CN110868417A - Network management system and network management method - Google Patents

Network management system and network management method Download PDF

Info

Publication number
CN110868417A
CN110868417A CN201911126599.2A CN201911126599A CN110868417A CN 110868417 A CN110868417 A CN 110868417A CN 201911126599 A CN201911126599 A CN 201911126599A CN 110868417 A CN110868417 A CN 110868417A
Authority
CN
China
Prior art keywords
module
user
network management
management system
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911126599.2A
Other languages
Chinese (zh)
Inventor
夏正新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN201911126599.2A priority Critical patent/CN110868417A/en
Publication of CN110868417A publication Critical patent/CN110868417A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a network management system and a network management method, wherein the network management system comprises an identity authentication module, a password authentication strengthening module and a security scanning module, wherein the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of a user and match the password input by the user; the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user; the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to guarantee the security of the network management system. Compared with the prior art, the network management system has the advantages of identity authentication, password authentication enhancement and safety scanning, and the safety of the network management system is further enhanced.

Description

Network management system and network management method
Technical Field
The invention relates to a network management system and a network management method, belonging to the technical field of network management.
Background
Network management involves the use, integration and coordination of hardware, software and human resources to monitor, test, configure, analyze, evaluate and control network resources so that certain network needs, such as real-time performance, quality of service, etc., can be met at a reasonable price. In addition, when the network fails, the system can report and process in time, and can coordinate and maintain the efficient operation of the network system.
The safety factor of the existing network management system is low when the system is used, the user login is not verified, and the account number and the password are easy to steal by people, so that any person can use the network; the cross-site script refers to data with malicious purpose in a remote Web page, and when the browser downloads the page, the malicious script embedded in the page is interpreted and executed, so that a client user is injured.
In view of the above, it is necessary to provide a network management system and a network management method to solve the above problems.
Disclosure of Invention
The invention aims to provide a network management system with higher safety coefficient.
To achieve the above object, the present invention provides a network management system, including:
the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of the user and match the password input by the user;
the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user;
and the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to ensure the security of the network management system.
Optionally, the password login module is configured to input a password, where the password includes a character type input and a coding symbol type input;
the data analysis module is used for comparing and analyzing user names input by users;
the number checking and seating module is used for generating a dialog box for inputting a password and generating a graphic verification code.
Optionally, the login request display module is used for limiting unfamiliar access;
the face recognition module logs in by matching the face of the user;
the login limiting module limits the user to log in when the user continuously inputs wrong passwords twice;
the inertial operation module is used for logging in according to the operation habit of the user.
Optionally, the password authentication enhancing module may be selectively turned on or off.
Optionally, the website identification module includes a notification interception module, so that when a malicious script is identified, the malicious script is intercepted by the notification interception module;
the self-security module is used for controlling the identity of a user, the function points allowed to be used, the integrity of a relevant scanning strategy and configuration files and the legality of software use;
the virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting external similar malicious script information.
Optionally, the network management system further includes a user login module, so that a user can register and log in.
Optionally, the network management system further includes a Web server for reading the database and the related file.
The invention also aims to provide a network management method for carrying out safety management on the network management system.
In order to achieve the above object, the present invention provides a network management method, which mainly comprises the following steps:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
Optionally, the password authentication enhancing module may be selectively turned on or off.
Optionally, the password authentication enhancing module includes:
the login request display module is used for limiting unfamiliar access;
the face recognition module is used for logging in by matching the face of the user;
the login limiting module is used for limiting the user to log in when the user continuously inputs wrong passwords twice;
and the inertia operation module is used for logging in according to the operation habit of the user.
The invention has the beneficial effects that: the network management system has the advantages of identity authentication, password authentication enhancement and safety scanning, and further enhances the safety of the network management system.
Drawings
Fig. 1 is a schematic structural diagram of the network management system of the present invention.
Fig. 2 is a schematic structural diagram of the identity verification module in fig. 1.
Fig. 3 is a schematic structural diagram of the password authentication enhancing module in fig. 1.
Fig. 4 is a schematic structural diagram of the security scanning module in fig. 1.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific embodiments.
As shown in fig. 1, the present invention discloses a network management system, which includes a user login module, an authentication module, a password authentication enhancement module, a security scanning module, and a Web server. After the user passes identity authentication, password enhanced authentication and security scanning, the user can browse the network through the Web server.
The Web server is a working module of the network management system, after logging in through a user login module, a user sends a browsing request to the Web server through a browser, the Web server receives the browsing request, runs a program according to the content of the request, generates a corresponding page, and finally sends the page back to the browser so as to read a database and related files.
As shown in fig. 2, the authentication module includes a data analysis module, a password login module, and a number-checking module to verify the user identity and match the password input by the user. The password login module is used for inputting passwords, and comprises character type input and coding symbol type input.
The data analysis module is used for analyzing the user name input by the user, analyzing and comparing the user name with the data input last time, inputting the password after the user name is successfully matched, and finally inputting the graphic verification code through the number matching module for verification.
The number matching and seating module is used for generating a dialog box for inputting a password, when the password is input and matched unsuccessfully, a character pattern with a wrong password can be popped up and matched again, after the password is matched successfully, a graphic verification code can be displayed on a screen, and the system can allow a user to log in when all the users pass through the given graphic input corresponding verification code, so that the safety factor of identity authentication is greatly enhanced.
As shown in fig. 3, the password authentication enhancing module includes a login request display module, a face recognition module, a login limiting module and an inertial operation module, and is used to enhance the authentication to protect the login security of the user.
Generally, when the password strength is weak or the password is not authorized, anyone can log in through password authentication, so in order to enhance the security of the system, a login request display module is used for limiting unfamiliar access, in other words, after the password login is successfully matched, a login request needs to be sent to a mobile phone of a user, and the user can log in through authentication after the password is allowed to be successfully matched.
The face recognition module is used for inputting the face of a user in advance, analyzing the proportion of the facial features of the current login person in the login process, matching the facial features of the face of the user which is input in advance in the system, and logging in through verification after matching is successful.
The login limiting module is used for limiting the user to log in, in other words, when the user inputs the password error twice continuously, the user is limited to log in within a period of time.
The inertial operation module sets and memorizes according to the operation habit of a user, after a password is successfully input and login is carried out, a circular ring-shaped pattern can be displayed on a screen, the user needs to rotate anticlockwise or clockwise, and if the user carries out wrong operation, the user is limited to login.
It will be appreciated that the password authentication enforcement module may be selectively turned on or off. In other words, the user may open or close the password authentication enhancing module according to the needs of the user, and may be opened all the time, or may be closed all the time, or may be opened when needed, or may be closed when not needed, which is not limited herein.
As shown in fig. 4, the security scanning module includes a website identification module, a self security module, and a virus matching analysis module, and is configured to scan and intercept a malicious script to ensure the security of the network management system.
The website identification module comprises a notification interception module, and when the webpage is sent back to the browser, the website identification module identifies the malicious script possibly embedded in the webpage and then intercepts the malicious script through the notification interception module.
The self-security module is responsible for controlling the identity of a user, the allowed function points, the integrity of related scanning strategies and configuration files and the legality of software use.
The virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting similar malicious script information in the outside.
In combination with the above description of the network management system, the present invention further provides a network management method for performing security management on the network management system, which mainly includes the following steps:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
In summary, compared with the prior art, the network management system of the present invention has the advantages of identity authentication, enhanced password authentication and security scanning, and further enhances the security of the network management system.
Although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the spirit and scope of the present invention.

Claims (10)

1. A network management system, comprising:
the identity authentication module comprises a data analysis module, a password login module and a number checking and seat entering module so as to authenticate the identity of the user and match the password input by the user;
the password authentication strengthening module comprises a login request display module, a face recognition module, a login limiting module and an inertial operation module and is used for strengthening identity authentication to protect the login safety of a user;
and the security scanning module comprises a website identification module, a self security module and a virus matching analysis module and is used for scanning and intercepting malicious scripts so as to ensure the security of the network management system.
2. The network management system according to claim 1, wherein: the password login module is used for inputting passwords, and comprises character type input and coding symbol type input;
the data analysis module is used for comparing and analyzing user names input by users;
the number checking and seating module is used for generating a dialog box for inputting a password and generating a graphic verification code.
3. The network management system according to claim 1, wherein: the login request display module is used for limiting unfamiliar access;
the face recognition module logs in by matching the face of the user;
the login limiting module limits the user to log in when the user continuously inputs wrong passwords twice;
the inertial operation module is used for logging in according to the operation habit of the user.
4. The network management system according to claim 1, wherein: the password authentication enhancement module can be selectively turned on or off.
5. The network management system according to claim 1, wherein: the website identification module comprises a notification interception module, and the notification interception module is used for intercepting the malicious script when the malicious script is identified;
the self-security module is used for controlling the identity of a user, the function points allowed to be used, the integrity of a relevant scanning strategy and configuration files and the legality of software use;
the virus matching analysis module comprises a data receiving module and an information interception module, the data receiving module is used for receiving analyzed malicious script information, and the information interception module is used for intercepting external similar malicious script information.
6. The network management system according to claim 1, wherein: the network management system also comprises a user login module so that a user can register and log in.
7. The network management system according to claim 1, wherein: the network management system also comprises a Web server used for reading the database and the related files.
8. A network management method applied to the network management system according to any one of claims 1 to 7, the network management method mainly comprising the steps of:
step 1: when logging in through the user login module, the identity authentication module authenticates the user identity and the password input by the user;
step 2: after the identity authentication is passed, the password authentication strengthening module carries out identity authentication again;
and step 3: after login is successful, a browsing request is sent to a Web server through a browser;
and 4, step 4: the Web server receives the browsing request, runs the program according to the request content, generates a corresponding page, and sends the generated webpage back to the browser so as to read the database and related files;
and 5: when the web page is sent back to the browser, the security scanning module performs security scanning on the web page.
9. The network management method according to claim 8, wherein: the password authentication enhancement module can be selectively turned on or off.
10. The network management method of claim 9, wherein the cryptographic authentication enforcement module comprises:
the login request display module is used for limiting unfamiliar access;
the face recognition module is used for logging in by matching the face of the user;
the login limiting module is used for limiting the user to log in when the user continuously inputs wrong passwords twice;
and the inertia operation module is used for logging in according to the operation habit of the user.
CN201911126599.2A 2019-11-18 2019-11-18 Network management system and network management method Pending CN110868417A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911126599.2A CN110868417A (en) 2019-11-18 2019-11-18 Network management system and network management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911126599.2A CN110868417A (en) 2019-11-18 2019-11-18 Network management system and network management method

Publications (1)

Publication Number Publication Date
CN110868417A true CN110868417A (en) 2020-03-06

Family

ID=69654827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911126599.2A Pending CN110868417A (en) 2019-11-18 2019-11-18 Network management system and network management method

Country Status (1)

Country Link
CN (1) CN110868417A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN105357196A (en) * 2015-11-03 2016-02-24 北京铭嘉实咨询有限公司 Network login method and system
CN106250739A (en) * 2016-07-19 2016-12-21 柳州龙辉科技有限公司 A kind of identity recognition device
CN109829293A (en) * 2018-12-29 2019-05-31 360企业安全技术(珠海)有限公司 Defend method and device, the system, storage medium, electronic device of browser

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104469767A (en) * 2014-10-28 2015-03-25 杭州电子科技大学 Implementation method for integrated security protection subsystem of mobile office system
CN105357196A (en) * 2015-11-03 2016-02-24 北京铭嘉实咨询有限公司 Network login method and system
CN106250739A (en) * 2016-07-19 2016-12-21 柳州龙辉科技有限公司 A kind of identity recognition device
CN109829293A (en) * 2018-12-29 2019-05-31 360企业安全技术(珠海)有限公司 Defend method and device, the system, storage medium, electronic device of browser

Similar Documents

Publication Publication Date Title
US11405380B2 (en) Systems and methods for using imaging to authenticate online users
US9032217B1 (en) Device-specific tokens for authentication
WO2017000829A1 (en) Method for checking security based on biological features, client and server
US20100154066A1 (en) System and Method for Managing Security Testing
CN106453422B (en) Dynamic authentication method and system based on mobile terminal
KR20050058296A (en) Method and system for monitoring user interaction with a computer
CN110569658A (en) User information processing method and device based on block chain network, electronic equipment and storage medium
CN113536258A (en) Terminal access control method and device, storage medium and electronic equipment
US20160261582A1 (en) System for secure login, and method and apparatus for same
US20220046047A1 (en) Monitoring and Preventing Remote User Automated Cyber Attacks
JP2017507552A (en) Method and apparatus for providing client-side score-based authentication
CN104158664A (en) Identity authentication method and system
US11775853B2 (en) Systems, methods and apparatus for evaluating status of computing device user
Bakar et al. Adaptive authentication based on analysis of user behavior
CN106375348A (en) Portal authentication method and Portal authentication device
CN109040030A (en) Single-point logging method and system
US20070143830A1 (en) Method, apparatus and system for preventing unauthorized access to password-protected system
CN112118238A (en) Method, device, system, equipment and storage medium for authentication login
US20180039771A1 (en) Method of and server for authorizing execution of an application on an electronic device
WO2021262680A1 (en) Distributed endpoint security architecture automated by artificial intelligence
Plata et al. Application of time-based one time password (TOTP) algorithm for human resource e-leave tracking web app
CN107491670A (en) A kind of Windows system safe login methods based on OTP algorithm
CN110868417A (en) Network management system and network management method
US20220092166A1 (en) Mobile device as a computer authenticator
He et al. Understanding mobile banking applications’ security risks through blog mining and the workflow technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200306

RJ01 Rejection of invention patent application after publication