CN209435252U - A kind of backup verifying network system - Google Patents

A kind of backup verifying network system Download PDF

Info

Publication number
CN209435252U
CN209435252U CN201821963242.0U CN201821963242U CN209435252U CN 209435252 U CN209435252 U CN 209435252U CN 201821963242 U CN201821963242 U CN 201821963242U CN 209435252 U CN209435252 U CN 209435252U
Authority
CN
China
Prior art keywords
module
output end
input terminal
subsystem
connect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201821963242.0U
Other languages
Chinese (zh)
Inventor
钱琳
王琳
陈海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NARI Group Corp
Nari Technology Co Ltd
Original Assignee
NARI Group Corp
Nari Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NARI Group Corp, Nari Technology Co Ltd filed Critical NARI Group Corp
Priority to CN201821963242.0U priority Critical patent/CN209435252U/en
Application granted granted Critical
Publication of CN209435252U publication Critical patent/CN209435252U/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The utility model discloses a kind of backup verifying network system, the system includes client, verify subsystem, processor, backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password authentication module and collector, the face verification module, the input terminal of fingerprint authentication module and password authentication module is connect with the output end of client, the face verification module, fingerprint authentication module, the output end of password authentication module is connect with the input terminal of collector, the output end of the collector is connected with the input terminal of backup subsystem and processor input terminal respectively;The output end of the processor is connect with the input terminal of client and secure subsystem respectively, and the output end of the secure subsystem is connect with the client.The utility model can monitor the verifying of identity information in real time, in several ways, facilitate the selection of user, and back up in realtime and can ensure the safety of data in use.

Description

A kind of backup verifying network system
Technical field
The utility model relates to technical field of the computer network, in particular to network system is verified in a kind of backup.
Background technique
With the rapid development of Internet, how to manage these mass data resources, enable with it is safe and efficient, one It is the huge difficult and challenge that data resource management faces under current cloud environment that the mode of cause, which provides on-demand service,.It is existing Network Management System be made of stocking system, analysis system and management system three parts, the workflow of the stocking system As follows: user logs in: inputting account, password and identifying code by user client and logs in cloud platform;It is verified: cloud platform pair Whether the information than user's input is correct;Verification result: information will correctly log in cloud platform, and information errors cloud platform steps on refusal Record;Data upload: user will need the data uploaded to upload to cloud platform;Automated back-up: the number that cloud platform uploads user It is corresponding in cloud platform other than the data that the working interface that user sees has it to upload according to back-up processing will be carried out automatically Automatically the data of user's upload are replicated in recovery district;Log saves: current operation is automatically generated journal file and recorded by cloud platform Get off, and log is saved;Data processing: the data that cloud platform is uploaded according to certain program processing;User publishes: user moves back Cloud platform out;
The workflow of the analysis system is as follows: data upload: the data that user is analysed to upload in cloud platform; Inside retrieval: cloud platform the data of upload are carried out in the workspace of the user inside retrieve;Search result analysis: according to number According to title retrieve whether have polyisomenism in the workspace of the user of cloud platform;Result treatment: if file name is without weight Recurrent images, direct Backup Data analyze the details of the duplicate file of title if file name has repetition;Interface is aobvious Show: the details of file and file of the same name are shown on the interface of user client;User's selection: user is to text of the same name How part selection is operated;Choosing is then fed back: the choosing that user is carried out on the client is then in synchronous feedback to cloud platform;Log Save: current operation is automatically generated journal file and recorded by cloud platform, and log is saved;Data processing: cloud platform The data uploaded according to certain program processing;User publishes: user exits cloud platform;
The workflow of the management system is as follows: management starts: cloud platform is managed data;Analysis is sorted out: cloud The data that platform uploads user are analyzed and are sorted out according to analysis result to data;Trend analysis: according to just input Data and historical data induction and conclusion is carried out to the data under the same classification, and analyze relevant development trend;Chart Production: the data development trend analyzed is fabricated to table or line chart;
Backstage saves: the table made or line chart are saved in the backstage of cloud platform;Management terminates: data management It completes.
The verifying system that existing management system is arranged when logging in, improves the safety of cloud platform, but system is adopted It has taken and has directly been verified according to data information in the mode that insider information system searches comparison, such mode cannot will be logged in and be tested The user and outsourcing malice inquiry system for demonstrate,proving information distinguish, and outsourcing malice inquiry system is caused to be able to enter in the account of user The personal information of user is stolen, safety is not high enough.
Utility model content
Purpose of utility model: the utility model provide one kind can client use when automated back-up, can be by more Kind mode login system and the safety that can ensure that user account data, the backup verifying network system for avoiding information from being stolen.
Technical solution: a kind of backup verifying network system, the system include: client, verifying subsystem, processing Device, backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password Authentication module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module with visitor The output end at family end connects, the face verification module, fingerprint authentication module, password authentication module output end and collector Input terminal connection, the input terminal of the collector also connect with the output end of client, and the output end of the collector divides It is not connected with the input terminal of backup subsystem and processor input terminal;The input terminal of the processor also with backup subsystem Output end be connected, the output end of the processor is connect with the input terminal of client and secure subsystem respectively, described The output end of secure subsystem connect with the client.
Further, the secure subsystem includes controller, access limitation module and alarm module, the controller Input terminal connect with the output end of the processor, the output end of the controller respectively with access limitation module and alarm The input terminal of module connects, and the access limitation module and the output end of alarm module and the input terminal of the client connect It connects.
Further, the backup subsystem includes that module, encrypting module, database and analysis module are integrated in classification;Institute The input terminal that module is integrated in the classification stated is connect with the output end of the collector, and the output end point of module is integrated in the classification It not being connect with the input terminal of analysis module and encrypting module, the output end of the encrypting module and the input terminal of database connect, The input terminal of the database and the output end of analysis module connect, and the output end of the database is defeated with the processor Enter end connection.
Further, the face verification module includes camera and three-dimensional skeleton model structural unit.
Further, the external device of the fingerprint authentication module is IBM integrated form Fingerprint Identification Unit.
Further, the collector be signal picker, and the key of signal picker mutually input mutually inputted for 2 road keys it is logical Road.
The utility model has the advantages that the utility model can monitor the verifying of identity information in real time, and in several ways, such as people Face identification, fingerprint recognition and password identification are logged in, and user is facilitated to be selected according to different use habits, and standby in real time Part can ensure the safety of data in use, can save in time deleting, distinguish user by and by certain mode And illegal user, and their access profile is limited, in order to increase the safety of user account data, avoid stealing information Deng.Meanwhile in backup, integrate module by classification classification integration carried out to different data informations, by encrypting module plus It is close, enhance the safety of data, then store in the database, and processor can call directly the data in database, it is directly anti- Reflect the quickening in response speed.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the backup verifying network system of the utility model;
Fig. 2 is the structural schematic diagram of the backup subsystem of the utility model.
Specific embodiment
The utility model is further described combined with specific embodiments below.
For figure as shown in 1- Fig. 2, the utility model provides a kind of backup verifying network system, comprising: client, verifying subsystem System, processor, secure subsystem and backup subsystem, the verifying subsystem include face verification module, fingerprint authentication mould Block, password authentication module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module Connect with the output end of client, the face verification module, fingerprint authentication module, password authentication module output end with The input terminal of collector connects, and the input terminal of the collector is also connect with the output end of client, the collector it is defeated Outlet is connected with the input terminal of backup subsystem and processor input terminal respectively;The input terminal of the processor also with backup The output end of subsystem is connected, and the output end of the processor connects with the input terminal of client and secure subsystem respectively It connects, the output end of the secure subsystem is connect with the client.
The verifying subsystem is authenticated by password, face and fingerprint, confirms the identity of user, and user could be after It is continuous to use, it ensures the data safety in user account, and the uniqueness of face information and finger print information, is logged in there is no other people May, and cipher authentication is provided with double code certification, safety can ensure, processor needs to collect the number of collector acquisition It is believed that breath, it is also necessary to user information original in database be compared, complete to feed back to client in verifying, also to assign Order the effect that intermediate connection and task processing are primarily served to controller, backup subsystem can to the password that user inputs, Face and fingerprint carry out storage backup, are encrypted when backing up storage, when user logs in, data in backup subsystem The user information is transferred in library, is compared by processor, and secure subsystem mainly ensures that use is safe, used in system It plays a role in journey, for customer-side, for the part violation operation of user, prevents user from carrying out data It distorts, collector is set as signal picker, carries out adopting for human face data signal, finger print data signal and code data signal Collection, a verification mode then verifying, and the key of signal picker mutually inputs as 2 Lu Jianxiang input channels, an input channel For normal use channel, another input channel is alternate channel, main channel go wrong can not signal acquisition transmission when into Row switching, going wrong can normal signal acquisition, the model of processor is set as AMD Ryzen Threadripper 2990WX, processor need to collect the data information of collector acquisition, it is also necessary to carry out user information original in database It compares, completes to feed back to client in verifying, also to issue an order to controller, so need processor to have stronger while locating The function of reason task, so the processor of this model is selected, for the treatment effeciency for increasing whole system.
The face verification module includes camera and three-dimensional skeleton model structural unit, and camera claps face It takes the photograph, the face component face skeletal graph that three-dimensional skeleton model structural unit is shot according to camera, because of everyone face's bone Whether bone figure is all different, be correct user by analysing and comparing, such verification mode is simpler for a user, it is only necessary to Positive face is wanted just to can be carried out verifying to camera one second, the external device of fingerprint authentication module is IBM integrated form Fingerprint Identification Unit, The speed of fingerprint recognition is fast, and precision is high.
The secure subsystem includes controller, access limitation module and alarm module;The input terminal of the controller It is connect with the output end signal of processor, the input with access limitation module and alarm module respectively of the output end of the controller End signal connection, the access limitation module and the output end of alarm module and the input end signal of client connect.Controller Play the role of assigning instruction, once there is exception, processor assigns instruction by controller, passes through access limitation module and report Alert module limits the access of user and gives and alerts, then sends exception reporting to administrator, and administrator is monitored inspection,
The backup subsystem includes that module, encrypting module, database and analysis module are integrated in classification;Wherein, classify It integrates module to be classified according to the source and type of data, and identical data is merged, the input of module is integrated in classification End is connect with the output end signal of collector, directly uses the collected data information of collector, and the output of module is integrated in classification End is connect with the input end signal of analysis module and encrypting module respectively, and the output end of encrypting module and the input terminal of database are believed Number connection, encrypting module are used to ensure the data safety of whole system and user information, the input terminal and analysis module of database Output end signal connection, analysis module for classification integrate module integrated results carry out big data analysis, analyze user The use habit of group is stored in database, the output end and processor of database using data information etc., and by analysis result Input end signal connection.Wherein, encrypting module is encrypted in DBMS outer layer, when using DBMS outer layer cipher mode, encryption/decryption The work such as operation, management of key is executed in DBMS outer layer, will not aggravate the load of database server and can be according to need Flexible configuration data base encryption is wanted, database includes data base management system and administrator, and database is by data base management system Unified management, insertion, modification and the retrieval of data be intended to carry out by data base management system, data administrator be responsible for creation, Monitor and safeguard entire database, enable data by it is any with access to people effectively use.
User is logged in by client, when the positive face of user sees one second to camera, then face verification module then from It is dynamic to collect face information, and face's skeletal graph will be constructed, when user presses finger on Fingerprint Identification Unit, fingerprint authentication module is opened Dynamic, user also can choose password authentication module, and collector collects face's skeletal graph information perhaps finger print information or password These information are stored in backup subsystem by information, and classification, which is integrated, passes to analysis module progress greatly after module integrates it Data analysis, while being stored in database after being encrypted by encrypting module, the analysis result of analysis module also is stored in data In library, these information signals are passed to processor simultaneously by collector, and original user information carries out in processor and database It compares, verifying is completed then to feed back to client, does not complete access of the access limitation module connected by controller to client It is limited, and gives client warning by alarm module simultaneously, and exception information is communicated to administrator, in client When carrying out using operation, backup subsystem backs up the use data of client, and backup interval time is set as 20 Minute.

Claims (6)

1. network system is verified in a kind of backup, it is characterised in that: the system include client, verifying subsystem, processor, Backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password authentification Module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module is and client Output end connection, the face verification module, fingerprint authentication module, the output end of password authentication module are defeated with collector Enter end connection, the input terminal of the collector also connect with the output end of client, the output end of the collector respectively with The input terminal of backup subsystem is connected with processor input terminal;The input terminal of the processor is also defeated with backup subsystem Outlet is connected, and the output end of the processor is connect with the input terminal of client and secure subsystem respectively, the peace The output end of full subsystem is connect with the client.
2. network system is verified in backup according to claim 1, it is characterised in that: the secure subsystem includes control Device, access limitation module and alarm module, the input terminal of the controller is connect with the output end of the processor, described The output end of controller is connect with the input terminal of access limitation module and alarm module respectively, the access limitation module and alarm The output end of module is connect with the input terminal of the client.
3. network system is verified in backup according to claim 1, it is characterised in that: the backup subsystem includes that classification is whole Mold block, encrypting module, database and analysis module;The input terminal and the collector of module are integrated in the classification Output end connection, it is described classify integrate the output end of module and connect respectively with the input terminal of analysis module and encrypting module, institute The input terminal of the output end and database of stating encrypting module connects, and the input terminal of the database and the output end of analysis module connect It connects, the output end of the database is connect with the input terminal of the processor.
4. network system is verified in backup according to claim 1, it is characterised in that: the face verification module includes taking the photograph As head and three-dimensional skeleton model structural unit.
5. network system is verified in backup according to claim 1, it is characterised in that: the fingerprint authentication module it is external Equipment is IBM integrated form Fingerprint Identification Unit.
6. network system is verified in backup according to claim 1, it is characterised in that: the collector is signal acquisition Device, and the key of signal picker mutually inputs as 2 Lu Jianxiang input channels.
CN201821963242.0U 2018-11-27 2018-11-27 A kind of backup verifying network system Active CN209435252U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201821963242.0U CN209435252U (en) 2018-11-27 2018-11-27 A kind of backup verifying network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201821963242.0U CN209435252U (en) 2018-11-27 2018-11-27 A kind of backup verifying network system

Publications (1)

Publication Number Publication Date
CN209435252U true CN209435252U (en) 2019-09-24

Family

ID=67968252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201821963242.0U Active CN209435252U (en) 2018-11-27 2018-11-27 A kind of backup verifying network system

Country Status (1)

Country Link
CN (1) CN209435252U (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698211A (en) * 2020-05-09 2020-09-22 中振区块链(深圳)有限公司 Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain
CN113282151A (en) * 2021-05-28 2021-08-20 罗鹏 Data encryption device with storage function based on big data technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111698211A (en) * 2020-05-09 2020-09-22 中振区块链(深圳)有限公司 Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain
CN113282151A (en) * 2021-05-28 2021-08-20 罗鹏 Data encryption device with storage function based on big data technology

Similar Documents

Publication Publication Date Title
Atlam et al. Internet of things forensics: A review
US10606988B2 (en) Security device, methods, and systems for continuous authentication
CN104573473B (en) A kind of method and authenticating device for unlocking administration authority
US11496288B1 (en) Enhanced encryption for face-related data
JP2019527417A (en) System and method for providing a secure data monitoring system executed in a factory or plant
CN209435252U (en) A kind of backup verifying network system
US11676418B1 (en) Enhanced storage and data retrieval for face-related data
CN112084474A (en) Enterprise archive management method, system, storage medium and electronic equipment
Khanuja et al. Role of metadata in forensic analysis of database attacks
CN104240348A (en) Admittance identity authentication method based on image identification
CN109886031A (en) A kind of smart city security assurance information system
WO2017221049A1 (en) A data-network connected server, a device, a platform and a method for conducting computer-executable experiments
Alshbtat et al. A novel secure fingerprint-based authentication system for student’s examination system
CN204360444U (en) Based on the admission identity authorization system of image recognition
CN105119760B (en) A kind of three-dimensional cloud monitoring method and device based on BIM
CN112863652A (en) Medical image data storage system
CN116488820B (en) Electronic data security method based on data acquisition analysis
KR102661221B1 (en) A method to detect abnormal symptoms occurring during login using text generated during login
CN111212262B (en) Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar
Peng et al. Detecting masqueraders by profiling user behaviors
KR20130042970A (en) Information providing control system using a bio information and method thereof
Yapa et al. Improve the Efficiency and Security by Digitalizing the Sri Lankan Police Department
CN107403080A (en) Hide/show the method and terminal device of application program
CN107086985A (en) Fingerprint authority checking method and system
AlShaikh et al. Post Incident Analysis Framework for Automated Video Forensic Investigation

Legal Events

Date Code Title Description
GR01 Patent grant
GR01 Patent grant