CN111611565A - Autonomous reaching type safety verification system - Google Patents

Autonomous reaching type safety verification system Download PDF

Info

Publication number
CN111611565A
CN111611565A CN202010392809.9A CN202010392809A CN111611565A CN 111611565 A CN111611565 A CN 111611565A CN 202010392809 A CN202010392809 A CN 202010392809A CN 111611565 A CN111611565 A CN 111611565A
Authority
CN
China
Prior art keywords
client
autonomous
verification
safety
different
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010392809.9A
Other languages
Chinese (zh)
Inventor
叶春林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010392809.9A priority Critical patent/CN111611565A/en
Publication of CN111611565A publication Critical patent/CN111611565A/en
Priority to US17/985,711 priority patent/US20230350998A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Abstract

The invention discloses an autonomous reach-through security verification system. The system comprises a client applied to wired and wireless communication equipment, a server corresponding to the client and comprising various levels of management and control platforms and associated equipment; the control platform ensures the safety of the client side and the server, gives different user operation interfaces and different application authorities according to the autonomous intention admission conditions set after the client side passes identity verification, and follows up the subsequent corresponding treatment according to the different input authorization confirmation, thereby achieving the practical efficacy of safely coping with various conditions and autonomous personalized setting; the invention can ideally solve the defects of the existing client application by using simple, reasonable and easy-to-implement structural characteristics, can effectively and reliably ensure the safety of the client application, and can fully meet different individual requirements of people.

Description

Autonomous reaching type safety verification system
Technical Field
The invention relates to the field of network client application security, in particular to an autonomous reaching type security verification system.
Background
At present, with the social development and the technological progress, various network client applications are gradually increasing to enter the daily life and work of people, bring great convenience to people and have a tendency, but things have two sides which are difficult to avoid, the network client applications are often associated with money or technical data, are easy to become targets of lawless persons who move around, and sometimes even endanger the personal safety, and in practical application, people also have different requirements on difficulty or need to disclose operation parts and confirm authorization modes; in the prior art, identity information, a mobile phone number or a personal mailbox of a client, a set password and the like are taken as admission conditions, most of the admission conditions are completely released after admission, verification code confirmation is sent to the set mobile phone or mailbox, some measures such as face recognition are followed, safety and reliability are enhanced to a certain degree, but the admission conditions are completely released after the authorization is confirmed, if the conditions that high-class confidential or financial clients are stressed or authorization permission is obtained through illegal means are involved, the admission settings are easy to be similar to nominal, the personalized requirements are met, and the problem of benefiting people who are worthy of diligence is also solved.
Disclosure of Invention
The invention aims to solve the problems of lack of safety and individuation in the application of the existing network client side and provides an autonomous meaning type safety verification system with wide application range.
In order to achieve the above purpose, the present invention is mainly solved by the following technical solutions: an autonomous reaching type safety verification system comprises a client applied to wired and wireless communication equipment and a server corresponding to the client, and comprises control platforms at all levels and associated equipment; the control platform ensures the safety of the client side and the server, gives different user operation interfaces and different application authorities according to the autonomous intention admission conditions set after the client side passes identity verification, and follows up the subsequent corresponding treatment according to the different input authorization confirmation, thereby achieving the practical efficacy of safely coping with various conditions and autonomous personalized setting;
furthermore, the verification code can be set into a self-defined code form, so that information can be transmitted according to a protocol plan, and timely strain treatment with the appearance as usual is realized;
moreover, the code verification can be implemented by adopting a matched special optimal shield type structure to carry out autonomous intention operation, and the separation of client and verification code selection or plan retention is carried out, thereby being more beneficial to ensuring the safety and reliability.
The authentication can be the existing common authentication means or interactive authentication using different types of information.
The self-intention access condition can agree with different sequences independently set by a protocol or replace authorization confirmation of a bit code thereof on the basis of the existing verification code, reflect different conditions and actual requirements on a user interface and subsequent services in real time, and avoid the defects existing in the passive verification code.
The method provides different user operation interfaces, and on the premise of meeting the actual requirements of the self-satisfied verification conditions confirmed by the client, different authorities are convenient for setting system sharing and differential treatment, and the method can more exert the advantages of network resources to make corresponding judgment and treatment intelligently.
The follow-up corresponding treatment comprises the actual requirement of meeting the self-intention verification condition confirmed by the client, and can timely perform strain treatment by utilizing various resources of the networked society according to specific conditions.
The code form can take various symbol marks, characters, numbers and sound effects as codes; the single class can be selected to be used as a code, or the code is formed by adopting a combination form of different characters or sound effects, so that the code cannot be deciphered, and the real clear requirement can be still conveyed even if the public operation is carried out.
The method adopts a special optimal shield type structure matched with a private closed document structure to implement autonomous intention operation, is more beneficial to storing and transmitting information quantity and has higher safety guarantee by the private closed document structure, and can select a plan according to the default cooperation of a plan in advance or through temporary contact.
Preferably, the verification of the human body biological characteristic information is used as one of conditions for the admission and authorization operation of the client of the system, and the system can be further set to randomly and randomly recheck different authentication items in use so as to prevent people from being changed in the midway.
Preferably, the system is configured as a wired or wireless connection monitoring and alarm system, which can be automatically touched on the surface as usual once the specific information entered is confirmed when an abnormal condition is encountered.
Preferably, the system is set to be capable of storing the existing operation in one key mode and intelligently switching to a preset reasonable page in time.
Obviously, the invention has a reasonable, simple, reliable and feasible structure form capable of randomly, flexibly and variably achieving the self-intention, can effectively guarantee the application safety of the client more reliably compared with passive verification according to different steps or selective implementation of each application occasion, definitely is the primary target of the invention, gives different operation interfaces, authority ranges and strain treatment through different verification authorizations, can fully meet different individual requirements of people, and is a practical characteristic which greatly meets the requirements of the public.
The invention has the following beneficial effects: the simple, reasonable and easy-to-implement structural characteristics can ideally solve the defects of the existing client application, can effectively and reliably ensure the safety of the client application, and can fully meet different individual requirements of people.
Detailed Description
An autonomic security verification system is described further below.
Example (b): an autonomous reaching type safety verification system comprises a client applied to wired and wireless communication equipment and a server corresponding to the client, and comprises control platforms at all levels and associated equipment; the control platform ensures the safety of the client side and the server, gives different user operation interfaces and different application authorities according to the autonomous intention admission conditions set after the client side passes identity verification, and follows up the subsequent corresponding treatment according to the different input authorization confirmation, thereby achieving the practical efficacy of safely coping with various conditions and autonomous personalized setting; furthermore, the verification code can be set into a self-defined code form, so that information can be transmitted according to a protocol plan, and timely strain treatment of the appearance as usual is realized;
furthermore, the code verification can be implemented by adopting a matched special optimal shield type structure to carry out autonomous intention operation, and the client and verification code selection or plan retention division is carried out, so that the safety and reliability are better guaranteed. The identity authentication can be the conventional common identity authentication means or interactive authentication adopting different types of information; the self-intention access condition can agree with self-set different sequences or replace authorization confirmation of a median code by a protocol on the basis of the existing verification code, reflect different conditions and actual requirements on a user interface and subsequent services in real time, and avoid the defects of passive verification code; different user operation interfaces are provided, on the premise that the actual requirements of the self-intention verification conditions confirmed by the client are met, different authorities are convenient for setting system sharing and differential treatment, and the advantages of network resources can be exerted more intelligently to make corresponding judgment and treatment; follow-up corresponding treatment comprises meeting the actual requirement of the self-intention verification condition confirmed by the client and timely performing strain treatment by utilizing various resources of the networked society according to specific conditions; the code form can take various symbol marks, characters, numbers and sound effects as codes; the single class can be selected to be used as a code, or a code is formed by adopting a combination form of different characters or sound effects, so that the code cannot be decoded, and the real and clear requirements can be still conveyed even if the public operation is carried out; the adoption of the matched special optimal shield type structure to implement autonomous intention operation facilitates the information storage and transmission quantity and has safety guarantee by using the private closed document structure, and the plan can be selected according to the default cooperation of the advance plan or through temporary contact. In specific implementation, the verification of the human body biological characteristic information can be used as one of conditions of client access and authorization operation, and different verification items can be randomly or irregularly re-checked in use to prevent people from being changed in midway; the system is set as a wired or wireless connection monitoring and alarming system, and when an abnormal condition occurs, the system can automatically touch and connect the monitoring or alarming system in the dark as usual once the input specific information is confirmed; and the system is set to be capable of storing the existing operation in one key mode and intelligently switching to a preset reasonable page in time. The above are only frame-type representations of the problems solved by the present invention, which in practice can be appropriately adjusted to suit the particular situation and be developed to better meet various needs.
It will be apparent to those skilled in the art that various changes in the structural arrangement of the present invention can be made without departing from the spirit and scope of the invention. Therefore, if these changes are within the technical scope of the claims of the present invention and their equivalents, the present invention is also intended to cover these changes.

Claims (4)

1. An autonomous reaching type safety verification system is characterized by comprising a client applied to wired and wireless communication equipment and a server corresponding to the client, wherein each level of management and control platform and associated equipment are included; the control platform ensures the safety of the client side and the server, gives different user operation interfaces and different application authorities according to the autonomous intention admission conditions set after the client side passes identity verification, and follows up the subsequent corresponding treatment according to the different input authorization confirmation, thereby achieving the practical efficacy of safely coping with various conditions and autonomous personalized setting;
furthermore, the verification code can be set into a self-defined code form, so that information can be transmitted according to a protocol plan, and timely strain treatment with the appearance as usual is realized;
moreover, the code verification can be implemented by adopting a matched special optimal shield type structure to carry out autonomous intention operation, and the separation of client and verification code selection or plan retention is carried out, thereby being more beneficial to ensuring the safety and reliability.
2. The system of claim 1, wherein the verification of biometric information of human body as one of the conditions for the client access and authorization operations of the system is further configured to randomly or sporadically re-check different authentication items to prevent the user from being changed.
3. The autonomic security verification system of claim 1 wherein the system is configured as a wired or wireless connection monitoring and alarm system that can automatically touch down the monitoring or alarm system in the dark as usual upon confirmation of specific information entered when an abnormal condition is encountered.
4. The autonomic ideation security validation system of claim 1 wherein the system is configured to save existing operations on a one-click basis and switch intelligently to a default logical page in time.
CN202010392809.9A 2020-05-11 2020-05-11 Autonomous reaching type safety verification system Pending CN111611565A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010392809.9A CN111611565A (en) 2020-05-11 2020-05-11 Autonomous reaching type safety verification system
US17/985,711 US20230350998A1 (en) 2020-05-11 2021-04-11 Security verification system featuring user autonomy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010392809.9A CN111611565A (en) 2020-05-11 2020-05-11 Autonomous reaching type safety verification system

Publications (1)

Publication Number Publication Date
CN111611565A true CN111611565A (en) 2020-09-01

Family

ID=72198110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010392809.9A Pending CN111611565A (en) 2020-05-11 2020-05-11 Autonomous reaching type safety verification system

Country Status (1)

Country Link
CN (1) CN111611565A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364375A (en) * 2020-11-10 2021-02-12 叶春林 Personal characteristic information security guarantee system
CN112788067A (en) * 2021-03-04 2021-05-11 叶春林 Identity authorization confirmation system
CN114140965A (en) * 2021-12-01 2022-03-04 叶沁 Fire-fighting information pushing method, server, client, local terminal and computer storage medium
WO2022217375A1 (en) * 2021-04-11 2022-10-20 叶春林 Autonomous expression security verification system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894242A (en) * 2010-06-22 2010-11-24 上海华御信息技术有限公司 System and method for protecting information safety of mobile electronic equipment
WO2016206090A1 (en) * 2015-06-26 2016-12-29 华为技术有限公司 Two-factor authentication method, device and apparatus
CN108388792A (en) * 2018-03-21 2018-08-10 北京力鼎创软科技有限公司 A kind of office operation system reinforcement method and system
CN109858226A (en) * 2019-01-31 2019-06-07 叶春林 The safeguards system of networking storage safety
CN110213111A (en) * 2019-06-13 2019-09-06 叶春林 Networked product safe-guard system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894242A (en) * 2010-06-22 2010-11-24 上海华御信息技术有限公司 System and method for protecting information safety of mobile electronic equipment
WO2016206090A1 (en) * 2015-06-26 2016-12-29 华为技术有限公司 Two-factor authentication method, device and apparatus
CN108388792A (en) * 2018-03-21 2018-08-10 北京力鼎创软科技有限公司 A kind of office operation system reinforcement method and system
CN109858226A (en) * 2019-01-31 2019-06-07 叶春林 The safeguards system of networking storage safety
CN110213111A (en) * 2019-06-13 2019-09-06 叶春林 Networked product safe-guard system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364375A (en) * 2020-11-10 2021-02-12 叶春林 Personal characteristic information security guarantee system
CN112788067A (en) * 2021-03-04 2021-05-11 叶春林 Identity authorization confirmation system
WO2022217375A1 (en) * 2021-04-11 2022-10-20 叶春林 Autonomous expression security verification system
CN114140965A (en) * 2021-12-01 2022-03-04 叶沁 Fire-fighting information pushing method, server, client, local terminal and computer storage medium

Similar Documents

Publication Publication Date Title
CN111611565A (en) Autonomous reaching type safety verification system
US4691355A (en) Interactive security control system for computer communications and the like
CN104167029B (en) A kind of intelligent lock and its operating method
CN205121680U (en) Bluetooth lock system based on intelligent terminal
WO2013117019A1 (en) Method and device for system login based on dynamic password generated autonomously by user
CN102970674A (en) Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC)
CN105224933A (en) A kind of safety long-distance authorization method of finger print information and system
CN106650373A (en) SIM card information protection method and device
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN106650361A (en) Unblocking method and device
Wakabayashi et al. Personal authentication method against shoulder-surfing attacks for smartphone
CN105208045A (en) Identity authentication method, equipment and system
CN104156653B (en) A kind of application guard method and the device of mobile terminal
CN114090994A (en) Face recognition authentication method and system based on block chain
CN104361667B (en) A kind of access control system and its entrance guard authorization method based on 4G communications
Moses et al. Physical security and cybersecurity: Reducing risk by enhancing physical security posture through multi-factor authentication and other techniques
CN105635090B (en) System access method, system access mechanism and terminal
CN1262132C (en) Method for realizing remote cipher key destruction for secret mobile phone
CN110084947A (en) Access information update method, device
CN103236093B (en) A kind of escort box management method of identity-based identification technology
EP2965490B1 (en) Method for authenticating persons
CN102467617A (en) Data isolation method of software as a service (SaaS) application software
CN106780871A (en) A kind of method and system based on mobile terminal alarm
WO2022217375A1 (en) Autonomous expression security verification system
CN102314733A (en) Method for preventing cashes in bank card from being falsely withdrawn

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination