CN111654496A - Safety monitoring and protection system for industrial internet platform system - Google Patents
Safety monitoring and protection system for industrial internet platform system Download PDFInfo
- Publication number
- CN111654496A CN111654496A CN202010494215.9A CN202010494215A CN111654496A CN 111654496 A CN111654496 A CN 111654496A CN 202010494215 A CN202010494215 A CN 202010494215A CN 111654496 A CN111654496 A CN 111654496A
- Authority
- CN
- China
- Prior art keywords
- data
- time
- verification
- password
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Evolutionary Computation (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a safety monitoring and protecting system for an industrial internet platform system, which comprises a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module, wherein the login module is used for logging in the database; the system comprises a login module, a verification module, a database and a judgment module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, and recorded account data, recorded password data and user mobile phone number data are stored in the database.
Description
Technical Field
The invention relates to the technical field of safety monitoring and protection, in particular to a safety monitoring and protection system for an industrial internet platform system.
Background
Industrial internet is a result of the convergence of global industrial systems with advanced computing, analytics, sensing technologies and internet connectivity. The industrial internet reconstructs the global industry and stimulates productivity by connecting intelligent machines and finally connecting human-computer, and combines software and big data analysis, but the safety of the existing industrial internet platform is low.
The safety monitoring and protection of the existing industrial internet platform are both directed at safety protection on a platform system, a login account of a user cannot be protected, the user cannot quickly perform safety verification on a user account in the login process, related data monitoring is performed according to a verification result, and meanwhile, accurate analysis on monitoring data cannot be performed, so that secondary verification is performed on the account password.
Disclosure of Invention
The invention aims to provide a safety monitoring and protecting system facing an industrial internet platform system, which carries out safety verification on account data logged in by a user through the setting of a verification module, carries out detection analysis according to the result of the safety verification by a monitoring module so as to judge whether relevant data when a user password is input is collected or not, solves the problem that the safety of the account cannot be quickly verified in the prior art, increases the safety of the account of the user, carries out safety protection on the account of the user, avoids blind collection of useless data, monitors the relevant data input by the password, saves time, improves the working efficiency, carries out detailed analysis on account password login records in a database through the setting of analysis operation so as to obtain a corresponding password login mean value, carries out score value calculation according to the password login mean value by the judgment module, and carries out safety verification on the password login of the user according to the score value, the problem that secondary verification cannot be performed on account passwords according to accurate analysis of data in the prior art is solved, the accuracy of the data is improved, persuasion of the data is improved, and therefore time is saved and working efficiency is improved for safety protection of user accounts.
The purpose of the invention can be realized by the following technical scheme: a safety monitoring and protecting system for an industrial Internet platform system comprises a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module;
the system comprises a login module, a verification module, a monitoring module and a monitoring module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, recorded account data, recorded password data and user mobile phone number data are stored in a database, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database, carries out safety verification operation on the recorded account data, the recorded password data and the user mobile phone number data together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation according to the secondary verification signal and the verification error signal specifically comprises the following steps:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database, analyzes the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean data, contact key time mean values, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data, the input interval time mean value data, the contact key time mean values, the total time mean value data, the error rate mean value data and the force mean value data to the judgment module together;
the judging module is used for performing login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and sending the verification passing signal and the verification failing signal to the sending module through the server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
As a further improvement of the invention: the specific operation process of the security verification operation comprises the following steps:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: and sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal.
As a further improvement of the invention: the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:wherein, PMJiThe average value of the password input interval time data, namely the input interval time average value data, is expressed, the password input total time data is extracted and is substituted into a calculation formula:wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error times when the user inputs the password into the real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into the real-time force data, and calibrating the real-time force data as SLl, i.1, 2,3.
As a further improvement of the invention: the specific operation process of the login judgment operation comprises the following steps:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, u1, u2, u3, u4 and u5 are respectively represented as score conversion factors of the interval preset value difference, the contact preset value difference, the consumed time preset value difference, the error rate preset value difference and the force preset value difference, e is represented as a score conversion influence factor, t1 is represented as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: and extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, and generating a verification failing signal.
The invention has the beneficial effects that:
(1) the login module logs in a user account, automatically acquires account information and transmits the account information to the verification module, the verification module acquires recorded account data, recorded password data and user mobile phone number data from a database, and carries out security verification operation together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring module together; the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal; when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal; extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information; through the setting of the verification module, the account data logged in by the user is subjected to safety verification, and the monitoring module performs detection and analysis according to the result of the safety verification, so that whether relevant data during the input of the user password is collected or not is judged, the safety of the user account is improved, the account of the user is subjected to safety protection, the blind collection of useless data is avoided, the relevant data during the input of the password is monitored, the time is saved, and the working efficiency is improved.
(2) The analysis module acquires password input interval time data, password input total time data, a password input error rate and password input force data from a database, performs analysis operation on the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-; the judging module performs login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and the verification passing signal and the verification failing signal are sent to the sending module together through the server; after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification; through the setting of analysis operation, account number password login records stored in the database are analyzed in detail, so that a corresponding password login mean value is obtained, the judgment module carries out score value calculation according to the password login mean value, and carries out safety verification on the password login of a user according to the score value, the accuracy of data is improved, the persuasion degree of the data is increased, and therefore the time is saved and the working efficiency is improved for the safety protection of the account number of the user.
Drawings
The invention will be further described with reference to the accompanying drawings.
FIG. 1 is a system block diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention is a security monitoring and protection system for an industrial internet platform system, which includes a monitoring module, a login module, a verification module, a database, an analysis module, a determination module, a server and a sending module;
the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, the database stores recorded account data, recorded password data and user mobile phone number data, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database and carries out safety verification operation together with the account information, and the specific operation process of the safety verification operation is as follows:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal;
step four: transmitting the secondary verification signal and the verification error signal to the monitoring module together;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database and performs analysis operation together with input information, wherein the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:wherein, PMJiExpressed as password input interval dataThe average value, namely the input interval time average data, extracts the password input total time data and brings the password input total time data into a calculation formula:wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error input times of the user when the user inputs the password into real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into real-time force data, and calibrating the real-time force data as SLl, wherein l is 1,2,3.
H5: transmitting real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean data, contact key time mean, total time mean data, error rate mean data and force mean data to a judgment module;
the judging module is used for carrying out login judging operation on real-time input data, real-time contact data, real-time total consumed time data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and the specific operation process of the login judging operation is as follows:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, u1, u2, u3, u4 and u5 are respectively represented as score conversion factors of the interval preset value difference, the contact preset value difference, the consumed time preset value difference, the error rate preset value difference and the force preset value difference, e is represented as a score conversion influence factor, t1 is represented as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, generating a verification failing signal;
g4: sending the verification passing signal and the verification failing signal to a sending module through a server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
When the system works, a login module logs in a user account, automatically acquires account information and transmits the account information to a verification module, the verification module acquires recorded account data, recorded password data and user mobile phone number data from a database, and carries out safety verification operation together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to a monitoring module; the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation is specifically as follows: s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal; s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal; s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information; the analysis module acquires password input interval time data, password input total time data, a password input error rate and password input force data from a database, performs analysis operation on the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-; the judging module performs login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and the verification passing signal and the verification failing signal are sent to the sending module together through the server; and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (4)
1. A safety monitoring and protecting system for an industrial Internet platform system is characterized by comprising a monitoring module, a login module, a verification module, a database, an analysis module, a judgment module, a server and a sending module;
the system comprises a login module, a verification module, a monitoring module and a monitoring module, wherein the login module is used for logging in a user account, automatically acquiring account information and transmitting the account information to the verification module, recorded account data, recorded password data and user mobile phone number data are stored in a database, the verification module acquires the recorded account data, the recorded password data and the user mobile phone number data from the database, carries out safety verification operation on the recorded account data, the recorded password data and the user mobile phone number data together with the account information to obtain a secondary verification signal and a verification error signal, and transmits the secondary verification signal and the verification error signal to the monitoring;
the monitoring module receives the secondary verification signal and the verification error signal, and the verification operation according to the secondary verification signal and the verification error signal specifically comprises the following steps:
s1: extracting a secondary verification signal and a verification error signal, and when the verification error data is identified, judging that the security verification of the user account fails and generating a non-detection signal;
s2: when the secondary verification signal is identified, judging that the security verification of the user account number is passed, and generating a detection signal;
s3: extracting a non-detection signal and a detection signal, wherein when the non-detection signal is identified, the monitoring module does not monitor the password data state of the user account, and when the detection signal is identified, the monitoring module monitors the password data state of the user account and automatically acquires input information;
s4: transmitting the input information to an analysis module;
the analysis module acquires the password input interval time data, the password input total time data, the password input error rate and the password input force data from the database, analyzes the password input interval time data, the password input total time data, the password input error rate and the password input force data together with input information to obtain real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, input interval time mean data, contact key time mean values, total time mean value data, error rate mean value data and force mean value data, and transmits the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data, the input interval time mean value data, the contact key time mean values, the total time mean value data, the error rate mean value data and the force mean value data to the judgment module together;
the judging module is used for performing login judging operation on real-time input data, real-time contact data, real-time total time consumption data, real-time error rate data, real-time force data, transmission interval time mean value data, contact key time mean value, total time mean value data, error rate mean value data and force mean value data to obtain a verification passing signal and a verification failing signal, and sending the verification passing signal and the verification failing signal to the sending module through the server;
and after receiving the verification passing signal and the verification failing signal, the sending module sends the verification passing signal and the verification failing signal to the user side for re-verification.
2. The industrial internet platform system-oriented security monitoring and protecting system according to claim 1, wherein the specific operation process of the security verification operation is as follows:
the method comprises the following steps: acquiring account information, calibrating data input by a user in an account input field into user account data, and calibrating data input by the user in the account password input field into user password data;
step two: acquiring user account data, matching the user account data with recorded account data, judging that the account exists and generating a presence signal when the account data is matched from the recorded account data, and judging that the account does not exist and generating an error signal when the user account data cannot be matched from the recorded account data;
step three: receiving the existence signal and the error signal in the second step, identifying the existence signal and the error signal, automatically jumping to an account registration interface when the error signal is identified, and carrying out password verification on the existence signal when the existence signal is identified, specifically:
k1: extracting user password data corresponding to the user account data, and comparing the user password data with record password data corresponding to the record account data;
k2: judging the comparison result according to the data comparison in the K1, specifically: when the matching result of the user password data and the recorded password data is consistent, judging that the user account password is correct, and generating a secondary verification signal; when the matching result of the user password data and the recorded password data is inconsistent, judging that the user account password is wrong, generating a verification error signal, and automatically acquiring user mobile phone number data corresponding to the user account data;
k3: and sending verification information to the user mobile phone number data, and carrying out re-verification on the account number according to the verification information to generate a secondary verification signal and a verification error signal.
3. The industrial internet-oriented platform system security monitoring and protecting system according to claim 1, wherein the specific operation process of the analysis operation is as follows:
h1: acquiring password input interval time data, password input total time data, a password input error rate and password input strength data, and sequentially marking the data as MYi, MSi, MCi and MLi, wherein i is 1,2,3.... No. n 1;
h2: extracting the password input interval time data and the password input total time data, and bringing the password input interval time data and the password input total time data into a calculation formula: ZJi — MSi-MJi, where ZJi represents the time of contact with a key at the time of password entry, i.e., the contact key time data, and brings the contact key time data into the calculation:wherein, PZJiThe average value of the touch key time data is expressed, namely the touch key time average value;
h3: extracting password input interval time data and substituting the password input interval time data into a calculation formula:wherein, PMJiThe average value of the password input interval time data, namely the input interval time average value data, is expressed, the password input total time data is extracted and is substituted into a calculation formula:wherein, PMSiAnd (3) the average value of the total time data of the password input, namely the total time average data, extracting the password input error rate and substituting the password input error rate into a calculation formula:wherein, PMCiThe average value of the password input error rate, namely error rate average value data, is expressed, password input force data is extracted and is brought into a calculation formula:wherein, PMLiThe password input force data are expressed as the average value of the password input force data, namely force average value data;
h4: acquiring input information, calibrating the total time of a user when the user inputs an account password into real-time input time data, marking the real-time input data as SSl, calibrating the contact time of a mobile phone and a key when the sub-password of the user is input into the real-time contact data, marking the real-time contact data as SJl, calibrating the total time consumed by the user when the user inputs the password into real-time total time consumption data, calibrating the real-time total time consumption data as SZl, calibrating the password error times when the user inputs the password into the real-time error rate data, calibrating the real-time error rate data as SCl, calibrating the force of the user on the key when the user inputs the password into the real-time force data, and calibrating the real-time force data as SLl, i.1, 2,3.
4. The industrial internet platform system-oriented security monitoring and protecting system according to claim 1, wherein the specific operation process of the login judgment operation is as follows:
g1: extracting the real-time input data, the real-time contact data, the real-time total time consumption data, the real-time error rate data and the real-time force data in H4, and respectively substituting the extracted data with the input interval time mean value data, the contact key time mean value, the total time mean value data, the error rate mean value data and the force mean value data into a difference value calculation formula, so as to calculate an interval difference value, a contact difference value, a time consumption difference value, an error rate difference value and a force difference value;
g2: setting preset values corresponding to the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, and performing preset value difference calculation on the preset values and the interval difference, the contact difference, the time consumption difference, the error rate difference and the force difference, thereby calculating the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference, and bringing the interval preset value difference, the contact preset value difference, the time consumption preset value difference, the error rate preset value difference and the force preset value difference:wherein RSl is represented as an input score value, JYl is represented as an interval preset value difference, CYl is represented as a contact preset value difference, HYl is represented as a consumed time preset value difference, LYl is represented as an error rate preset value difference, DYl is represented as a force preset value difference, and u1, u2, u3, u4 and u5 are respectively represented as an interval preset value difference, a contact preset value,A grading conversion factor of the time-consuming preset value difference, the error rate preset value difference and the strength preset value difference, wherein e is expressed as a grading conversion influence factor, t1 is expressed as a conversion influence adjustment factor, u1 is 0.23716, u2 is 0.31579, u3 is 0.411327, u4 is 0.293517, u5 is 0.212173, e is 0.837125, and t1 is 0,335471;
g3: and extracting the input score value RSl in the G2, setting a score standard preset value MR, comparing the score standard preset value MR with the input score value, judging that the password input mode is correct when RSl is larger than or equal to the MR, generating a verification passing signal, and judging that the password input mode is incorrect when RSl is smaller than the MR, and generating a verification failing signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010494215.9A CN111654496B (en) | 2020-06-03 | 2020-06-03 | Safety monitoring and protection system for industrial internet platform system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010494215.9A CN111654496B (en) | 2020-06-03 | 2020-06-03 | Safety monitoring and protection system for industrial internet platform system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111654496A true CN111654496A (en) | 2020-09-11 |
CN111654496B CN111654496B (en) | 2021-02-05 |
Family
ID=72348905
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010494215.9A Active CN111654496B (en) | 2020-06-03 | 2020-06-03 | Safety monitoring and protection system for industrial internet platform system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111654496B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115450A (en) * | 2020-09-28 | 2020-12-22 | 兰和科技(深圳)有限公司 | Campus security information management system based on artificial intelligence technology |
CN112637187A (en) * | 2020-12-18 | 2021-04-09 | 合肥阿格德信息科技有限公司 | Computer network information safety system |
CN113535689A (en) * | 2021-08-02 | 2021-10-22 | 曜立科技(北京)有限公司 | Database establishment management system for digital therapy |
CN115955478A (en) * | 2022-06-17 | 2023-04-11 | 珠海市穗之峰农业服务有限公司 | Data security protection processing system based on cloud computing |
CN117077097A (en) * | 2023-08-31 | 2023-11-17 | 深圳市易连汇通科技有限公司 | Tablet personal computer login verification method based on data analysis |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101093554A (en) * | 2007-06-04 | 2007-12-26 | 李惠科 | Card with realtime biological identification system |
US20090313696A1 (en) * | 2008-06-12 | 2009-12-17 | International Business Machines Corporation | Calculating a password strength score based upon character proximity and relative position upon an input device |
CN102684882A (en) * | 2012-05-16 | 2012-09-19 | 中国科学院计算机网络信息中心 | Verifying method and verifying equipment |
CN105930065A (en) * | 2015-12-08 | 2016-09-07 | 中国银联股份有限公司 | Operating command input method, background device and terminal |
US10540493B1 (en) * | 2018-09-19 | 2020-01-21 | KnowBe4, Inc. | System and methods for minimizing organization risk from users associated with a password breach |
CN110751861A (en) * | 2019-11-28 | 2020-02-04 | 张丽丽 | Network remote education system based on cloud platform |
CN110781487A (en) * | 2019-09-27 | 2020-02-11 | 广西英腾教育科技股份有限公司 | Safety auxiliary verification method, system, medium and equipment |
US10588017B2 (en) * | 2014-08-19 | 2020-03-10 | Zighra Inc. | System and method for implicit authentication |
CN111008225A (en) * | 2019-11-15 | 2020-04-14 | 湖北瑞致和科技有限公司 | Student physical health integrated management system |
US10645086B1 (en) * | 2016-12-30 | 2020-05-05 | Charles Schwab & Co., Inc. | System and method for handling user requests for web services |
CN111159155A (en) * | 2019-12-31 | 2020-05-15 | 管华明 | Database security guarantee system and method based on big data |
CN111163087A (en) * | 2019-12-30 | 2020-05-15 | 南宁一站网网络技术有限公司 | Database safety protection system based on data acquisition |
-
2020
- 2020-06-03 CN CN202010494215.9A patent/CN111654496B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101093554A (en) * | 2007-06-04 | 2007-12-26 | 李惠科 | Card with realtime biological identification system |
US20090313696A1 (en) * | 2008-06-12 | 2009-12-17 | International Business Machines Corporation | Calculating a password strength score based upon character proximity and relative position upon an input device |
CN102684882A (en) * | 2012-05-16 | 2012-09-19 | 中国科学院计算机网络信息中心 | Verifying method and verifying equipment |
US10588017B2 (en) * | 2014-08-19 | 2020-03-10 | Zighra Inc. | System and method for implicit authentication |
CN105930065A (en) * | 2015-12-08 | 2016-09-07 | 中国银联股份有限公司 | Operating command input method, background device and terminal |
US10645086B1 (en) * | 2016-12-30 | 2020-05-05 | Charles Schwab & Co., Inc. | System and method for handling user requests for web services |
US10540493B1 (en) * | 2018-09-19 | 2020-01-21 | KnowBe4, Inc. | System and methods for minimizing organization risk from users associated with a password breach |
CN110781487A (en) * | 2019-09-27 | 2020-02-11 | 广西英腾教育科技股份有限公司 | Safety auxiliary verification method, system, medium and equipment |
CN111008225A (en) * | 2019-11-15 | 2020-04-14 | 湖北瑞致和科技有限公司 | Student physical health integrated management system |
CN110751861A (en) * | 2019-11-28 | 2020-02-04 | 张丽丽 | Network remote education system based on cloud platform |
CN111163087A (en) * | 2019-12-30 | 2020-05-15 | 南宁一站网网络技术有限公司 | Database safety protection system based on data acquisition |
CN111159155A (en) * | 2019-12-31 | 2020-05-15 | 管华明 | Database security guarantee system and method based on big data |
Non-Patent Citations (2)
Title |
---|
王雨华: "基于击键动力学的智能手机身份认证技术研究与实现", 《中国优秀硕士论文电子期刊》 * |
金振乾: "基于击键特征的身份识别技术在考试系统中的应用", 《电子技术与软件工程》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112115450A (en) * | 2020-09-28 | 2020-12-22 | 兰和科技(深圳)有限公司 | Campus security information management system based on artificial intelligence technology |
CN112637187A (en) * | 2020-12-18 | 2021-04-09 | 合肥阿格德信息科技有限公司 | Computer network information safety system |
CN113535689A (en) * | 2021-08-02 | 2021-10-22 | 曜立科技(北京)有限公司 | Database establishment management system for digital therapy |
CN113535689B (en) * | 2021-08-02 | 2022-02-11 | 曜立科技(北京)有限公司 | Database establishment management system for digital therapy |
CN115955478A (en) * | 2022-06-17 | 2023-04-11 | 珠海市穗之峰农业服务有限公司 | Data security protection processing system based on cloud computing |
CN115955478B (en) * | 2022-06-17 | 2023-11-24 | 北京博大网通科技发展有限公司 | Data security processing system based on cloud computing |
CN117077097A (en) * | 2023-08-31 | 2023-11-17 | 深圳市易连汇通科技有限公司 | Tablet personal computer login verification method based on data analysis |
CN117077097B (en) * | 2023-08-31 | 2024-03-19 | 深圳市易连汇通科技有限公司 | Tablet personal computer login verification method based on data analysis |
Also Published As
Publication number | Publication date |
---|---|
CN111654496B (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111654496B (en) | Safety monitoring and protection system for industrial internet platform system | |
CN111163087B (en) | Database safety protection system based on data acquisition | |
CN111339506A (en) | Customer management platform for sale of trusted operating system | |
CN103227734A (en) | Method for detecting abnormity of OpenStack cloud platform | |
CN112115450B (en) | Campus security information management system based on artificial intelligence technology | |
CN111191720B (en) | Service scene identification method and device and electronic equipment | |
CN112765578B (en) | Method for realizing safety privacy calculation based on browser client | |
WO2023108833A1 (en) | Terminal anomalous behavior detection method and apparatus, device, and storage medium | |
CN112347523A (en) | Information safety system based on cloud computing | |
CN115659369A (en) | User unified management system based on user operation habits | |
CN118075017A (en) | Network information security protection detection method and system | |
CN117171694B (en) | Distribution scene safety identification system based on AI technology | |
CN110445790A (en) | A kind of account method for detecting abnormality logging in behavior based on user | |
CN112163813B (en) | Transaction list accounting method for online purchasing | |
CN117238455B (en) | Hospital diagnosis supervision optimization system based on Internet of things | |
CN111767179A (en) | Computer hardware dimension system based on cloud platform | |
CN111932279A (en) | Traditional Chinese medicine quality safety tracing and supervising method based on block chain technology | |
CN114155914B (en) | Detection and correction system based on metagenome splicing errors | |
CN114866546A (en) | PaaS-based one-stop management system for monitoring platform | |
CN114579809A (en) | Event analysis method and device, electronic equipment and storage medium | |
CN106658542B (en) | Communication tower stability detection method and system based on stress model | |
CN110719313A (en) | Webshell detection method based on log session | |
CN116982587B (en) | Intelligent feeding system for ocean pasture | |
CN118381679B (en) | Intelligent control cabinet safety communication transmission system and method based on big data | |
CN110109968B (en) | Signal system time sequence consistency analysis method based on network data capture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |