CN112115462A - Method and system for limiting access terminal based on web page - Google Patents

Method and system for limiting access terminal based on web page Download PDF

Info

Publication number
CN112115462A
CN112115462A CN202011006108.3A CN202011006108A CN112115462A CN 112115462 A CN112115462 A CN 112115462A CN 202011006108 A CN202011006108 A CN 202011006108A CN 112115462 A CN112115462 A CN 112115462A
Authority
CN
China
Prior art keywords
unit
terminal
data
information
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011006108.3A
Other languages
Chinese (zh)
Other versions
CN112115462B (en
Inventor
吴波
秦志军
陈娅
施爱军
周彤
曾阳
徐辉
刘清
朱晨
周鹏飞
王相和
符建平
吴欣蓉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Yishu Information Science & Technology Co ltd
State Grid Jiangsu Electric Power Co Ltd
Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
Nanjing Yishu Information Science & Technology Co ltd
State Grid Jiangsu Electric Power Co Ltd
Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Yishu Information Science & Technology Co ltd, State Grid Jiangsu Electric Power Co Ltd, Taizhou Power Supply Co of State Grid Jiangsu Electric Power Co Ltd filed Critical Nanjing Yishu Information Science & Technology Co ltd
Priority to CN202011006108.3A priority Critical patent/CN112115462B/en
Publication of CN112115462A publication Critical patent/CN112115462A/en
Application granted granted Critical
Publication of CN112115462B publication Critical patent/CN112115462B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a method and a system for limiting access to a terminal based on a web page, and particularly relates to the field of computer information security. According to the invention, the access limit of the management configuration unit to the terminal processor is set, a computer administrator checks the running state of calculation through backstage overall, a user administrator can log in a central processing center on a browser of any terminal processor to check data and configure functions, independent safety setting of each computer is not needed, the computers can be grouped according to management requirements, different groups send different management configurations, and a fault-tolerant change unit temporarily changes the fault tolerance of the management configuration unit, so that the independent macroscopic regulation and control of the access-limiting terminal can be facilitated, necessary unconventional applications can be temporarily passed, and the efficient proceeding of learning and working is ensured.

Description

Method and system for limiting access terminal based on web page
Technical Field
The invention relates to the technical field of computer information security, in particular to a method and a system for limiting access to a terminal based on a web page.
Background
The computer is commonly called computer, is an electronic computer for high-speed calculation, can perform numerical calculation and logic calculation, and also has the function of storage and memory. A computer that is composed of a hardware system and a software system and does not have any software installed is called a bare metal. The computer can be divided into a super computer, an industrial control computer, a network computer, a personal computer and an embedded computer, and more advanced computers comprise a biological computer, a photon computer, a quantum computer and the like. The computer is one of the most advanced scientific and technical inventions in the 20 th century, has extremely important influence on the production activities and social activities of human beings, is spread throughout general schools, enterprises and public institutions, enters common people and becomes an essential tool in the information society. The application of computers is more and more common in China, after the innovation is opened, the number of Chinese computer users is continuously increased, the application level is continuously improved, and particularly, the application in the fields of Internet, communication, multimedia and the like obtains good results. The network computer is specially used for some high-performance computers and can provide services to the outside through the network. Compared with a common computer, the requirements on stability, safety, performance and the like are higher, so that the hardware such as a CPU (central processing unit), a chipset, a memory, a disk system, a network and the like is different from the common computer. The server is a node of the network, stores and processes 80% of data and information on the network, and plays a very important role in the network. They are high-performance computers that provide various services to client computers, and their high performance is mainly expressed in terms of high-speed computing capability, long-time reliable operation, strong external data throughput capability, and the like.
The limiting terminal access of the computer is commonly called behavior control, and is that a user sets a terminal computer according to needs to achieve related safety management purposes, for example, websites which can be browsed by a management and control computer, external equipment which can be used by the management and control computer, starting time which can be used by the management and control computer and the like, one computer is enabled to reach a state required by a manager through a series of detailed settings, the existing limiting terminal access mostly carries out autonomous crash adjustment according to setting information, but cannot cross setting to carry out necessary autonomous changing capability, the manager needs to carry out autonomous regulation and control at any time, and learning and efficient work cannot be guaranteed.
Disclosure of Invention
In order to overcome the above defects in the prior art, embodiments of the present invention provide a method and system for restricting access to a terminal based on a web page, and the technical problem to be solved by the present invention is: how to improve the behavior looseness of a computer when limiting terminal access so as to ensure the efficient proceeding of learning and work.
In order to achieve the purpose, the invention provides the following technical scheme: a system for limiting access terminals based on web pages comprises a central processing center, wherein a system login unit is arranged at the input end of the central processing center, a management configuration unit and a safety setting unit are arranged at the output end of the central processing center, a terminal processor is arranged at the output ends of the management configuration unit and the safety setting unit, a signal conduction unit is arranged at the output end of the terminal processor, a fault-tolerant change unit is further arranged at the output end of the terminal processor, the output end of the fault-tolerant change unit is set to be a signal conduction unit, an information overall planning unit is arranged at the output end of the signal conduction unit, an overall planning and reporting unit is arranged at the output end of the information overall planning unit, and the output end of the overall planning and reporting unit is set to be;
the central processing center is set as a center for a manager to issue control instructions and check information;
the system login unit is used for a manager to log in a login interface of the central processing center;
the management configuration unit is used for comprehensively managing webpage browsing and function configuration of each computer;
the safety setting unit is used for setting and updating the setting data of the terminal computer by a user according to the requirement;
the signal transmission unit is used for effectively transmitting data from the central processing center to the terminal processor;
the terminal processor is set as each computer to be controlled;
the fault-tolerant modification unit is used for carrying out data modification on error points of unconventional data requested by the terminal processor for a plurality of times so as to enable the requests to pass;
the information overall planning unit can carry out centralized overall planning on the access data of the terminal processor and the access change data of the fault-tolerant change unit to produce comprehensive information;
the overall planning point reporting unit is used for producing specific information source points for various signals of the information overall planning unit.
In a preferred embodiment, the system login unit logs in by using a login name and a login password, and can log in a computer browser corresponding to any terminal processor.
In a preferred embodiment, the number of applications of fault-tolerant alteration in the fault-tolerant alteration unit is not less than 3, and subsequent access of the machine is not blocked after a single alteration.
In a preferred embodiment, the orchestration point unit is configured to perform a differential labeling of the non-conventional operation points generated by the normal-setting production points and the fault-tolerant modification units in the security setting unit.
The invention also comprises a method for limiting the access to the terminal system based on the web page, which comprises the following steps:
s1, setting management and control information:
s1.1: the administrator selects any computer of the terminal processors to log in the central processing center by using the password and the account, the terminal processors corresponding to different areas are grouped by the security setting unit, then the security setting unit sets the website which can be browsed by the computer, the time for starting the computer and the information of the external equipment which can be communicated with the computer by signals, and stores the signals to the management configuration unit for storage, and the macroscopic control is operated by the corresponding groups;
s1.2: the method comprises the steps that the terminal processing machines which are correspondingly grouped transmit set management configuration of a safety setting unit in the step S1.1 to a signal transmission unit, the set conventional information is recorded as conventional running data through an information overall unit, the terminal processing machines receive management configuration application set by the safety setting unit in the non-step S1.1 and operated by an operator for a plurality of times, the management configuration unit of the terminal processing machines is temporarily changed by application information through a fault-tolerant changing unit, the non-conventional data is generated and transmitted to the signal transmission unit through the fault-tolerant changing unit, the conventional running data and the non-conventional data are centrally recorded through the information overall unit, and the general running data and the non-conventional data are distinguished and displayed by an overall reporting unit;
s2, data view and setup supplement: the manager selects any computer of the terminal processor again to log in the central processing center by using the password and the account, and opens the management background to check the punctuation data and the function configuration generated by the overall reporting unit;
s3, macro regulation:
s3.1, if the frequency of the non-conventional data points reaches the standard and the manager judges that the setting is missed to effectively operate, the safety setting unit increases the setting information and the functions of the grouped terminal processors;
s3.2: if the frequency of the non-conventional data points does not reach the standard and the manager judges that the non-missing set effective operation is carried out, the manager locks the application behavior by the safety setting unit and forbids the fault-tolerant changing unit to change the application behavior again;
s3.3: if the frequency of the unconventional data points does not reach the standard and the manager judges that the setting is missed and the operation is effective, the safety setting unit increases the setting information and the function of the terminal processor corresponding to the unconventional data points.
In a preferred embodiment, the security setting related information corresponding to different groups of terminal processing machines in step S1.1 is different.
In a preferred embodiment, the frequency of the non-regular data points in step S3 is set to be greater than 30% of the total number of terminal processors generating the same type of non-regular data points.
The invention has the technical effects and advantages that:
according to the invention, the access limit of the management configuration unit to the terminal processor is set, a computer administrator does not need to set related options by one computer any more, and can also check the operation state of calculation by backstage overall, a user administrator can log in a central processing center on a browser of any terminal processor to check data and configure functions, so that not only is independent safety setting of each computer not needed, but also the computers can be grouped according to the management requirements, different groups can be issued to different management configurations, and the fault-tolerant change unit can temporarily change the fault tolerance of the management configuration unit, thereby facilitating autonomous macroscopic regulation and control of the access limiting terminal, temporarily passing necessary unconventional applications, and ensuring efficient learning and working.
Drawings
Fig. 1 is an overall block diagram of the present invention.
FIG. 2 is a schematic overall flow chart of the present invention.
The reference signs are: 101 central processing center, 102 system login unit, 103 management configuration unit, 104 security setting unit, 105 signal transmission unit, 106 terminal processor, 107 fault tolerance changing unit, 108 information integration unit, 109 integration reporting unit.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the present invention provides a system for restricting access to a terminal based on a web page as shown in fig. 1-2, including a central processing center 101, the input end of the central processing center 101 is provided with a system login unit 102, the output end of the central processing center 101 is provided with a management configuration unit 103 and a security setting unit 104, the output of the management configuration unit 103 and the security configuration unit 104 is provided with a terminal handler 106, the output end of the terminal processor 106 is provided with a signal conduction unit 105, the output end of the terminal processor 106 is also provided with a fault-tolerant change unit 107, the output end of the fault-tolerant changing unit 107 is provided with a signal conducting unit 105, the output end of the signal conducting unit 105 is provided with an information overall unit 108, the output end of the information overall planning unit 108 is provided with an overall planning and point reporting unit 109, and the output end of the overall planning and point reporting unit 109 is arranged as the central processing center 101;
the central processing center 101 is set as a center for a manager to issue control instructions and check information;
the system login unit 102 is used for a manager to log in a login interface of the central processing center 101;
the management configuration unit 103 is configured to perform comprehensive management on web browsing and function configuration of each computer;
the security setting unit 104 is used for setting and updating the setting data of the terminal computer by the user according to the requirement;
the signal transmission unit 105 is used for effectively transmitting data from the central processing center 101 to the terminal processor 106;
the terminal processor 106 is set as each computer to be managed and controlled;
the fault-tolerant modification unit 107 is configured to perform data modification on the error point of the irregular data requested by the terminal processor 106 several times, so that the request is passed;
the information overall planning unit 108 may perform centralized overall planning on the access data of the terminal processor 106 and the access change data of the fault-tolerant change unit 107 to produce the comprehensive information;
the overall planning point reporting unit 109 is configured to generate specific information source points for various signals of the information overall planning unit 108.
The system login unit 102 logs in by adopting a login name and a login password, and can log in a computer browser corresponding to any terminal processor 106, the application times of fault-tolerant change in the fault-tolerant change unit 107 are not less than 3, follow-up similar access of the system is not blocked after single change, and the unconventional operation report points generated by the normal setting production report points and the fault-tolerant change unit 107 in the security setting unit 104 are labeled in the overall report point unit 109 in a distinguishing manner.
The invention also comprises a method for limiting the access to the terminal system based on the web page, which comprises the following steps:
s1, setting management and control information:
s1.1: a manager selects any one computer of the terminal processors 106 to log in the central processing center 101 by using a password and an account, the terminal processors 106 corresponding to different areas are grouped by the security setting unit 104, then the security setting unit 104 sets the website which can be browsed by the computer, the time for starting the computer and the information of external equipment which can be communicated with the computer for signals, and stores the signals in the management configuration unit 103 for storage, and the macroscopic control is operated by corresponding grouping;
s1.2: the correspondingly grouped terminal processors 106 transmit the set management configuration set by the safety setting unit 104 in the step S1.1 to the signal transmission unit 105, and then record the management configuration as the conventional running data through the information overall unit 108, the terminal processors 106 receive the management configuration application set by the safety setting unit 104 in the non-step S1.1 from the operator for a plurality of operations, temporarily change the management configuration unit 103 of the terminal through the application information by the fault-tolerant changing unit 107, generate the non-conventional data, transmit the non-conventional data to the signal transmission unit 105 through the fault-tolerant changing unit 107, and then perform centralized overall recording on the conventional running data and the non-conventional data by the information overall unit 108, and perform the differentiated standard point display on the conventional running data and the non-conventional data by the overall point unit 109;
s2, data view and setup supplement: the administrator selects any computer of the terminal processor 106 again to log in the central processing center 101 by using the password and the account, and opens the management background to check the punctuation data and the functional configuration generated by the overall planning and reporting unit 109;
s3, macro regulation: if the frequency of the non-conventional data points reaches the standard and the manager determines that the setting is missed and the operation is valid, the security setting unit 104 adds the setting information and the function of the grouped terminal processor 106.
Example 2:
the present invention provides a system for restricting access to a terminal based on a web page as shown in fig. 1-2, including a central processing center 101, the input end of the central processing center 101 is provided with a system login unit 102, the output end of the central processing center 101 is provided with a management configuration unit 103 and a security setting unit 104, the output of the management configuration unit 103 and the security configuration unit 104 is provided with a terminal handler 106, the output end of the terminal processor 106 is provided with a signal conduction unit 105, the output end of the terminal processor 106 is also provided with a fault-tolerant change unit 107, the output end of the fault-tolerant changing unit 107 is provided with a signal conducting unit 105, the output end of the signal conducting unit 105 is provided with an information overall unit 108, the output end of the information overall planning unit 108 is provided with an overall planning and point reporting unit 109, and the output end of the overall planning and point reporting unit 109 is arranged as the central processing center 101;
the central processing center 101 is set as a center for a manager to issue control instructions and check information;
the system login unit 102 is used for a manager to log in a login interface of the central processing center 101;
the management configuration unit 103 is configured to perform comprehensive management on web browsing and function configuration of each computer;
the security setting unit 104 is used for setting and updating the setting data of the terminal computer by the user according to the requirement;
the signal transmission unit 105 is used for effectively transmitting data from the central processing center 101 to the terminal processor 106;
the terminal processor 106 is set as each computer to be managed and controlled;
the fault-tolerant modification unit 107 is configured to perform data modification on the error point of the irregular data requested by the terminal processor 106 several times, so that the request is passed;
the information overall planning unit 108 may perform centralized overall planning on the access data of the terminal processor 106 and the access change data of the fault-tolerant change unit 107 to produce the comprehensive information;
the overall planning point reporting unit 109 is configured to generate specific information source points for various signals of the information overall planning unit 108.
The system login unit 102 logs in by adopting a login name and a login password, and can log in a computer browser corresponding to any terminal processor 106, the application times of fault-tolerant change in the fault-tolerant change unit 107 are not less than 3, follow-up similar access of the system is not blocked after single change, and the unconventional operation report points generated by the normal setting production report points and the fault-tolerant change unit 107 in the security setting unit 104 are labeled in the overall report point unit 109 in a distinguishing manner.
The invention also comprises a method for limiting the access to the terminal system based on the web page, which comprises the following steps:
s1, setting management and control information:
s1.1: a manager selects any one computer of the terminal processors 106 to log in the central processing center 101 by using a password and an account, the terminal processors 106 corresponding to different areas are grouped by the security setting unit 104, then the security setting unit 104 sets the website which can be browsed by the computer, the time for starting the computer and the information of external equipment which can be communicated with the computer for signals, and stores the signals in the management configuration unit 103 for storage, and the macroscopic control is operated by corresponding grouping;
s1.2: the correspondingly grouped terminal processors 106 transmit the set management configuration set by the safety setting unit 104 in the step S1.1 to the signal transmission unit 105, and then record the management configuration as the conventional running data through the information overall unit 108, the terminal processors 106 receive the management configuration application set by the safety setting unit 104 in the non-step S1.1 from the operator for a plurality of operations, temporarily change the management configuration unit 103 of the terminal through the application information by the fault-tolerant changing unit 107, generate the non-conventional data, transmit the non-conventional data to the signal transmission unit 105 through the fault-tolerant changing unit 107, and then perform centralized overall recording on the conventional running data and the non-conventional data by the information overall unit 108, and perform the differentiated standard point display on the conventional running data and the non-conventional data by the overall point unit 109;
s2, data view and setup supplement: the administrator selects any computer of the terminal processor 106 again to log in the central processing center 101 by using the password and the account, and opens the management background to check the punctuation data and the functional configuration generated by the overall planning and reporting unit 109;
s3, macro regulation: if the frequency of the non-conventional data points does not reach the standard and the manager determines that the setting is not missed, the manager locks the application behavior by the security setting unit 104 and prohibits the fault-tolerant changing unit 107 from changing the application behavior again.
Example 3:
the invention provides a system for limiting access terminals based on web pages, which comprises a central processing center 101, wherein the input end of the central processing center 101 is provided with a system login unit 102, the output end of the central processing center 101 is provided with a management configuration unit 103 and a safety setting unit 104, the output ends of the management configuration unit 103 and the safety setting unit 104 are provided with a terminal processor 106, the output end of the terminal processor 106 is provided with a signal conduction unit 105, the output end of the terminal processor 106 is also provided with a fault-tolerant change unit 107, the output end of the fault-tolerant change unit 107 is arranged as the signal conduction unit 105, the output end of the signal conduction unit 105 is provided with an information overall planning unit 108, the output end of the information overall planning unit 108 is provided with an overall planning and reporting unit 109, and the output end of the overall planning and reporting unit 109 is arranged as the central;
the central processing center 101 is set as a center for a manager to issue control instructions and check information;
the system login unit 102 is used for a manager to log in a login interface of the central processing center 101;
the management configuration unit 103 is configured to perform comprehensive management on web browsing and function configuration of each computer;
the security setting unit 104 is used for setting and updating the setting data of the terminal computer by the user according to the requirement;
the signal transmission unit 105 is used for effectively transmitting data from the central processing center 101 to the terminal processor 106;
the terminal processor 106 is set as each computer to be managed and controlled;
the fault-tolerant modification unit 107 is configured to perform data modification on the error point of the irregular data requested by the terminal processor 106 several times, so that the request is passed;
the information overall planning unit 108 may perform centralized overall planning on the access data of the terminal processor 106 and the access change data of the fault-tolerant change unit 107 to produce the comprehensive information;
the overall planning point reporting unit 109 is configured to generate specific information source points for various signals of the information overall planning unit 108.
The system login unit 102 logs in by adopting a login name and a login password, and can log in a computer browser corresponding to any terminal processor 106, the application times of fault-tolerant change in the fault-tolerant change unit 107 are not less than 3, follow-up similar access of the system is not blocked after single change, and the unconventional operation report points generated by the normal setting production report points and the fault-tolerant change unit 107 in the security setting unit 104 are labeled in the overall report point unit 109 in a distinguishing manner.
The invention also comprises a method for limiting the access to the terminal system based on the web page, which comprises the following steps:
s1, setting management and control information:
s1.1: a manager selects any one computer of the terminal processors 106 to log in the central processing center 101 by using a password and an account, the terminal processors 106 corresponding to different areas are grouped by the security setting unit 104, then the security setting unit 104 sets the website which can be browsed by the computer, the time for starting the computer and the information of external equipment which can be communicated with the computer for signals, and stores the signals in the management configuration unit 103 for storage, and the macroscopic control is operated by corresponding grouping;
s1.2: the correspondingly grouped terminal processors 106 transmit the set management configuration set by the safety setting unit 104 in the step S1.1 to the signal transmission unit 105, and then record the management configuration as the conventional running data through the information overall unit 108, the terminal processors 106 receive the management configuration application set by the safety setting unit 104 in the non-step S1.1 from the operator for a plurality of operations, temporarily change the management configuration unit 103 of the terminal through the application information by the fault-tolerant changing unit 107, generate the non-conventional data, transmit the non-conventional data to the signal transmission unit 105 through the fault-tolerant changing unit 107, and then perform centralized overall recording on the conventional running data and the non-conventional data by the information overall unit 108, and perform the differentiated standard point display on the conventional running data and the non-conventional data by the overall point unit 109;
s2, data view and setup supplement: the administrator selects any computer of the terminal processor 106 again to log in the central processing center 101 by using the password and the account, and opens the management background to check the punctuation data and the functional configuration generated by the overall planning and reporting unit 109;
s3, macro regulation: if the frequency of the non-conventional data points does not reach the standard and the administrator determines that the setting is missed and the operation is valid, the security setting unit 104 adds the setting information and the function of the terminal processor 106 corresponding to the non-conventional data points.
The points to be finally explained are: first, in the description of the present application, it should be noted that, unless otherwise specified and limited, the terms "mounted," "connected," and "connected" should be understood broadly, and may be a mechanical connection or an electrical connection, or a communication between two elements, and may be a direct connection, and "upper," "lower," "left," and "right" are only used to indicate a relative positional relationship, and when the absolute position of the object to be described is changed, the relative positional relationship may be changed;
secondly, the method comprises the following steps: in the drawings of the disclosed embodiments of the invention, only the structures related to the disclosed embodiments are referred to, other structures can refer to common designs, and the same embodiment and different embodiments of the invention can be combined with each other without conflict;
and finally: the above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that are within the spirit and principle of the present invention are intended to be included in the scope of the present invention.

Claims (8)

1. A system for restricting access to a terminal based on a web page, comprising a central processing center (101), characterized in that: the input end of the central processing center (101) is provided with a system login unit (102), the output end of the central processing center (101) is provided with a management configuration unit (103) and a security setting unit (104), the output ends of the management configuration unit (103) and the safety setting unit (104) are provided with a terminal processor (106), the output end of the terminal processor (106) is provided with a signal conduction unit (105), the output end of the terminal processor (106) is also provided with a fault-tolerant change unit (107), the output end of the fault-tolerant changing unit (107) is arranged as a signal conduction unit (105), an information overall planning unit (108) is arranged at the output end of the signal conduction unit (105), an overall planning and point reporting unit (109) is arranged at the output end of the information overall planning unit (108), the output end of the overall reporting unit (109) is set as a central processing center (101);
the central processing center (101) is set as a center for a manager to issue control instructions and check information;
the system login unit (102) is used for a manager to log in a login interface of the central processing center (101);
the management configuration unit (103) is used for comprehensively managing webpage browsing and function configuration of each computer;
the safety setting unit (104) is used for setting and updating the setting data of the terminal computer by a user according to the requirement;
the signal transmission unit (105) is used for effectively transmitting data from the central processing center (101) to the terminal processor (106);
the terminal processor (106) is set as each computer to be managed and controlled;
the fault-tolerant modification unit (107) is used for performing data modification on error points of unconventional data requested by the terminal processor (106) for a plurality of times to enable the requests to pass;
the information overall planning unit (108) can carry out centralized overall production of the comprehensive information on the access data of the terminal processor (106) and the access change data of the fault-tolerant change unit (107);
the overall planning point reporting unit (109) is used for producing specific information source points for various signals of the information overall planning unit (108).
2. The system for restricting access to a terminal based on a web page of claim 1, wherein: the system login unit (102) logs in by adopting a login name and a login password and can log in a computer browser corresponding to any terminal processor (106).
3. The system for restricting access to a terminal based on a web page of claim 1, wherein: the application times of fault-tolerant change in the fault-tolerant change unit (107) are not less than 3, and subsequent access of the machine is not blocked after single change.
4. The system for restricting access to a terminal based on a web page of claim 1, wherein: the overall report point unit (109) is used for distinguishing and marking the normal set production report points in the safety setting unit (104) and the unconventional operation report points generated by the fault-tolerant changing unit (107).
5. The system for restricting access to a terminal based on a web page of claim 1, wherein: the signal conducting unit (105) is arranged for web network based wireless/fiber optic signal conducting.
6. A method for restricting access to a terminal system based on a web page according to any one of claims 1 to 5, characterized in that: the method comprises the following specific steps:
s1, setting management and control information:
s1.1: a manager selects any computer of the terminal processors (106) to log in a central processing center (101) by using a password and an account, the terminal processors (106) corresponding to different areas are grouped by the security setting unit (104), then the security setting unit (104) sets the website which can be browsed by the computer, the time for starting up and the information of external equipment which can be communicated with the computer for signals, and stores the signals in the management configuration unit (103), and the macroscopic control is operated by the corresponding groups;
s1.2: the management configuration set by the safety setting unit (104) in the step S1.1 is conducted to the signal conducting unit (105) by the corresponding grouped terminal processor (106), then the set regular information is recorded as regular running data through the information overall planning unit (108), the terminal processor (106) receives a management configuration application from the safety setting unit (104) in the step S1.1 operated by an operator for a plurality of times, the application information is temporarily changed for the management configuration unit (103) of the terminal processor through the fault-tolerant changing unit (107), the irregular data is generated, the irregular data is conducted to the signal conducting unit (105) through the fault-tolerant changing unit (107), then the regular running data and the irregular data are centrally recorded through the information overall planning unit (108), and the irregular running data and the irregular data are distinguished and displayed by the overall planning unit (109);
s2, data view and setup supplement: the manager selects any computer of the terminal processor (106) again to log in the central processing center (101) by using the password and the account, and opens the management background to check punctuation data and function configuration generated by the overall planning and reporting unit (109);
s3, macro regulation:
s3.1, if the frequency of the non-conventional data points reaches the standard and the manager judges that the setting is missed to effectively operate, the safety setting unit (104) increases the setting information and the function of the grouped terminal processor 106;
s3.2: if the frequency of the non-conventional data points does not reach the standard and the manager judges that the non-missing set effective operation is carried out, the manager locks the application behavior by the safety setting unit (104) and forbids the fault-tolerant changing unit (107) to change the application behavior again;
s3.3: if the frequency of the unconventional data points does not reach the standard and the administrator determines that the setting is missed and the operation is effective, the safety setting unit (104) increases the setting information and the function of the terminal processor (106) corresponding to the unconventional data points.
7. The method of claim 6, wherein the method comprises: the security setting related information corresponding to the terminal processors (106) of different groups in the step S1.1 is different.
8. The method of claim 6, wherein the method comprises: the frequency of the irregular data points in the step S3 is set to be more than 30% of the total number of the terminal processing machines (106) generating the same type of irregular data points.
CN202011006108.3A 2020-09-23 2020-09-23 Method and system for limiting access terminal based on web page Active CN112115462B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011006108.3A CN112115462B (en) 2020-09-23 2020-09-23 Method and system for limiting access terminal based on web page

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011006108.3A CN112115462B (en) 2020-09-23 2020-09-23 Method and system for limiting access terminal based on web page

Publications (2)

Publication Number Publication Date
CN112115462A true CN112115462A (en) 2020-12-22
CN112115462B CN112115462B (en) 2022-07-08

Family

ID=73800331

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011006108.3A Active CN112115462B (en) 2020-09-23 2020-09-23 Method and system for limiting access terminal based on web page

Country Status (1)

Country Link
CN (1) CN112115462B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917716A (en) * 2014-03-10 2015-09-16 腾讯科技(深圳)有限公司 Page security management method and device
CN107154934A (en) * 2017-04-24 2017-09-12 绿网天下(福建)网络科技股份有限公司 A kind of method of browser of mobile terminal filtering network address

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917716A (en) * 2014-03-10 2015-09-16 腾讯科技(深圳)有限公司 Page security management method and device
CN107154934A (en) * 2017-04-24 2017-09-12 绿网天下(福建)网络科技股份有限公司 A kind of method of browser of mobile terminal filtering network address

Also Published As

Publication number Publication date
CN112115462B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
WO2017053802A1 (en) System and method for detecting whether automatic login of user credentials to a web site has succeeded
US11777921B2 (en) Systems and methods for controlling personal information on online services
Zeufack et al. An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis
US20220229657A1 (en) Extensible resource compliance management
US11055480B2 (en) Crowd-source as a backup to asynchronous identification of a type of form and relevant fields in a credential-seeking web page
CN107645507A (en) A kind of data processing method, anti-swindle equipment and computer-readable recording medium
CN112115462B (en) Method and system for limiting access terminal based on web page
Wang et al. Asynchronous hierarchical federated learning
DE112021003167T5 (en) LOAD BALANCING IN PARALLEL DATA STREAM REGIONS
US11222028B2 (en) Report recommendation engine
CN111651766B (en) Method and device for testing unauthorized access
CN214591506U (en) Subway integrated monitoring system
CN109218437A (en) Office management system
Rojek et al. Case-based reasoning approach to control of industrial processes
US20240111856A1 (en) Providing password security in non-federated computing arrangements
Ranjithkumar et al. Security Information and Event Management (Siem) Performance in On-Premises and Cloud Based Siem: A Survey
Gao Intelligent Management Platform Design for Engineering Construction Project
CN116992462A (en) Plaintext information offline method based on big data transmission scene and related equipment thereof
Aguilar et al. Online performance introspection with IPM
CN116827604A (en) Application login control method, system, terminal and storage medium
CN117714454A (en) Flow control method, system, electronic equipment and medium
Xiao et al. The research on measurement method of knowledge work productivity
Lichun Design and Implementation of Power Quality Monitoring Systems
Stögerer et al. Distributed monitoring for component-based traffic management systems
Ailin et al. Application of IEC 61850 proxy in seamless communication between digital substation and control centre

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant