CN113111332A - Artificial intelligence real-time detection security attack system - Google Patents
Artificial intelligence real-time detection security attack system Download PDFInfo
- Publication number
- CN113111332A CN113111332A CN202110393611.7A CN202110393611A CN113111332A CN 113111332 A CN113111332 A CN 113111332A CN 202110393611 A CN202110393611 A CN 202110393611A CN 113111332 A CN113111332 A CN 113111332A
- Authority
- CN
- China
- Prior art keywords
- computer
- virus
- iris
- fingerprint
- vulnerability
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013473 artificial intelligence Methods 0.000 title claims abstract description 16
- 238000011897 real-time detection Methods 0.000 title claims abstract description 13
- 241000700605 Viruses Species 0.000 claims abstract description 52
- 230000008030 elimination Effects 0.000 claims abstract description 10
- 238000003379 elimination reaction Methods 0.000 claims abstract description 10
- 230000002349 favourable effect Effects 0.000 claims abstract description 8
- 238000001514 detection method Methods 0.000 claims abstract description 5
- 210000000554 iris Anatomy 0.000 claims description 46
- 238000002513 implantation Methods 0.000 claims description 6
- 238000000034 method Methods 0.000 claims description 6
- 230000000903 blocking effect Effects 0.000 claims description 3
- 230000006386 memory function Effects 0.000 claims description 3
- 230000009545 invasion Effects 0.000 abstract description 4
- 230000002155 anti-virotic effect Effects 0.000 description 2
- 239000007943 implant Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000003058 natural language processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention relates to the technical field of artificial intelligence, in particular to an artificial intelligence real-time detection security attack system, wherein a fingerprint input device and an iris collector are installed on a computer, then information input is carried out on personnel needing to use the computer, the fingerprint input device inputs fingerprints of the personnel, and the iris collector can collect iris eyes, and the system has the advantages that: through the website identification system who sets up, the invasion identification system, the vulnerability scanning system, alarm sound production system, virus elimination system, when visiting dangerous website, website identification system can stop its entering, vulnerability scanning system can scan the vulnerability that already exists in the computer, intrusion detection system can detect the virus that gets into this computer, when the vulnerability exists or virus invasion, alarm sound production system sends out the police dispatch newspaper, later virus elimination system eliminates the virus and the vulnerability of entering, this is favorable to carrying out all-round protection to computer system inside, prevent that it from being attacked by the virus inside.
Description
Technical Field
The invention relates to the technical field of artificial intelligence, in particular to an artificial intelligence real-time detection security attack system.
Background
The artificial intelligence is a new intelligent machine which can respond in a similar way of human intelligence, the research in the field comprises a robot, a language identification system, an image identification system, a natural language processing system, an expert system and the like, the artificial intelligence is mature from birth, the application field is expanded continuously, the artificial intelligence can be assumed to be a container of human intelligence, the artificial intelligence can simulate the information process of consciousness and thinking of people, the artificial intelligence is not human intelligence but can think like people and can exceed the human intelligence, and the artificial intelligence here refers to a computer;
most of the existing computer computers are repeatedly used by multiple people when in use, and the situation that whether a certain person implants viruses into a computer system or not in the use process cannot be determined, and specific personnel using the computer cannot be tracked; in addition, the existing computer kills computer viruses by installing antivirus software, which can kill part of viruses but cannot kill the viruses completely.
Disclosure of Invention
The invention aims to solve the problems that the existing computer in the prior art is mostly used by multiple people repeatedly when in use, and can not determine whether a certain person implants viruses into a computer system or not in the use process, and can not track specific personnel using the computer; the existing computer kills computer viruses by installing antivirus software, which can kill part of viruses but can not kill viruses comprehensively, and provides an artificial intelligent real-time detection security attack system.
In order to achieve the purpose, the invention adopts the following technical scheme:
an artificial intelligence real-time detection security attack system is designed, and the real-time detection security attack system comprises the following specific use steps:
the method comprises the following steps: firstly, a fingerprint input device and an iris collector are installed on a computer, then information input is carried out on personnel needing to use the computer, the fingerprint input device can input fingerprints of the personnel, and the iris collector can collect irises of eyes;
step two: the collected fingerprint and iris are transmitted into a computer system to generate a memory function, a fingerprint recognizer is arranged on a starting switch of the computer, then when a person uses the computer, the person needs to press the switch according to the switch, the fingerprint recognizer recognizes the person when the switch is pressed, so as to check whether the person using the computer is a person whose identity is already confirmed by the system, then an iris recognition instrument on the computer authenticates the iris of the person, so as to confirm whether the identity is in the identity recorded by the system, the fingerprint and the iris of the user are recognized, when the fingerprint recognized by the computer is consistent with the iris and the fingerprint and the iris recorded by the system, the computer starting switch is started, at the moment, the computer is started, when the fingerprint recognized by the computer is in and out with the iris and the fingerprint and the iris recorded by the system, the computer starting switch cannot be started, which is favorable for preventing strangers from using the computer, the risk of blocking the computer from the root for external implantation of viruses;
step three: after the computer is cut off by the risk of virus implantation, the risk of internal virus (the internal virus means that the computer is attacked maliciously or the virus coming from software) may exist, so a website identification system, an intrusion identification system, a vulnerability scanning system, an alarm sounding system and a virus elimination system need to be installed for the computer, when a dangerous website is visited, the website identification system can prevent the computer from entering the dangerous website, the vulnerability scanning system can scan the existing vulnerability in the computer, the intrusion detection system can detect the virus entering the computer, when the vulnerability exists or the virus invades, the alarm sounding system gives an alarm to remind, and then the virus elimination system eliminates the entering virus and the vulnerability, which is favorable for carrying out all-round protection on the computer.
Preferably, the computer starting switch is positioned on the front surface of the computer host, and the shape of the starting switch is circular.
Preferably, the camera is positioned at the top of the computer display, and the camera is linearly connected with the computer host.
Preferably, the fingerprint recorder is positioned at the top of the computer host, and the iris collector is positioned at the top of the front surface of the computer display.
Preferably, the alarm sounding system comprises an alarm, the alarm is a sound and light alarm, and the alarm is in linear connection with the computer host.
The artificial intelligence real-time detection security attack system provided by the invention has the beneficial effects that:
1. the fingerprint recognizer identifies the computer when the switch is pressed by the fingerprint recognizer and the iris recognizer, so that whether a person using the computer is a person whose identity is already confirmed by the system is checked, then the iris recognizer on the computer authenticates the iris of the person, so that whether the identity of the person is in the identity recorded by the system is confirmed, the fingerprint and the iris of a user are identified, when the fingerprint identified by the computer is consistent with the iris and the fingerprint and the iris recorded by the system, the computer starting switch is turned on, and when the fingerprint identified by the computer is in and out of the iris and the fingerprint and the iris recorded by the system, the computer starting switch cannot be started, so that strangers can be prevented from using the computer, and the risk that the computer is externally implanted with viruses is prevented from root causes;
2. through the website identification system who sets up, the invasion identification system, the vulnerability scanning system, the alarm sound production system, virus elimination system, when visiting dangerous website, website identification system can stop it to get into this dangerous website, vulnerability scanning system can scan the vulnerability that already exists in the computer, intrusion detection system can detect the virus that gets into this computer, when the vulnerability exists or the virus invasion, the alarm takes place that the system sends out the alarm sound and reminds, later virus elimination system eliminates the virus and the vulnerability of getting into, this is favorable to carrying out all-round protection to computer system inside, prevent that it from being attacked by the virus in inside.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1-2, an artificial intelligence real-time detection security attack system, the specific use steps of the real-time detection security attack system are as follows:
the method comprises the following steps: firstly, a fingerprint input device and an iris collector are installed on a computer, then information input is carried out on personnel needing to use the computer, the fingerprint input device can input fingerprints of the personnel, and the iris collector can collect irises of eyes;
step two: the collected fingerprint and iris are transmitted into a computer system to generate a memory function, a fingerprint recognizer is arranged on a starting switch of the computer, then when a person uses the computer, the person needs to press the switch according to the switch, the fingerprint recognizer recognizes the person when the switch is pressed, so as to check whether the person using the computer is a person whose identity is already confirmed by the system, then an iris recognition instrument on the computer authenticates the iris of the person, so as to confirm whether the identity is in the identity recorded by the system, the fingerprint and the iris of the user are recognized, when the fingerprint recognized by the computer is consistent with the iris and the fingerprint and the iris recorded by the system, the computer starting switch is started, at the moment, the computer is started, when the fingerprint recognized by the computer is in and out with the iris and the fingerprint and the iris recorded by the system, the computer starting switch cannot be started, which is favorable for preventing strangers from using the computer, the risk of blocking the computer from the root for external implantation of viruses;
step three: after the computer is cut off by the risk of virus implantation, the risk of internal virus (the internal virus means that the computer is attacked maliciously or the virus coming from software) may exist, so a website identification system, an intrusion identification system, a vulnerability scanning system, an alarm sounding system and a virus elimination system need to be installed for the computer, when a dangerous website is visited, the website identification system can prevent the computer from entering the dangerous website, the vulnerability scanning system can scan the existing vulnerability in the computer, the intrusion detection system can detect the virus entering the computer, when the vulnerability exists or the virus invades, the alarm sounding system gives an alarm to remind, and then the virus elimination system eliminates the entering virus and the vulnerability, which is favorable for carrying out all-round protection on the computer.
The computer starting switch is positioned on the front surface of the computer host, and the starting switch is circular; the computer starting switch is arranged on the front surface of the computer host, so that the starting switch is convenient to press.
The camera is positioned at the top of the computer display and is in linear connection with the computer host; through setting up the camera at the top of computer display, be convenient for take off user of service's whole face.
Wherein, the fingerprint recorder is positioned at the top of the computer host, and the iris collector is positioned at the top of the front surface of the computer display; the fingerprint input device is arranged at the top of the computer host, so that the input of fingerprints is convenient, and the iris collector is arranged on the front surface of the computer display, so that the iris can be conveniently identified at the optimal position.
The alarm sounding system comprises an alarm, the alarm is a sound and light alarm, and the alarm is in linear connection with the computer host; through setting up the siren, be convenient for remind the user when the virus invades.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (5)
1. An artificial intelligence real-time detection security attack system is characterized in that: the real-time detection security attack system comprises the following specific use steps:
the method comprises the following steps: firstly, a fingerprint input device and an iris collector are installed on a computer, then information input is carried out on personnel needing to use the computer, the fingerprint input device can input fingerprints of the personnel, and the iris collector can collect irises of eyes;
step two: the collected fingerprint and iris are transmitted into a computer system to generate a memory function, a fingerprint recognizer is arranged on a starting switch of the computer, then when a person uses the computer, the person needs to press the switch according to the switch, the fingerprint recognizer recognizes the person when the switch is pressed, so as to check whether the person using the computer is a person whose identity is already confirmed by the system, then an iris recognition instrument on the computer authenticates the iris of the person, so as to confirm whether the identity is in the identity recorded by the system, the fingerprint and the iris of the user are recognized, when the fingerprint recognized by the computer is consistent with the iris and the fingerprint and the iris recorded by the system, the computer starting switch is started, at the moment, the computer is started, when the fingerprint recognized by the computer is in and out with the iris and the fingerprint and the iris recorded by the system, the computer starting switch cannot be started, which is favorable for preventing strangers from using the computer, the risk of blocking the computer from the root for external implantation of viruses;
step three: after the computer is cut off by the risk of virus implantation, the risk of internal virus (the internal virus means that the computer is attacked maliciously or the virus coming from software) may exist, so a website identification system, an intrusion identification system, a vulnerability scanning system, an alarm sounding system and a virus elimination system need to be installed for the computer, when a dangerous website is visited, the website identification system can prevent the computer from entering the dangerous website, the vulnerability scanning system can scan the existing vulnerability in the computer, the intrusion detection system can detect the virus entering the computer, when the vulnerability exists or the virus invades, the alarm sounding system gives an alarm to remind, and then the virus elimination system eliminates the entering virus and the vulnerability, which is favorable for carrying out all-round protection on the computer.
2. The system of claim 1, wherein the computer start switch is located on a front surface of the computer host, and the start switch is circular.
3. The system according to claim 1, wherein the camera is located on top of a computer monitor, and the camera is connected to the computer host by a linear connection.
4. The system of claim 1, wherein the fingerprint writer is located on top of the computer host, and the iris collector is located on top of the front surface of the computer monitor.
5. The system for real-time detection of security attacks according to claim 1, wherein said alarm sound generating system comprises an alarm, said alarm is an acousto-optic alarm, and said alarm is connected to the host computer through a linear connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110393611.7A CN113111332A (en) | 2021-04-13 | 2021-04-13 | Artificial intelligence real-time detection security attack system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110393611.7A CN113111332A (en) | 2021-04-13 | 2021-04-13 | Artificial intelligence real-time detection security attack system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113111332A true CN113111332A (en) | 2021-07-13 |
Family
ID=76716292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110393611.7A Pending CN113111332A (en) | 2021-04-13 | 2021-04-13 | Artificial intelligence real-time detection security attack system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113111332A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579395A (en) * | 2024-01-16 | 2024-02-20 | 成都市思叠科技有限公司 | Method and system for scanning network security vulnerabilities by applying artificial intelligence |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286190A (en) * | 2007-04-13 | 2008-10-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and its fingerprint verification protecting method |
CN103699827A (en) * | 2013-12-20 | 2014-04-02 | 河北汉光重工有限责任公司 | Computer starting management mode |
CN107729732A (en) * | 2017-09-18 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of computer starting method and system based on information security |
CN109446818A (en) * | 2018-10-30 | 2019-03-08 | 大连多维互动数字科技有限公司 | A kind of novel computer starting method |
CN110717155A (en) * | 2018-07-11 | 2020-01-21 | 深圳市阿丹能量信息技术有限公司 | Vehicle-mounted identity recognition method and system |
CN110881049A (en) * | 2019-12-16 | 2020-03-13 | 淮安信息职业技术学院 | Computer network safety intelligent control system |
-
2021
- 2021-04-13 CN CN202110393611.7A patent/CN113111332A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286190A (en) * | 2007-04-13 | 2008-10-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and its fingerprint verification protecting method |
CN103699827A (en) * | 2013-12-20 | 2014-04-02 | 河北汉光重工有限责任公司 | Computer starting management mode |
CN107729732A (en) * | 2017-09-18 | 2018-02-23 | 郑州云海信息技术有限公司 | A kind of computer starting method and system based on information security |
CN110717155A (en) * | 2018-07-11 | 2020-01-21 | 深圳市阿丹能量信息技术有限公司 | Vehicle-mounted identity recognition method and system |
CN109446818A (en) * | 2018-10-30 | 2019-03-08 | 大连多维互动数字科技有限公司 | A kind of novel computer starting method |
CN110881049A (en) * | 2019-12-16 | 2020-03-13 | 淮安信息职业技术学院 | Computer network safety intelligent control system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117579395A (en) * | 2024-01-16 | 2024-02-20 | 成都市思叠科技有限公司 | Method and system for scanning network security vulnerabilities by applying artificial intelligence |
CN117579395B (en) * | 2024-01-16 | 2024-03-26 | 成都市思叠科技有限公司 | Method and system for scanning network security vulnerabilities by applying artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103400436A (en) | Access control system and control method thereof | |
CN101211483A (en) | Unattended bank safe precaution method | |
CN203250345U (en) | Access control system based on brain wave identity recognition | |
CN110795963A (en) | Monitoring method, device and equipment based on face recognition | |
CN105554026A (en) | Electronic record information security management system | |
CN111564224A (en) | Intelligent monitoring system with health monitoring function and implementation method thereof | |
CN202771441U (en) | Face recognition monitoring system | |
CN106803297A (en) | A kind of intelligent countering intrusions system | |
CN108200405A (en) | A kind of video monitoring system based on recognition of face | |
CN106970552B (en) | Switch control method, intelligent switch and mobile terminal | |
CN110525456A (en) | Train safe driving monitoring system and method | |
CN103806789A (en) | Intelligent safety box with iris recognition function | |
CN103226705A (en) | Searching system based on human face recognition | |
CN110097882A (en) | A kind of intelligent safety and defence system based on speech recognition technology | |
CN103247150A (en) | Fatigue driving preventing system | |
CN206039795U (en) | Self service bank's safe alarm system | |
CN108230517B (en) | Access control releasing method and device and electronic equipment | |
CN114187561A (en) | Abnormal behavior identification method and device, terminal equipment and storage medium | |
WO2016145842A1 (en) | Automobile anti-theft device and method | |
CN113111332A (en) | Artificial intelligence real-time detection security attack system | |
CN204929052U (en) | Internet security protection control intelligent management system | |
EP3828837A1 (en) | Frictionless security processing | |
US20230059889A1 (en) | Gate apparatus, control method of gate apparatus, and storage medium | |
CN111820880A (en) | Campus overlord early warning system and method | |
CN109194672A (en) | A kind of network intrusions warning system and method based on man machine language's interaction |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |