CN209435252U - A kind of backup verifying network system - Google Patents
A kind of backup verifying network system Download PDFInfo
- Publication number
- CN209435252U CN209435252U CN201821963242.0U CN201821963242U CN209435252U CN 209435252 U CN209435252 U CN 209435252U CN 201821963242 U CN201821963242 U CN 201821963242U CN 209435252 U CN209435252 U CN 209435252U
- Authority
- CN
- China
- Prior art keywords
- module
- output end
- input terminal
- subsystem
- connect
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Collating Specific Patterns (AREA)
Abstract
The utility model discloses a kind of backup verifying network system, the system includes client, verify subsystem, processor, backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password authentication module and collector, the face verification module, the input terminal of fingerprint authentication module and password authentication module is connect with the output end of client, the face verification module, fingerprint authentication module, the output end of password authentication module is connect with the input terminal of collector, the output end of the collector is connected with the input terminal of backup subsystem and processor input terminal respectively;The output end of the processor is connect with the input terminal of client and secure subsystem respectively, and the output end of the secure subsystem is connect with the client.The utility model can monitor the verifying of identity information in real time, in several ways, facilitate the selection of user, and back up in realtime and can ensure the safety of data in use.
Description
Technical field
The utility model relates to technical field of the computer network, in particular to network system is verified in a kind of backup.
Background technique
With the rapid development of Internet, how to manage these mass data resources, enable with it is safe and efficient, one
It is the huge difficult and challenge that data resource management faces under current cloud environment that the mode of cause, which provides on-demand service,.It is existing
Network Management System be made of stocking system, analysis system and management system three parts, the workflow of the stocking system
As follows: user logs in: inputting account, password and identifying code by user client and logs in cloud platform;It is verified: cloud platform pair
Whether the information than user's input is correct;Verification result: information will correctly log in cloud platform, and information errors cloud platform steps on refusal
Record;Data upload: user will need the data uploaded to upload to cloud platform;Automated back-up: the number that cloud platform uploads user
It is corresponding in cloud platform other than the data that the working interface that user sees has it to upload according to back-up processing will be carried out automatically
Automatically the data of user's upload are replicated in recovery district;Log saves: current operation is automatically generated journal file and recorded by cloud platform
Get off, and log is saved;Data processing: the data that cloud platform is uploaded according to certain program processing;User publishes: user moves back
Cloud platform out;
The workflow of the analysis system is as follows: data upload: the data that user is analysed to upload in cloud platform;
Inside retrieval: cloud platform the data of upload are carried out in the workspace of the user inside retrieve;Search result analysis: according to number
According to title retrieve whether have polyisomenism in the workspace of the user of cloud platform;Result treatment: if file name is without weight
Recurrent images, direct Backup Data analyze the details of the duplicate file of title if file name has repetition;Interface is aobvious
Show: the details of file and file of the same name are shown on the interface of user client;User's selection: user is to text of the same name
How part selection is operated;Choosing is then fed back: the choosing that user is carried out on the client is then in synchronous feedback to cloud platform;Log
Save: current operation is automatically generated journal file and recorded by cloud platform, and log is saved;Data processing: cloud platform
The data uploaded according to certain program processing;User publishes: user exits cloud platform;
The workflow of the management system is as follows: management starts: cloud platform is managed data;Analysis is sorted out: cloud
The data that platform uploads user are analyzed and are sorted out according to analysis result to data;Trend analysis: according to just input
Data and historical data induction and conclusion is carried out to the data under the same classification, and analyze relevant development trend;Chart
Production: the data development trend analyzed is fabricated to table or line chart;
Backstage saves: the table made or line chart are saved in the backstage of cloud platform;Management terminates: data management
It completes.
The verifying system that existing management system is arranged when logging in, improves the safety of cloud platform, but system is adopted
It has taken and has directly been verified according to data information in the mode that insider information system searches comparison, such mode cannot will be logged in and be tested
The user and outsourcing malice inquiry system for demonstrate,proving information distinguish, and outsourcing malice inquiry system is caused to be able to enter in the account of user
The personal information of user is stolen, safety is not high enough.
Utility model content
Purpose of utility model: the utility model provide one kind can client use when automated back-up, can be by more
Kind mode login system and the safety that can ensure that user account data, the backup verifying network system for avoiding information from being stolen.
Technical solution: a kind of backup verifying network system, the system include: client, verifying subsystem, processing
Device, backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password
Authentication module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module with visitor
The output end at family end connects, the face verification module, fingerprint authentication module, password authentication module output end and collector
Input terminal connection, the input terminal of the collector also connect with the output end of client, and the output end of the collector divides
It is not connected with the input terminal of backup subsystem and processor input terminal;The input terminal of the processor also with backup subsystem
Output end be connected, the output end of the processor is connect with the input terminal of client and secure subsystem respectively, described
The output end of secure subsystem connect with the client.
Further, the secure subsystem includes controller, access limitation module and alarm module, the controller
Input terminal connect with the output end of the processor, the output end of the controller respectively with access limitation module and alarm
The input terminal of module connects, and the access limitation module and the output end of alarm module and the input terminal of the client connect
It connects.
Further, the backup subsystem includes that module, encrypting module, database and analysis module are integrated in classification;Institute
The input terminal that module is integrated in the classification stated is connect with the output end of the collector, and the output end point of module is integrated in the classification
It not being connect with the input terminal of analysis module and encrypting module, the output end of the encrypting module and the input terminal of database connect,
The input terminal of the database and the output end of analysis module connect, and the output end of the database is defeated with the processor
Enter end connection.
Further, the face verification module includes camera and three-dimensional skeleton model structural unit.
Further, the external device of the fingerprint authentication module is IBM integrated form Fingerprint Identification Unit.
Further, the collector be signal picker, and the key of signal picker mutually input mutually inputted for 2 road keys it is logical
Road.
The utility model has the advantages that the utility model can monitor the verifying of identity information in real time, and in several ways, such as people
Face identification, fingerprint recognition and password identification are logged in, and user is facilitated to be selected according to different use habits, and standby in real time
Part can ensure the safety of data in use, can save in time deleting, distinguish user by and by certain mode
And illegal user, and their access profile is limited, in order to increase the safety of user account data, avoid stealing information
Deng.Meanwhile in backup, integrate module by classification classification integration carried out to different data informations, by encrypting module plus
It is close, enhance the safety of data, then store in the database, and processor can call directly the data in database, it is directly anti-
Reflect the quickening in response speed.
Detailed description of the invention
Fig. 1 is the structural schematic diagram of the backup verifying network system of the utility model;
Fig. 2 is the structural schematic diagram of the backup subsystem of the utility model.
Specific embodiment
The utility model is further described combined with specific embodiments below.
For figure as shown in 1- Fig. 2, the utility model provides a kind of backup verifying network system, comprising: client, verifying subsystem
System, processor, secure subsystem and backup subsystem, the verifying subsystem include face verification module, fingerprint authentication mould
Block, password authentication module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module
Connect with the output end of client, the face verification module, fingerprint authentication module, password authentication module output end with
The input terminal of collector connects, and the input terminal of the collector is also connect with the output end of client, the collector it is defeated
Outlet is connected with the input terminal of backup subsystem and processor input terminal respectively;The input terminal of the processor also with backup
The output end of subsystem is connected, and the output end of the processor connects with the input terminal of client and secure subsystem respectively
It connects, the output end of the secure subsystem is connect with the client.
The verifying subsystem is authenticated by password, face and fingerprint, confirms the identity of user, and user could be after
It is continuous to use, it ensures the data safety in user account, and the uniqueness of face information and finger print information, is logged in there is no other people
May, and cipher authentication is provided with double code certification, safety can ensure, processor needs to collect the number of collector acquisition
It is believed that breath, it is also necessary to user information original in database be compared, complete to feed back to client in verifying, also to assign
Order the effect that intermediate connection and task processing are primarily served to controller, backup subsystem can to the password that user inputs,
Face and fingerprint carry out storage backup, are encrypted when backing up storage, when user logs in, data in backup subsystem
The user information is transferred in library, is compared by processor, and secure subsystem mainly ensures that use is safe, used in system
It plays a role in journey, for customer-side, for the part violation operation of user, prevents user from carrying out data
It distorts, collector is set as signal picker, carries out adopting for human face data signal, finger print data signal and code data signal
Collection, a verification mode then verifying, and the key of signal picker mutually inputs as 2 Lu Jianxiang input channels, an input channel
For normal use channel, another input channel is alternate channel, main channel go wrong can not signal acquisition transmission when into
Row switching, going wrong can normal signal acquisition, the model of processor is set as AMD Ryzen Threadripper
2990WX, processor need to collect the data information of collector acquisition, it is also necessary to carry out user information original in database
It compares, completes to feed back to client in verifying, also to issue an order to controller, so need processor to have stronger while locating
The function of reason task, so the processor of this model is selected, for the treatment effeciency for increasing whole system.
The face verification module includes camera and three-dimensional skeleton model structural unit, and camera claps face
It takes the photograph, the face component face skeletal graph that three-dimensional skeleton model structural unit is shot according to camera, because of everyone face's bone
Whether bone figure is all different, be correct user by analysing and comparing, such verification mode is simpler for a user, it is only necessary to
Positive face is wanted just to can be carried out verifying to camera one second, the external device of fingerprint authentication module is IBM integrated form Fingerprint Identification Unit,
The speed of fingerprint recognition is fast, and precision is high.
The secure subsystem includes controller, access limitation module and alarm module;The input terminal of the controller
It is connect with the output end signal of processor, the input with access limitation module and alarm module respectively of the output end of the controller
End signal connection, the access limitation module and the output end of alarm module and the input end signal of client connect.Controller
Play the role of assigning instruction, once there is exception, processor assigns instruction by controller, passes through access limitation module and report
Alert module limits the access of user and gives and alerts, then sends exception reporting to administrator, and administrator is monitored inspection,
The backup subsystem includes that module, encrypting module, database and analysis module are integrated in classification;Wherein, classify
It integrates module to be classified according to the source and type of data, and identical data is merged, the input of module is integrated in classification
End is connect with the output end signal of collector, directly uses the collected data information of collector, and the output of module is integrated in classification
End is connect with the input end signal of analysis module and encrypting module respectively, and the output end of encrypting module and the input terminal of database are believed
Number connection, encrypting module are used to ensure the data safety of whole system and user information, the input terminal and analysis module of database
Output end signal connection, analysis module for classification integrate module integrated results carry out big data analysis, analyze user
The use habit of group is stored in database, the output end and processor of database using data information etc., and by analysis result
Input end signal connection.Wherein, encrypting module is encrypted in DBMS outer layer, when using DBMS outer layer cipher mode, encryption/decryption
The work such as operation, management of key is executed in DBMS outer layer, will not aggravate the load of database server and can be according to need
Flexible configuration data base encryption is wanted, database includes data base management system and administrator, and database is by data base management system
Unified management, insertion, modification and the retrieval of data be intended to carry out by data base management system, data administrator be responsible for creation,
Monitor and safeguard entire database, enable data by it is any with access to people effectively use.
User is logged in by client, when the positive face of user sees one second to camera, then face verification module then from
It is dynamic to collect face information, and face's skeletal graph will be constructed, when user presses finger on Fingerprint Identification Unit, fingerprint authentication module is opened
Dynamic, user also can choose password authentication module, and collector collects face's skeletal graph information perhaps finger print information or password
These information are stored in backup subsystem by information, and classification, which is integrated, passes to analysis module progress greatly after module integrates it
Data analysis, while being stored in database after being encrypted by encrypting module, the analysis result of analysis module also is stored in data
In library, these information signals are passed to processor simultaneously by collector, and original user information carries out in processor and database
It compares, verifying is completed then to feed back to client, does not complete access of the access limitation module connected by controller to client
It is limited, and gives client warning by alarm module simultaneously, and exception information is communicated to administrator, in client
When carrying out using operation, backup subsystem backs up the use data of client, and backup interval time is set as 20
Minute.
Claims (6)
1. network system is verified in a kind of backup, it is characterised in that: the system include client, verifying subsystem, processor,
Backup subsystem and secure subsystem, the verifying subsystem includes face verification module, fingerprint authentication module, password authentification
Module and collector, the input terminal of the face verification module, fingerprint authentication module and password authentication module is and client
Output end connection, the face verification module, fingerprint authentication module, the output end of password authentication module are defeated with collector
Enter end connection, the input terminal of the collector also connect with the output end of client, the output end of the collector respectively with
The input terminal of backup subsystem is connected with processor input terminal;The input terminal of the processor is also defeated with backup subsystem
Outlet is connected, and the output end of the processor is connect with the input terminal of client and secure subsystem respectively, the peace
The output end of full subsystem is connect with the client.
2. network system is verified in backup according to claim 1, it is characterised in that: the secure subsystem includes control
Device, access limitation module and alarm module, the input terminal of the controller is connect with the output end of the processor, described
The output end of controller is connect with the input terminal of access limitation module and alarm module respectively, the access limitation module and alarm
The output end of module is connect with the input terminal of the client.
3. network system is verified in backup according to claim 1, it is characterised in that: the backup subsystem includes that classification is whole
Mold block, encrypting module, database and analysis module;The input terminal and the collector of module are integrated in the classification
Output end connection, it is described classify integrate the output end of module and connect respectively with the input terminal of analysis module and encrypting module, institute
The input terminal of the output end and database of stating encrypting module connects, and the input terminal of the database and the output end of analysis module connect
It connects, the output end of the database is connect with the input terminal of the processor.
4. network system is verified in backup according to claim 1, it is characterised in that: the face verification module includes taking the photograph
As head and three-dimensional skeleton model structural unit.
5. network system is verified in backup according to claim 1, it is characterised in that: the fingerprint authentication module it is external
Equipment is IBM integrated form Fingerprint Identification Unit.
6. network system is verified in backup according to claim 1, it is characterised in that: the collector is signal acquisition
Device, and the key of signal picker mutually inputs as 2 Lu Jianxiang input channels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821963242.0U CN209435252U (en) | 2018-11-27 | 2018-11-27 | A kind of backup verifying network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201821963242.0U CN209435252U (en) | 2018-11-27 | 2018-11-27 | A kind of backup verifying network system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN209435252U true CN209435252U (en) | 2019-09-24 |
Family
ID=67968252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201821963242.0U Active CN209435252U (en) | 2018-11-27 | 2018-11-27 | A kind of backup verifying network system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN209435252U (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111698211A (en) * | 2020-05-09 | 2020-09-22 | 中振区块链(深圳)有限公司 | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain |
CN113282151A (en) * | 2021-05-28 | 2021-08-20 | 罗鹏 | Data encryption device with storage function based on big data technology |
-
2018
- 2018-11-27 CN CN201821963242.0U patent/CN209435252U/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111698211A (en) * | 2020-05-09 | 2020-09-22 | 中振区块链(深圳)有限公司 | Intelligent consensus system based on double certificates and suitable for intellectual property alliance chain |
CN113282151A (en) * | 2021-05-28 | 2021-08-20 | 罗鹏 | Data encryption device with storage function based on big data technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Atlam et al. | Internet of things forensics: A review | |
US10606988B2 (en) | Security device, methods, and systems for continuous authentication | |
CN104573473B (en) | A kind of method and authenticating device for unlocking administration authority | |
US11496288B1 (en) | Enhanced encryption for face-related data | |
JP2019527417A (en) | System and method for providing a secure data monitoring system executed in a factory or plant | |
CN209435252U (en) | A kind of backup verifying network system | |
US11676418B1 (en) | Enhanced storage and data retrieval for face-related data | |
CN112084474A (en) | Enterprise archive management method, system, storage medium and electronic equipment | |
Khanuja et al. | Role of metadata in forensic analysis of database attacks | |
CN104240348A (en) | Admittance identity authentication method based on image identification | |
CN109886031A (en) | A kind of smart city security assurance information system | |
WO2017221049A1 (en) | A data-network connected server, a device, a platform and a method for conducting computer-executable experiments | |
Alshbtat et al. | A novel secure fingerprint-based authentication system for student’s examination system | |
CN204360444U (en) | Based on the admission identity authorization system of image recognition | |
CN105119760B (en) | A kind of three-dimensional cloud monitoring method and device based on BIM | |
CN112863652A (en) | Medical image data storage system | |
CN116488820B (en) | Electronic data security method based on data acquisition analysis | |
KR102661221B1 (en) | A method to detect abnormal symptoms occurring during login using text generated during login | |
CN111212262B (en) | Method, device, system and storage medium for discovering abnormal behavior personnel of internet bar | |
Peng et al. | Detecting masqueraders by profiling user behaviors | |
KR20130042970A (en) | Information providing control system using a bio information and method thereof | |
Yapa et al. | Improve the Efficiency and Security by Digitalizing the Sri Lankan Police Department | |
CN107403080A (en) | Hide/show the method and terminal device of application program | |
CN107086985A (en) | Fingerprint authority checking method and system | |
AlShaikh et al. | Post Incident Analysis Framework for Automated Video Forensic Investigation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GR01 | Patent grant | ||
GR01 | Patent grant |