID=69654827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911126599.2A Pending CN110868417A (en) | 2019-11-18 | 2019-11-18 | Network management system and network management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110868417A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104469767A (en) * | 2014-10-28 | 2015-03-25 | 杭州电子科技大学 | Implementation method for integrated security protection subsystem of mobile office system |
CN105357196A (en) * | 2015-11-03 | 2016-02-24 | 北京铭嘉实咨询有限公司 | Network login method and system |
CN106250739A (en) * | 2016-07-19 | 2016-12-21 | 柳州龙辉科技有限公司 | A kind of identity recognition device |
CN109829293A (en) * | 2018-12-29 | 2019-05-31 | 360企业安全技术(珠海)有限公司 | Defend method and device, the system, storage medium, electronic device of browser |
-
2019
- 2019-11-18 CN CN201911126599.2A patent/CN110868417A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104469767A (en) * | 2014-10-28 | 2015-03-25 | 杭州电子科技大学 | Implementation method for integrated security protection subsystem of mobile office system |
CN105357196A (en) * | 2015-11-03 | 2016-02-24 | 北京铭嘉实咨询有限公司 | Network login method and system |
CN106250739A (en) * | 2016-07-19 | 2016-12-21 | 柳州龙辉科技有限公司 | A kind of identity recognition device |
CN109829293A (en) * | 2018-12-29 | 2019-05-31 | 360企业安全技术(珠海)有限公司 | Defend method and device, the system, storage medium, electronic device of browser |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11405380B2 (en) | Systems and methods for using imaging to authenticate online users | |
US9032217B1 (en) | Device-specific tokens for authentication | |
WO2017000829A1 (en) | Method for checking security based on biological features, client and server | |
US20100154066A1 (en) | System and Method for Managing Security Testing | |
CN106453422B (en) | Dynamic authentication method and system based on mobile terminal | |
KR20050058296A (en) | Method and system for monitoring user interaction with a computer | |
CN110569658A (en) | User information processing method and device based on block chain network, electronic equipment and storage medium | |
CN113536258A (en) | Terminal access control method and device, storage medium and electronic equipment | |
US20160261582A1 (en) | System for secure login, and method and apparatus for same | |
US20220046047A1 (en) | Monitoring and Preventing Remote User Automated Cyber Attacks | |
JP2017507552A (en) | Method and apparatus for providing client-side score-based authentication | |
CN104158664A (en) | Identity authentication method and system | |
US11775853B2 (en) | Systems, methods and apparatus for evaluating status of computing device user | |
Bakar et al. | Adaptive authentication based on analysis of user behavior | |
CN106375348A (en) | Portal authentication method and Portal authentication device | |
CN109040030A (en) | Single-point logging method and system | |
US20070143830A1 (en) | Method, apparatus and system for preventing unauthorized access to password-protected system | |
CN112118238A (en) | Method, device, system, equipment and storage medium for authentication login | |
US20180039771A1 (en) | Method of and server for authorizing execution of an application on an electronic device | |
WO2021262680A1 (en) | Distributed endpoint security architecture automated by artificial intelligence | |
Plata et al. | Application of time-based one time password (TOTP) algorithm for human resource e-leave tracking web app | |
CN107491670A (en) | A kind of Windows system safe login methods based on OTP algorithm | |
CN110868417A (en) | Network management system and network management method | |
US20220092166A1 (en) | Mobile device as a computer authenticator | |
He et al. | Understanding mobile banking applications’ security risks through blog mining and the workflow technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200306 |
|
RJ01 | Rejection of invention patent application after publication |