CN111654496A - Safety monitoring and protection system for industrial internet platform system - Google Patents

Safety monitoring and protection system for industrial internet platform system Download PDF

Info

Publication number
CN111654496A
CN111654496A CN202010494215.9A CN202010494215A CN111654496A CN 111654496 A CN111654496 A CN 111654496A CN 202010494215 A CN202010494215 A CN 202010494215A CN 111654496 A CN111654496 A CN 111654496A
Authority
CN
China
Prior art keywords
data
time
verification
password
signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010494215.9A
Other languages
Chinese (zh)
Other versions
CN111654496B (en
Inventor
杨灵运
李凌
侯伟
赵佑军
杨廷玮泞
陈�胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Casicloud Technology Co ltd
Original Assignee
Guizhou Casicloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Casicloud Technology Co ltd filed Critical Guizhou Casicloud Technology Co ltd
Priority to CN202010494215.9A priority Critical patent/CN111654496B/en
Publication of CN111654496A publication Critical patent/CN111654496A/en
Application granted granted Critical
Publication of CN111654496B publication Critical patent/CN111654496B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Evolutionary Computation (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a safety monitoring and protecting system for an industrial internet platform system, which comprises a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module, wherein the login module is used for logging in the database; the system comprises a login module, a verification module, a database and a judgment module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, and recorded account data, recorded password data and user mobile phone number data are stored in the database.

Description

Safety monitoring and protection system for industrial internet platform system
Technical Field
The invention relates to the technical field of safety monitoring and protection, in particular to a safety monitoring and protection system for an industrial internet platform system.
Background
Industrial internet is a result of the convergence of global industrial systems with advanced computing, analytics, sensing technologies and internet connectivity. The industrial internet reconstructs the global industry and stimulates productivity by connecting intelligent machines and finally connecting human-computer, and combines software and big data analysis, but the safety of the existing industrial internet platform is low.
The safety monitoring and protection of the existing industrial internet platform are both directed at safety protection on a platform system, a login account of a user cannot be protected, the user cannot quickly perform safety verification on a user account in the login process, related data monitoring is performed according to a verification result, and meanwhile, accurate analysis on monitoring data cannot be performed, so that secondary verification is performed on the account password.
Disclosure of Invention
The invention aims to provide a safety monitoring and protecting system facing an industrial internet platform system, which carries out safety verification on account data logged in by a user through the setting of a verification module, carries out detection analysis according to the result of the safety verification by a monitoring module so as to judge whether relevant data when a user password is input is collected or not, solves the problem that the safety of the account cannot be quickly verified in the prior art, increases the safety of the account of the user, carries out safety protection on the account of the user, avoids blind collection of useless data, monitors the relevant data input by the password, saves time, improves the working efficiency, carries out detailed analysis on account password login records in a database through the setting of analysis operation so as to obtain a corresponding password login mean value, carries out score value calculation according to the password login mean value by the judgment module, and carries out safety verification on the password login of the user according to the score value, the problem that secondary verification cannot be performed on account passwords according to accurate analysis of data in the prior art is solved, the accuracy of the data is improved, persuasion of the data is improved, and therefore time is saved and working efficiency is improved for safety protection of user accounts.
The purpose of the invention can be realized by the following technical scheme: a safety monitoring and protecting system for an industrial Internet platform system comprises a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module;
the system comprises a login module, a verification module, a monitoring module and a monitoring module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, recorded account data, recorded password data and user mobile phone number data are stored in a database, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database, carries out safety verification operation on the recorded account data, the recorded password data and the user mobile phone number data together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation according to the secondary verification signal and the verification error signal specifically comprises the following steps:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database, analyzes the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean data, contact key time mean values, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data, the input interval time mean value data, the contact key time mean values, the total time mean value data, the error rate mean value data and the force mean value data to the judgment module together;
the judging module is used for performing login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and sending the verification passing signal and the verification failing signal to the sending module through the server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
As a further improvement of the invention: the specific operation process of the security verification operation comprises the following steps:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: and sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal.
As a further improvement of the invention: the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:
Figure BDA0002522161690000041
wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:
Figure BDA0002522161690000042
wherein, PMJiThe average value of the password input interval time data, namely the input interval time average value data, is expressed, the password input total time data is extracted and is substituted into a calculation formula:
Figure BDA0002522161690000043
wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:
Figure BDA0002522161690000051
wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:
Figure BDA0002522161690000052
wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error times when the user inputs the password into the real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into the real-time force data, and calibrating the real-time force data as SLl, i.1, 2,3.
As a further improvement of the invention: the specific operation process of the login judgment operation comprises the following steps:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:
Figure BDA0002522161690000053
wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, u1, u2, u3, u4 and u5 are respectively represented as score conversion factors of the interval preset value difference, the contact preset value difference, the consumed time preset value difference, the error rate preset value difference and the force preset value difference, e is represented as a score conversion influence factor, t1 is represented as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: and extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, and generating a verification failing signal.
The invention has the beneficial effects that:
(1) the login module logs in a user account, automatically acquires account information and transmits the account information to the verification module, the verification module acquires recorded account data, recorded password data and user mobile phone number data from a database, and carries out security verification operation together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring module together; the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal; when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal; extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information; through the setting of the verification module, the account data logged in by the user is subjected to safety verification, and the monitoring module performs detection and analysis according to the result of the safety verification, so that whether relevant data during the input of the user password is collected or not is judged, the safety of the user account is improved, the account of the user is subjected to safety protection, the blind collection of useless data is avoided, the relevant data during the input of the password is monitored, the time is saved, and the working efficiency is improved.
(2) The analysis module acquires password input interval time data, password input total time data, a password input error rate and password input force data from a database, performs analysis operation on the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-; the judging module performs login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and the verification passing signal and the verification failing signal are sent to the sending module together through the server; after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification; through the setting of analysis operation, account number password login records stored in the database are analyzed in detail, so that a corresponding password login mean value is obtained, the judgment module carries out score value calculation according to the password login mean value, and carries out safety verification on the password login of a user according to the score value, the accuracy of data is improved, the persuasion degree of the data is increased, and therefore the time is saved and the working efficiency is improved for the safety protection of the account number of the user.
Drawings
The invention will be further described with reference to the accompanying drawings.
FIG. 1 is a system block diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is a security monitoring and protection system for an industrial internet platform system, which includes a monitoring module, a login module, a verification module, a database, an analysis module, a determination module, a server and a sending module;
the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, the database stores recorded account data, recorded password data and user mobile phone number data, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database and carries out safety verification operation together with the account information, and the specific operation process of the safety verification operation is as follows:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal;
step four: transmitting the secondary verification signal and the verification error signal to the monitoring module together;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database and performs analysis operation together with input information, wherein the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:
Figure BDA0002522161690000101
wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:
Figure BDA0002522161690000102
wherein, PMJiExpressed as password input interval dataThe average value, namely the input interval time average data, extracts the password input total time data and brings the password input total time data into a calculation formula:
Figure BDA0002522161690000103
wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:
Figure BDA0002522161690000104
wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:
Figure BDA0002522161690000105
wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error input times of the user when the user inputs the password into real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into real-time force data, and calibrating the real-time force data as SLl, wherein l is 1,2,3.
H5: transmitting real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean data, contact key time mean, total time mean data, error rate mean data and force mean data to a judgment module;
the judging module is used for carrying out login judging operation on real-time input data, real-time contact data, real-time total consumed time data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and the specific operation process of the login judging operation is as follows:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:
Figure BDA0002522161690000111
wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, u1, u2, u3, u4 and u5 are respectively represented as score conversion factors of the interval preset value difference, the contact preset value difference, the consumed time preset value difference, the error rate preset value difference and the force preset value difference, e is represented as a score conversion influence factor, t1 is represented as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, generating a verification failing signal;
g4: sending the verification passing signal and the verification failing signal to a sending module through a server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
When the system works, a login module logs in a user account, automatically acquires account information and transmits the account information to a verification module, the verification module acquires recorded account data, recorded password data and user mobile phone number data from a database, and carries out safety verification operation together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to a monitoring module; the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows: s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal; s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal; s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information; the analysis module acquires password input interval time data, password input total time data, a password input error rate and password input force data from a database, performs analysis operation on the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-; the judging module performs login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and the verification passing signal and the verification failing signal are sent to the sending module together through the server; and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (4)

1. A safety monitoring and protecting system for an industrial Internet platform system is characterized by comprising a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module;
the system comprises a login module, a verification module, a monitoring module and a monitoring module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, recorded account data, recorded password data and user mobile phone number data are stored in a database, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database, carries out safety verification operation on the recorded account data, the recorded password data and the user mobile phone number data together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation according to the secondary verification signal and the verification error signal specifically comprises the following steps:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database, analyzes the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean data, contact key time mean values, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data, the input interval time mean value data, the contact key time mean values, the total time mean value data, the error rate mean value data and the force mean value data to the judgment module together;
the judging module is used for performing login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and sending the verification passing signal and the verification failing signal to the sending module through the server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
2. The industrial internet platform system-oriented security monitoring and protecting system according to claim 1, wherein the specific operation process of the security verification operation is as follows:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: and sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal.
3. The industrial internet-oriented platform system security monitoring and protecting system according to claim 1, wherein the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:
Figure FDA0002522161680000031
wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:
Figure FDA0002522161680000032
wherein, PMJiThe average value of the password input interval time data, namely the input interval time average value data, is expressed, the password input total time data is extracted and is substituted into a calculation formula:
Figure FDA0002522161680000033
wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:
Figure FDA0002522161680000041
wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:
Figure FDA0002522161680000042
wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error times when the user inputs the password into the real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into the real-time force data, and calibrating the real-time force data as SLl, i.1, 2,3.
4. The industrial internet platform system-oriented security monitoring and protecting system according to claim 1, wherein the specific operation process of the login judgment operation is as follows:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:
Figure FDA0002522161680000043
wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, and u1, u2, u3, u4 and u5 are respectively represented as an interval preset value difference, a contact preset value,A grading conversion factor of the time-consuming preset value difference, the error rate preset value difference and the strength preset value difference, wherein e is expressed as a grading conversion influence factor, t1 is expressed as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: and extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, and generating a verification failing signal.
CN202010494215.9A 2020-06-03 2020-06-03 Safety monitoring and protection system for industrial internet platform system Active CN111654496B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010494215.9A CN111654496B (en) 2020-06-03 2020-06-03 Safety monitoring and protection system for industrial internet platform system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010494215.9A CN111654496B (en) 2020-06-03 2020-06-03 Safety monitoring and protection system for industrial internet platform system

Publications (2)

Publication Number Publication Date
CN111654496A true CN111654496A (en) 2020-09-11
CN111654496B CN111654496B (en) 2021-02-05

Family

ID=72348905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010494215.9A Active CN111654496B (en) 2020-06-03 2020-06-03 Safety monitoring and protection system for industrial internet platform system

Country Status (1)

Country Link
CN (1) CN111654496B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115450A (en) * 2020-09-28 2020-12-22 兰和科技(深圳)有限公司 Campus security information management system based on artificial intelligence technology
CN112637187A (en) * 2020-12-18 2021-04-09 合肥阿格德信息科技有限公司 Computer network information safety system
CN113535689A (en) * 2021-08-02 2021-10-22 曜立科技(北京)有限公司 Database establishment management system for digital therapy
CN115955478A (en) * 2022-06-17 2023-04-11 珠海市穗之峰农业服务有限公司 Data security protection processing system based on cloud computing
CN117077097A (en) * 2023-08-31 2023-11-17 深圳市易连汇通科技有限公司 Tablet personal computer login verification method based on data analysis

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093554A (en) * 2007-06-04 2007-12-26 李惠科 Card with realtime biological identification system
US20090313696A1 (en) * 2008-06-12 2009-12-17 International Business Machines Corporation Calculating a password strength score based upon character proximity and relative position upon an input device
CN102684882A (en) * 2012-05-16 2012-09-19 中国科学院计算机网络信息中心 Verifying method and verifying equipment
CN105930065A (en) * 2015-12-08 2016-09-07 中国银联股份有限公司 Operating command input method, background device and terminal
US10540493B1 (en) * 2018-09-19 2020-01-21 KnowBe4, Inc. System and methods for minimizing organization risk from users associated with a password breach
CN110751861A (en) * 2019-11-28 2020-02-04 张丽丽 Network remote education system based on cloud platform
CN110781487A (en) * 2019-09-27 2020-02-11 广西英腾教育科技股份有限公司 Safety auxiliary verification method, system, medium and equipment
US10588017B2 (en) * 2014-08-19 2020-03-10 Zighra Inc. System and method for implicit authentication
CN111008225A (en) * 2019-11-15 2020-04-14 湖北瑞致和科技有限公司 Student physical health integrated management system
US10645086B1 (en) * 2016-12-30 2020-05-05 Charles Schwab & Co., Inc. System and method for handling user requests for web services
CN111159155A (en) * 2019-12-31 2020-05-15 管华明 Database security guarantee system and method based on big data
CN111163087A (en) * 2019-12-30 2020-05-15 南宁一站网网络技术有限公司 Database safety protection system based on data acquisition

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101093554A (en) * 2007-06-04 2007-12-26 李惠科 Card with realtime biological identification system
US20090313696A1 (en) * 2008-06-12 2009-12-17 International Business Machines Corporation Calculating a password strength score based upon character proximity and relative position upon an input device
CN102684882A (en) * 2012-05-16 2012-09-19 中国科学院计算机网络信息中心 Verifying method and verifying equipment
US10588017B2 (en) * 2014-08-19 2020-03-10 Zighra Inc. System and method for implicit authentication
CN105930065A (en) * 2015-12-08 2016-09-07 中国银联股份有限公司 Operating command input method, background device and terminal
US10645086B1 (en) * 2016-12-30 2020-05-05 Charles Schwab & Co., Inc. System and method for handling user requests for web services
US10540493B1 (en) * 2018-09-19 2020-01-21 KnowBe4, Inc. System and methods for minimizing organization risk from users associated with a password breach
CN110781487A (en) * 2019-09-27 2020-02-11 广西英腾教育科技股份有限公司 Safety auxiliary verification method, system, medium and equipment
CN111008225A (en) * 2019-11-15 2020-04-14 湖北瑞致和科技有限公司 Student physical health integrated management system
CN110751861A (en) * 2019-11-28 2020-02-04 张丽丽 Network remote education system based on cloud platform
CN111163087A (en) * 2019-12-30 2020-05-15 南宁一站网网络技术有限公司 Database safety protection system based on data acquisition
CN111159155A (en) * 2019-12-31 2020-05-15 管华明 Database security guarantee system and method based on big data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
王雨华: "基于击键动力学的智能手机身份认证技术研究与实现", 《中国优秀硕士论文电子期刊》 *
金振乾: "基于击键特征的身份识别技术在考试系统中的应用", 《电子技术与软件工程》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112115450A (en) * 2020-09-28 2020-12-22 兰和科技(深圳)有限公司 Campus security information management system based on artificial intelligence technology
CN112637187A (en) * 2020-12-18 2021-04-09 合肥阿格德信息科技有限公司 Computer network information safety system
CN113535689A (en) * 2021-08-02 2021-10-22 曜立科技(北京)有限公司 Database establishment management system for digital therapy
CN113535689B (en) * 2021-08-02 2022-02-11 曜立科技(北京)有限公司 Database establishment management system for digital therapy
CN115955478A (en) * 2022-06-17 2023-04-11 珠海市穗之峰农业服务有限公司 Data security protection processing system based on cloud computing
CN115955478B (en) * 2022-06-17 2023-11-24 北京博大网通科技发展有限公司 Data security processing system based on cloud computing
CN117077097A (en) * 2023-08-31 2023-11-17 深圳市易连汇通科技有限公司 Tablet personal computer login verification method based on data analysis
CN117077097B (en) * 2023-08-31 2024-03-19 深圳市易连汇通科技有限公司 Tablet personal computer login verification method based on data analysis

Also Published As

Publication number Publication date
CN111654496B (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN111654496B (en) Safety monitoring and protection system for industrial internet platform system
CN111163087B (en) Database safety protection system based on data acquisition
CN111339506A (en) Customer management platform for sale of trusted operating system
CN103227734A (en) Method for detecting abnormity of OpenStack cloud platform
CN112115450B (en) Campus security information management system based on artificial intelligence technology
CN111191720B (en) Service scene identification method and device and electronic equipment
CN112765578B (en) Method for realizing safety privacy calculation based on browser client
WO2023108833A1 (en) Terminal anomalous behavior detection method and apparatus, device, and storage medium
CN112347523A (en) Information safety system based on cloud computing
CN115659369A (en) User unified management system based on user operation habits
CN118075017A (en) Network information security protection detection method and system
CN117171694B (en) Distribution scene safety identification system based on AI technology
CN110445790A (en) A kind of account method for detecting abnormality logging in behavior based on user
CN112163813B (en) Transaction list accounting method for online purchasing
CN117238455B (en) Hospital diagnosis supervision optimization system based on Internet of things
CN111767179A (en) Computer hardware dimension system based on cloud platform
CN111932279A (en) Traditional Chinese medicine quality safety tracing and supervising method based on block chain technology
CN114155914B (en) Detection and correction system based on metagenome splicing errors
CN114866546A (en) PaaS-based one-stop management system for monitoring platform
CN114579809A (en) Event analysis method and device, electronic equipment and storage medium
CN106658542B (en) Communication tower stability detection method and system based on stress model
CN110719313A (en) Webshell detection method based on log session
CN116982587B (en) Intelligent feeding system for ocean pasture
CN118381679B (en) Intelligent control cabinet safety communication transmission system and method based on big data
CN110109968B (en) Signal system time sequence consistency analysis method based on network data capture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant